<div dir="ltr"><pre>This issue has been resolved. It turned out to be a SIP DOS attack to the other node.<br><br></pre><pre>I'm not sure why he was able to connect to nodes besides mine. I have noticed multiple app_rpt<br></pre><pre>boxes that have SIP enabled being attacked by Amsterdam IPs. 188.138.74.76 and 188.138.74.90 are two<br></pre><pre>that come to mind. We've reported the abuse to the ISP (RIPE), but I'm not holding my breath..<br></pre><pre><br>73<br><br>--- Original Message ---<br><br>Kyle,
Does the other node have a problem connecting to nodes other then yours?
Does the other node have problems with incoming connections?
What are the node numbers involved?
Check the system date and time on both nodes.
73, Steve N4IRS
On 10/24/2015 01:36 PM, K Yoksh wrote:
><i>
</i>><i> Hi all,
</i>><i>
</i>><i> I recently converted one of my boxes from ACID to DIAL, and have run
</i>><i> into this issue... When a particular node tries to connect to me (or
</i>><i> vice-versa), I hear a 'connection failed' message, and see the
</i>><i> following in my logs: (note I've replaced the actual IP with IP ADDRESS:
</i>><i>
</i>><i> chan_iax2.c: Address [IP ADDRESS] failed CallToken hash inspection
</i>><i>
</i>><i> I did make sure that the node's IP in rpt_extnodes matches the IP of
</i>><i> the remote node. Other stations can connect to me, and vice-versa.
</i>><i>
</i>><i> Any ideas?
</i>><i>
</i>><i> Thanks. 73
</i>><i>
</i>><i> Kyle Yoksh
</i>><i> K0KN
</i>><i> Olathe, KS
</i>><i> Allstar 2210-2219</i></pre></div>