[asterisk-biz] 87.230.80.186

Calleasy BsAS sisint2005 at hotmail.com
Mon Jun 28 00:23:09 CDT 2010


Dear  Brett

 

Many thanks for your comment.

 

 any method  that reads logs to detect a  failrude auth , may be suitable , fail2ban make this  

or  just reading  files from  logs directory ( register and messages files ).  to know if  were any intents refused and then block the src ip..

 

with any script that works on  this could be found the ip  from where come the  intents. 

 

 

cat \etc\asterisk\messages | grep Reg | grep  @my.domian  

 

or 

 

cat \etc\asterisk\messages | grep Reg | grep  my.ip.add.res

 

processing it  could be add the iip to the iptables ruiles for block...

 

 

 

in this process, like ever , former we must chose the path  to follow , from two  possibles  to implement .

 

1) closed netowroks , denny all , enables some host to connect.  simple,  not flexible,    not suitbale continuous changing  networks, 

 

2) open networks,  accept all , we must detect intrussion+ attacks and denny all ip for any attack detected o not  trusted .. need much intelligence, resources  and efforts to identify and blocks anything that seem dangerous 

 

 

  

this breif comment was aimed to help some guys  that  were tryiing to get  works some iptables conf to avoid undesired conections.

 

in short:

 

YES...publics DDNS, have some delay  to progress in refresh   cache. there is no doubt about that.

 

 



More information about the asterisk-biz mailing list