Re: Trouble with SQLPasswordAuth

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Sat 27 June 2004 18:55, Michal Zygmuntowicz wrote:
> Probably you need to modify your Gatekeeper::Auth section
> to not contain default=reject line (or change it to default=accept).
> The stack of modules configured in the Gatekeeper::Auth section
> is processed sequentially with each message (GRQ, RRQ, ARQ, ...).
> If you have default=reject rule at the end, all requests not
> accepted or rejected by preceding modules are rejected by this
> last line.

Now I have following in my gatekeeper.ini:
[Gatekeeper::Auth]
SQLPasswordAuth=required;RRQ
default=allow;GRQ

Gatekeeper gets GRQ, RRQ.
If I login with propably user name and propably password athentication passes.
If I login with wrong user name athentication failes.
But if I login with propably user and wrong password athentication passes!!!

So the problem has slightly changed:
It doesn't matter what password I type.  Gatekeeper checks only username and
does not compare passwords.






2004/06/27 19:37:59.650	2	      RasSrv.cxx(2392)	GK	Read from 10.0.0.81:4552
2004/06/27 19:37:59.650	3	      RasSrv.cxx(2405)	GK
gatekeeperRequest {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        0a 00 00 51                                        ...Q
      }
      port = 4552
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  3 octets {
          00 00 00                                           ...
        }
        versionId =  26 octets {
          31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 19:37:59.650	1	      RasSrv.cxx(900)	GK	GRQ Received
2004/06/27 19:37:59.650	4	        gkauth.h(82)	GkAuth	default check ok
2004/06/27 19:37:59.651	4	      RasSrv.cxx(2470)	GK	GCF will select 
authentication mechanism: pwdHash <<null>> and algorithm OID: 
1.2.840.113549.2.5
2004/06/27 19:37:59.651	2	      RasSrv.cxx(975)	GCF|10.0.0.81|jacek:h323_ID|
terminal; 

2004/06/27 19:37:59.651	3	      RasSrv.cxx(2332)	GK	Send to 10.0.0.81:4552
gatekeeperConfirm {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1719
    }
    authenticationMode = pwdHash <<null>>
    algorithmOID = 1.2.840.113549.2.5
  }
2004/06/27 19:37:59.652	2	      RasSrv.cxx(2392)	GK	Read from 192.168.0.1:4553
2004/06/27 19:37:59.653	3	      RasSrv.cxx(2405)	GK
gatekeeperRequest {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 01                                        ....
      }
      port = 4553
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  3 octets {
          00 00 00                                           ...
        }
        versionId =  26 octets {
          31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 19:37:59.653	1	      RasSrv.cxx(900)	GK	GRQ Received
2004/06/27 19:37:59.653	4	        gkauth.h(82)	GkAuth	default check ok
2004/06/27 19:37:59.653	4	      RasSrv.cxx(2470)	GK	GCF will select 
authentication mechanism: pwdHash <<null>> and algorithm OID: 
1.2.840.113549.2.5
2004/06/27 19:37:59.653	2	      RasSrv.cxx(975)	GCF|192.168.0.1|jacek:h323_ID|
terminal; 

2004/06/27 19:37:59.653	3	      RasSrv.cxx(2332)	GK	Send to 192.168.0.1:4553
gatekeeperConfirm {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1719
    }
    authenticationMode = pwdHash <<null>>
    algorithmOID = 1.2.840.113549.2.5
  }
2004/06/27 19:37:59.654	2	      RasSrv.cxx(2392)	GK	Read from 
192.168.176.1:4554
2004/06/27 19:37:59.655	3	      RasSrv.cxx(2405)	GK
gatekeeperRequest {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 b0 01                                        ....
      }
      port = 4554
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  3 octets {
          00 00 00                                           ...
        }
        versionId =  26 octets {
          31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 19:37:59.655	1	      RasSrv.cxx(900)	GK	GRQ Received
2004/06/27 19:37:59.655	4	        gkauth.h(82)	GkAuth	default check ok
2004/06/27 19:37:59.655	4	      RasSrv.cxx(2470)	GK	GCF will select 
authentication mechanism: pwdHash <<null>> and algorithm OID: 
1.2.840.113549.2.5
2004/06/27 19:37:59.655	2	      RasSrv.cxx(975)	GCF|192.168.176.1|
jacek:h323_ID|terminal; 

