Can you please elaborate on rate limiting. Not how to implement it but rather 
how implementation is beneficiary.

 

Reading up on it, it appears that it just checks the tcp connections and denys 
connection if limit is passed.

 

In my thoughts, this is essentially a live fail2ban monitor in respects to 
attempted authentications. 

 

Thanks,

--E

 

From: [email protected] 
[mailto:[email protected]] On Behalf Of Jim DeVito
Sent: Saturday, January 21, 2012 12:02 AM
To: Asterisk Users Mailing List - Non-Commercial Discussion
Subject: Re: [asterisk-users] Sip Registration Hijacking

 

Rate limiting (google) via iptables FTW! Good luck! 

----- Original message ----- 
>    
> 
> Alejandro Imass wrote 20.01.2012 18:09: 
> 
> > I would like to know how 
> to block this MF because he makes calls at 1-2 AM 
> 
> I use this 
> construction on my servers 
> 
> [users] 
> 
> exten => 
> _XXX,1,GotoIfTime(1:00-2:00,*,*,*?block,1,1) 
> 
> [block] 
> exten => 
> _X.,1,HangUp(1) 
> 
> -- 
> With Best Regards 
> Mikhail Lischuk 
> 
>    

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to