Auth Module


Table of Contents

1. Admin Guide
1.1. Overview
1.1.1. RFC 8760 Support (Strenghtened Authentication)
1.2. Nonce Security
1.3. Dependencies
1.3.1. OpenSIPS Modules
1.3.2. External Libraries or Applications
1.4. Exported Parameters
1.4.1. secret (string)
1.4.2. nonce_expire (integer)
1.4.3. rpid_prefix (string)
1.4.4. rpid_suffix (string)
1.4.5. realm_prefix (string)
1.4.6. rpid_avp (string)
1.4.7. username_spec (string)
1.4.8. password_spec (string)
1.4.9. calculate_ha1 (integer)
1.4.10. disable_nonce_check (int)
1.5. Exported Functions
1.5.1. www_challenge(realm[, qop[, algorithms]])
1.5.2. proxy_challenge(realm[, qop[, algorithms]])
1.5.3. consume_credentials()
1.5.4. is_rpid_user_e164()
1.5.5. append_rpid_hf()
1.5.6. append_rpid_hf(prefix, suffix)
1.5.7. pv_www_authorize(realm)
1.5.8. pv_proxy_authorize(realm)
2. Contributors
2.1. By Commit Statistics
2.2. By Commit Activity
3. Documentation
3.1. Contributors

List of Tables

2.1. Top contributors by DevScore(1), authored commits(2) and lines added/removed(3)
2.2. Most recently active contributors(1) to this module

List of Examples

1.1. secret parameter example
1.2. nonce_expire parameter example
1.3. rpid_prefix parameter example
1.4. rpid_suffix parameter example
1.5. realm_prefix parameter example
1.6. rpid_avp parameter example
1.7. username_spec parameter usage
1.8. password_spec parameter usage
1.9. calculate_ha1 parameter usage
1.10. disable_nonce_check parameter usage
1.11. www_challenge usage
1.12. proxy_challenge usage
1.13. consume_credentials example
1.14. is_rpid_user_e164 usage
1.15. append_rpid_hf usage
1.16. append_rpid_hf(prefix, suffix) usage
1.17. pv_www_authorize usage
1.18. pv_proxy_authorize usage

Chapter 1. Admin Guide

1.1. Overview

This is a module that provides common functions that are needed by other authentication related modules. Also, it can perform authentication taking username and password from pseudo-variables.

1.1.1. RFC 8760 Support (Strenghtened Authentication)

Starting with OpenSIPS 3.2, the auth, auth_db and uac_auth modules include support for two new digest authentication algorithms ("SHA-256" and "SHA-512-256"), according to the RFC 8760 specs.

1.2. Nonce Security

The authentication mechanism offers protection against sniffing intrusion. The module generates and verifies the nonces so that they can be used only once (in an auth response). This is done by having a lifetime value and an index associated with every nonce. Using only an expiration value is not good enough because,as this value has to be of few tens of seconds, it is possible for someone to sniff on the network, get the credentials and then reuse them in another packet with which to register a different contact or make calls using the others's account. The index ensures that this will never be possible since it is generated as unique through the lifetime of the nonce.

The default limit for the requests that can be authenticated is 100000 in 30 seconds. If you wish to adjust this you can decrease the lifetime of a nonce( how much time to wait for a reply to a challenge). However, be aware not to set it to a too smaller value.

However this mechanism does not work for architectures using a cluster of servers that share the same dns name for load balancing. In this case you can disable the nonce reusability check by setting the module parameter 'disable_nonce_check'.

1.3. Dependencies

1.3.1. OpenSIPS Modules

The module depends on the following modules (in the other words the listed modules must be loaded before this module):

  • signaling -- Signaling module

1.3.2. External Libraries or Applications

The following libraries or applications must be installed before running OpenSIPS with this module loaded:

  • none

1.4. Exported Parameters

1.4.1. secret (string)

Secret phrase used to calculate the nonce value. Must be exactly 32-character long.

The default is to use a random value generated from the random source in the core.

If you use multiple servers in your installation, and would like to authenticate on the second server against the nonce generated at the first one its necessary to explicitly set the secret to the same value on all servers. However, the use of a shared (and fixed) secret as nonce is insecure, much better is to stay with the default. Any clients should send the reply to the server that issued the request.

Example 1.1. secret parameter example

modparam("auth", "secret", "johndoessecretphrase")

1.4.2. nonce_expire (integer)

Nonces have limited lifetime. After a given period of time nonces will be considered invalid. This is to protect replay attacks. Credentials containing a stale nonce will be not authorized, but the user agent will be challenged again. This time the challenge will contain stale parameter which will indicate to the client that it doesn't have to disturb user by asking for username and password, it can recalculate credentials using existing username and password.

The value is in seconds and default value is 30 seconds.

