Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[BUG] Teleblock #531

Open
mackhendricks opened this issue Sep 16, 2023 · 1 comment
Open

[BUG] Teleblock #531

mackhendricks opened this issue Sep 16, 2023 · 1 comment

Comments

@mackhendricks
Copy link
Member

Describe the bug
Teleblock will only be triggered if the UAC is using IP authentication

** We haven't had any request for Teleblock support in a while - should we deprecate this feature or offer our own "Do not call list service"

To Reproduce
Steps to reproduce the behavior:

  1. Added an EndPoint group using Username/Password as the Auth method

  2. Setup a Trunk and Outbound Route with the Trunk as the default route

  3. Enabled Teleblock

  4. Registered my SIP client using the Username/Password Auth

  5. Call always goes out of the Trunk I setup

Expected behavior

The call should of been routed to the Teleblock service and it should of denied our request because we don't have a valid subscription

Screenshots
If applicable, add screenshots to help explain your problem.
Add any applicable logs as well; such as an dsiprouter.log, or kamailio.log, etc...

Server Info:

PRETTY_NAME="Debian GNU/Linux 11 (bullseye)"
NAME="Debian GNU/Linux"
VERSION_ID="11"
VERSION="11 (bullseye)"
VERSION_CODENAME=bullseye
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/

  • dSIPRouter Version: 0.73

Client Info:

  • Device: n/a
  • OS: Mac OS X
  • Client Software: Zoiper Softphone

Additional context

@mackhendricks mackhendricks added bug This issue is a BUG needs validation labels Sep 16, 2023
@devopsec devopsec added feedback-needed and removed bug This issue is a BUG needs validation labels Nov 1, 2023
@devopsec
Copy link
Member

devopsec commented Nov 1, 2023

tagging this one for community feedback

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants