On Sun, Jun 13, 2010 at 10:59:43AM -0700, Dave Platt wrote:

> The O.P. seems to have made two (fairly common) mistakes:

[snip]

> -  Used the user's extension number as the SIP user ID... and
>    thus making it easy to figure out which user IDs on which a
>    password attack could be carried out.

Sadly this is something that FreePBX (and probably other systems) force
you to do.

One other minor nit:
 
> One of your best tools is a program or script to generate
> random sequences of letters and digits and other legal-
> in-SIP-names characters.  Try something like
> 
>    dd if=/dev/urandom bs=512 count=1 | base64
> 
> and then copy some 10- or 12-character substrings out of this
> mass of gibberish and use 'em for SIP secrets.  With this many
> bits of randomness in the secrets, they'll be effectively
> invulnerable to guessing or brute force attacks.

Ahem. If you only want that many characters, just get less random bits.

This will get you 128 (16 * 8) [pseudo?]random bits:

   head /dev/urandom -c 16 | base64

-- 
               Tzafrir Cohen
icq#16849755              jabber:[email protected]
+972-50-7952406           mailto:[email protected]
http://www.xorcom.com  iax:[email protected]/tzafrir

-- 
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to