On Tue, 2010-04-13 at 09:47 +0100, Gordon Henderson wrote:
> On Tue, 13 Apr 2010, Alyed wrote:
> 
> > Think we need some solution WITHIN the Asterisk core. Roderick A. suggested
> > something that looks nice using iptables, some others have pointed out using
> > RBL or fail2ban, but the best would be to have some generic solution not
> > dependant on third party programs.
> 
> I'd strongly disagree with this. (And I was the OP of this thread and had 
> my home/office network connection taken down due to it)
> 
> But then, I'm an old worldy Unix sysadmin and the philosophy of having a 
> program do one thing well is still etched into my core...
> 
> http://en.wikipedia.org/wiki/Unix_philosophy
> 
> So get asterisk to do what it does well, then get something else that does 
> what you need to do just as well - built-in to Linux are the iptables 
> firewall rules. Use them! They are very effective and do work. (And you 
> have a choice!)

I'll agree with you here.
Any aditional security within * is fine, but if someone is simply
drowning your bandwith, action must be taken at a lower level.
Otherwise you endup re-inventing the wheel for D.o.s. attackes for voip,
mail, ssh, ldap, http, rsync, (or any other service you might be
running)

So a proper job for ip(6)tables, imho

-- 
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to