Tuesday, August 22, 2017

Kamailio Presentation At ClueCon 2017

Fred Posner, our big friend (and baker from Florida), participated to ClueCon Conference 2017 and gave a presentation about Kamailio SIP Server. The slides deck is available at:
You can find some good hints and tips about using Kamailio for building intelligent SIP routing.
As usual, we would like to thank for spending time and financial resources for promoting Kamailio. Should you present at a large world wide event or small meetup in your area and have some notes about Kamailio, we definitely appreciate it a lot and we are more than happy to host a copy of the slides on our events directory:
Just get in touch with us!
Thank you for flying Kamailio!

Wednesday, August 9, 2017

ACC – SQL Define Removed And Diameter Code Relocated

The ACC module (accounting) in Kamailio got a bit of clean up, therefore be aware of following changes:
  • (1) the define conditions on SQL_ACC were removed — this was enabled for more than 10 years and only made the code look complex and hard to follow up its logic.
  • (2) the code related to DIAMETER accounting was relocated to acc_diameter (new) module. It was a consistent size of code that was not enabled for sooo… long. It is now a dedicated module, similar to acc_radius. The diameter accounting code, even a new module now, is in the same stage, compiling but not tested, in pair with auth_diameter module, it may work, but very likely not.
In summary, what’s important for those using the acc module — it offers the same functionality as it was enabled by default in the past 10 years or more: writing accounting records to syslog and sql databases — only the unused code was relocated.
The acc module is now slimmer, only with the code that it needs, therefore easier to maintain and enhance for the future. For any issue, as usual open a report on Github project portal.
Thanks for flying Kamailio!

Tuesday, August 1, 2017

Research On VoIP Fraud Using Kamailio As Sensor

Konstantin Tumalevich has posted an article via GitHub about his research done on VoIP fraud using Kamailio as a sensor, along with other VoIP applications such as Asterisk.
Some interesting facts extracted from the article:
For research, I created honeypot what mimics vulnerable PBX.
For emulation, I used Kamailio nodes that send any calls to termination node and answers to OPTIONS and REGISTER.
For every INVITE I recorded From, To, UA, Call-ID, IP and call time.
Termination node has Kamailio with Flask app for preprocessing calls and Asterisk for topology hiding when calls sent to PSTN.
All calls with a cost of more than 2 cents per minute were rejected with code 486.
I used 4 sensor nodes located in NL, DE, SG and NYC.
For 18 days, 254805 INVITE were collected from 296 different IP’s. On average, 860 INVITEs were received from an IP.
Reports about top source IPs, countries of origin and the operator as well as related graphs can be found in the conclusions of the research. Few hints are also provided about how to protect better.
You can read the entire article at:
Enjoy!
Thanks for flying Kamailio!