Displaying 20 results from an estimated 6000 matches similar to: "1.6.0.9 sip.c: "Serious Network Trouble" ??"
2009 May 23
1
1.6.0.9: Unknown signalling method 'pri_cpe' ??
I'm trying to upgrade from 1.4.24.1 to 1.6.0.9 with a TE120P card.
I can't make any connection over the T1.
From CLI:
ERROR[26017]: chan_dahdi.c:14300 process_dahdi: Unknown signalling
method 'pri_cpe' at line 37.
cat chan_dahdi.conf
cat chan_dahdi.conf
[trunkgroups]
[channels]
language=en
;internationalprefix = 00
;nationalprefix = 0
context=from-pstn
switchtype=national
2018 Aug 30
2
getting invites to rtp ports ??
OK, Thanks. I have a couple of questions -- the line numbers do not
match exactly, so can you tell me a couple of lines before and after
the line in question? Also, when will this be logged, if its only
during sip debug, I need to change it to log when I can see it more
readily.
Thanks.
On Wed, 29 Aug 2018 20:31:15 -0400,
sean darcy wrote:
>
> On 08/29/2018 08:07 PM, John Covici wrote:
2018 Aug 29
2
getting invites to rtp ports ??
On 08/29/2018 09:42 AM, Carlos Rojas wrote:
> Hi
>
> Probably somebody is trying to hack your system, you should block that
> ip on your firewall.
>
> Regards
>
> On Wed, Aug 29, 2018 at 9:34 AM, sean darcy <seandarcy2 at gmail.com
> <mailto:seandarcy2 at gmail.com>> wrote:
>
> I'm getting invites to very high ports every 30 seconds from a
2018 Aug 30
2
getting invites to rtp ports ??
I wonder if I could have that patch, maybe I could add it to my
fail2ban regexp and if you have the correct regexp, I would apperciate
that as well.
Thanks.
On Wed, 29 Aug 2018 19:18:29 -0400,
Telium Support Group wrote:
>
> Depending on log trolling (Asterisk security log) misses a lot, and also depends on the SIP/PJSIP folks to not change message structure (which has already happened
2018 Aug 29
3
getting invites to rtp ports ??
On 08/29/2018 11:59 AM, Telium Support Group wrote:
> Block a single IP is the wrong approach (whack-a-mole). You should consider a more comprehensive approach to securing your VoIP environment. Have a look at this wiki:
>
> https://www.voip-info.org/asterisk-security/
>
>
>
> -----Original Message-----
> From: asterisk-users [mailto:asterisk-users-bounces at
2018 Aug 30
6
getting invites to rtp ports ??
On Wed, Aug 29, 2018 at 6:20 PM Telium Support Group <support at telium.ca>
wrote:
> Depending on log trolling (Asterisk security log) misses a lot, and also
> depends on the SIP/PJSIP folks to not change message structure (which has
> already happened numerous time). If you are comfortable hacking
> chan_sip.c you may prefer to get the same messages from the AMI. It still
2018 Aug 29
3
getting invites to rtp ports ??
I'm getting invites to very high ports every 30 seconds from a
particular ip address:
Retransmitting #10 (NAT) to 5.199.133.128:52734:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
0.0.0.0:52734;branch=z9hG4bK1207255353;received=5.199.133.128;rport=52734
From: <sip:37120116780191250 at 67.80.191.250>;tag=1872048972
To: <sip:3712011972592181418 at 67.80.191.250>;tag=as3a52e748
2009 May 27
3
1.6.0.9: Now "Unable to create ... 'DAHDI'"
Still trying to upgrade to 1.6.0.9 for 1.4.
It worked - it worked all day yesterday, but this morning:
-- Executing [646xxxyyyy at longdistance:1]
Answer("SIP/172-08276a60", "") in new stack
..........
-- Executing [646xxxyyy at longdistance:6] Dial("SIP/172-08276a60",
""DAHDI/g2"/1646xxxyyyy") in new stack
May 27 09:56:57]
2018 Sep 09
2
getting invites to rtp ports ??
Hi. So, I applied the patch, works, but I could not figure out a
fail2ban regex which will hit that line, have you got one I can use?
Thanks.
On Thu, 30 Aug 2018 11:03:08 -0400,
sean darcy wrote:
>
> On 08/29/2018 09:33 PM, John Covici wrote:
> > OK, Thanks. I have a couple of questions -- the line numbers do not
> > match exactly, so can you tell me a couple of lines before
2009 Apr 25
4
64bit: any problems with asterisk?
We're getting a new server. I'm considering installing 64bit fedora
rather than the 32bit we use now. Is 64 bit a problem with asterisk? Any
issues we should expect?
sean
2009 Sep 06
1
1.6.2-RC1 question
I just upgraded to 1.6.2.rc-1 after running betas 2 and 3 with no
problems and while everything seems fine i get these message at
startup and than all is well. Should I be worried or do i need to let
the team know about this?
