Commit Graph

294 Commits

Author SHA1 Message Date
Anthony Minessale 94763ea52b FS-4681 --resolve 2012-11-01 13:07:47 -05:00
Anthony Minessale 68e0b7e859 optimize sofia sql by using new core transaction processor we will no longer support databases that do not support transactions 2012-10-25 11:31:47 -05:00
Anthony Minessale 986fede6b0 make a way to get the jitter buffer down to the codecs 2012-10-18 15:29:00 -04:00
Anthony Minessale 337d2bc7b6 add cdr refresh to bridge/unbridge 2012-10-12 12:23:56 -05:00
Anthony Minessale 4dae523bca tweak the session level logging to work on the console too 2012-10-11 12:44:31 -05:00
Anthony Minessale 21d19b6100 add switch_core_session_findall_matching_var func to core to get a list of uuid with a certian var set to a certian val 2012-10-11 09:57:02 -05:00
Anthony Minessale 2f9304dcda add assert 2012-10-09 11:47:39 -05:00
Anthony Minessale da0ff2d615 FS-4697 --resolve 2012-10-07 09:40:30 -05:00
Anthony Minessale 464155c5cd more priority tweaks 2012-10-01 10:20:48 -05:00
Anthony Minessale 06a3266360 FS-4655 its not a bug its a behaviour request, try this patch 2012-09-27 14:27:28 -05:00
Anthony Minessale 7d2e742feb tweak 2012-08-30 16:52:34 -05:00
Anthony Minessale ada8b78393 FS-4573 --resolve 2012-08-29 11:46:36 -05:00
Anthony Minessale 3c685bff25 fix double sessions on auth challenged calls 2012-08-29 10:38:37 -05:00
Stefan Knoblich a436a3e962 FreeSWITCH: Fix format string error in witch_core_session_thread_pool_worker().
Fixes:
    cc1: warnings being treated as errors
    src/switch_core_session.c: In function 'switch_core_session_thread_pool_worker':
    src/switch_core_session.c:1478: warning: format '%ld' expects type 'long int', but argument 9 has type 'switch_size_t'
    src/switch_core_session.c:1483: warning: format '%ld' expects type 'long int', but argument 9 has type 'switch_size_t'
    gmake[2]: *** [libfreeswitch_la-switch_core_session.lo] Error 1

Signed-off-by: Stefan Knoblich <stkn@openisdn.net>
2012-08-24 00:51:36 +02:00
Anthony Minessale 66677c940a move recovery engine up into the core 2012-08-22 16:27:07 -05:00
Anthony Minessale 33e642e98c remove unused resurrect code 2012-08-22 16:27:07 -05:00
Anthony Minessale e008af0e50 refactor some unneeded code and move artoo code into the core 2012-08-22 10:08:20 -05:00
Anthony Minessale ebc2e8d01b update to session thread cache 2012-08-22 09:52:20 -05:00
Anthony Minessale 3dcf89e472 add timeout 2012-08-21 09:58:27 -05:00
Anthony Minessale 17faa239fe ammendment to last commit 2012-08-21 00:39:56 -05:00
Anthony Minessale 142c051d68 cache session threads and reuse them if possible 2012-08-21 00:14:50 -05:00
Anthony Minessale cc351ca004 revert 2012-08-16 12:09:19 -05:00
Anthony Minessale 42bf44de51 FS-4539 please test this and post new logs if necessary 2012-08-16 11:56:55 -05:00
Anthony Minessale bb69310259 FS-4079 FS-4540 please update to this version 2012-08-15 22:51:41 -05:00
Anthony Minessale e5a15cde31 debug lost read lock 2012-08-15 15:11:57 -05:00
Anthony Minessale 3708c96257 add uuid to event socket apps 2012-07-02 15:12:55 -05:00
Anthony Minessale 8b4c9dc42c FS-3659 and some refactor for rtcp ice and video ice and rtcp 2012-06-22 18:15:06 -05:00
Anthony Minessale 8bb55ed4bf abstract out originate_signal_bond to a function to avoid confustion and regressions 2012-05-29 13:10:15 -05:00
Travis Cross 23f8967c32
add enhanced zrtp passthrough (zrtp passthru) mode
ZRTP passthrough mode allows two ZRTP-capable clients to negotiate an
end-to-end security association through FreeSWITCH.  The clients are
therefore able to be certain that the FreeSWITCH instance mediating
the call cannot eavesdrop on their conversation.

Importantly, this capability is maintained across multiple FreeSWITCH
hops.  If widely deployed, this enables a global network architecture
where two people can speak securely with strong cryptographically
protected authentication and confidentiality.

With this commit we implement a zrtp-passthru mode that handles all
the details of the negotiation intelligently.  This mode can be
selected by setting the boolean parameter inbound-zrtp-passthru in the
sofia profile.  This will also force late-negotiation as it is
essential for correctly negotiating an end-to-end ZRTP security
association.

When an incoming call with a zrtp-hash is received and this mode is
enabled, we find the first audio and the first video zrtp-hash in the
SDP and store them as remote values on this channel.  Once a b-leg is
available, we set the local zrtp-hash values on that channel to the
remote zrtp-hash values collected from the a-leg.

Because zrtp-passthru absolutely requires that the channels negotiate
the same codec, we offer to the b-leg only codecs that the a-leg can
speak.  Once the b-leg accepts a codec, we will force that choice onto
the a-leg.

