search for: ast_sockaddr_stringify

Displaying 11 results from an estimated 11 matches for "ast_sockaddr_stringify".

2018 Aug 30
2
getting invites to rtp ports ??
...t;>> > >>> So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip: > >>> > >>> ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from > >>> %s.\n", > >>> pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); > >>> > >>> With that in the log, I'm now blocking the ip addresses. > >>> > >>> Thanks, > >>> sean > >>> > >>> > >>> -- > >>> _________________________...
2010 Nov 05
2
How to append custom option to Contact: header on outgoing SIP INVITE msgs?
Hi list, My need is to append a site specific parameter to the Contact: header on all INVITEs exiting * via a SIP trunk. I'd like it to look something like this: Contact: <bob:3125551212 at 10.10.10.10;SITE-ID=us.here> where SITE-ID=us.here is set in a config file that * parses on startup. Or in a Dial() command option? Or I don't care exactly how. :-) It is possible to
2015 Sep 13
4
Fail2ban
...uot;[\d-]+",S$ ^(%(__prefix_line)s|\[\]\s*WARNING%(__pid_re)s:?(?:\[C-[\da-f]*\])? )Ext\. s: "Rejecting unknown SIP connection from <HOST>"$ ignoreregex = # Author: Xavier Devlamynck / Daniel Black # # General log format - main/logger.c:ast_log # Address format - ast_sockaddr_stringify # # First regex: channels/chan_sip.c # # main/logger.c:ast_log_vsyslog - "in {functionname}:" only occurs in s
2018 Aug 29
2
getting invites to rtp ports ??
...> sean > > Ok, so the high port is not the destination port but the source port. So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip: ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from %s.\n", pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); With that in the log, I'm now blocking the ip addresses. Thanks, sean
2018 Aug 30
2
getting invites to rtp ports ??
...e destination port but the source port. > > > > So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip: > > > > ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from > > %s.\n", > > pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); > > > > With that in the log, I'm now blocking the ip addresses. > > > > Thanks, > > sean > > > > > > -- > > _____________________________________________________________________ > > -- Bandwidth and...
2018 Sep 09
2
getting invites to rtp ports ??
...I hacked the log warning in chan_sip.c on non-critical invites to show the source ip: > >>>>> > >>>>> ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from > >>>>> %s.\n", > >>>>> pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); > >>>>> > >>>>> With that in the log, I'm now blocking the ip addresses. > >>>>> > >>>>> Thanks, > >>>>> sean > >>>>> > >>>>> > &gt...
2018 Aug 29
3
getting invites to rtp ports ??
...> Ok, so the high port is not the destination port but the source port. > > So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip: > > ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from %s.\n", > pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); > > With that in the log, I'm now blocking the ip addresses. > > Thanks, > sean > > > -- > _____________________________________________________________________ > -- Bandwidth and Colocation Provided by http://www.api-digital.com...
2015 Sep 14
2
Fail2ban
...:?(?:\[C-[\da-f]*\])? >> )Ext\. s: "Rejecting unknown SIP connection from <HOST>"$ >> >> ignoreregex = >> >> >> # Author: Xavier Devlamynck / Daniel Black >> # >> # General log format - main/logger.c:ast_log >> # Address format - ast_sockaddr_stringify >> # >> # First regex: channels/chan_sip.c >> # >> # main/logger.c:ast_log_vsyslog - "in {functionname}:" only occurs in s >> > > > -- > Technical Support > http://www.cellroute.net > > > > -- > __________________________________...
2018 Aug 30
6
getting invites to rtp ports ??
...destination port but the source port. > > > > So I hacked the log warning in chan_sip.c on non-critical invites to > show the source ip: > > > > ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from > > %s.\n", > > pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner))); > > > > With that in the log, I'm now blocking the ip addresses. > > > > Thanks, > > sean > > > > > > -- > > _____________________________________________________________________ > > -- Bandwidth and Colo...
2018 Aug 29
3
getting invites to rtp ports ??
I'm getting invites to very high ports every 30 seconds from a particular ip address: Retransmitting #10 (NAT) to 5.199.133.128:52734: SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 0.0.0.0:52734;branch=z9hG4bK1207255353;received=5.199.133.128;rport=52734 From: <sip:37120116780191250 at 67.80.191.250>;tag=1872048972 To: <sip:3712011972592181418 at 67.80.191.250>;tag=as3a52e748
2014 Jun 27
4
Attack on Sip server.
Hi All. Someone is attacking on my SIP server. There are lot of requests coming in and I am not able to stop it because I am unable to detect the IP address. I used wireshark to capture the packets. Although I am using very strong password for my SIP users but still is there any way to drop these packets and stop this attack. I tried dropping packet after matching some string (most of the