Hello,
try with event_route[core:receive-parse-error] { ... }
The variables related to sip message content (headers, body, ...) likely not working there (should return null), but source IP/port should be good.
Cheers, Daniel
On 17.09.18 14:24, Juha Heinanen wrote:
Juha Heinanen writes:
I didn't find any sanity module param value that would turn on checking of request line syntax. Any other ideas?
I added log message at the beginning of main route block:
route { # main route block (initial tasks)
xinfo("Here\n");
It was not printed when malformed request came in, which means that the main route block was not executed at all.
Kamailio cannot be wide open to DoS attacks. What is it that I'm missing.
-- Juha
Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users