Re: [asterisk-users] Securing Asterisk

2011-07-28 Thread Bruce B
Hmmm, if alwaysauthreject is already breaking RFC rules then why not break another rule for the greater good? It would only add another layer of security. Maybe: *alwaysregreject=yes* * * *To drop SIP packets for both unauthorized registers and anonymous calls. Keep it off by default and then

Re: [asterisk-users] Securing Asterisk

2011-07-28 Thread john millican
On 7/28/2011 11:31 AM, Bruce B wrote: Hmmm, if alwaysauthreject is already breaking RFC rules then why not break another rule for the greater good? It would only add another layer of security. Maybe: *alwaysregreject=yes* * * *To drop SIP packets for both unauthorized registers and anonymous

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread Paul Hayes
On 23/07/11 18:38, CDR wrote: I beg to differ. Digium is hiding from the real world and somebody is going take the software and run with it. My customers lost in excess of $50.000 and cut my pay in half, because of hackers. The hackers figured out how to scan every asterisk for weak passwords or

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread Steven Howes
On 27 Jul 2011, at 17:11, CDR wrote: This is turning into a political issue such as the one in Washington and the impending default on US debt. No, YOU are turning this into a political discussion. The point is that a minor change in the code would have a dramatic effect on security, and

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread A J Stiles
On Wednesday 27 Jul 2011, CDR wrote: This is turning into a political issue such as the one in Washington and the impending default on US debt. No, you are getting your knickers in a twist and blaming other people for your own shortcomings. The point is that a minor change in the code

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread Matthew J. Roth
CDR wrote: The point is that a minor change in the code would have a dramatic effect on security, and carry a lower impact on CPU that using Iptables. The simplicity of the change cannot understated. You're in luck. Since Asterisk is open source, you can make the unbelievably simple change

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread Kevin P. Fleming
On 07/27/2011 01:35 PM, Matthew J. Roth wrote: This feature would actually be a bit like alwaysauthreject in that it breaks RFC compliance for the sake of security, so it's not a completely lost cause. However, pining away on a mailing list about how simple the work would be instead of doing

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread Steve Edwards
On Wednesday 27 Jul 2011, CDR wrote nothing new, still trying to beat life into his dead horse. On Wed, 27 Jul 2011, A J Stiles wrote: Whose fault do you think it would be, if you built a car out of Meccano, didn't fit seat belts, crashed it and injured yourself? On the off chance the car

Re: [asterisk-users] Securing Asterisk

2011-07-27 Thread --[ UxBoD ]--
Simple answer to all this is to install http://lync.microsoft.com/ ... good luck ;) -- Thanks, Phil - Original Message - Kevin P. Fleming wrote: 'alwaysauthreject' in not imcompliant with any RFCs; the RFCs define response codes that *can* be used to indicate (for example)

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Lee Howard
Here are a few guidelines that I think may serve you well... Firstly, every network port that is being listened-to on any publicly-reachable system MUST be carefully protected - typically by firewalling. So, for example, you're likely going to want to block SSH from all but certain IPs. In

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread --[ UxBoD ]--
-- Message: 3 Date: Sat, 23 Jul 2011 17:48:44 +0200 From: Patrick Listsasterisk-l...@puzzled.xs4all.nl Subject: Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined To: Asterisk Users Mailing List - Non-Commercial

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Alex Balashov
On 07/26/2011 02:09 PM, CDR wrote: Only way to cope with hackers would be that Digium comes to its senses and accepts to disable any response to a REGISTER whose username is unknown. I cannot think of a good reason why Digium finds this proposal unacceptable, given the onslaught of hacking

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Kevin P. Fleming
On 07/26/2011 02:14 PM, Alex Balashov wrote: On 07/26/2011 02:09 PM, CDR wrote: Only way to cope with hackers would be that Digium comes to its senses and accepts to disable any response to a REGISTER whose username is unknown. I cannot think of a good reason why Digium finds this proposal

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Bruce B
I would have to err on the side of CDR to say that the only difference in analogy you provided (SSH vs Asterisk) is that people lose much more in VoIP than they ever did in SSH hacking. So, if this is an exceptional case bending a rule or two of RFC in favor of security won't harm

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Alex Balashov
On 07/26/2011 02:33 PM, Bruce B wrote: I would have to err on the side of CDR to say that the only difference in analogy you provided (SSH vs Asterisk) is that people lose much more in VoIP than they ever did in SSH hacking. So, if this is an exceptional case bending a rule or two of

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread arcopix
Hello all, Just out of curiosity, why are you not using something like fail2ban. It tends to work flawlessly against brute force attacks. It works good on invalid registrations / invites / etc. You can go pretty much fanatic with that tool (ban IP addr for a week if they fail to register more

