Our objective is to test stability of various SIP/VoIP servers, in order to make sure that the software is stable against VoIP attacks. Here we publish results of tests with FreeSWITCH.
For our tests we use our penetration test suite.
2018-11-18 - FreeSWITCH 1.8.2 - DOS attack with malformed SIP packets
We have downloaded latest version 1.8.2, compiled it with Visual Studio 2017, applied minimal configuration to the FreeSWITCH:
Here we route SIP calls from the FreeSWITCH (192.168.10.4:5080) back to our SIP Tester (192.168.10.6)
Set XML entry log level = ERR in some other xml configuration files:
<param name="loglevel" value="ERR"/>
We don't want the excessive logging to affect results of our tests
After that, we run our SIP Tester on 192.168.10.4, and configure it with our brand new CallXML scripts, for penetration tests. We start generation of calls with max 50 CPS, max 44 concurrent calls.
Duration of calls is random, about 2 seconds. Early media state duration is also random, part of calls is cancelled, part of calls is connected, part of calls is rejected at destination.
We observe an interesting result in about 2 minutes, after 6685 attempted calls: vulnerability - memory leak in FreeSWITCH. See screenshots:
In a real environment I think the watchdog will restart the Freeswitch. If the SIP DOS attack continues, it will continue to restart. It means interruption of 24/7 operation of the softswitch. Not good.