sobomax     2008/08/14 03:40:52 CEST

  SER CVS Repository

  Modified files:
    .                    main.c rtp_server.c rtpp_command.c 
                         rtpp_defines.h rtpp_util.c rtpp_util.h 
  Log:
  Implement random ports allocation. Basically, instead of allocating
  UDP ports sequentally as before this change, generate a random "path"
  through the available port range at startup. Then select a random
  port by simply skipping to the next port in that list of random
  ports.
  
  This should provide good resistance not only against RTP injections
  attacks but also against DOS attacks. DOS attack was possible if
  attacker could place a call through the proxy and observe port
  allocated for her own session. Then she could have generated flood
  of UDP packets to port numbers close to that port resulting in RTPproxy
  possibly "latching" attacker's IP instead of legitimate IPs of the new
  sessions' endpoints preventing RTP path from establishing.
  
  Submitted by:   Tavis Paquette <tavis at galaxytelecom dot net>
                  Peter Baer <pbaer at galaxytelecom dot net>
  
  Revision  Changes    Path
  1.82      +19 -10    rtpproxy/main.c
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/main.c.diff?r1=1.81&r2=1.82
  1.9       +1 -2      rtpproxy/rtp_server.c
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/rtp_server.c.diff?r1=1.8&r2=1.9
  1.17      +14 -23    rtpproxy/rtpp_command.c
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/rtpp_command.c.diff?r1=1.16&r2=1.17
  1.17      +5 -2      rtpproxy/rtpp_defines.h
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/rtpp_defines.h.diff?r1=1.16&r2=1.17
  1.10      +27 -1     rtpproxy/rtpp_util.c
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/rtpp_util.c.diff?r1=1.9&r2=1.10
  1.11      +2 -1      rtpproxy/rtpp_util.h
http://cvs.berlios.de/cgi-bin/viewcvs.cgi/ser/rtpproxy/rtpp_util.h.diff?r1=1.10&r2=1.11
_______________________________________________
Serdev mailing list
[email protected]
http://lists.iptel.org/mailman/listinfo/serdev

Reply via email to