On 10/15/10 6:52 AM, Tony Graziano wrote:
I am hardened and had no issues. I just found the fact that it is a real
domain with sip on a subdomain that is not published ANYWHERE until a few
hours before the attack, which was very limited since I had cps throttled in
a way that Mitigated it gracefully, which was all in another post.
I would love to get those patches that allow me to use a different port for sip url calls!
No, it doesn't solve the problem, but will cut down on it.
Your firewall can 'tarpit' anyone (except your ITSP) who hits port 5060 once you have the ports swapped. Tarpitting can effectively slow the attack down, limiting the bandwidth the attacker can use. Another idea taken from anti-spam systems is the concept of a 'siptrap' (like a spam trap). Someone hits sip:[email protected] and our sip system 'pretends' to talk to him. We might start reporting these ip addresses to dshield.org. The combination of posts here, and data collected by dshield.org assisted a couple of security researchers in justifying tracking the Amazon EC2 Cloud ip addresses which were extensively used in sipvicious attacks a while back. Amazon saw the correlation and put measures in place to stop the abuse of their network. (I wonder: someone uses the Amazon cloud to look for open sip servers in order to commit toll fraud.. I but they used their own credit card to pay for you, what do you think?)

Anyway, a collective way to track and maybe block these folks who are doing this would add to a 'defense in depth' approach to the problem.


--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> *| *SECNAP Network Security Corporation

   * Certified SNORT Integrator
   * 2008-9 Hot Company Award Winner, World Executive Alliance
   * Five-Star Partner Program 2009, VARBusiness
   * Best in Email Security,2010: Network Products Guide
   * King of Spam Filters, SC Magazine 2008


______________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/
______________________________________________________________________  
_______________________________________________
sipx-users mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to