> On Thu, Dec 09, 2010 at 07:57:37AM -0600, Joe Greco wrote:
> > Specifically looking for examples of (or how to generate)
> > 
> > 1)  .*No registration for peer '.*' (from <HOST>)
> > 2)  .*Host <HOST> failed MD5 authentication for '.*' (.*)
> > 3)  .*Failed to authenticate user .*@<HOST>.*
> > 
> > If anyone who is more familiar with the attacks or how to generate
> > these messages would give me some assistance, or chime in on the
> > sshguard-users list, that'd be most appreciated.
> 
> You could use SIPVicious to run attacks on your own servers:
> http://code.google.com/p/sipvicious/

Those tools don't seem to generate (or I can't figure out how to get
them to generate) any of the above messages; I already have plenty
of the

Registration from 'foo' failed for 'host' - reason

messages that sipvicious seems to generate.  I'm not quite sure what
to do to generate examples of the above messages, any suggestions
are appreciated.

... JG
-- 
Joe Greco - sol.net Network Services - Milwaukee, WI - http://www.sol.net
"We call it the 'one bite at the apple' rule. Give me one chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.

-- 
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to