Hi<div><br></div><div>In default opensips.cfg there is following line:</div><div><br></div><div><div>if (!db_check_from()) {</div><div> send_reply("403", "Forbidden Auth ID");</div><div> exit;</div>
<div>}</div></div><div><br>Beside that I authenticate all calls by using proxy_authorize function</div><div><br></div><div>The problem is that some buggy/cheap ATA's can't be configured to use user in From field to be identical with authentication username and it results 403 error for them.</div>
<div>Unfortunately I can't tell my customers to replace their buggy ATA's</div><div><br></div><div>So, is it safe to disable db_check_from when proxy_authorize is in place?</div><div><br></div><div>Does it pose any security problems?</div>
<div><br></div><div>Best Regards</div><div><br></div>