kann es sein, dass wir hier eine Sicherheitslücke haben? Ich habe in der Firewall eine DenyAll Regel und dann keine VoIP Ports geöffnet aber trotzdem kommen hier komische Anfragen rein:
Code: Alles auswählen
[SIP-Packet] 2015/11/22 09:18:21,472 Devicetime: 2015/11/22 09:18:19,897 [PACKET] :
Receiving datagram with length 758 from 209.126.111.104:5070 to <IP-KABEL-200>:5060
INVITE sip:90041215083427@<IP-KABEL-200> SIP/2.0\r\n
To: 90041215083427<sip:90041215083427@<IP-KABEL-200>>\r\n
From: 8000<sip:8000@<IP-KABEL-200>>;tag=96175b80\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-010d507207764356d0ca74741b5ae836;rport\r\n
Call-ID: 010d507207764356d0ca74741b5ae836\r\n
CSeq: 1 INVITE\r\n
Contact: <sip:8000@209.126.111.104:5070>\r\n
Max-Forwards: 70\r\n
Allow: INVITE, ACK, CANCEL, BYE\r\n
User-Agent: sipcli/v1.8\r\n
Content-Type: application/sdp\r\n
Content-Length: 285\r\n
\r\n
v=0\r\n
o=sipcli-Session 72683242 1367824081 IN IP4 209.126.111.104\r\n
s=sipcli\r\n
c=IN IP4 209.126.111.104\r\n
t=0 0\r\n
m=audio 5072 RTP/AVP 18 0 8 101\r\n
a=fmtp:101 0-15\r\n
a=rtpmap:18 G729/8000\r\n
a=rtpmap:0 PCMU/8000\r\n
a=rtpmap:8 PCMA/8000\r\n
a=rtpmap:101 telephone-event/8000\r\n
a=ptime:20\r\n
a=sendrecv\r\n
[SIP-Packet] 2015/11/22 09:18:21,473 Devicetime: 2015/11/22 09:18:19,898 [PACKET] :
Sending datagram with length 457 from <IP-KABEL-200>:5060 to 209.126.111.104:5070
SIP/2.0 404 Not Found\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-010d507207764356d0ca74741b5ae836;rport\r\n
From: "8000"<sip:8000@<IP-KABEL-200>>;tag=96175b80\r\n
To: "90041215083427"<sip:90041215083427@<IP-KABEL-200>>\r\n
Call-ID: 010d507207764356d0ca74741b5ae836\r\n
CSeq: 1 INVITE\r\n
Max-Forwards: 70\r\n
User-Agent: LANCOM 1781EF+ / 9.10.0517 / 19.11.2015\r\n
Server: dsl-home\r\n
Allow: REGISTER, INVITE, ACK, CANCEL, BYE, REFER, NOTIFY, OPTIONS\r\n
Content-Length: 0\r\n
\r\n
[SIP-Packet] 2015/11/22 09:18:21,728 Devicetime: 2015/11/22 09:18:20,154 [PACKET] :
Receiving datagram with length 760 from 209.126.111.104:5070 to <IP-KABEL-100>:5060
INVITE sip:90041215083427@<IP-KABEL-100> SIP/2.0\r\n
To: 90041215083427<sip:90041215083427@<IP-KABEL-100>>\r\n
From: 8000<sip:8000@<IP-KABEL-100>>;tag=d8ab4846\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-63ef27946d0b9239e590f13820d32f7c;rport\r\n
Call-ID: 63ef27946d0b9239e590f13820d32f7c\r\n
CSeq: 1 INVITE\r\n
Contact: <sip:8000@209.126.111.104:5070>\r\n
Max-Forwards: 70\r\n
Allow: INVITE, ACK, CANCEL, BYE\r\n
User-Agent: sipcli/v1.8\r\n
Content-Type: application/sdp\r\n
Content-Length: 287\r\n
\r\n
v=0\r\n
o=sipcli-Session 2145291810 1473807293 IN IP4 209.126.111.104\r\n
s=sipcli\r\n
c=IN IP4 209.126.111.104\r\n
t=0 0\r\n
m=audio 5072 RTP/AVP 18 0 8 101\r\n
a=fmtp:101 0-15\r\n
a=rtpmap:18 G729/8000\r\n
a=rtpmap:0 PCMU/8000\r\n
a=rtpmap:8 PCMA/8000\r\n
a=rtpmap:101 telephone-event/8000\r\n
a=ptime:20\r\n
a=sendrecv\r\n
[SIP-Packet] 2015/11/22 09:18:21,729 Devicetime: 2015/11/22 09:18:20,155 [PACKET] :
Sending datagram with length 457 from <IP-KABEL-100>:5060 to 209.126.111.104:5070
SIP/2.0 404 Not Found\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-63ef27946d0b9239e590f13820d32f7c;rport\r\n
From: "8000"<sip:8000@<IP-KABEL-100>>;tag=d8ab4846\r\n
To: "90041215083427"<sip:90041215083427@<IP-KABEL-100>>\r\n
Call-ID: 63ef27946d0b9239e590f13820d32f7c\r\n
CSeq: 1 INVITE\r\n
Max-Forwards: 70\r\n
User-Agent: LANCOM 1781EF+ / 9.10.0517 / 19.11.2015\r\n
Server: dsl-home\r\n
Allow: REGISTER, INVITE, ACK, CANCEL, BYE, REFER, NOTIFY, OPTIONS\r\n
Content-Length: 0\r\n
\r\n
[SIP-Packet] 2015/11/22 09:18:39,451 Devicetime: 2015/11/22 09:18:37,878 [PACKET] :
