[SR-Users] how to catch attacker using bad request line?

Daniel-Constantin Mierla miconda at gmail.com
Mon Sep 17 15:24:30 CEST 2018


Hello,

try with event_route[core:receive-parse-error] { ... }

The variables related to sip message content (headers, body, ...) likely
not working there (should return null), but source IP/port should be good.

Cheers,
Daniel


On 17.09.18 14:24, Juha Heinanen wrote:
> Juha Heinanen writes:
>
>> I didn't find any sanity module param value that would turn on checking
>> of request line syntax.  Any other ideas?
> I added log message at the beginning of main route block:
>
> route { # main route block (initial tasks)
>
>     xinfo("Here\n");
>
> It was not printed when malformed request came in, which means that the
> main route block was not executed at all.
>
> Kamailio cannot be wide open to DoS attacks.  What is it that I'm
> missing.
>
> -- Juha
>
> _______________________________________________
> Kamailio (SER) - Users Mailing List
> sr-users at lists.kamailio.org
> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda
Kamailio World Conference -- www.kamailioworld.com
Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com




More information about the sr-users mailing list