[asterisk-biz] PBX got Hacked
Andrew M. Lauppe
alauppe at anteil.com
Sun Feb 8 09:19:27 CST 2009
I'm not standing up for SwitchVOX but I would point out that, on that
platform, the root password is both unknown/undocumented, and there is
no way to activate it for end-user access short of booting from a
recovery CD and using single-user mode or chroot and running passwd.
In other words, SSH is useless on that platform so this machine had to
be hacked some other way. Also - with no shell access, there is no
access to the apache or asterisk logs, and no way to install fail2ban.
If you're running switchvox, you *NEED *to put it behind a firewall with
logging.
If you need help securing switchvox, or building a firewall with proper
logging support, let us know. Anteil is happy to help.
Andy
Anteil, Inc. <http://www.anteil.com>
------------------------------------------------------------------------
*Andrew M. Lauppe
* /Consultant/
4051B Executive Park Dr.
Harrisburg, PA 17111
------------------------------------------------------------------------
+1 (877) OS-LINUX x23
+1 (484) 421-9919 direct
voip-asterisk at maximumcrm.com wrote:
>> On Sat, 2009-02-07 at 21:54 -0500, Alex Balashov wrote:
>>
>>> Agreed strongly.
>>>
>>> 1) For one, it sounds like you allowed remote root logins directly via
>>> SSH via password. Many people seem to do this for convenience. This is
>>> VERY BAD and should NEVER, EVER be allowed under any circumstances.
>>> Only password access to user accounts should be permitted 100% of the time.
>>>
>>> 2) Secondly, SSH should really not be open to the public at all. With
>>> some hosts, that just can't be helped (public access boxes). For a PBX,
>>> there is absolutely no reason why SSH should be open to anyone but you.
>>>
>>> My SSH on all servers is firewalled to everyone in the world and I can
>>> only get in through an OpenVPN management VPN. If for some reason that
>>> fails or I am on a host that doesn't have a client, there are a few IPs
>>> that are allowed in as a back door. That's it.
>>>
>>>
>> Having the ssh server at the default port and accepting password
>> authentication its a security problem waiting to happen.
>> Looking at firewall logs you can see that the ssh port is scanned
>> routinely and brute force attacks happen all the time.
>> If you need to have ssh access open, move it a another port,disable
>> password auth and use only publickey auth.
>> Also as I see more and more companies implementing a strict "no incoming
>> ports open" policy (which is good), an option is to have a reverse ssh
>> tunnel.
>> http://skoroneos.blogspot.com/2009/01/doing-reverse-ssh-tunnel-embedded-way.html
>>
>>
>> I have implemented this in our embedded asterisk distro and now works
>> with the dialplan also.
>> i.e you trigger the connection from inside by dialing a number
>>
>
> There are other ways too, including port knocking.
>
> For SIP bruteforce attack, I use fail2ban to monitor the logs and firewall
> any attacks,in addition to having strong passwords and long sip user ids.
>
> _______________________________________________
> --Bandwidth and Colocation Provided by http://www.api-digital.com--
>
> asterisk-biz mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-biz
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-biz/attachments/20090208/1357494a/attachment-0001.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: Anteil_email.jpg
Type: image/jpeg
Size: 3436 bytes
Desc: not available
Url : http://lists.digium.com/pipermail/asterisk-biz/attachments/20090208/1357494a/attachment-0001.jpg
More information about the asterisk-biz
mailing list