Following is a packet dump from not long ago: U 67.215.13.194:3532 -> x.x.x.x:5060 ACK sip:[email protected] SIP/2.0..Via: SIP/2.0/UDP 67.215.13.194:3532;branch=1011001111110011111110100001011067.215.13.194x.x.x.x724021918;rport..Max-Forwards: 70..Contact: <sip:[email protected]:3532;transport=udp>..To: <sip:[email protected]>..From : <sip:[email protected]>;tag=21341467536-168237612213414675362134146753667.215.13.194..Call-ID: 286d8ab810001011100001100110111101011110
1011001111110011111110100001011067.215.13.194x.x.x.x.x7240219181f6d6ad010963112326111#21341467536-168237612213414675362134146753667.215.13.1 94-497846270..CSeq: 1 ACK..User-Agent: X-Lite release 1006e stamp 34025..Content-Length: 0.... Anyone know what this specific attack attacks etc? -- Best regards, Duane http://www.freeauth.org - Enterprise Two Factor Authentication http://www.nodedb.com - Think globally, network locally http://www.sydneywireless.com - Telecommunications Freedom http://e164.org - Global Communication for the 21st Century "In the long run the pessimist may be proved right, but the optimist has a better time on the trip."
signature.asc
Description: OpenPGP digital signature
_______________________________________________ --Bandwidth and Colocation Provided by http://www.api-digital.com-- asterisk-security mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-security
