Hello Lonnie,

Thursday, September 25, 2014, 8:55:17 PM, you wrote:

...

> Would it be possible to capture a SIP packet for each of these cases ?  For 
> example:
> -- 
> ngrep -d eth0 -qt -W byline port 5060
> -- 
> or possibly redirected to a file for a new minutes and you can then
> ^C and look through the file for matches to your Asterisk logs to
> identify it.  That would really help, your public IP address would
> need to be obscured, feel free to show the bad guys IP :-)  Only one example 
> for each case is needed.
Sure  -  this  bad guy is coming at night.  Need to find a solution to
get started and getting the trace in the morning...
I'll send the trace off-list - if that's alright.

...

> If you must listen to a common SIP port and allow any IP address,
> you may be able to "whitelist" a set of User-Agent's or at least
> minimally blacklist the common bad ones.
Indeed - that's an interesting plugin.

...

> Lonnie
Regards,
Armin.


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Astlinux-users mailing list
Astlinux-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/astlinux-users

Donations to support AstLinux are graciously accepted via PayPal to 
pay...@krisk.org.

Reply via email to