Skip to content

Commit 395ca93

Browse files
committed
Merge branch '1.1.6-rc'
2 parents 0ddbbe9 + c907609 commit 395ca93

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+1945
-736
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
OpenLI -- open source ETSI-compliant Lawful Intercept software
22

3-
Version: 1.1.5
3+
Version: 1.1.6
44

55
---------------------------------------------------------------------------
66

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Super primitive configure script
22

3-
AC_INIT([openli],[1.1.5],[[email protected]])
3+
AC_INIT([openli],[1.1.6],[[email protected]])
44

55
AM_INIT_AUTOMAKE([subdir-objects])
66
AC_CONFIG_SRCDIR(src/collector/collector.c)

debian/changelog

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,25 @@
1+
openli (1.1.6-1) unstable; urgency=medium
2+
3+
* Fix incorrect encoding of userLocationInformation field.
4+
* Add support for IMSI and IMEI as target identifiers for mobile
5+
data (IP) intercepts.
6+
* Added new parameter for IP intercepts: mobileident -- this is
7+
used to indicate whether the user identifier for a mobile data
8+
intercept is an MSISDN, IMEI or IMSI.
9+
* Add support for including SIP packets in pcapdisk output for
10+
VoIP intercepts.
11+
* Fix bug where mediators receiving message from a collector via
12+
RabbitMQ would be disconnected due to regular consumer timeouts.
13+
This in turn should resolve issues where old IRIs or CCs would be
14+
periodically retransmitted by a mediator to the LEA.
15+
* Fix memory errors when reassembling TCP segments in the collector
16+
libtrace threads.
17+
* Generate error log messages when a component (either mediator or
18+
collector) cannot publish to RabbitMQ due to the connection being
19+
blocked.
20+
21+
-- Shane Alcock <[email protected]> Mon, 1 Jul 2024 09:57:07 +1200
22+
123
openli (1.1.5-1) unstable; urgency=medium
224

325
* Fix bug where pcap disk output was not producing pcap files for IP

doc/ProvisionerDoc.md

Lines changed: 39 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,11 @@ intercept must be configured with the following parameters:
165165
* Access type -- the technology used to provide the target with Internet
166166
access (e.g. DSL, Fiber, Wireless, etc).
167167
* User -- the username assigned to that user within your AAA system. This is
168-
required, even if the target is only using static IP addresses.
168+
required, even if the target is only using static IP addresses. For mobile
169+
intercepts, this should be either the MSISDN, IMSI, or IMEI of the target
170+
device.
171+
* Mobile Identifier -- (for mobile intercepts only) indicates whether the
172+
target is to be identified based on their MSISDN, IMSI, or IMEI.
169173

170174
An IP intercept may also include ONE of the following parameters, which is
171175
used to identify the intercept target.
@@ -177,6 +181,10 @@ used to identify the intercept target.
177181
traffic into the OpenLI collector(s), any mirrored traffic with an intercept
178182
ID that matches this value will be treated as belonging to this OpenLI IP
179183
intercept.
184+
* Cisco Mirror ID -- if you are using Cisco packet mirroring to feed
185+
intercepted traffic into an OpenLI collector, any mirrored traffic with
186+
an intercept ID that matches this value will be assumed to belong to this
187+
OpenLI IP intercept.
180188
* Static IPs -- if the target has a static IP (range), you can use this
181189
parameter to tell OpenLI which IPs belong to the target.
182190

@@ -194,8 +202,11 @@ as the one that is receiving the mirrored packets.
194202
For mobile IP intercepts, there are some slight differences. The Access type
195203
must be set to "mobile" to tell OpenLI to detect IP sessions using mobile
196204
session management protocols (such as GTP), instead of RADIUS. The User must
197-
also be set to the target's phone number (MSISDN). The ALU Shim and JMirror
198-
methods do not apply to mobile IP intercepts.
205+
also be set to either the MSISDN, IMSI, or IMEI of the device that is to be
206+
intercepted. You must use the "Mobile Identifier" parameter to tell OpenLI
207+
which type of identifier is described by the User field.
208+
209+
The vendor mirroring interception methods do not apply to mobile IP intercepts.
199210

200211
#### Using the RADIUS Calling Station ID to Identify IP Intercept Targets
201212
In a conventional RADIUS deployment, the identity of the subscriber can be
@@ -234,17 +245,25 @@ to or from your SIP and RADIUS servers.
234245
SIP servers are defined using the sipservers option. Each SIP server that
235246
you have in your network should be included as a list item within the
236247
'sipservers' option. Failure to configure SIP servers will prevent OpenLI from
237-
performing any VOIP intercepts. A SIP server is configured using two parameters:
248+
performing any VOIP intercepts. A SIP server is configured using the
249+
following parameters:
238250
* ip -- the IP address of the SIP server
239-
* port -- the port that the SIP server is listening on.
251+
* port_lower -- the lowest port number that the SIP server is listening on.
252+
* port_upper -- the highest port number that the SIP server is listening on.
240253

