Re: [asterisk-users] Receive sms via bluetooth with chan_mobile and an Android phone?

2011-11-26 Thread Sebastian Arcus


  
  
On 22/11/11 23:22, Sebastian Arcus wrote:

  
  Hi all,

I've been using a Nokia series 40 phone to receive GSM incoming
calls OK into Asterisk for a few years now. According to the
documentation of chan_mobile, it seems that (at least some)
Nokia mobiles with S60 operating systems should be able to also
receive (and even send) sms via bluetooth using chan_mobile.

Is anybody here familiar with the implementations of bluetooth
stacks and what is required to receive and send SMS via
bluetooth? More precisely, the question is - do any of the
Android devices (or versions of Android) have the required
bluetooth stack to perform sms over bluetooth (at least in
theory)? I already have an Android phone - and would like to put
it to good use for incoming sms - if it has what it takes.

Looking at the Wikipedia page for Bluetooth profiles (http://en.wikipedia.org/wiki/Bluetooth_profile),
I'm trying to figure out which profile is used by chan_mobile to
retrieve and send sms (and implicitly, which profile would need
to be supported by the phone in order to enable this). Would it
be the SAP/SIM profile, or MAP profile - or another one?

Then I could use this information to work out if any Android
version implements the required profile.

*bump*
  
  Anybody using chan_mobile with Android or using chan_mobile for
  SMS?
  

  


--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

[asterisk-users] A new hack?

2011-11-26 Thread Gordon Henderson


Or just an old one that I've not noticed before...

Seeing lines like this in the logs:


[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ
[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=XMDRarBM2w
[Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=AaTE0L0oRj
[Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=igsN240Wr5
[Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye
[Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=LEvpc7tK6B
[Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=WrIoZ92YPz
[Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd
[Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP 
sip:VOIP@85.25.145.176;tag=ygQBLSjH1m


etc.

The IP address is presumably the IP address of some compromised host (in 
Germany in this case, but I've noticed others around the globe so the 
software doing it would appear to be widespread) - it's not a host that 
should be connecting in.


I supect that some SIP PBX somewhare is vulnerable to having an account 
called VOIP, so this remote attack is trying to compromise that account.


At least it's only once every 2 seconds, so in that respect no worse than 
the multitude of pop/smtp/imap/ssh type attacks that hackers try...


I've seen it on several servers now, always for account VOIP. I'm 
presuming the fake rejection is the side-effect of using 
alwaysauthreject in sip.conf. (if-so, then it's doing the right thing)


But something to look out for just in-case..

Gordon

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
  http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] A new hack?

2011-11-26 Thread Terry Brummell
Install  Configure Fail2Ban then the host will be blocked from
connecting.  And no, it's not new.

-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Gordon
Henderson
Sent: Saturday, November 26, 2011 6:55 AM
To: Asterisk Users Mailing List Discussion
Subject: [asterisk-users] A new hack?


Or just an old one that I've not noticed before...

Seeing lines like this in the logs:


[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ
[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=XMDRarBM2w
[Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=AaTE0L0oRj
[Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=igsN240Wr5
[Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye
[Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=LEvpc7tK6B
[Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=WrIoZ92YPz
[Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd
[Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=ygQBLSjH1m


etc.

The IP address is presumably the IP address of some compromised host (in

Germany in this case, but I've noticed others around the globe so the 
software doing it would appear to be widespread) - it's not a host that 
should be connecting in.

I supect that some SIP PBX somewhare is vulnerable to having an account 
called VOIP, so this remote attack is trying to compromise that
account.

At least it's only once every 2 seconds, so in that respect no worse
than 
the multitude of pop/smtp/imap/ssh type attacks that hackers try...

I've seen it on several servers now, always for account VOIP. I'm 
presuming the fake rejection is the side-effect of using 
alwaysauthreject in sip.conf. (if-so, then it's doing the right thing)

But something to look out for just in-case..

Gordon

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] A new hack?

2011-11-26 Thread Gordon Henderson

On Sat, 26 Nov 2011, Terry Brummell wrote:


Install  Configure Fail2Ban then the host will be blocked from
connecting.  And no, it's not new.


I don't need Fail2Ban, thank you. But your advice might be useful to 
others.


Gordon





-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Gordon
Henderson
Sent: Saturday, November 26, 2011 6:55 AM
To: Asterisk Users Mailing List Discussion
Subject: [asterisk-users] A new hack?


Or just an old one that I've not noticed before...

Seeing lines like this in the logs:


[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ
[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=XMDRarBM2w
[Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=AaTE0L0oRj
[Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=igsN240Wr5
[Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye
[Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=LEvpc7tK6B
[Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=WrIoZ92YPz
[Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd
[Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user VOIP sip:VOIP@85.25.145.176;tag=ygQBLSjH1m


etc.

The IP address is presumably the IP address of some compromised host (in

Germany in this case, but I've noticed others around the globe so the
software doing it would appear to be widespread) - it's not a host that
should be connecting in.

I supect that some SIP PBX somewhare is vulnerable to having an account
called VOIP, so this remote attack is trying to compromise that
account.

At least it's only once every 2 seconds, so in that respect no worse
than
the multitude of pop/smtp/imap/ssh type attacks that hackers try...

I've seen it on several servers now, always for account VOIP. I'm
presuming the fake rejection is the side-effect of using
alwaysauthreject in sip.conf. (if-so, then it's doing the right thing)

But something to look out for just in-case..

Gordon

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
  http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
  http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users



--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
  http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] A new hack?

2011-11-26 Thread C F
On Sat, Nov 26, 2011 at 7:50 AM, Gordon Henderson
gordon+aster...@drogon.net wrote:
 On Sat, 26 Nov 2011, Terry Brummell wrote:

 Install  Configure Fail2Ban then the host will be blocked from
 connecting.  And no, it's not new.

 I don't need Fail2Ban, thank you. But your advice might be useful to others.

Why is that?
Even if they don't compromise an account they are still using your
bandwidth and resources on your machine.

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


[asterisk-users] Automatic IVR generator (alpha)

2011-11-26 Thread Raj Mathur (राज माथुर)
Hi,

Have started work on a Perl script to automatically generate Asterisk 
IVR dialplans from a YAML configuration.  It's pretty rudimentary right 
now, but working for the couple of test cases I've thrown at it.

Current features:

- Built-in navigation (GoTop, GoToMenu).  A GoUp is planned.
- Default 'i' stanzas for menus that don't define one.
- Any level of menu nesting.
- Special pre-entry menu (for auth, language selection, etc.).
- Priority labels.

The Perl script and the test YAML file are respectively available from:

  http://etc.kandalaya.org/IVR/ivr.pl
  http://etc.kandalaya.org/IVR/test.yml

First off, does this look like a useful tool?  And if it does, what 
features would you like to see in the finished product?  (No promises 
about speedy implementation, but I'll try!)

Regards,

-- Raj
-- 
Raj Mathur  || r...@kandalaya.org   || GPG:
http://otheronepercent.blogspot.com || http://kandalaya.org || CC68
It is the mind that moves   || http://schizoid.in   || D17F

--
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users