Hi Alexey,
You can extend the shell command with source IP listing/matching logic
within iptables. For example:
/usr/bin/sudo iptables -t filter -S INPUT | grep -q $si || (/usr/bin/sudo iptables -A INPUT -s
$si -p udp -j DROP -m comment --comment 'blacklisted by OpenSIPS' && { echo
\"/usr/bi
Hi all.
I use module pike.so and exec.so to automatically add flooding IP addresses to
firewall rejecting rules.
The code is as follows:
pike_check_req();
switch($retcode) {
case -2:# detected once - simply drop the request
exit;
case -1:# detected again -
Hi Kirill,
I see you use partitions, and your lookup is over partition "1". So, in
the dr_partitions table, when defining the partition "1", have you set
the "|rule_id_avp" field to "|$avp(dr_rule_id)" ?
http://www.opensips.org/Documentation/Install-DBSchema-2-3#GEN-DB-DR-PARTITIONS
Regards,
When I am compiling opensips with the changes I am getting bellow error .
opensips: ERROR:core:sr_load_module: could not open module
:
/usr/local/lib64/opensips/modules/db_mysql.so: undefined symbol:
db_new_result
How I will fix this ?
*Thanks & Regards*
*Sasmita Panda*
*Senior Network Testing