Quoting Lee Azzarello (2014-06-11 19:05:16) > There's some suspect UDP traffic coming into the ostel.co server and > it may have caused a segfault in the auth_db module of Kamailio. I've > installed a process supervisor to auto restart on crash, though I also > thought it productive to block all incoming traffic on port 5060 since > that's plaintext SIP. This will have some end user effects, since > previously users had the choice to use plaintext signaling. Now they > have no choice and the service will appear to be unavailable until > they configure their clients to use encrypted signaling on TCP port > 5061. > > If anyone knows a proven process to work around this, let me know. My > instinct was to translate incoming TCP port 5060 to TCP port 5061 but > I don't have the time to test that.
How about setup a war dialer calling up and playing a pre-recorded message to anyone logging into the cleartext port? (if not obvious: I am just kiiding here) - Jonas -- * Jonas Smedegaard - idealist & Internet-arkitekt * Tlf.: +45 40843136 Website: http://dr.jones.dk/ [x] quote me freely [ ] ask before reusing [ ] keep private
signature.asc
Description: signature
_______________________________________________ Guardian-dev mailing list Post: [email protected] List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev To Unsubscribe Send email to: [email protected] Or visit: https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com You are subscribed as: [email protected]
