It shouldn't be too hard to take the ssh-brute-force-protection.plugin
from Arno and tweak it to do the same thing for UDP and port 5060 (or
better, a range of ports). Maybe 30 minutes of work and testing...
Maybe Lonnie will get bored. :-)
-Philip
Michael Keuter wrote:
> Hi list,
>
> I ha
trunk providers
-Christopher
-Original Message-
From: Michael Keuter [mailto:mkeu...@web.de]
Sent: Thursday, April 16, 2009 7:50 AM
To: AstLinux Users Mailing List
Subject: Re: [Astlinux-users] SIP-Hacker
>Hi list,
>
>I have a customer with Astlinux 0.6.4 on a net5501, who was (not
>Hi list,
>
>I have a customer with Astlinux 0.6.4 on a net5501, who was (not
>successfully) tested by a SIP-hacker:
>
>Apr 12 14:49:40 asterisk local0.notice asterisk[1832]: NOTICE[1832]:
>chan_sip.c:15839 in handle_request_register: Registration from
>'"1345"' failed f
Hello Michael,
I hope the following link will be usefull for you:
http://blog.krisk.org/2008/07/sip-dosddos-mitigation.html
Also I read somewhere about keepin a "tail" on the asterisk log and use
iptables rules to block specific IPs
Never used on our Asterisk boxes - but maybe it will help yo
Hi list,
I have a customer with Astlinux 0.6.4 on a net5501, who was (not
successfully) tested by a SIP-hacker:
Apr 12 14:49:40 asterisk local0.notice asterisk[1832]: NOTICE[1832]:
chan_sip.c:15839 in handle_request_register: Registration from
'"1345"' failed for '9