2004/06/27 19:37:59.655	3	      RasSrv.cxx(2332)	GK	Send to 192.168.176.1:4554
gatekeeperConfirm {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1719
    }
    authenticationMode = pwdHash <<null>>
    algorithmOID = 1.2.840.113549.2.5
  }
2004/06/27 19:37:59.656	2	      RasSrv.cxx(2392)	GK	Read from 
192.168.187.1:4555
2004/06/27 19:37:59.657	3	      RasSrv.cxx(2405)	GK
gatekeeperRequest {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 bb 01                                        ....
      }
      port = 4555
    }
    endpointType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  3 octets {
          00 00 00                                           ...
        }
        versionId =  26 octets {
          31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    endpointAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    authenticationCapability = 2 entries {
      [0]=pwdHash <<null>>
      [1]=authenticationBES radius <<null>>
    }
    algorithmOIDs = 3 entries {
      [0]=0.0.8.235.0.2.6
      [1]=1.2.840.113549.2.5
      [2]=1.2.840.113548.10.1.2.1
    }
    supportsAltGK = <<null>>
  }
2004/06/27 19:37:59.657	1	      RasSrv.cxx(900)	GK	GRQ Received
2004/06/27 19:37:59.657	4	        gkauth.h(82)	GkAuth	default check ok
2004/06/27 19:37:59.657	4	      RasSrv.cxx(2470)	GK	GCF will select 
authentication mechanism: pwdHash <<null>> and algorithm OID: 
1.2.840.113549.2.5
2004/06/27 19:37:59.657	2	      RasSrv.cxx(975)	GCF|192.168.187.1|
jacek:h323_ID|terminal; 

2004/06/27 19:37:59.657	3	      RasSrv.cxx(2332)	GK	Send to 192.168.187.1:4555
gatekeeperConfirm {
    requestSeqNum = 50262
    protocolIdentifier = 0.0.8.2250.0.4
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    rasAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1719
    }
    authenticationMode = pwdHash <<null>>
    algorithmOID = 1.2.840.113549.2.5
  }
2004/06/27 19:37:59.675	2	      RasSrv.cxx(2392)	GK	Read from 10.0.0.81:4552
2004/06/27 19:37:59.675	3	      RasSrv.cxx(2405)	GK
registrationRequest {
    requestSeqNum = 50263
    protocolIdentifier = 0.0.8.2250.0.4
    discoveryComplete = TRUE
    callSignalAddress = 4 entries {
      [0]=ipAddress {
        ip =  4 octets {
          0a 00 00 51                                        ...Q
        }
        port = 1720
      }
      [1]=ipAddress {
        ip =  4 octets {
          c0 a8 00 01                                        ....
        }
        port = 1720
      }
      [2]=ipAddress {
        ip =  4 octets {
          c0 a8 b0 01                                        ....
        }
        port = 1720
      }
      [3]=ipAddress {
        ip =  4 octets {
          c0 a8 bb 01                                        ....
        }
        port = 1720
      }
    }
    rasAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          0a 00 00 51                                        ...Q
        }
        port = 4552
      }
    }
    terminalType = {
      vendor = {
        vendor = {
          t35CountryCode = 9
          t35Extension = 0
          manufacturerCode = 61
        }
        productId =  3 octets {
          00 00 00                                           ...
        }
        versionId =  26 octets {
          31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
          76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
        }
      }
      terminal = {
      }
      mc = FALSE
      undefinedNode = FALSE
    }
    terminalAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    endpointVendor = {
      vendor = {
        t35CountryCode = 9
        t35Extension = 0
        manufacturerCode = 61
      }
      productId =  3 octets {
        00 00 00                                           ...
      }
      versionId =  26 octets {
        31 2e 30 2e 31 20 28 4f  70 65 6e 48 33 32 33 20   1.0.1 (OpenH323 
        76 31 2e 31 34 2e 31 29  00 00                     v1.14.1)..
      }
    }
    cryptoTokens = 1 entries {
      [0]=cryptoEPPwdHash {
        alias = h323_ID  5 characters {
          006a 0061 0063 0065 006b                  jacek
        }
        timeStamp = 1088357867
        token = {
          algorithmOID = 1.2.840.113549.2.5
          paramS = {
          }
          hash = Hex:  c8 2a e0 92 73 9c f6 17  ca a9 89 ef 7b c0 28 41 
        }
      }
    }
    keepAlive = FALSE
    willSupplyUUIEs = TRUE
    maintainConnection = FALSE
    supportsAltGK = <<null>>
    usageReportingCapability = {
      nonStandardUsageTypes = 0 entries {
      }
      startTime = <<null>>
      endTime = <<null>>
      terminationCause = <<null>>
    }
    callCreditCapability = {
      canDisplayAmountString = TRUE
      canEnforceDurationLimit = TRUE
    }
  }
2004/06/27 19:37:59.676	1	      RasSrv.cxx(1002)	GK	RRQ Received
2004/06/27 19:37:59.676	4	      gkauth.cxx(884)	GkAuth	jacek password match 
(MD5)
2004/06/27 19:37:59.676	4	      gkauth.cxx(444)	GkAuth	SQLPasswordAuth check 
ok
2004/06/27 19:37:59.676	1	      RasTbl.cxx(64)	New EP|10.0.0.81:1720|
jacek:h323_ID|terminal|9008_endp 