Example 1.2. nonce_expire parameter example

modparam("auth", "nonce_expire", 15)   # Set nonce_expire to 15s

1.4.3. rpid_prefix (string)

Prefix to be added to Remote-Party-ID header field just before the URI returned from either radius or database.

Default value is .

Example 1.3. rpid_prefix parameter example

modparam("auth", "rpid_prefix", "Whatever <")

1.4.4. rpid_suffix (string)

Suffix to be added to Remote-Party-ID header field after the URI returned from either radius or database.

Default value is ;party=calling;id-type=subscriber;screen=yes.

Example 1.4. rpid_suffix parameter example

modparam("auth", "rpid_suffix", "@1.2.3.4>")

1.4.5. realm_prefix (string)

Prefix to be automatically strip from realm. As an alternative to SRV records (not all SIP clients support SRV lookup), a subdomain of the master domain can be defined for SIP purposes (like sip.mydomain.net pointing to same IP address as the SRV record for mydomain.net). By ignoring the realm_prefix sip., at authentication, sip.mydomain.net will be equivalent to mydomain.net .

Default value is empty string.

Example 1.5. realm_prefix parameter example

modparam("auth", "realm_prefix", "sip.")

1.4.6. rpid_avp (string)

Full AVP specification for the AVP which stores the RPID value. It used to transport the RPID value from authentication backend modules (auth_db or auth_radius) or from script to the auth function append_rpid_hf and is_rpid_user_e164.

If defined to NULL string, all RPID functions will fail at runtime.

Default value is $avp(rpid).

Example 1.6. rpid_avp parameter example

modparam("auth", "rpid_avp", "$avp(caller_rpid)")
		

1.4.7. username_spec (string)

This name of the pseudo-variable that will hold the username.

Default value is NULL.

Example 1.7. username_spec parameter usage

modparam("auth", "username_spec", "$var(username)")

1.4.8. password_spec (string)

This name of the pseudo-variable that will hold the password.

Default value is NULL.

Example 1.8. password_spec parameter usage

modparam("auth", "password_spec", "$var(password)")

1.4.9. calculate_ha1 (integer)

This parameter tells the server whether it should expect plaintext passwords in the pseudo-variable or a pre-calculated HA1 string.

If the parameter is set to 1 then the server will assume that the password_spec pseudo-variable contains plaintext passwords and it will calculate HA1 strings on the fly. If the parameter is set to 0 then the server assumes the pseudo-variable contains the HA1 strings directly and will not calculate them.

Default value of this parameter is 0.

Example 1.9. calculate_ha1 parameter usage

modparam("auth", "calculate_ha1", 1)

1.4.10. disable_nonce_check (int)

By setting this parameter you disable the security mechanism that protects against intrusion sniffing and does not allow nonces to be reused. But, because of the current implementation, having this enabled breaks auth for an architecture where load is balanced by having more servers with the same dns name. This parameter has to be set in this case.

Default value is 0 (enabled).

Example 1.10. disable_nonce_check parameter usage

modparam("auth", "disable_nonce_check", 1)

1.5. Exported Functions

1.5.1.  www_challenge(realm[, qop[, algorithms]])

The function challenges a user agent. It will generate one or more WWW-Authorize header fields containing a digest challenges, it will put the header field(s) into a response generated from the request the server is processing and will send the reply. Upon reception of such a reply the user agent should compute credentials and retry the request. For more information regarding digest authentication see RFC2617, RFC3261 and RFC8760.

Meaning of the parameters is as follows:

  • realm (string) - Realm is an opaque string that the user agent should present to the user so it can decide what username and password to use. Usually this is domain of the host the server is running on.

    If an empty string is used then the server will generate it from the request. In case of REGISTER request's To header field, domain will be used (because this header field represents a user being registered), for all other messages From header field domain will be used.

  • qop (string, optional) - Value of this parameter can be either auth, auth-int or both (separated by ,). When this parameter is set the server will put a qop parameter in the challenge. It is recommended to use the qop parameter, however there are still some user agents that cannot handle qop properly so we made this optional. On the other hand there are still some user agents that cannot handle request without a qop parameter too.

    Enabling this parameter does not improve security at the moment, because the sequence number is not stored and therefore could not be checked. Actually there is no information kept by the module during the challenge and response requests.

  • algorithms (string, optional) - Value of this parameter is a comma-separated list of digest algorithms to be offered for the UAC to use for authentication. Possible values are:

    • MD5
    • MD5-sess
    • SHA-256
    • SHA-256-sess
    • SHA-512-256
    • SHA-512-256-sess

    When the value is empty or not set, the only offered digest algorithm is MD5, to provide compatibility with pre-RFC8760 UAC implementations.

    Values can be listed in any order. The actual order of individual challenges in SIP response is defined by the RFC8760: from stronger algorithm to a weaker one.

