2009/4/29 Alex Balashov <abalas...@evaristesys.com>:
> That is a very good point.
>
> Do you know how the ACC module in Kamailio determines whether to stamp a CDR
> as finished?  Is it vulnerable to this attack?

Kamailio/openSIPS has a "dialog" module, but it remains being a proxy
so, for now, it doesn't check such subjects as correct CSeq value and
so.
So yes, they are vulnerable to this simple attack.


> I would have assumed it is tied to the dialog state and that ACC states are
> tethered to dialog module callbacks programmatically. But I am not sure.

Acc has nothing to do with "dialog" module (at least for now).

You could configure Kamailio/OpenSIPS to acc the BYE when the 200 OK
arrives (instead of inmediatelly after BYE), but what about if the
gateway is down so an internal 408 is received?
Also, the attacker could send a spoofed BYE with the Route or RURI
pointing to itself, so he *itself* will receive its own BYE and will
reply 200 (acc done in the proxy). Of course the attacker doesn't end
the RTP session with the gateway, which didn't receive this BYE.

Any required improvement for the "dialog" module in a proxy will get
it becoming a B2BUA, it's the only solution for reliable SIP
accounting.


-- 
Iñaki Baz Castillo
<i...@aliax.net>

_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to