|
|
|
@ -53,29 +53,4 @@ route[FILTER_TO_DOMAIN] |
|
|
|
drop(); |
|
|
|
exit; |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
route[CCP_SECURITY_CHECKS] { |
|
|
|
#!ifdef WITH_CCP_SECURITY_CHECKS |
|
|
|
if (is_method("INVITE|REGISTER")) { |
|
|
|
|
|
|
|
if($ua =~ "(friendly-scanner|sipvicious|pplsip)") { |
|
|
|
xlog("$ci|block|Fail2Ban blocking traffic from $si Script Kiddie trying to exploit\n"); |
|
|
|
drop(); |
|
|
|
exit; |
|
|
|
} |
|
|
|
|
|
|
|
if($au =~ "(\=)|(\-\-)|(')|(\#)|(\%27)|(\%24)" and $au != $null) { |
|
|
|
xlog("$ci|block|Fail2Ban blocking traffic from $si SQL Injection attack over SIP\n"); |
|
|
|
drop(); |
|
|
|
exit; |
|
|
|
} |
|
|
|
|
|
|
|
if($(hdr(Record-Route)[0]{nameaddr.uri}) != $si and $(hdr(Record-Route)[0]{nameaddr.uri}) != $null) { |
|
|
|
xlog("$ci|block|Fail2Ban blocking traffic from $si Spoofing attack over SIP\n"); |
|
|
|
drop(); |
|
|
|
exit; |
|
|
|
} |
|
|
|
} |
|
|
|
#!endif |
|
|
|
} |
|
|
|
} |