[SR-Users] bad cseq attack

Juha Heinanen jh at tutpro.com
Thu Aug 22 07:07:42 CEST 2013


Sergey Okhapkin writes:

> Actually nothing needs to be done in kamailio core. I's a simple scripting 
> logic.
> 
>         if(!sanity_check("whatever_you wan't_check")) {
>                 xlog("L_INFO","Malformed message from $proto:$si:$sp\n$mb\n");
>                 break;
>         }

in this attack, my sanity_check call was not executed, i.e., config
script was not executed.

-- juha



More information about the sr-users mailing list