2004/06/27 19:37:59.677	2	      RasSrv.cxx(1257)	RCF|10.0.0.81:1720|
jacek:h323_ID|terminal|9008_endp; 

2004/06/27 19:37:59.677	3	      RasSrv.cxx(2332)	GK	Send to 10.0.0.81:4552
registrationConfirm {
    requestSeqNum = 50263
    protocolIdentifier = 0.0.8.2250.0.4
    callSignalAddress = 1 entries {
      [0]=ipAddress {
        ip =  4 octets {
          c0 a8 00 05                                        ....
        }
        port = 0
      }
    }
    terminalAlias = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    endpointIdentifier =  9 characters {
      0039 0030 0030 0038 005f 0065 006e 0064   9008_end
      0070                                      p
    }
    timeToLive = 600
    willRespondToIRR = FALSE
    maintainConnection = FALSE
  }
2004/06/27 19:37:59.703	2	      RasSrv.cxx(2392)	GK	Read from 10.0.0.81:4552
2004/06/27 19:37:59.704	3	      RasSrv.cxx(2405)	GK
admissionRequest {
    requestSeqNum = 50264
    callType = pointToPoint <<null>>
    endpointIdentifier =  9 characters {
      0039 0030 0030 0038 005f 0065 006e 0064   9008_end
      0070                                      p
    }
    destinationInfo = 1 entries {
      [0]=h323_ID  6 characters {
        006d 0061 006e 0075 0069 0061             manuia
      }
    }
    destCallSignalAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1720
    }
    srcInfo = 1 entries {
      [0]=h323_ID  5 characters {
        006a 0061 0063 0065 006b                  jacek
      }
    }
    bandWidth = 200000
    callReferenceValue = 7839
    conferenceID =  16 octets {
      5c d8 18 3f 6c f0 18 10  8d 0e 00 40 05 3f 19 f8   \..?l......@.?..
    }
    activeMC = FALSE
    answerCall = FALSE
    canMapAlias = TRUE
    callIdentifier = {
      guid =  16 octets {
        42 d2 18 3f 6c f0 18 10  8d 0e 00 40 05 3f 19 f8   B..?l......@.?..
      }
    }
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    cryptoTokens = 1 entries {
      [0]=cryptoEPPwdHash {
        alias = h323_ID  5 characters {
          006a 0061 0063 0065 006b                  jacek
        }
        timeStamp = 1088357867
        token = {
          algorithmOID = 1.2.840.113549.2.5
          paramS = {
          }
          hash = Hex:  c8 2a e0 92 73 9c f6 17  ca a9 89 ef 7b c0 28 41 
        }
      }
    }
    willSupplyUUIEs = TRUE
  }
2004/06/27 19:37:59.704	1	      RasSrv.cxx(1414)	GK	ARQ Received
2004/06/27 19:37:59.705	3	      RasSrv.cxx(1716)	GK	ARQ will request bandwith 
of 200000
2004/06/27 19:37:59.705	2	      RasTbl.cxx(2005)	CallTable::Insert(CALL) Call 
No. 1, total sessions : 1
2004/06/27 19:37:59.705	2	      RasSrv.cxx(1830)	ACF|10.0.0.81:1720|9008_endp|
7839|manuia:h323_ID|jacek:h323_ID|false; 

