Hello Brian,
On 29 November 2010 09:33, marius zbihlei <marius.zbihlei@1and1.ro> wrote:
On 11/26/2010 12:38 AM, dotneHello,
Hi Marius,
Will apply tomorrow and recompile.. I don't have a dump of the attack traffic but I'm sure it won't take long . . .
Thanks for your assistance.
Regards
Brian
Please check commit 29990057d8b17cf0ded395438465c6cb2c38207f on the 3.0 branch.(patch cherry-picked to 3.1 and master branch)
Marius
Hello,
Did this fix make it to the main 3.1 - I did install 3.1 last week and just checked the source..
int th_skip_msg(sip_msg_t *msg){if (!get_cseq(msg)) {LM_WARN("Invalid/Unparsed CSeq in message. Skipping.");return 1;}
if((get_cseq(msg)->method_id)&(METHOD_REGISTER|METHOD_PUBLISH))return 1;
return 0;
Regards,Brian
Module: sip-router Branch: 3.1 Commit: a72e59d23d4b104af6d7f30d1dc02a5fe175f3afAlso master and 3.0 are checked. the patch is this simple check for messages that don't have a correct CSeq header.