This function can be used from REQUEST_ROUTE.

Example 1.11. www_challenge usage

...
if (!www_authorize("siphub.net", "subscriber")) {
	www_challenge("siphub.net", "auth,auth-int", "MD5,SHA-512-256");
}
...

1.5.2.  proxy_challenge(realm[, qop[, algorithms]])

The function challenges a user agent. It will generate a Proxy-Authorize header field containing a digest challenge, it will put the header field into a response generated from the request the server is processing and will send the reply. Upon reception of such a reply the user agent should compute credentials and retry the request. For more information regarding digest authentication see RFC2617, RFC3261 and RFC8760.

See the paragraph on www_challenge() parameters meaning for the description of the parameters.

This function can be used from REQUEST_ROUTE.

Example 1.12. proxy_challenge usage

...
$var(secure_algorithms) = "sha-256,sha-512-256";
...
if (!proxy_authorize("", "subscriber")) {
...
	proxy_challenge("", "auth", $var(secure_algorithms));  # Realm will be autogenerated
							       # MD5 won't be allowed
}
...

1.5.3.  consume_credentials()

This function removes previously authorized credentials from the message being processed by the server. That means that the downstream message will not contain credentials there were used by this server. This ensures that the proxy will not reveal information about credentials used to downstream elements and also the message will be a little bit shorter. The function must be called after www_authorize or proxy_authorize.

This function can be used from REQUEST_ROUTE.

Example 1.13. consume_credentials example

...
if (www_authorize("", "subscriber")) {
    consume_credentials();
}
...

1.5.4.  is_rpid_user_e164()

The function checks if the SIP URI received from the database or radius server and will potentially be used in Remote-Party-ID header field contains an E164 number (+followed by up to 15 decimal digits) in its user part. Check fails, if no such SIP URI exists (i.e. radius server or database didn't provide this information).

This function can be used from REQUEST_ROUTE.

Example 1.14. is_rpid_user_e164 usage

...
if (is_rpid_user_e164()) {
    # do something here
}
...

1.5.5.  append_rpid_hf()

Appends to the message a Remote-Party-ID header that contains header 'Remote-Party-ID: ' followed by the saved value of the SIP URI received from the database or radius server followed by the value of module parameter radius_rpid_suffix. The function does nothing if no saved SIP URI exists.

This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE.

Example 1.15. append_rpid_hf usage

...
append_rpid_hf();  # Append Remote-Party-ID header field
...

1.5.6.  append_rpid_hf(prefix, suffix)

This function is the same as append_rpid_hf(). The only difference is that it accepts two parameters--prefix and suffix to be added to Remote-Party-ID header field. This function ignores rpid_prefix and rpid_suffix parameters, instead of that allows to set them in every call.

Meaning of the parameters is as follows:

  • prefix (string) - Prefix of the Remote-Party-ID URI. The string will be added at the beginning of body of the header field, just before the URI.

  • suffix (string) - Suffix of the Remote-Party-ID header field. The string will be appended at the end of the header field. It can be used to set various URI parameters, for example.

This function can be used from REQUEST_ROUTE, FAILURE_ROUTE, BRANCH_ROUTE.

Example 1.16. append_rpid_hf(prefix, suffix) usage

...
# Append Remote-Party-ID header field
append_rpid_hf("", ";party=calling;id-type=subscriber;screen=yes");
...

1.5.7.  pv_www_authorize(realm)

The function verifies credentials according to RFC2617. If the credentials are verified successfully then the function will succeed and mark the credentials as authorized (marked credentials can be later used by some other functions). If the function was unable to verify the credentials for some reason then it will fail and the script should call www_challenge which will challenge the user again.

Negative codes may be interpreted as follows:

  • -5 (generic error) - some generic error occurred and no reply was sent out;

  • -4 (no credentials) - credentials were not found in request;

  • -3 (stale nonce) - stale nonce;

  • -2 (invalid password) - valid user, but wrong password;

  • -1 (invalid user) - authentication user does not exist.

Meaning of the parameters is as follows:

  • realm (string) - Realm is an opaque string that the user agent should present to the user so he can decide what username and password to use. Usually this is domain of the host the server is running on.

    If an empty string is used then the server will generate it from the request. In case of REGISTER requests To header field domain will be used (because this header field represents a user being registered), for all other messages From header field domain will be used.

This function can be used from REQUEST_ROUTE.

Example 1.17. pv_www_authorize usage

...
$var(username)="abc";
$var(password)="xyz";
if (!pv_www_authorize("opensips.org")) {
	www_challenge("opensips.org", "auth");
}
...

1.5.8.  pv_proxy_authorize(realm)

The function verifies credentials according to RFC2617. If the credentials are verified successfully then the function will succeed and mark the credentials as authorized (marked credentials can be later used by some other functions). If the function was unable to verify the credentials for some reason then it will fail and the script should call proxy_challenge which will challenge the user again. For more about the negative return codes, see the above function.