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Steve Edwards
On Tue, 26 Jul 2011, Bruce B wrote: After-all, RFC does stand for Referral For Comment as in always open to be improved. Actually, it stands for 'Request' and I don't think Digium or the Asterisk mailing lists made the request :) Maybe the proper path is for you to submit a comment to the

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Richard Kenner
Can please the Powers that Be reconsider and add this option to sip.conf? What Powers that Be? This is open-source software! If you need an option in sip.conf, just add it! -- _ -- Bandwidth and Colocation Provided by

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Alex Balashov
On 07/26/2011 03:51 PM, Richard Kenner wrote: Can please the Powers that Be reconsider and add this option to sip.conf? What Powers that Be? This is open-source software! If you need an option in sip.conf, just add it! Or don't. Just because it's open source doesn't mean you should put

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Paul Belanger
On 11-07-26 02:33 PM, Bruce B wrote: I would have to err on the side of CDR to say that the only difference in analogy you provided (SSH vs Asterisk) is that people lose much more in VoIP than they ever did in SSH hacking. So, if this is an exceptional case bending a rule or two of RFC

Re: [asterisk-users] Securing Asterisk

2011-07-26 Thread Alex Balashov
On Jul 26, 2011, at 2:33 PM, Bruce B bruceb...@gmail.com wrote: people lose much more in VoIP than they ever did in SSH hacking. Um, what? -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-25 Thread Paul Hayes
On 23/07/11 04:48, Bruce B wrote: Quote,/How do the users register to begin with, if their REGISTER requests won't be processed unless their IP is already known to be a registrant? :-)/ Well, unfortunately I don't have the luxury of knowing their IP and the closest I know is their IP range.

Re: [asterisk-users] Securing Asterisk

2011-07-24 Thread Alex Balashov
On 07/23/2011 11:39 PM, C F wrote: On Sat, Jul 23, 2011 at 1:38 PM, CDRvene...@gmail.com wrote: I beg to differ. Digium is hiding from the real world and somebody is Because you have no clue how to secure a box its someone elses fault? Of course! Does Call Detail Record need to repeat

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-23 Thread Mitesh Thakkar
I think fail2ban can help in this issue. Regards, Mitesh Thakkar +91 94279 07952 Yahoo: miteshthakkar...@yahoo.co.in GTalk: mail.mthak...@gmail.com On Sat, Jul 23, 2011 at 10:04 AM, Bruce B bruceb...@gmail.com wrote: Robert thanks for weighing in. So, you are saying that FreeSwitch on it's

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-23 Thread Bruce B
Not really. It's only good after DECLINED is sent. On Sat, Jul 23, 2011 at 2:08 AM, Mitesh Thakkar mail.mthak...@gmail.comwrote: I think fail2ban can help in this issue. Regards, Mitesh Thakkar +91 94279 07952 Yahoo: miteshthakkar...@yahoo.co.in GTalk: mail.mthak...@gmail.com On Sat,

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-23 Thread Paul Belanger
On 11-07-23 12:34 AM, Bruce B wrote: Robert thanks for weighing in. So, you are saying that FreeSwitch on it's own can tackle issues like this without the need of OpenSIPs? Can you elaborate please? If true, I'd be curious to see how they accomplish it. I've never tried FreeSwitch but as

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-23 Thread Patrick Lists
On 07/23/2011 04:00 PM, Paul Belanger wrote: A UAS rejecting an offer contained in an INVITE SHOULD return a 488 (Not Acceptable Here) response. Such a response SHOULD include a Warning header field value explaining why the offer was rejected. If the choice is to get hacked/DDOS'ed/etc or

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-23 Thread Paul Belanger
On 11-07-23 11:48 AM, Patrick Lists wrote: On 07/23/2011 04:00 PM, Paul Belanger wrote: A UAS rejecting an offer contained in an INVITE SHOULD return a 488 (Not Acceptable Here) response. Such a response SHOULD include a Warning header field value explaining why the offer was rejected. If the

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread Darren Wiebe
17:48:44 +0200 From: Patrick Listsasterisk-l...@puzzled.xs4all.nl Subject: Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined To: Asterisk Users Mailing List - Non-Commercial Discussion asterisk-users@lists.digium.com Message-ID:4e2aed5c.9080

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread Paul Belanger
On 11-07-23 01:38 PM, CDR wrote: I beg to differ. Digium is hiding from the real world and somebody is going take the software and run with it. My customers lost in excess of $50.000 and cut my pay in half, because of hackers. The hackers figured out how to scan every asterisk for weak passwords

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread Danny Nicholas
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Paul Belanger Sent: Saturday, July 23, 2011 1:10 PM To: asterisk-users@lists.digium.com Subject: Re: [asterisk-users] Securing Asterisk On 11-07-23 01:38 PM, CDR wrote: I beg to differ. Digium is hiding from the real world and somebody

