Table of Contents
List of Tables
List of Examples
auth_date_freshness
parameterverify_date_freshness
parameterca_list
parameterca_dir
parametercrl_list
parametercrl_dir
parametere164_strict_mode
parametere164_max_length
parameterrequire_date_hdr
parameterstir_shaken_auth()
usagestir_shaken_verify()
usagestir_shaken_check()
usagestir_shaken_check_cert()
usageidentity
usageThis module adds support for implementing STIR/SHAKEN (RFC 8224, RFC 8588) Authentication and Verification services in OpenSIPS.
The following modules must be loaded before this module:
No dependencies on other OpenSIPS modules.
The maximum number of seconds that the value in the Date header field can be older than the current time.
This parameter is only relevant for the stir_shaken_auth() function.
The default value is 60.
Example 1.1. Set auth_date_freshness
parameter
... modparam("stir_shaken", "auth_date_freshness", 300) ...
The maximum number of seconds that the value in the Date header field can be older than the current time. Also, if the iat value in the PASSporT is different than the Date value, but remains within the permitted interval, it will be used in the verification process (for the reconstructed PASSporT) instead of the Date value.
If the require_date_hdr parameter is set to not required and the Date header is missing, the iat value will be used for this check instead.
This parameter is only relevant for the stir_shaken_verify() function.
The default value is 60.
Example 1.2. Set verify_date_freshness
parameter
... modparam("stir_shaken", "verify_date_freshness", 300) ...
Path to a file containing trusted CA certificates for the verifier. The certificates must be in PEM format, one after another.
Example 1.3. Set ca_list
parameter
... modparam("stir_shaken", "ca_list", "/stir_certs/ca_list.pem") ...
Path to a directory containing trusted CA certificates for the verifier. The certificates in the directory must be in hashed form, as described in the openssl documentation for the Hashed Directory Method.
Path to a file containing certificate revocation lists (CRLs) for the verifier.
Example 1.5. Set crl_list
parameter
... modparam("identity", "crl_list", "/stir_certs/crl_list.pem") ...
Path to a directory containing certificate revocation lists (CRLs) for the verifier. The CRLs in the directory must be in hashed form, as described in the openssl documentation for the Hashed Directory Method.
Require a leading "+" to be present in the originating/destination SHAKEN identity, on top of mandating an E.164 telephone number by default. Additionally, require the URI to be either a tel URI or a sip / sips URI with the user=phone parameter.
The default value is 0 (disabled).
This parameter allows the 15-digit number length restriction of the E.164 format to be bypassed. Especially useful in scenarios where various telephony number prefixes are in use, causing some numbers to exceed the standard maximum length.
The default value is 15.
Specifies whether the Date header is mandatory when doing verification with the stir_shaken_verify() function.
A value of 1 means required and 0 not required.
If the parameter is set to "not required" but the Date header is present in the message, the header value will be used as normally to check the freshness (as configured in the verify_date_freshness parameter). If the Date header is indeed missing, the value of the iat claim in the PASSporT will be used instead.
The default value is 1 (required).
This function performs the steps of an authentication service. Before calling this function though, you must ensure:
authority - the server is authoritative for the identity in question;
authentication - the originator is authorized to claim the given identity.
Meaning of the parameters is as follows:
attest (string) - value of the 'attest' claim to be included in the PASSporT. The following values can be used:
A or full
B or partial
C or gateway
origid (string) - value of the 'origid' claim to be included in the PASSporT. Treated by the module as an opaque string.
cert (string) - the X.509 certificate used to compute the signature, in PEM format.
pkey (string) - the private key used to compute the signature, in PEM format.
x5u (string) - value of the 'x5u' claim to be included in the PASSporT. Treated by the module as an opaque string.
orig (string, optional) - telephone number to be used as the originating identity in the PASSporT. If missing, this value will be derived from the SIP message.
dest (string, optional) - telephone number to be used as the destination identity in the PASSporT. If missing, this value will be derived from the SIP message.
out (string, no expand, optional) - name of an output variable to store the Identity header or the following flags:
req - the Identity header will be appended to the current request message;
rpl - the Identity header will be appended to all replies that will be generated by OpenSIPS for this request.
If this parameter is missing, the Identity header will be appended to the current request message.
If an output variable is provided, it should be given as a quoted string, eg. "$var(identity_hdr)".
The function returns the following values:
1: Success
-1: Internal error
-2: Identity header already exists
-3: Failed to derive identity from SIP message because the URI is not a telephone number
-4: Date header value is older than local policy for freshness
-5: The current time or Date header value does not fall within the certificate validity
This function can be used from REQUEST_ROUTE.
Example 1.10. stir_shaken_auth()
usage
... stir_shaken_auth("A", "4437c7eb-8f7a-4f0e-a863-f53a0e60251a", $var(cert), $var(privKey), "https://certs.example.org/cert.pem"); ...
This function performs the steps of an verification service.
Meaning of the parameters is as follows:
cert (string) - the X.509 certificate used to verify the signature, in PEM format.
err_code (var) - output variable that will store the SIP response code associated with an eventual error of the verification process.
err_reason (var) - output variable that will store the SIP response reason phrase associated with an eventual error of the verification process.
orig (string, optional) - telephone number to be used as the originating identity in the verification prcess. If missing, this value will be derived from the SIP message.
dest (string, optional) - telephone number to be used as the destination identity in the verification process. If missing, this value will be derived from the SIP message.
