search for: ast_sockaddr_stringifi

Displaying 11 results from an estimated 11 matches for "ast_sockaddr_stringifi".

Did you mean: ast_sockaddr_stringify
2018 Aug 30
2
getting invites to rtp ports ??
OK, Thanks. I have a couple of questions -- the line numbers do not match exactly, so can you tell me a couple of lines before and after the line in question? Also, when will this be logged, if its only during sip debug, I need to change it to log when I can see it more readily. Thanks. On Wed, 29 Aug 2018 20:31:15 -0400, sean darcy wrote: > > On 08/29/2018 08:07 PM, John Covici wrote:
2010 Nov 05
2
How to append custom option to Contact: header on outgoing SIP INVITE msgs?
Hi list, My need is to append a site specific parameter to the Contact: header on all INVITEs exiting * via a SIP trunk. I'd like it to look something like this: Contact: <bob:3125551212 at 10.10.10.10;SITE-ID=us.here> where SITE-ID=us.here is set in a config file that * parses on startup. Or in a Dial() command option? Or I don't care exactly how. :-) It is possible to
2015 Sep 13
4
Fail2ban
Hello I'm using the Fail2ban. I configuration below. I want to try to prevent the continuous password. Fail2ban password that does not prevent this form. (Asterisk 1.8 / Elastix interface) What could be the problem ? Asterisk log; "Registration from '<sip:3060 at sip.x.eu;transport=UDP>' failed for 'x.x.x.x:32956' - Wrong password" Fail2ban asterisk
2018 Aug 29
2
getting invites to rtp ports ??
On 08/29/2018 09:42 AM, Carlos Rojas wrote: > Hi > > Probably somebody is trying to hack your system, you should block that > ip on your firewall. > > Regards > > On Wed, Aug 29, 2018 at 9:34 AM, sean darcy <seandarcy2 at gmail.com > <mailto:seandarcy2 at gmail.com>> wrote: > > I'm getting invites to very high ports every 30 seconds from a
2018 Aug 30
2
getting invites to rtp ports ??
I wonder if I could have that patch, maybe I could add it to my fail2ban regexp and if you have the correct regexp, I would apperciate that as well. Thanks. On Wed, 29 Aug 2018 19:18:29 -0400, Telium Support Group wrote: > > Depending on log trolling (Asterisk security log) misses a lot, and also depends on the SIP/PJSIP folks to not change message structure (which has already happened
2018 Sep 09
2
getting invites to rtp ports ??
Hi. So, I applied the patch, works, but I could not figure out a fail2ban regex which will hit that line, have you got one I can use? Thanks. On Thu, 30 Aug 2018 11:03:08 -0400, sean darcy wrote: > > On 08/29/2018 09:33 PM, John Covici wrote: > > OK, Thanks. I have a couple of questions -- the line numbers do not > > match exactly, so can you tell me a couple of lines before
2018 Aug 29
3
getting invites to rtp ports ??
On 08/29/2018 11:59 AM, Telium Support Group wrote: > Block a single IP is the wrong approach (whack-a-mole). You should consider a more comprehensive approach to securing your VoIP environment. Have a look at this wiki: > > https://www.voip-info.org/asterisk-security/ > > > > -----Original Message----- > From: asterisk-users [mailto:asterisk-users-bounces at
2015 Sep 14
2
Fail2ban
I solved the problem. "action.d/iptables-custom.conf" include only udp. service fail2ban restart Thank you. On Sun, Sep 13, 2015 at 9:17 PM, Andres <andres at telesip.net> wrote: > On 9/13/15 11:16 AM, Gokan Atmaca wrote: >> >> Hello >> >> I'm using the Fail2ban. I configuration below. I want to try to >> prevent the continuous password.
2018 Aug 30
6
getting invites to rtp ports ??
On Wed, Aug 29, 2018 at 6:20 PM Telium Support Group <support at telium.ca> wrote: > Depending on log trolling (Asterisk security log) misses a lot, and also > depends on the SIP/PJSIP folks to not change message structure (which has > already happened numerous time). If you are comfortable hacking > chan_sip.c you may prefer to get the same messages from the AMI. It still
2018 Aug 29
3
getting invites to rtp ports ??
I'm getting invites to very high ports every 30 seconds from a particular ip address: Retransmitting #10 (NAT) to 5.199.133.128:52734: SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 0.0.0.0:52734;branch=z9hG4bK1207255353;received=5.199.133.128;rport=52734 From: <sip:37120116780191250 at 67.80.191.250>;tag=1872048972 To: <sip:3712011972592181418 at 67.80.191.250>;tag=as3a52e748
2014 Jun 27
4
Attack on Sip server.
Hi All. Someone is attacking on my SIP server. There are lot of requests coming in and I am not able to stop it because I am unable to detect the IP address. I used wireshark to capture the packets. Although I am using very strong password for my SIP users but still is there any way to drop these packets and stop this attack. I tried dropping packet after matching some string (most of the