Also, is not finding "/dev/dahdi/transcode" a problem I should be
worried about?
And lastly conf2ael always segfaults when I try to run it. it did run
once
2009 Apr 06
0
Asterisk 1.6.0.9 Now Available
The Asterisk Development Team has announced the release of Asterisk 1.6.0.9.
Asterisk 1.6.0.9 is available for immediate download at
http://downloads.digium.com/pub/asterisk/
This release resolves a merge issue from trunk to 1.6.0.7 that caused memory
to be freed that should not be. In trunk, pkt->data is an ast_str, but in
1.6.0, it is allocated in the same chunk of memory as the sip_pkt.
2009 Apr 06
0
Asterisk 1.6.0.9 Now Available
The Asterisk Development Team has announced the release of Asterisk 1.6.0.9.
Asterisk 1.6.0.9 is available for immediate download at
http://downloads.digium.com/pub/asterisk/
This release resolves a merge issue from trunk to 1.6.0.7 that caused memory
to be freed that should not be. In trunk, pkt->data is an ast_str, but in
1.6.0, it is allocated in the same chunk of memory as the sip_pkt.
2018 Dec 12
4
[PATCH v2 3/5] VSOCK: support receive mergeable rx buffer in guest
Guest receive mergeable rx buffer, it can merge
scatter rx buffer into a big buffer and then copy
to user space.
In addition, it also use iovec to replace buf in struct
virtio_vsock_pkt, keep tx and rx consistency. The only
difference is now tx still uses a segment of continuous
physical memory to implement.
Signed-off-by: Yiwen Jiang <jiangyiwen at huawei.com>
---
drivers/vhost/vsock.c
2018 Dec 12
4
[PATCH v2 3/5] VSOCK: support receive mergeable rx buffer in guest
Guest receive mergeable rx buffer, it can merge
scatter rx buffer into a big buffer and then copy
to user space.
In addition, it also use iovec to replace buf in struct
virtio_vsock_pkt, keep tx and rx consistency. The only
difference is now tx still uses a segment of continuous
physical memory to implement.
Signed-off-by: Yiwen Jiang <jiangyiwen at huawei.com>
---
drivers/vhost/vsock.c
2018 Dec 13
2
[PATCH v2 3/5] VSOCK: support receive mergeable rx buffer in guest
Hi Michael,
On 2018/12/12 23:31, Michael S. Tsirkin wrote:
> On Wed, Dec 12, 2018 at 05:31:39PM +0800, jiangyiwen wrote:
>> Guest receive mergeable rx buffer, it can merge
>> scatter rx buffer into a big buffer and then copy
>> to user space.
>>
>> In addition, it also use iovec to replace buf in struct
>> virtio_vsock_pkt, keep tx and rx consistency. The
2018 Dec 13
2
[PATCH v2 3/5] VSOCK: support receive mergeable rx buffer in guest
Hi Michael,
On 2018/12/12 23:31, Michael S. Tsirkin wrote:
> On Wed, Dec 12, 2018 at 05:31:39PM +0800, jiangyiwen wrote:
>> Guest receive mergeable rx buffer, it can merge
>> scatter rx buffer into a big buffer and then copy
>> to user space.
>>
>> In addition, it also use iovec to replace buf in struct
>> virtio_vsock_pkt, keep tx and rx consistency. The
2018 Nov 05
2
[PATCH 3/5] VSOCK: support receive mergeable rx buffer in guest
Guest receive mergeable rx buffer, it can merge
scatter rx buffer into a big buffer and then copy
to user space.
Signed-off-by: Yiwen Jiang <jiangyiwen at huawei.com>
---
include/linux/virtio_vsock.h | 9 ++++
net/vmw_vsock/virtio_transport.c | 75 +++++++++++++++++++++++++++++----
net/vmw_vsock/virtio_transport_common.c | 59 ++++++++++++++++++++++----
3 files changed,
2018 Nov 05
2
[PATCH 3/5] VSOCK: support receive mergeable rx buffer in guest
Guest receive mergeable rx buffer, it can merge
scatter rx buffer into a big buffer and then copy
to user space.
Signed-off-by: Yiwen Jiang <jiangyiwen at huawei.com>
---
include/linux/virtio_vsock.h | 9 ++++
net/vmw_vsock/virtio_transport.c | 75 +++++++++++++++++++++++++++++----
net/vmw_vsock/virtio_transport_common.c | 59 ++++++++++++++++++++++----
3 files changed,
2019 May 12
1
[PATCH v2 1/8] vsock/virtio: limit the memory used per-socket
On Fri, May 10, 2019 at 02:58:36PM +0200, Stefano Garzarella wrote:
> Since virtio-vsock was introduced, the buffers filled by the host
> and pushed to the guest using the vring, are directly queued in
> a per-socket list avoiding to copy it.
> These buffers are preallocated by the guest with a fixed
> size (4 KB).
>
> The maximum amount of memory used by each socket should