Sorry ... Try to use force_rport() *before*
sl_send_reply
On Tue, 3 Dec 2019 at 16:37, Pepelux <pepeluxx(a)gmail.com> wrote:
Hi Aymeric
Try to use force_rport() after sl_send_reply:
secf_check_ua();
if ($? == -2) {
force_rport();
sl_send_reply("200", "OK");
exit;
}
For secf_check_sqli_all() the module drops the packet if a sqli is
detected in any header but for other functions as secf_check_sqli_ua() it
returns a negative code for detection and you choose if you want to drop
the packet or not
Regards
On Tue, 3 Dec 2019 at 15:48, Aymeric Moizard <amoizard(a)gmail.com>
wrote:
> Hi all,
>
> I'm testing and moving my kamailio script to use the newer secfilter
> module.
>
> In the past, I was replying "200 Ok" to "friendly scanners"...
>
> With the newer secfilter module, it looks like I can't send a reply
> with "sl_send_reply("200", "OK")"
>
> secf_check_ua();
> if ($? == -2) {
> sl_send_reply("200", "OK");
> exit;
> }
>
>
> I have read the code of the secfilter, but I was not able to see any
> specific code to silently discard the SIP request.
>
> I can see in the documentation about "secf_check_sqli_all", that the
> SIP message is supposed to be "dropped". I can see
"w_check_sqli_all"
> returns 0 on detection and w_check_ua returns -2 upon detection.
>
> Are the message discarded because a negative value was returned?
>
> Would it be doable, using the secfilter, to still reply 200 Ok?
> Regards
> Aymeric
>
> --
> Antisip -
http://www.antisip.com
> _______________________________________________
> Kamailio (SER) - Users Mailing List
> sr-users(a)lists.kamailio.org
>
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
_______________________________________________