Thanks, guy. I was looking for a better pf tutorial. Hopefully there is something advanced on reserving SIP channel bandwidth because I just don't seem to be able to get that to work somehow. There must also be a decent web admin interface for pf around by now. I don't seem to mind working from the CLI but it would be nice to see something more advanced.

Peter M.

Ian Darwin wrote:
None of this surprises me somehow.

Peter MacFarlane wrote:
You should really have a firewall that filters out most of these going to the Internet. As a general rule, only open to the outside what is required for access. That is the best default for security. There is an application or option you can add to your Linux server that cuts off ssh login attempts from an IP after so many attempts. I don't know what it is at the moment but I saw it used. Works well.

I use OpenBSD and the pf firewall allows traffic to be directed to specific servers. Hopefully the cracker robots can be cut off there as well. I'll have to check that out. Strong passwords are one of your best assets. I hear that OpenBSD runs Asterisk well also, if you don't need card drivers. That might be a nice two-in-one box.

Yes, pf has an option

     max-src-conn-rate <number> / <seconds>
     Limit the rate of new connections over a time interval.  The con-
     nection rate is an approximation calculated as a moving average.

See Peter Hansteen's excellent pf tutorial. Start at the page

    http://www.bgnett.no/~peter/pf/en/bruteforce.html

for details on this option in particular, or go to that directory and read the whole thing.

And yes, I run my "production" (but low volume) Asterisk server on OpenBSD, using hard phones, the odd ATA, and DID service from Unlimitel.

Ian






--
Peter L. MacFarlane, ACP
C & P Consulting 2000
Charlottetown PEI

Reply via email to