gardners e015f0670b Switched to new BAR format with 15 bytes of BID prefix, and TTL
at the end, and log2(filesize) instead of filesize.  Equally
importantly BAR construction and parsing now uses #defines for
field sizes and offsets instead of it being hardwired without
meaningful documentation.
WILL BREAK BACKWARD COMPATIBILITY WITH PREVIOUS BUILDS.
YOU MUST DELETE AND REBUILD YOUR RHIZOME DATABASE AS OLD-FORMAT
BIDs WILL BE IN THERE AND GET SENT, AND STRANGE THINGS WILL HAPPEN.
This break with backwards compatibility is only reasonable to
consider because we have not yet had an official build using the
new Rhizome with old BAR format.  0.08 uses old Rhizome.  #9
2012-10-03 12:22:59 +02:00
2012-09-12 15:21:50 +09:30
2012-05-11 08:14:00 +09:30
2012-06-27 16:54:42 +09:30
2012-05-11 08:14:00 +09:30
2012-09-06 12:43:06 +09:30
2012-09-05 20:42:50 +09:30
2012-05-24 17:11:55 +09:30
2012-09-05 20:42:50 +09:30
2012-08-09 12:14:32 +09:30
2012-09-05 20:42:50 +09:30
2012-09-28 12:16:55 +09:30
2012-09-28 17:46:40 +09:30
2012-09-28 17:46:40 +09:30
2012-05-14 18:37:32 +09:30
2012-08-21 13:32:55 +09:30
2011-08-10 15:39:40 +02:00
2012-08-23 12:31:07 +09:30
2012-08-23 12:31:07 +09:30
2012-08-23 12:31:07 +09:30
2012-09-05 20:42:50 +09:30
2012-07-24 16:04:59 +09:30
2012-09-05 20:42:50 +09:30
2012-09-05 20:42:50 +09:30
2012-02-23 12:45:42 +10:30
2012-08-23 12:31:07 +09:30
2012-09-28 12:05:22 +09:30
2012-09-28 12:16:55 +09:30
2011-10-25 13:39:14 +10:30

When we were looking at implementing secure calls for OpenBTS it was suggested
that we configure Asterisk to use SIPS/ZRTP. This would have been relatively
easy to setup, however there are a few problems.

Number one is that when Asterisk checks the certificates it will either
validate the certificate (checking the chain of trust and so on) and then
check that the common name attribute on the certificate matches the hostname
of the peer, or it will do none of these checks. This code is in main/tcptls.c
line 206 (in version 1.8.14.1).

This is undesirable in a setup where there is limited or no infrastructure as
there is not likely to be a DNS server setup, or even rigid IP assignments
that would allow a static hosts file based setup. This situation would force
the administrator to disable the checks completely which would allow a trivial
man in the middle attack.

It would be possible to modify Asterisk to have a third way where it validates
the certificate and checks the chain of trust but does not look at the common
name. We decided against this approach as the VOMP channel driver was written
in time to avoid it.

Description
The Serval Project's core daemon that implements Distributed Numbering Architecture (DNA), MDP, VoMP, Rhizome, MeshMS, etc.
Readme 33 MiB
Languages
C 89.4%
Shell 5.9%
Java 2%
M4 1.1%
Assembly 0.6%
Other 0.9%