<div dir="ltr">Hi everybody,<div><br></div><div>i create my xml_curl script as that don't allow unregistered calls with the following condition</div><div><b><condition field=\"\${sofia_contact */{$sipuser}@$domain}\" expression=\"^[^@]+@(.+)\"></b><br>
</div><div>and its working but yesterday a call is originated from having </div><div><br></div><div><b>fs_cli log as </b></div><div><a href="http://pastebin.freeswitch.org/22050">http://pastebin.freeswitch.org/22050</a><br>
</div><div><br></div><div><b>xml_cdr is</b> </div><div><a href="http://pastebin.freeswitch.org/22052">http://pastebin.freeswitch.org/22052</a><br></div><div><br></div><div><div><b>dialplan xml is </b></div><div><a href="http://pastebin.freeswitch.org/22054">http://pastebin.freeswitch.org/22054</a><br>
</div></div><div><br></div><div>this is only example that how the hacker breached</div><div><br></div><div>i want to know that </div><div><b>1. how it is possible that this call is originated as i check condition that allow to call only registered sip accounts.</b></div>
<div><b>2. how to prevent that this would not happened in future. </b></div><div><b>3. if there any better way to do that do inform me;</b></div><div><br></div><div>i check about 500 calls placed under the given scenario and many of them also answered</div>
<div><br></div><div>Regards</div><div><br></div><div>Shahzad Bhatti </div><div><br></div></div>