If the b-leg sends us zrtp-hash values in the signaling, we store
those as remote values on the b-leg and copy them to the local values
on the a-leg.

At this point, each leg has the zrtp-hash values from the other, and
we know we can do ZRTP passthrough mode on the call.  We send the
b-leg's zrtp-hash back to the a-leg in the 200 OK.

We then enable UDPTL mode on the rtp streams for both the audio and
the video so that we don't interfere in the ZRTP negotiation.

If the b-leg fails to return a zrtp-hash in the signaling, we set up a
ZRTP security association with the a-leg ourselves, if we are so
equipped.  Likewise, if the a-leg fails to send a zrtp-hash in the
signaling, we attempt to set up a ZRTP security association ourselves
with the b-leg.

The zrtp-passthru mode can also be enabled in the dialplan by setting
the boolean channel variable zrtp_passthru.  If enabled in this
manner, we can't force late-negotiation, so the user would need to be
sure this is configured.

If ZRTP passthrough mode is not enabled in either manner, this change
should have no effect.

Channel variables for each of the various zrtp-hash values are set,
though it is anticipated that there is no good reason to use them, so
they may be removed without warning.  For checking whether zrtp
passthrough mode was successful, we provide the channel variable
zrtp_passthru_active which is set on both legs.

Though not implemented by this commit, the changes here should make it
more straightforward to add correct zrtp-hash values to the signaling
and verify that correct hello hash values are received when FreeSWITCH
is acting as a terminating leg of the ZRTP security association.

A historical note...

This commit replaces the recently-added sdp_zrtp_hash_string method,
commit 2ab1605a88.

This prior method sets a channel variable from the a-leg's zrtp-hash,
then relies on the dialplan to export this channel variable to the
b-leg, where it is put into the SDP.

While it was a great start and wonderful for testing, this approach
has some drawbacks that motivated the present work:

 * There's no good way to pass the zrtp-hash from the b-leg back to
   the a-leg.  In fact, the implementation seems to send the a-leg's
   zrtp-hash back to the originating client in the 200 OK.  This is
   not correct.

 * To support video, we'd need to have a separate dialplan variable,
   and the dialplan author would need to deal with that explicitly.

 * The API is problematic as it requires the dialplan author to
   understand intricate details of how ZRTP works to implement a
   correct dialplan.  Further, by providing too fine-grained control
   (but at the same time, not enough control) it would limit our
   ability to make the behavior smarter once people started relying on
   this.
2012-05-24 20:39:03 +00:00
Anthony Minessale 07204a1fb5 add param:confirm-blind-transfer var:confirm_blind_transfer that makes blind transfers keep the transferrer on the line until its confirmed that the call was completed or brings it back to the bridge. blind_transfer_ack app can be executed in the dp by the transferee to indicate sucess or fail or a sucessful bridge will automatically trigger a success 2012-05-08 08:50:41 -05:00
Anthony Minessale d5766ceaa0 FS-4115 --resolve this should fix it in all circumstances 2012-04-23 13:25:21 -05:00
Ken Rice c5554eb939 Copyright date update. 2012-04-18 11:52:02 -05:00
Anthony Minessale 19f441c6f4 move relevant portion of display update code into the core and fix mod_loopback bug involving passing display updates across properly 2012-04-17 16:13:41 -05:00
Anthony Minessale 44e5691223 FS-4107 --resolve 2012-04-13 07:33:00 -05:00
Anthony Minessale 995ae2621c FS-3769 --resolve 2012-04-10 16:17:16 -05:00
Anthony Minessale 8618e22c9d FS-4053 try this 2012-03-30 14:24:50 -05:00
Anthony Minessale e31a35a7be FS-3973 --resolve we can go with this for now and ponder the other problem for later 2012-03-09 11:43:37 -06:00
Anthony Minessale a822421be1 FS-3901 FS-3870 yay a chain of regressions 2012-02-16 16:09:41 -06:00
Anthony Minessale f24f2b3a1c FS-3901 --resolve alternate solution to FS-3870 2012-02-16 10:20:55 -06:00
Anthony Minessale 8fedd51d37 missing comma 2012-01-09 10:03:51 -06:00
Anthony Minessale 6e7d44af42 FS-3764 --resolve 2011-12-14 13:23:54 -06:00
Anthony Minessale 0120b39f0a add string 2011-12-13 14:16:16 -06:00
Anthony Minessale 9ecf187dd9 use the non-signal checking version of switch_channel_up/down in the core 2011-11-18 13:18:04 -06:00
Anthony Minessale ba14f95d81 FS-3678 --resolve 2011-11-08 08:02:17 -06:00
Anthony Minessale fe3e93567f add session_id variable 2011-11-02 12:37:31 -05:00
Anthony Minessale fd495dbbe1 FS-3640 try this patch, not sure what you are doing because I can recover 300 channels fine. I added a patch to deal with what looks like corrupted data in the cdr or something so it should fail more gracefully 2011-10-26 09:00:59 -05:00
Anthony Minessale bad5964b94 FS-3589 --resolve 2011-10-24 08:47:08 -05:00
Anthony Minessale 2094f2d33b add fsctl sync_clock_when_idle so you can sync the clock but have it not do it till there are 0 calls 2011-10-12 14:55:32 -05:00
Anthony Minessale 65836742e8 fix missing null dmachine check 2011-10-04 14:37:48 -05:00
Anthony Minessale 3a2f818387 make app to turn on new zombie exec instead of always doing it 2011-09-13 17:12:37 -05:00