Hello,
try with event_route[core:receive-parse-error] { ... }
The variables related to sip message content (headers, body, ...) likely
not working there (should return null), but source IP/port should be good.
Cheers,
Daniel
On 17.09.18 14:24, Juha Heinanen wrote:
Juha Heinanen writes:
I didn't find any sanity module param value
that would turn on checking
of request line syntax. Any other ideas?
I added log message at the beginning of
main route block:
route { # main route block (initial tasks)
xinfo("Here\n");
It was not printed when malformed request came in, which means that the
main route block was not executed at all.
Kamailio cannot be wide open to DoS attacks. What is it that I'm
missing.
-- Juha
_______________________________________________
Kamailio (SER) - Users Mailing List
sr-users(a)lists.kamailio.org
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
--
Daniel-Constantin Mierla --
www.asipto.com
www.twitter.com/miconda --
www.linkedin.com/in/miconda
Kamailio World Conference --
www.kamailioworld.com
Kamailio Advanced Training, Nov 12-14, 2018, in Berlin --
www.asipto.com