Hi All.

This link is to a discussion on how to keep SER from being an open relay due to the following logic that most everyone uses in their ser.cfg files.

if (uri!=myself) {
  t_relay();
  break;
}

http://lists.iptel.org/pipermail/serusers/2003-October/003264.html

Some time has passed on this issue and the 2003 article described a few "in-progress" patches.

Does anyone know if SER now has the ability to prevent malicious users from exploiting (uri!=myself) code blocks?

Regards,
Paul