Can you please elaborate on rate limiting. Not how to implement it but rather how implementation is beneficiary.
Reading up on it, it appears that it just checks the tcp connections and denys connection if limit is passed. In my thoughts, this is essentially a live fail2ban monitor in respects to attempted authentications. Thanks, --E From: [email protected] [mailto:[email protected]] On Behalf Of Jim DeVito Sent: Saturday, January 21, 2012 12:02 AM To: Asterisk Users Mailing List - Non-Commercial Discussion Subject: Re: [asterisk-users] Sip Registration Hijacking Rate limiting (google) via iptables FTW! Good luck! ----- Original message ----- > > > Alejandro Imass wrote 20.01.2012 18:09: > > > I would like to know how > to block this MF because he makes calls at 1-2 AM > > I use this > construction on my servers > > [users] > > exten => > _XXX,1,GotoIfTime(1:00-2:00,*,*,*?block,1,1) > > [block] > exten => > _X.,1,HangUp(1) > > -- > With Best Regards > Mikhail Lischuk > >
-- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
