Re: [asterisk-users] Receive sms via bluetooth with chan_mobile and an Android phone?
On 22/11/11 23:22, Sebastian Arcus wrote: Hi all, I've been using a Nokia series 40 phone to receive GSM incoming calls OK into Asterisk for a few years now. According to the documentation of chan_mobile, it seems that (at least some) Nokia mobiles with S60 operating systems should be able to also receive (and even send) sms via bluetooth using chan_mobile. Is anybody here familiar with the implementations of bluetooth stacks and what is required to receive and send SMS via bluetooth? More precisely, the question is - do any of the Android devices (or versions of Android) have the required bluetooth stack to perform sms over bluetooth (at least in theory)? I already have an Android phone - and would like to put it to good use for incoming sms - if it has what it takes. Looking at the Wikipedia page for Bluetooth profiles (http://en.wikipedia.org/wiki/Bluetooth_profile), I'm trying to figure out which profile is used by chan_mobile to retrieve and send sms (and implicitly, which profile would need to be supported by the phone in order to enable this). Would it be the SAP/SIM profile, or MAP profile - or another one? Then I could use this information to work out if any Android version implements the required profile. *bump* Anybody using chan_mobile with Android or using chan_mobile for SMS? -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
[asterisk-users] A new hack?
Or just an old one that I've not noticed before... Seeing lines like this in the logs: [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=XMDRarBM2w [Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=AaTE0L0oRj [Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=igsN240Wr5 [Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye [Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=LEvpc7tK6B [Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=WrIoZ92YPz [Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd [Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=ygQBLSjH1m etc. The IP address is presumably the IP address of some compromised host (in Germany in this case, but I've noticed others around the globe so the software doing it would appear to be widespread) - it's not a host that should be connecting in. I supect that some SIP PBX somewhare is vulnerable to having an account called VOIP, so this remote attack is trying to compromise that account. At least it's only once every 2 seconds, so in that respect no worse than the multitude of pop/smtp/imap/ssh type attacks that hackers try... I've seen it on several servers now, always for account VOIP. I'm presuming the fake rejection is the side-effect of using alwaysauthreject in sip.conf. (if-so, then it's doing the right thing) But something to look out for just in-case.. Gordon -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
Re: [asterisk-users] A new hack?
Install Configure Fail2Ban then the host will be blocked from connecting. And no, it's not new. -Original Message- From: asterisk-users-boun...@lists.digium.com [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Gordon Henderson Sent: Saturday, November 26, 2011 6:55 AM To: Asterisk Users Mailing List Discussion Subject: [asterisk-users] A new hack? Or just an old one that I've not noticed before... Seeing lines like this in the logs: [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=XMDRarBM2w [Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=AaTE0L0oRj [Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=igsN240Wr5 [Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye [Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=LEvpc7tK6B [Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=WrIoZ92YPz [Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd [Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=ygQBLSjH1m etc. The IP address is presumably the IP address of some compromised host (in Germany in this case, but I've noticed others around the globe so the software doing it would appear to be widespread) - it's not a host that should be connecting in. I supect that some SIP PBX somewhare is vulnerable to having an account called VOIP, so this remote attack is trying to compromise that account. At least it's only once every 2 seconds, so in that respect no worse than the multitude of pop/smtp/imap/ssh type attacks that hackers try... I've seen it on several servers now, always for account VOIP. I'm presuming the fake rejection is the side-effect of using alwaysauthreject in sip.conf. (if-so, then it's doing the right thing) But something to look out for just in-case.. Gordon -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
Re: [asterisk-users] A new hack?
On Sat, 26 Nov 2011, Terry Brummell wrote: Install Configure Fail2Ban then the host will be blocked from connecting. And no, it's not new. I don't need Fail2Ban, thank you. But your advice might be useful to others. Gordon -Original Message- From: asterisk-users-boun...@lists.digium.com [mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Gordon Henderson Sent: Saturday, November 26, 2011 6:55 AM To: Asterisk Users Mailing List Discussion Subject: [asterisk-users] A new hack? Or just an old one that I've not noticed before... Seeing lines like this in the logs: [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E2lb2p9BOJ [Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=XMDRarBM2w [Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=AaTE0L0oRj [Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=igsN240Wr5 [Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=E8Nkbs0Aye [Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=LEvpc7tK6B [Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=WrIoZ92YPz [Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=kuGTjXr7Pd [Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection for user VOIP sip:VOIP@85.25.145.176;tag=ygQBLSjH1m etc. The IP address is presumably the IP address of some compromised host (in Germany in this case, but I've noticed others around the globe so the software doing it would appear to be widespread) - it's not a host that should be connecting in. I supect that some SIP PBX somewhare is vulnerable to having an account called VOIP, so this remote attack is trying to compromise that account. At least it's only once every 2 seconds, so in that respect no worse than the multitude of pop/smtp/imap/ssh type attacks that hackers try... I've seen it on several servers now, always for account VOIP. I'm presuming the fake rejection is the side-effect of using alwaysauthreject in sip.conf. (if-so, then it's doing the right thing) But something to look out for just in-case.. Gordon -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
Re: [asterisk-users] A new hack?
On Sat, Nov 26, 2011 at 7:50 AM, Gordon Henderson gordon+aster...@drogon.net wrote: On Sat, 26 Nov 2011, Terry Brummell wrote: Install Configure Fail2Ban then the host will be blocked from connecting. And no, it's not new. I don't need Fail2Ban, thank you. But your advice might be useful to others. Why is that? Even if they don't compromise an account they are still using your bandwidth and resources on your machine. -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
[asterisk-users] Automatic IVR generator (alpha)
Hi, Have started work on a Perl script to automatically generate Asterisk IVR dialplans from a YAML configuration. It's pretty rudimentary right now, but working for the couple of test cases I've thrown at it. Current features: - Built-in navigation (GoTop, GoToMenu). A GoUp is planned. - Default 'i' stanzas for menus that don't define one. - Any level of menu nesting. - Special pre-entry menu (for auth, language selection, etc.). - Priority labels. The Perl script and the test YAML file are respectively available from: http://etc.kandalaya.org/IVR/ivr.pl http://etc.kandalaya.org/IVR/test.yml First off, does this look like a useful tool? And if it does, what features would you like to see in the finished product? (No promises about speedy implementation, but I'll try!) Regards, -- Raj -- Raj Mathur || r...@kandalaya.org || GPG: http://otheronepercent.blogspot.com || http://kandalaya.org || CC68 It is the mind that moves || http://schizoid.in || D17F -- _ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- New to Asterisk? Join us for a live introductory webinar every Thurs: http://www.asterisk.org/hello asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users