Displaying 11 results from an estimated 11 matches for "ast_sockaddr_stringify".
2018 Aug 30
2
getting invites to rtp ports ??
...t;>>
> >>> So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip:
> >>>
> >>> ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from
> >>> %s.\n",
> >>> pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
> >>>
> >>> With that in the log, I'm now blocking the ip addresses.
> >>>
> >>> Thanks,
> >>> sean
> >>>
> >>>
> >>> --
> >>> _________________________...
2010 Nov 05
2
How to append custom option to Contact: header on outgoing SIP INVITE msgs?
Hi list,
My need is to append a site specific parameter to the
Contact: header on all INVITEs exiting * via a SIP trunk.
I'd like it to look something like this:
Contact: <bob:3125551212 at 10.10.10.10;SITE-ID=us.here>
where SITE-ID=us.here is set in a config file that * parses on
startup. Or in a Dial() command option? Or I don't care exactly
how. :-)
It is possible to
2015 Sep 13
4
Fail2ban
...uot;[\d-]+",S$
^(%(__prefix_line)s|\[\]\s*WARNING%(__pid_re)s:?(?:\[C-[\da-f]*\])?
)Ext\. s: "Rejecting unknown SIP connection from <HOST>"$
ignoreregex =
# Author: Xavier Devlamynck / Daniel Black
#
# General log format - main/logger.c:ast_log
# Address format - ast_sockaddr_stringify
#
# First regex: channels/chan_sip.c
#
# main/logger.c:ast_log_vsyslog - "in {functionname}:" only occurs in s
2018 Aug 29
2
getting invites to rtp ports ??
...> sean
>
>
Ok, so the high port is not the destination port but the source port.
So I hacked the log warning in chan_sip.c on non-critical invites to
show the source ip:
ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from %s.\n",
pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
With that in the log, I'm now blocking the ip addresses.
Thanks,
sean
2018 Aug 30
2
getting invites to rtp ports ??
...e destination port but the source port.
> >
> > So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip:
> >
> > ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from
> > %s.\n",
> > pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
> >
> > With that in the log, I'm now blocking the ip addresses.
> >
> > Thanks,
> > sean
> >
> >
> > --
> > _____________________________________________________________________
> > -- Bandwidth and...
2018 Sep 09
2
getting invites to rtp ports ??
...I hacked the log warning in chan_sip.c on non-critical invites to show the source ip:
> >>>>>
> >>>>> ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from
> >>>>> %s.\n",
> >>>>> pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
> >>>>>
> >>>>> With that in the log, I'm now blocking the ip addresses.
> >>>>>
> >>>>> Thanks,
> >>>>> sean
> >>>>>
> >>>>>
> >...
2018 Aug 29
3
getting invites to rtp ports ??
...> Ok, so the high port is not the destination port but the source port.
>
> So I hacked the log warning in chan_sip.c on non-critical invites to show the source ip:
>
> ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from %s.\n",
> pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
>
> With that in the log, I'm now blocking the ip addresses.
>
> Thanks,
> sean
>
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com...
2015 Sep 14
2
Fail2ban
...:?(?:\[C-[\da-f]*\])?
>> )Ext\. s: "Rejecting unknown SIP connection from <HOST>"$
>>
>> ignoreregex =
>>
>>
>> # Author: Xavier Devlamynck / Daniel Black
>> #
>> # General log format - main/logger.c:ast_log
>> # Address format - ast_sockaddr_stringify
>> #
>> # First regex: channels/chan_sip.c
>> #
>> # main/logger.c:ast_log_vsyslog - "in {functionname}:" only occurs in s
>>
>
>
> --
> Technical Support
> http://www.cellroute.net
>
>
>
> --
> __________________________________...
2018 Aug 30
6
getting invites to rtp ports ??
...destination port but the source port.
> >
> > So I hacked the log warning in chan_sip.c on non-critical invites to
> show the source ip:
> >
> > ast_log(LOG_WARNING, "Timeout on %s non-critic invite trans from
> > %s.\n",
> > pkt->owner->callid,ast_sockaddr_stringify(sip_real_dst(pkt->owner)));
> >
> > With that in the log, I'm now blocking the ip addresses.
> >
> > Thanks,
> > sean
> >
> >
> > --
> > _____________________________________________________________________
> > -- Bandwidth and Colo...
2018 Aug 29
3
getting invites to rtp ports ??
I'm getting invites to very high ports every 30 seconds from a
particular ip address:
Retransmitting #10 (NAT) to 5.199.133.128:52734:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
0.0.0.0:52734;branch=z9hG4bK1207255353;received=5.199.133.128;rport=52734
From: <sip:37120116780191250 at 67.80.191.250>;tag=1872048972
To: <sip:3712011972592181418 at 67.80.191.250>;tag=as3a52e748
2014 Jun 27
4
Attack on Sip server.
Hi All.
Someone is attacking on my SIP server.
There are lot of requests coming in and I am not able to stop it because I
am unable to detect the IP address.
I used wireshark to capture the packets.
Although I am using very strong password for my SIP users but still is
there any way to drop these packets and stop this attack.
I tried dropping packet after matching some string (most of the