Agreed, this can be solved with a firewall or sip firewall. Block 5060 & RTP from all but US based IP addresses for instance.
Mike On Sat, Aug 7, 2010 at 7:06 PM, Michael Scheidell < [email protected]> wrote: > On 8/7/10 6:13 PM, Tony Graziano wrote: > > That seems actually hard to implement because it adds a layer to all calls > at the proxy. Have you looked at the sipvicious scripts yet that allow it to > be recognized and killed? > > > pfsense with the snort package could deal with these. > > there is also a 'kill sipvicsious' pyton script (that needs python 2.5) > that can send a nasty packet back and known off line the external server's > process. > > > > -- > Michael Scheidell, CTO > o: 561-999-5000 > d: 561-948-2259 > ISN: 1259*1300 > > *| *SECNAP Network Security Corporation > > - Certified SNORT Integrator > - 2008-9 Hot Company Award Winner, World Executive Alliance > - Five-Star Partner Program 2009, VARBusiness > - Best in Email Security,2010: Network Products Guide > - King of Spam Filters, SC Magazine 2008 > > > ------------------------------ > > This email has been scanned and certified safe by SpammerTrap®. > For Information please see http://www.secnap.com/products/spammertrap/ > ------------------------------ > > > _______________________________________________ > sipx-users mailing list > [email protected] > List Archive: http://list.sipfoundry.org/archive/sipx-users/ > -- There are 10 kinds of people in this world, those who understand binary and those who don't. [email protected] blog: http://www.sipxecs.info call: sip:[email protected] <sip%[email protected]>
_______________________________________________ sipx-users mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-users/
