Quoting Lee Azzarello (2014-06-11 19:05:16)
> There's some suspect UDP traffic coming into the ostel.co server and 
> it may have caused a segfault in the auth_db module of Kamailio. I've 
> installed a process supervisor to auto restart on crash, though I also 
> thought it productive to block all incoming traffic on port 5060 since 
> that's plaintext SIP. This will have some end user effects, since 
> previously users had the choice to use plaintext signaling. Now they 
> have no choice and the service will appear to be unavailable until 
> they configure their clients to use encrypted signaling on TCP port 
> 5061.
> 
> If anyone knows a proven process to work around this, let me know. My 
> instinct was to translate incoming TCP port 5060 to TCP port 5061 but 
> I don't have the time to test that.

How about setup a war dialer calling up and playing a pre-recorded 
message to anyone logging into the cleartext port?

(if not obvious: I am just kiiding here)


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

Attachment: signature.asc
Description: signature

_______________________________________________
Guardian-dev mailing list

Post: [email protected]
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev

To Unsubscribe
        Send email to:  [email protected]
        Or visit: 
https://lists.mayfirst.org/mailman/options/guardian-dev/archive%40mail-archive.com

You are subscribed as: [email protected]

Reply via email to