You might want to read up on ICE (STUN & TURN) and SRTP / DTLS which
broadly resolve your issues.

On 21 April 2015 at 23:40, GG GG <ggcod...@gmail.com> wrote:

> By port closed, I mean that ports are normally closed, but when rtpengine
> send the first rtp packets to the client, it opens a pinhole in the
> firewall, and the matching incoming packets from the client will make the
> connection established,related in iptables. I think symmetric nat permits
> that.
>
> But now I'm thinking that it's impossible for rtpengine to know the
> client's destination port at the learning phase if the client's rtp packets
> can't reach rtpengine.
>
> Rtpengine can learn the IP Address from kamailio through the --sip-source
> CLI switch, but can't guess the port, right ?
>
> So, playing with established,related is not possible.
>
> > If the attacker is fast enough, yes. You can disable learning of
> > endpoint addresses using the asynchronous flag, but obviously this will
> > break NAT'd media. You can also use the strict-source flag to make
> > rtpengine drop packets received from a mismatched source address.
>
> So if I don't use strict-source flag, an attacker could merge any garbage
> of data in an existing RTP stream ?
>
> Thanks.
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users@lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to