[asterisk-biz] PBX Hacker IP List

John Todd jtodd at digium.com
Mon Mar 16 19:18:18 CDT 2009


[cc'ed Phil Schwartz of DenyHosts and Cyril Jaquier of Fail2Ban]

On Mar 16, 2009, at 12:05 PM, JR Richardson wrote:

>> No matter how the system is set up there should be a way to easily  
>> add
>> known-good IP as they relate to a particular installation.
>>
> The Project Honey Pot looks great.
>
> I'm not too keen on white listing though.  It would be hard to verify
> an attacker's IP's that hasn't been identified as bad yet.  I'm sure
> some hackers would troll the black list and try to add their IP's as
> known good.  I don't think this would be some automated mechanism for
> PBX server subscription, at least not yet.
>
> I'm thinking more along the lines of a central list, updated by
> community participants, to add IP's that have attacked them, with
> date/time of the attack.  It would be up to the PBX admin to employ a
> filter with those black listed IP's or disregard the list all
> together.
>
> Thanks
>
> JR
> --
> JR Richardson
> Engineering for the Masses


[Phil and Cyril - the quick synopsis here is that Asterisk systems are  
being hit with some frequency with brute-force SIP password or  
extension guessing attacks.  Asterisk can output logfiles (non- 
customizable) of failures.]

JR and I had been having parts of this conversation off-line, but it's  
probably worth bringing it up here.

I am of the opinion that a "blacklist" is probably useful for some  
people, as an optional method to automatically configure certain  
firewall filters or other ACLs which would deny certain IP addresses  
from reaching the SIP stack.  This could be triggered by quantity of  
requests within a certain time period, or number of failures, or  
whatever.  In fact, there are people who have configured Fail2Ban  
already to serve locally as a prophylactic for their own machines.   
JR's point is that there would optimally be some distributed mechanism  
which would serve to collect the IP addresses as reported by a wide  
variety of endpoints, such that badly acting IP addresses would be  
denied even the first step in blocking.

The Honey Pot Project seems interesting, but it's not quite the right  
collection method - they seem to be fairly mail-focused, and their  
input comes from dormant accounts that they run themselves.  Or am I  
missing how they could be easily used for SIP?

It seems that the combination of Fail2Ban and DenyHosts would provide  
a fairly strong method of both detecting and then centrally storing  
"bad" IP addresses.  I don't know enough about either to say if one  
duplicates the other as far as functionality, so I'm hoping the  
authors/members of those packages might chime in here.  If I can get  
some good comments, I'll make this a blog post and maybe we can have a  
session or two on this at Astricon (hint, hint - JR, you're on the  
hook!)

Lastly, this again doesn't seem to be specific to Asterisk except for  
inputs of logfile data which would be standardized and reported back  
up the reporting path to the repository.  This is an opportunity for  
anyone with SIP devices to start contributing to a new database.  If  
we can get some interest and a beta platform in place using Asterisk  
logfiles and something like iptables, then I'd hope to start bringing  
in people from other SIP platforms such as Kamailio/SER/OpenSER,  
FreeSwitch, Cisco, SIPxchange, and others so we could all benefit from  
this effort.

I'm hesitant to create any sort of human-regulated system such as a  
mailing list or even a wiki as the repository for IP address data of  
elements, because I think that data will be difficult to collect,  
difficult to integrate into existing systems, and impossible to update  
in a way that is fair to people who may be incorrectly added (or who  
inherit "bad" IP addresses via DHCP or whatever.)  Automation seems  
the only reasonable solution.  I could be convinced otherwise, and of  
course anyone can start such a manual process if they think it would  
lead to rapid problem resolution.  However, I don't think it is a long- 
term viable method of IP address tagging and I hope that some method  
might arise with tools that mostly already exist.

Resources:
   http://www.voip-info.org/wiki/view/Fail2Ban+(with+iptables)+And+Asterisk
   http://denyhosts.sourceforge.net/index.html


JT


---
John Todd                       email:jtodd at digium.com
Digium, Inc. | Asterisk Open Source Community Director
445 Jan Davis Drive NW -  Huntsville AL 35806  -   USA
direct: +1-256-428-6083         http://www.digium.com/






More information about the asterisk-biz mailing list