The function returns the following values:
1: Success
-1: Internal error
-2: No Identity or Date header found
-3: Failed to derive identity from SIP message because the URI is not a telephone number
-4: Invalid identity header
-5: Unsupported 'ppt' or 'alg' Identity header parameter
-6: Date header value is older than local policy for freshness
-7: The Date header value does not fall within the certificate validity
-8: Invalid certificate
-9: Signature does not verify successfully
This function can be used from REQUEST_ROUTE.
Example 1.11. stir_shaken_verify()
usage
... $var(rc) = stir_shaken_verify($var(cert), $var(err_code), $var(err_reason)); if ($var(rc) < -1) { send_reply($var(err_sip_code), $var(err_sip_reason)); exit; } ...
This function checks the Identity header in order to validate the STIR/SHAKEN information in terms of format. It detects issues such as: missing or badly formated PASSporT claims, unsupported extensions etc.
The function returns the following values:
1: Success
-1: Internal error
-2: No Identity header found
-3: Invalid identity header
-4: Unsupported 'ppt' or 'alg' Identity header parameter
This function can be used from REQUEST_ROUTE.
Example 1.12. stir_shaken_check()
usage
... if (stir_shaken_check()) { xlog("forwarding call to stir/shaken verification service\n"); ... } ...
This function checks if the current time falls within the given certificate's validity period.
The function returns the following values:
1: Success
-1: Internal error
-2: Certificate is not valid
This function can be used from REQUEST_ROUTE.
Example 1.13. stir_shaken_check_cert()
usage
... # update expired cached certificates cache_fetch("local", $identity(x5u), $var(cert)); if (!stir_shaken_check_cert($var(cert))) { rest_get($identity(x5u), $var(cert)); cache_store("local", $identity(x5u), $var(cert)); } ...
This is a read-only pseudo-variable that provides access to the parsed information from the Identity header, through the following subnames:
header - the entire PASSporT header;
x5u - the value of the 'x5u' PASSporT claim;
payload - the entire PASSporT payload;
attest - the value of the 'attest' PASSporT claim;
dest - the value of the 'tn' member of the 'dest' PASSporT claim;
iat - the value of the 'iat' PASSporT claim;
orig - the value of the 'tn' member of the 'orig' PASSporT claim;
origid - the value of the 'origid' PASSporT claim;
Example 1.14. identity
usage
... # acquire the certificate to use for the verification process $var(rc) = rest_get($identity(x5u), $var(cert)); if ($var(rc) < 0) { send_reply(436, "Bad Identity Info"); exit; } ... xlog("Verified caller:$identity(orig), attestation level: $identity(attest)\n"); ...
Table 2.1. Top contributors by DevScore(1), authored commits(2) and lines added/removed(3)
Name | DevScore | Commits | Lines ++ | Lines -- | |
---|---|---|---|---|---|
1. | Vlad Patrascu (@rvlad-patrascu) | 58 | 26 | 3129 | 324 |
2. | Liviu Chircu (@liviuchircu) | 22 | 17 | 246 | 120 |
3. | Maksym Sobolyev (@sobomax) | 4 | 2 | 18 | 18 |
4. | Razvan Crainea (@razvancrainea) | 4 | 2 | 8 | 9 |
5. | kworm83 | 4 | 2 | 7 | 2 |
6. | Kevin | 3 | 1 | 2 | 2 |
7. | John Burke (@john08burke) | 2 | 1 | 4 | 0 |
8. | Andriy Pylypenko (@bambyster) | 2 | 1 | 1 | 0 |
(1) DevScore = author_commits + author_lines_added / (project_lines_added / project_commits) + author_lines_deleted / (project_lines_deleted / project_commits)
(2) including any documentation-related commits, excluding merge commits. Regarding imported patches/code, we do our best to count the work on behalf of the proper owner, as per the "fix_authors" and "mod_renames" arrays in opensips/doc/build-contrib.sh. If you identify any patches/commits which do not get properly attributed to you, please submit a pull request which extends "fix_authors" and/or "mod_renames".
(3) ignoring whitespace edits, renamed files and auto-generated files
Table 2.2. Most recently active contributors(1) to this module
Name | Commit Activity | |
---|---|---|
1. | Liviu Chircu (@liviuchircu) | Nov 2019 - Sep 2023 |
2. | Kevin | Feb 2022 - Feb 2022 |
3. | kworm83 | Jan 2022 - Jan 2022 |
4. | Vlad Patrascu (@rvlad-patrascu) | Oct 2019 - Aug 2021 |
5. | Razvan Crainea (@razvancrainea) | Jan 2021 - Jul 2021 |
6. | John Burke (@john08burke) | Apr 2021 - Apr 2021 |
7. | Maksym Sobolyev (@sobomax) | Jan 2021 - Jan 2021 |
8. | Andriy Pylypenko (@bambyster) | Aug 2020 - Aug 2020 |
(1) including any documentation-related commits, excluding merge commits
Last edited by: Liviu Chircu (@liviuchircu), Vlad Patrascu (@rvlad-patrascu).
Documentation Copyrights:
Copyright © 2019 www.opensips-solutions.com