>
> Hello,
>
> you should enable core dumping - that should be via running 'ulimit -c
> unlimited' before you start rtpproxy.
>
> If you get the coredump, then grab the backtrace with gdb, it should
> show where rtpproxy crashed. With that info, maybe we can spot a fix for it.
>
> Hopefully rtpprox
Hi there,
I'm trying use tmrec_match in order to create routing rules based on time,
but without sucess, please have a look at my code and the errors that i got:
Code block:
if(tmrec_match("20130101T080500|24H|weekly|||MO,TU,WE,TH,FR"))
{
x
Dear All,
I am working on Kamailio (V 4.0), installed and configured on ubuntu
(12.04) System and it runs on Private IP address. I have also configured
Media proxy with the Server.
I have two Kinds of SIP clients : One is SIP hard phones and Another is
IMSDroid clients.
But the problem is its st
You can simply drop or exit on User-agent, however as mentioned in above
thread it is not a proper solution changing a user-agent is not a big deal,
you may have to look into fail2ban, pike etc.
if ($ua =~ "friendly-scanner"){
exit;
}
On Mon, Dec 30, 2013 at 2:18 PM, Moritz Graf wrote:
Hi,
blocking staticly on the "friendly-scanner" string might not be the
smartest way. Not everyone is so "friendly" to include the
"friendly-scanner" string.
fail2ban seems reasonably, or take a look at that tutorial by daniel:
http://kb.asipto.com/kamailio:usage:k31-sip-scanning-attack (using hta
Visetel LLC writes:
> I added the following rules on iptables, but it does not work.
might be easier to use fail2ban and let it deal with iptables.
-- juha
___
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-
I added the following rules on iptables, but it does not work.
iptables -A INPUT -j BLACKLIST
iptables -A BLACKLIST -p udp -m udp --dport 5060 -m string --string
'friendly-scanner' --algo bm -m comment --comment 'friendly-scanner' -j DROP
Any suggestions will be appreciated.
_