[SR-Users] how to catch attacker using bad request line?
Daniel-Constantin Mierla
miconda at gmail.com
Mon Sep 17 15:24:30 CEST 2018
Hello,
try with event_route[core:receive-parse-error] { ... }
The variables related to sip message content (headers, body, ...) likely
not working there (should return null), but source IP/port should be good.
Cheers,
Daniel
On 17.09.18 14:24, Juha Heinanen wrote:
> Juha Heinanen writes:
>
>> I didn't find any sanity module param value that would turn on checking
>> of request line syntax. Any other ideas?
> I added log message at the beginning of main route block:
>
> route { # main route block (initial tasks)
>
> xinfo("Here\n");
>
> It was not printed when malformed request came in, which means that the
> main route block was not executed at all.
>
> Kamailio cannot be wide open to DoS attacks. What is it that I'm
> missing.
>
> -- Juha
>
> _______________________________________________
> Kamailio (SER) - Users Mailing List
> sr-users at lists.kamailio.org
> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
--
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda
Kamailio World Conference -- www.kamailioworld.com
Kamailio Advanced Training, Nov 12-14, 2018, in Berlin -- www.asipto.com
More information about the sr-users
mailing list