That is a very good point. Do you know how the ACC module in Kamailio determines whether to stamp a CDR as finished? Is it vulnerable to this attack?
I would have assumed it is tied to the dialog state and that ACC states are tethered to dialog module callbacks programmatically. But I am not sure. -- Sent from mobile device On Apr 29, 2009, at 5:03 AM, Iñaki Baz Castillo <[email protected]> wrote: > 2009/4/29 Alex Balashov <[email protected]>: >> What I meant before was that I have hacked Kamailio in the past to >> basically >> do this UA functionality despite it being very much a UA and not >> proxy thing >> to do. It originated and absorbed special re-INVITEs that were >> spoofed and >> basically did dlg_bye() if no response. Nasty, I know. > > Be carefull with some easy attacks like this: > > Phone1 Proxy PGateway > > INVITE CSeq:1 -----> ---------------> > <------------------- <-------- 200 OK > ACK CSeq:1 --------> ---------------> > > <############ RTP ###########> > > BYE CSeq:1 --------> ---------------> > [ ACC DONE ] > <------------------- <-- 400 Bad CSeq > > ( audio remains ) > > > >> In the open source cottage industry world, what B2BUA do you >> recommend for >> high-volume applications of this? Yate perhaps? > > Not experimented too much with B2BUA in high-traffic environments :( > > > > -- > Iñaki Baz Castillo > <[email protected]> _______________________________________________ Sip-implementors mailing list [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
