That is a very good point.

Do you know how the ACC module in Kamailio determines whether to stamp  
a CDR as finished?  Is it vulnerable to this attack?

I would have assumed it is tied to the dialog state and that ACC  
states are tethered to dialog module callbacks programmatically. But I  
am not sure.

--
Sent from mobile device

On Apr 29, 2009, at 5:03 AM, Iñaki Baz Castillo <[email protected]> wrote:

> 2009/4/29 Alex Balashov <[email protected]>:
>> What I meant before was that I have hacked Kamailio in the past to  
>> basically
>> do this UA functionality despite it being very much a UA and not  
>> proxy thing
>> to do.  It originated and absorbed special re-INVITEs that were  
>> spoofed and
>> basically did dlg_bye() if no response.  Nasty, I know.
>
> Be carefull with some easy attacks like this:
>
> Phone1            Proxy         PGateway
>
> INVITE CSeq:1 -----> --------------->
> <------------------- <-------- 200 OK
> ACK CSeq:1 --------> --------------->
>
> <############ RTP ###########>
>
> BYE CSeq:1 --------> --------------->
>             [ ACC DONE ]
> <------------------- <-- 400 Bad CSeq
>
>           ( audio remains )
>
>
>
>> In the open source cottage industry world, what B2BUA do you  
>> recommend for
>> high-volume applications of this?  Yate perhaps?
>
> Not experimented too much with B2BUA in high-traffic environments :(
>
>
>
> -- 
> Iñaki Baz Castillo
> <[email protected]>

_______________________________________________
Sip-implementors mailing list
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to