Displaying 11 results from an estimated 11 matches for "ast_sockaddr_stringifi".
Did you mean:
ast_sockaddr_stringify
2018 Aug 30
2
getting invites to rtp ports ??
OK, Thanks. I have a couple of questions -- the line numbers do not
match exactly, so can you tell me a couple of lines before and after
the line in question? Also, when will this be logged, if its only
during sip debug, I need to change it to log when I can see it more
readily.
Thanks.
On Wed, 29 Aug 2018 20:31:15 -0400,
sean darcy wrote:
>
> On 08/29/2018 08:07 PM, John Covici wrote:
2010 Nov 05
2
How to append custom option to Contact: header on outgoing SIP INVITE msgs?
Hi list,
My need is to append a site specific parameter to the
Contact: header on all INVITEs exiting * via a SIP trunk.
I'd like it to look something like this:
Contact: <bob:3125551212 at 10.10.10.10;SITE-ID=us.here>
where SITE-ID=us.here is set in a config file that * parses on
startup. Or in a Dial() command option? Or I don't care exactly
how. :-)
It is possible to
2015 Sep 13
4
Fail2ban
Hello
I'm using the Fail2ban. I configuration below. I want to try to
prevent the continuous password. Fail2ban password that does not
prevent this form. (Asterisk 1.8 / Elastix interface)
What could be the problem ?
Asterisk log;
"Registration from '<sip:3060 at sip.x.eu;transport=UDP>' failed for
'x.x.x.x:32956' - Wrong password"
Fail2ban asterisk
2018 Aug 29
2
getting invites to rtp ports ??
On 08/29/2018 09:42 AM, Carlos Rojas wrote:
> Hi
>
> Probably somebody is trying to hack your system, you should block that
> ip on your firewall.
>
> Regards
>
> On Wed, Aug 29, 2018 at 9:34 AM, sean darcy <seandarcy2 at gmail.com
> <mailto:seandarcy2 at gmail.com>> wrote:
>
> I'm getting invites to very high ports every 30 seconds from a
2018 Aug 30
2
getting invites to rtp ports ??
I wonder if I could have that patch, maybe I could add it to my
fail2ban regexp and if you have the correct regexp, I would apperciate
that as well.
Thanks.
On Wed, 29 Aug 2018 19:18:29 -0400,
Telium Support Group wrote:
>
> Depending on log trolling (Asterisk security log) misses a lot, and also depends on the SIP/PJSIP folks to not change message structure (which has already happened
2018 Sep 09
2
getting invites to rtp ports ??
Hi. So, I applied the patch, works, but I could not figure out a
fail2ban regex which will hit that line, have you got one I can use?
Thanks.
On Thu, 30 Aug 2018 11:03:08 -0400,
sean darcy wrote:
>
> On 08/29/2018 09:33 PM, John Covici wrote:
> > OK, Thanks. I have a couple of questions -- the line numbers do not
> > match exactly, so can you tell me a couple of lines before
2018 Aug 29
3
getting invites to rtp ports ??
On 08/29/2018 11:59 AM, Telium Support Group wrote:
> Block a single IP is the wrong approach (whack-a-mole). You should consider a more comprehensive approach to securing your VoIP environment. Have a look at this wiki:
>
> https://www.voip-info.org/asterisk-security/
>
>
>
> -----Original Message-----
> From: asterisk-users [mailto:asterisk-users-bounces at
2015 Sep 14
2
Fail2ban
I solved the problem. "action.d/iptables-custom.conf" include only udp.
service fail2ban restart
Thank you.
On Sun, Sep 13, 2015 at 9:17 PM, Andres <andres at telesip.net> wrote:
> On 9/13/15 11:16 AM, Gokan Atmaca wrote:
>>
>> Hello
>>
>> I'm using the Fail2ban. I configuration below. I want to try to
>> prevent the continuous password.
2018 Aug 30
6
getting invites to rtp ports ??
On Wed, Aug 29, 2018 at 6:20 PM Telium Support Group <support at telium.ca>
wrote:
> Depending on log trolling (Asterisk security log) misses a lot, and also
> depends on the SIP/PJSIP folks to not change message structure (which has
> already happened numerous time). If you are comfortable hacking
> chan_sip.c you may prefer to get the same messages from the AMI. It still
2018 Aug 29
3
getting invites to rtp ports ??
I'm getting invites to very high ports every 30 seconds from a
particular ip address:
Retransmitting #10 (NAT) to 5.199.133.128:52734:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
0.0.0.0:52734;branch=z9hG4bK1207255353;received=5.199.133.128;rport=52734
From: <sip:37120116780191250 at 67.80.191.250>;tag=1872048972
To: <sip:3712011972592181418 at 67.80.191.250>;tag=as3a52e748
2014 Jun 27
4
Attack on Sip server.
Hi All.
Someone is attacking on my SIP server.
There are lot of requests coming in and I am not able to stop it because I
am unable to detect the IP address.
I used wireshark to capture the packets.
Although I am using very strong password for my SIP users but still is
there any way to drop these packets and stop this attack.
I tried dropping packet after matching some string (most of the