Meaning of the parameters is as follows:

  • realm (string) - Realm is an opaque string that the user agent should present to the user so he can decide what username and password to use. Usually this is domain of the host the server is running on.

    If an empty string is used then the server will generate it from the request. From header field domain will be used as realm.

This function can be used from REQUEST_ROUTE.

Example 1.18. pv_proxy_authorize usage

...
$var(username)="abc";
$var(password)="xyz";
if (!pv_proxy_authorize("")) {
	proxy_challenge("", "auth");  # Realm will be autogenerated
}
...

Chapter 2. Contributors

2.1. By Commit Statistics

Table 2.1. Top contributors by DevScore(1), authored commits(2) and lines added/removed(3)

 NameDevScoreCommitsLines ++Lines --
1. Jan Janak (@janakj)26910777176060
2. Bogdan-Andrei Iancu (@bogdan-iancu)5134704615
3. Daniel-Constantin Mierla (@miconda)39211136476
4. Maksym Sobolyev (@sobomax)3313587862
5. Liviu Chircu (@liviuchircu)2821206292
6. Jiri Kuthan (@jiriatipteldotorg)261966051
7. Vlad Patrascu (@rvlad-patrascu)1810420236
8. Razvan Crainea (@razvancrainea)12987102
9. Anca Vamanu12549777
10. Henning Westerholt (@henningw)118107100

All remaining contributors: Edson Gellert Schubert, Andrei Pelinescu-Onciul, Juha Heinanen (@juha-h), Dan Pascu (@danpascu), Zero King (@l2dy), Sergio Gutierrez, Anatoly Pidruchny, Konstantin Bokarius, Vlad Paiu (@vladpaiu), Peter Lemenkov (@lemenkov), Walter Doekes (@wdoekes), Nils Ohlmeier, Dusan Klinec (@ph4r05).

(1) DevScore = author_commits + author_lines_added / (project_lines_added / project_commits) + author_lines_deleted / (project_lines_deleted / project_commits)

(2) including any documentation-related commits, excluding merge commits. Regarding imported patches/code, we do our best to count the work on behalf of the proper owner, as per the "fix_authors" and "mod_renames" arrays in opensips/doc/build-contrib.sh. If you identify any patches/commits which do not get properly attributed to you, please submit a pull request which extends "fix_authors" and/or "mod_renames".

(3) ignoring whitespace edits, renamed files and auto-generated files

2.2. By Commit Activity

Table 2.2. Most recently active contributors(1) to this module

 NameCommit Activity
1. Liviu Chircu (@liviuchircu)Mar 2014 - May 2024
2. Maksym Sobolyev (@sobomax)Jan 2005 - Mar 2023
3. Vlad Patrascu (@rvlad-patrascu)May 2017 - Jun 2022
4. Bogdan-Andrei Iancu (@bogdan-iancu)Dec 2002 - Jan 2021
5. Zero King (@l2dy)Mar 2020 - Mar 2020
6. Razvan Crainea (@razvancrainea)Jun 2011 - Sep 2019
7. Peter Lemenkov (@lemenkov)Jun 2018 - Jun 2018
8. Dusan Klinec (@ph4r05)Dec 2015 - Dec 2015
9. Walter Doekes (@wdoekes)Feb 2014 - Feb 2014
10. Vlad Paiu (@vladpaiu)Mar 2012 - Mar 2012

All remaining contributors: Sergio Gutierrez, Dan Pascu (@danpascu), Anca Vamanu, Daniel-Constantin Mierla (@miconda), Konstantin Bokarius, Edson Gellert Schubert, Henning Westerholt (@henningw), Juha Heinanen (@juha-h), Anatoly Pidruchny, Jan Janak (@janakj), Jiri Kuthan (@jiriatipteldotorg), Andrei Pelinescu-Onciul, Nils Ohlmeier.

(1) including any documentation-related commits, excluding merge commits

Chapter 3. Documentation

3.1. Contributors

Last edited by: Maksym Sobolyev (@sobomax), Liviu Chircu (@liviuchircu), Vlad Patrascu (@rvlad-patrascu), Peter Lemenkov (@lemenkov), Razvan Crainea (@razvancrainea), Bogdan-Andrei Iancu (@bogdan-iancu), Sergio Gutierrez, Dan Pascu (@danpascu), Anca Vamanu, Daniel-Constantin Mierla (@miconda), Konstantin Bokarius, Edson Gellert Schubert, Henning Westerholt (@henningw), Jan Janak (@janakj).

Documentation Copyrights:

Copyright © 2005 Voice Sistem SRL

Copyright © 2002-2003 FhG FOKUS