Agreed, this can be solved with a firewall or sip firewall.

Block 5060 & RTP from all but US based IP addresses for instance.

Mike

On Sat, Aug 7, 2010 at 7:06 PM, Michael Scheidell <
[email protected]> wrote:

>  On 8/7/10 6:13 PM, Tony Graziano wrote:
>
> That seems actually hard to implement because it adds a layer to all calls
> at the proxy. Have you looked at the sipvicious scripts yet that allow it to
> be recognized and killed?
>
>
> pfsense with the snort package could deal with these.
>
> there is also a 'kill sipvicsious' pyton script (that needs python 2.5)
> that can send a nasty packet back and known off line the external server's
> process.
>
>
>
> --
> Michael Scheidell, CTO
> o: 561-999-5000
> d: 561-948-2259
> ISN: 1259*1300
> > *| *SECNAP Network Security Corporation
>
>    - Certified SNORT Integrator
>    - 2008-9 Hot Company Award Winner, World Executive Alliance
>    - Five-Star Partner Program 2009, VARBusiness
>    - Best in Email Security,2010: Network Products Guide
>    - King of Spam Filters, SC Magazine 2008
>
>
> ------------------------------
>
> This email has been scanned and certified safe by SpammerTrap®.
> For Information please see http://www.secnap.com/products/spammertrap/
> ------------------------------
>
>
> _______________________________________________
> sipx-users mailing list
> [email protected]
> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>



-- 
There are 10 kinds of people in this world, those who understand binary and
those who don't.

[email protected]
blog: http://www.sipxecs.info
call: sip:[email protected] <sip%[email protected]>
_______________________________________________
sipx-users mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to