241254
RADIUS servers are defined using the 'radiusservers' option. The configuration
242255
works much the same as for SIP, except that most RADIUS deployments will need
243-
TWO server entries: one for the auth service and one for the accounting service,
244-
as these are usually listening on different ports. A RADIUS server entry is
245-
configured using two parameters:
256+
to ensure that their port range covers both the auth service and the accounting
257+
service, as these are usually listening on different ports. A RADIUS server
258+
entry is configured using the same parameters as a SIP server, i.e.:
246259
* ip -- the IP address of the RADIUS server
247-
* port -- the port that the RADIUS server is communicating on.
260+
* port_lower -- the lowest port number that the RADIUS server is listening on.
261+
* port_upper -- the highest port number that the RADIUS server is listening on.
262+
263+
For SIP and RADIUS servers that are only listening on a single port, you may
264+
choose to omit `port_lower` and `port_upper` and instead provide the following
265+
parameter:
266+
* port -- the single port that the server is listening on.
248267

249268

250269
### Email Servers
@@ -442,21 +461,28 @@ An IP intercept must contain the following key-value elements:
442461
* `liid` -- the LIID
443462
* `authcountrycode` -- the authorisation country code
444463
* `deliverycountrycode` -- the delivery country code
445-
* `user` -- the AAA username for the target
464+
* `user` -- the AAA username for the target, or the target
465+
identifier for mobile intercepts
446466
* `mediator` -- the ID of the mediator which will forward the
447467
intercept
448468
* `agencyid` -- the internal identifier of the agency that
449469
requested the intercept
450-
* `accesstype` -- the access type providied to the user, will
451-
default to 'undefined' if not set.
470+
* `accesstype` -- the access type provided to the user, will
471+
default to 'undefined' if not set
472+
* `mobileident` -- (required for mobile intercepts only) the type
473+
of identifier specified in the `user` element
452474

453475
Valid access types are:
454476
'dialup', 'adsl', 'vdsl', 'fiber', 'wireless', 'lan', 'satellite', 'wimax',
455477
'cable', 'mobile' and 'wireless-other'.
456478

479+
Valid mobileident values are:
480+
'imsi', 'msisdn', and 'imei'. If not specified, the default is `msisdn`.
481+
457482
Note that setting the access type to 'mobile' will cause OpenLI to use GTPv2
458483
traffic to identify the target's IP sessions, and the resulting ETSI records
459-
will conform to the UMTS format (as opposed to the standard IP format).
484+
will conform to the UMTS format (as opposed to the standard IP format
485+
defined in ETSI TS 102 232-3).
460486

461487
Optional key-value elements for an IP intercept are:
462488

doc/exampleconfigs/running-intercept-example.yaml

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,23 @@
1313

1414
# List of SIP servers on our network (for managing VOIP intercepts)
1515
sipservers:
16+
17+
# This server is listening on a single port -- we could have used the
18+
# 'port' parameter instead, but I want to demonstrate how port_lower and
19+
# port_upper would look for a single port configuration.
1620
- ip: 192.168.110.100
17-
port: 5060
21+
port_lower: 5060
22+
port_upper: 5060
1823

1924
# List of RADIUS servers on our network (for managing IP intercepts).
20-
# NOTE: we have two entries with the same IP -- one for the Auth service
21-
# on port 1812 and one for the Accounting service on port 1813.
25+
# NOTE: the port range below must cover the listening ports for both the
26+
# Authentication and Accounting services.
2227
# NOTE: make sure you are mirroring ALL RADIUS traffic into your collector(s),
2328
# even the Accounting-Response records as these are necessary for ETSI LI.
2429
radiusservers:
2530
- ip: 10.199.0.253
26-
port: 1812
27-
- ip: 10.199.0.253
28-
port: 1813
31+
port_lower: 1812
32+
port_upper: 1813
2933

3034
# List of GTP servers on our network (for managing mobile IP intercepts)
3135
gtpservers:
@@ -143,6 +147,8 @@ ipintercepts:
143147
mediator: 6001 # ID of the mediator to send intercept via
144148
agencyid: "Police" # ID of agency to send intercept to
145149
accesstype: "mobile" # Must be "mobile" for UMTS intercepts
150+
mobileident: "msisdn" # Intercept sessions where the MSISDN matches
151+
# the "user" value
146152
payloadencryption: "aes-192-cbc" # Encrypt IP content using AES-192-CBC
147153
encryptionkey: "alongencryptionkeyisgood" # Key to use for encryption,
148154
# should be provided by the agency

rpm/openli.spec

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
Name: openli
2-
Version: 1.1.5
2+
Version: 1.1.6
33
Release: 1%{?dist}
44
Summary: Software for performing ETSI-compliant lawful intercept
55

@@ -283,6 +283,9 @@ fi
283283

284284

285285
%changelog
286+
* Mon Jul 1 2024 Shane Alcock <[email protected]> - 1.1.6-1
287+
- Updated for 1.1.6 release
288+
286289
* Wed May 8 2024 Shane Alcock <[email protected]> - 1.1.5-1
287290
- Updated for 1.1.5 release
288291

0 commit comments

Comments
 (0)