Receiving datagram with length 757 from 209.126.111.104:5070 to <IP-KABEL-200>:5060
INVITE sip:0041215083427@<IP-KABEL-200> SIP/2.0\r\n
To: 0041215083427<sip:0041215083427@<IP-KABEL-200>>\r\n
From: 8001<sip:8001@<IP-KABEL-200>>;tag=860a9f90\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-d4a2a3d0a45f0ab51dba3469bdaf18db;rport\r\n
Call-ID: d4a2a3d0a45f0ab51dba3469bdaf18db\r\n
CSeq: 1 INVITE\r\n
Contact: <sip:8001@209.126.111.104:5070>\r\n
Max-Forwards: 70\r\n
Allow: INVITE, ACK, CANCEL, BYE\r\n
User-Agent: sipcli/v1.8\r\n
Content-Type: application/sdp\r\n
Content-Length: 287\r\n
\r\n
v=0\r\n
o=sipcli-Session 1832064392 1655237617 IN IP4 209.126.111.104\r\n
s=sipcli\r\n
c=IN IP4 209.126.111.104\r\n
t=0 0\r\n
m=audio 5072 RTP/AVP 18 0 8 101\r\n
a=fmtp:101 0-15\r\n
a=rtpmap:18 G729/8000\r\n
a=rtpmap:0 PCMU/8000\r\n
a=rtpmap:8 PCMA/8000\r\n
a=rtpmap:101 telephone-event/8000\r\n
a=ptime:20\r\n
a=sendrecv\r\n
[SIP-Packet] 2015/11/22 09:18:39,454 Devicetime: 2015/11/22 09:18:37,878 [PACKET] :
Sending datagram with length 455 from <IP-KABEL-200>:5060 to 209.126.111.104:5070
SIP/2.0 404 Not Found\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-d4a2a3d0a45f0ab51dba3469bdaf18db;rport\r\n
From: "8001"<sip:8001@<IP-KABEL-200>>;tag=860a9f90\r\n
To: "0041215083427"<sip:0041215083427@<IP-KABEL-200>>\r\n
Call-ID: d4a2a3d0a45f0ab51dba3469bdaf18db\r\n
CSeq: 1 INVITE\r\n
Max-Forwards: 70\r\n
User-Agent: LANCOM 1781EF+ / 9.10.0517 / 19.11.2015\r\n
Server: dsl-home\r\n
Allow: REGISTER, INVITE, ACK, CANCEL, BYE, REFER, NOTIFY, OPTIONS\r\n
Content-Length: 0\r\n
\r\n
[SIP-Packet] 2015/11/22 09:18:39,717 Devicetime: 2015/11/22 09:18:38,143 [PACKET] :
Receiving datagram with length 756 from 209.126.111.104:5070 to <IP-KABEL-100>:5060
INVITE sip:0041215083427@<IP-KABEL-100> SIP/2.0\r\n
To: 0041215083427<sip:0041215083427@<IP-KABEL-100>>\r\n
From: 8001<sip:8001@<IP-KABEL-100>>;tag=007a4f88\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-2bdcddc317adccbb3d7c317b2b4e37e4;rport\r\n
Call-ID: 2bdcddc317adccbb3d7c317b2b4e37e4\r\n
CSeq: 1 INVITE\r\n
Contact: <sip:8001@209.126.111.104:5070>\r\n
Max-Forwards: 70\r\n
Allow: INVITE, ACK, CANCEL, BYE\r\n
User-Agent: sipcli/v1.8\r\n
Content-Type: application/sdp\r\n
Content-Length: 286\r\n
\r\n
v=0\r\n
o=sipcli-Session 635289494 1131109146 IN IP4 209.126.111.104\r\n
s=sipcli\r\n
c=IN IP4 209.126.111.104\r\n
t=0 0\r\n
m=audio 5072 RTP/AVP 18 0 8 101\r\n
a=fmtp:101 0-15\r\n
a=rtpmap:18 G729/8000\r\n
a=rtpmap:0 PCMU/8000\r\n
a=rtpmap:8 PCMA/8000\r\n
a=rtpmap:101 telephone-event/8000\r\n
a=ptime:20\r\n
a=sendrecv\r\n
[SIP-Packet] 2015/11/22 09:18:39,717 Devicetime: 2015/11/22 09:18:38,144 [PACKET] :
Sending datagram with length 455 from <IP-KABEL-100>:5060 to 209.126.111.104:5070
SIP/2.0 404 Not Found\r\n
Via: SIP/2.0/UDP 209.126.111.104:5070;branch=z9hG4bK-2bdcddc317adccbb3d7c317b2b4e37e4;rport\r\n
From: "8001"<sip:8001@<IP-KABEL-100>>;tag=007a4f88\r\n
To: "0041215083427"<sip:0041215083427@<IP-KABEL-100>>\r\n
Call-ID: 2bdcddc317adccbb3d7c317b2b4e37e4\r\n
CSeq: 1 INVITE\r\n
Max-Forwards: 70\r\n
User-Agent: LANCOM 1781EF+ / 9.10.0517 / 19.11.2015\r\n
Server: dsl-home\r\n
Allow: REGISTER, INVITE, ACK, CANCEL, BYE, REFER, NOTIFY, OPTIONS\r\n
Content-Length: 0\r\n
\r\n
Die IP kommt aus Amerika: http://whois.arin.net/rest/net/NET-209- ... 26.111.104
Also da versucht einer irgendwas zu hacken, geantwortet wird immer mit "404 Not Found", aber die Frage ist, warum nimmt der Router die Anfrage überhaupt entgegen? Auch ist bei keinem SIP Benutzer der Zugriff über das WAN erlaubt.
Viele Grüße
Stefan