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread Robert-iPhone
...@lists.digium.com [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Paul Belanger Sent: Saturday, July 23, 2011 1:10 PM To: asterisk-users@lists.digium.com Subject: Re: [asterisk-users] Securing Asterisk On 11-07-23 01:38 PM, CDR wrote: I beg to differ. Digium is hiding from

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread Eric Wieling
-Original Message- From: asterisk-users-boun...@lists.digium.com [mailto:asterisk-users- boun...@lists.digium.com] On Behalf Of CDR Sent: Saturday, July 23, 2011 1:39 PM To: asterisk-users@lists.digium.com Subject: [asterisk-users] Securing Asterisk I beg to differ. Digium is

Re: [asterisk-users] Securing Asterisk

2011-07-23 Thread C F
? Regards Armand Fumal -- Message: 3 Date: Sat, 23 Jul 2011 17:48:44 +0200 From: Patrick Lists asterisk-l...@puzzled.xs4all.nl Subject: Re: [asterisk-users] Securing Asterisk - How to avoid        sending, SIP/2.0 603 Declined To: Asterisk Users Mailing

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Alex Balashov
On 07/22/2011 07:32 PM, Bruce B wrote: Hello, I am wondering if there is a way to drop SIP packets for generic transactions? For example, only SIP PEERs are allowed to call in and receive ACK or Declined rather that those inviting a call who are not PEERs at all. Currently my Asterisk setup

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Bruce B
Thanks for the input. I am really surprised. But yes, I want exactly what firewall does, DROP packet instead of REJECTING it. So, you are saying that one has to tamper the SIP stack to add the option to not respond to un-trusted sources? I really thought Asterisk might have this built in as a

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Alex Balashov
Asterisk does not expose low-level control of its SIP stack. It's something intended to be configured and used at the application level. If you really want to do this without a firewall, put a Kamailio proxy in front of your Asterisk install and drop things as you see fit. But why go through

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Paul Belanger
On 11-07-22 07:32 PM, Bruce B wrote: Hello, I am wondering if there is a way to drop SIP packets for generic transactions? For example, only SIP PEERs are allowed to call in and receive ACK or Declined rather that those inviting a call who are not PEERs at all. Currently my Asterisk setup

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Alex Balashov
Paul, Won't that just send a 403 Forbidden? -- Alex Balashov - Principal Evariste Systems LLC 260 Peachtree Street NW Suite 2200 Atlanta, GA 30303 Tel: +1-678-954-0670 Fax: +1-404-961-1892 Web: http://www.evaristesys.com/ On Jul 22, 2011, at 9:48 PM, Paul Belanger pabelan...@digium.com wrote:

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Paul Belanger
On 11-07-22 09:51 PM, Alex Balashov wrote: Paul, Won't that just send a 403 Forbidden? I believe so, but I was proposing a different SIP message then 603 Declined. As you mentioned, a firewall is the real solution if OP wants to drop packets. Asterisk is a B2BUA, not a firewall. -- Paul

Re: [asterisk-users] Securing Asterisk - How to avoid sending, SIP/2.0 603 Declined

2011-07-22 Thread Bruce B
Robert thanks for weighing in. So, you are saying that FreeSwitch on it's own can tackle issues like this without the need of OpenSIPs? Can you elaborate please? Thanks On Sat, Jul 23, 2011 at 12:17 AM, Robert-iPhone rhuddles...@gmail.comwrote: I like to put mine on 3389 hahaha just

Re: [asterisk-users] Securing Asterisk and your network

2008-06-13 Thread Jay R. Ashworth
On Thu, Jun 12, 2008 at 11:09:43PM +0300, Tzafrir Cohen wrote: Additionally, you should install a brute-force-attack blocker: http://www.la-samhna.de/library/brutessh.html This is effectively another service listening. It is also a method for an attacker to lock you out of the system.

Re: [asterisk-users] Securing Asterisk and your network

2008-06-13 Thread Tzafrir Cohen
On Fri, Jun 13, 2008 at 11:51:35AM -0400, Jay R. Ashworth wrote: On Thu, Jun 12, 2008 at 11:09:43PM +0300, Tzafrir Cohen wrote: Additionally, you should install a brute-force-attack blocker: http://www.la-samhna.de/library/brutessh.html This is effectively another service

Re: [asterisk-users] Securing Asterisk and your network

2008-06-13 Thread Jay R. Ashworth
On Fri, Jun 13, 2008 at 08:43:44PM +0300, Tzafrir Cohen wrote: And if they fool your log analysis system, then it's regexes aren't written tightly enough. Aparantly, getting the regex right is a bit trickier than people think. http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4321

Re: [asterisk-users] Securing Asterisk and your network

2008-06-12 Thread Tzafrir Cohen
On Thu, Jun 12, 2008 at 09:53:53AM -0400, Jay R. Ashworth wrote: Additionally, you should install a brute-force-attack blocker: http://www.la-samhna.de/library/brutessh.html This is effectively another service listening. It is also a method for an attacker to lock you out of the system.