None of this surprises me somehow.

Peter MacFarlane wrote:
You should really have a firewall that filters out most of these going to the Internet. As a general rule, only open to the outside what is required for access. That is the best default for security. There is an application or option you can add to your Linux server that cuts off ssh login attempts from an IP after so many attempts. I don't know what it is at the moment but I saw it used. Works well.

I use OpenBSD and the pf firewall allows traffic to be directed to specific servers. Hopefully the cracker robots can be cut off there as well. I'll have to check that out. Strong passwords are one of your best assets. I hear that OpenBSD runs Asterisk well also, if you don't need card drivers. That might be a nice two-in-one box.

Yes, pf has an option

     max-src-conn-rate <number> / <seconds>
     Limit the rate of new connections over a time interval.  The con-
     nection rate is an approximation calculated as a moving average.

See Peter Hansteen's excellent pf tutorial. Start at the page

        http://www.bgnett.no/~peter/pf/en/bruteforce.html

for details on this option in particular, or go to that directory and read the whole thing.

And yes, I run my "production" (but low volume) Asterisk server on OpenBSD, using hard phones, the odd ATA, and DID service from Unlimitel.

Ian



Reply via email to