2004/06/27 19:37:59.705	3	      RasSrv.cxx(2332)	GK	Send to 10.0.0.81:4552
admissionConfirm {
    requestSeqNum = 50264
    bandWidth = 200000
    callModel = direct <<null>>
    destCallSignalAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1720
    }
    irrFrequency = 120
    willRespondToIRR = FALSE
    uuiesRequested = {
      setup = FALSE
      callProceeding = FALSE
      connect = FALSE
      alerting = FALSE
      information = FALSE
      releaseComplete = FALSE
      facility = FALSE
      progress = FALSE
      empty = FALSE
      status = FALSE
      statusInquiry = FALSE
      setupAcknowledge = FALSE
      notify = FALSE
    }
  }
2004/06/27 19:37:59.894	2	      RasSrv.cxx(2392)	GK	Read from 
192.168.0.5:33570
2004/06/27 19:37:59.895	3	      RasSrv.cxx(2405)	GK
admissionRequest {
    requestSeqNum = 42083
    callType = pointToPoint <<null>>
    endpointIdentifier =  9 characters {
      0039 0030 0030 0037 005f 0065 006e 0064   9007_end
      0070                                      p
    }
    destinationInfo = 1 entries {
      [0]=h323_ID  12 characters {
        0063 006f 006d 006d 0075 006e 0069 0063   communic
        0061 0074 006f 0072                       ator
      }
    }
    destCallSignalAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 05                                        ....
      }
      port = 1720
    }
    srcInfo = 1 entries {
      [0]=h323_ID  19 characters {
        006a 0061 0063 0065 006b 0020 005b 0031   jacek [1
        0039 0032 002e 0031 0036 0038 002e 0030   92.168.0
        002e 0031 005d                            .1]
      }
    }
    srcCallSignalAddress = ipAddress {
      ip =  4 octets {
        c0 a8 00 01                                        ....
      }
      port = 4558
    }
    bandWidth = 100000
    callReferenceValue = 7839
    conferenceID =  16 octets {
      5c d8 18 3f 6c f0 18 10  8d 0e 00 40 05 3f 19 f8   \..?l......@.?..
    }
    activeMC = FALSE
    answerCall = TRUE
    canMapAlias = TRUE
    callIdentifier = {
      guid =  16 octets {
        42 d2 18 3f 6c f0 18 10  8d 0e 00 40 05 3f 19 f8   B..?l......@.?..
      }
    }
    gatekeeperIdentifier =  10 characters {
      004b 0061 0063 007a 006f 0072 0065 006b   Kaczorek
      0047 004b                                 GK
    }
    cryptoTokens = 1 entries {
      [0]=cryptoEPPwdHash {
        alias = h323_ID  12 characters {
          0063 006f 006d 006d 0075 006e 0069 0063   communic
          0061 0074 006f 0072                       ator
        }
        timeStamp = 1088357879
        token = {
          algorithmOID = 1.2.840.113549.2.5
          paramS = {
          }
          hash = Hex:  c2 08 ff 5d d9 a8 de 1f  e9 72 b8 92 db 0c f8 81 
        }
      }
    }
    willSupplyUUIEs = TRUE
  }
2004/06/27 19:37:59.895	1	      RasSrv.cxx(1414)	GK	ARQ Received
2004/06/27 19:37:59.895	3	      RasSrv.cxx(1716)	GK	ARQ will request bandwith 
of 100000
2004/06/27 19:37:59.896	3	      RasSrv.cxx(1759)	GK	ACF: found existing call 
no 1
2004/06/27 19:37:59.896	2	      RasSrv.cxx(1830)	ACF|192.168.0.5:1720|
9007_endp|7839|communicator:h323_ID|jacek [192.168.0.1]:h323_ID|true; 

2004/06/27 19:37:59.896	3	      RasSrv.cxx(2332)	GK	Send to 192.168.0.5:33570


-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 - 
digital self defense, top technical experts, no vendor pitches, 
unmatched networking opportunities. Visit www.blackhat.com

_______________________________________________________

List: Openh323gk-users@xxxxxxxxxxxxxxxxxxxxx
Archive: http://sourceforge.net/mailarchive/forum.php?forum_id=8549
Homepage: http://www.gnugk.org/

[Index of Archives]     [SIP]     [Open H.323]     [Gnu Gatekeeper]     [Asterisk PBX]     [ISDN Cause Codes]     [Yosemite News]

  Powered by Linux