<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
I'm not standing up for SwitchVOX but I would point out that, on that
platform, the root password is both unknown/undocumented, and there is
no way to activate it for end-user access short of booting from a
recovery CD and using single-user mode or chroot and running passwd. <br>
<br>
In other words, SSH is useless on that platform so this machine had to
be hacked some other way. Also - with no shell access, there is no
access to the apache or asterisk logs, and no way to install fail2ban.
If you're running switchvox, you <b>NEED </b>to put it behind a
firewall with logging. <br>
<br>
If you need help securing switchvox, or building a firewall with proper
logging support, let us know. Anteil is happy to help.<br>
<br>
Andy<br>
<div class="moz-signature">
<p align="left"><font face="Times New Roman, Times, serif" size="1">
<table border="0" width="317">
<tbody>
<tr valigh="top">
<td>
<div align="center"> <a href="http://www.anteil.com"><img
moz-do-not-send="false" src="cid:part1.06010109.00000507@anteil.com"
alt="Anteil, Inc." border="0"></a>
<table border="0" width="317">
<tbody>
<tr>
<td colspan="3">
<div align="center">
<table width="270">
<tbody>
<tr>
<td>
<hr></td>
</tr>
</tbody>
</table>
</div>
</td>
</tr>
<tr valign="top">
<td width="134">
<div align="right"><font color="#000000"
face="Times New Roman, Times, serif" size="2"> <strong>Andrew M.
Lauppe<br>
</strong> <em>Consultant</em> </font>
</div>
</td>
<td width="11"><br>
</td>
<td width="148"><font face="Times New Roman, Times, serif"><font
color="#666666" size="1">4051B Executive Park Dr.<br>
Harrisburg, PA 17111<br>
<hr align="left" width="105">+1 (877) OS-LINUX x23<br>
+1 (484) 421-9919 direct </font></font></td>
</tr>
</tbody>
</table>
</div>
</td>
</tr>
</tbody>
</table>
</font></p>
</div>
<br>
<br>
<a class="moz-txt-link-abbreviated" href="mailto:voip-asterisk@maximumcrm.com">voip-asterisk@maximumcrm.com</a> wrote:
<blockquote
cite="mid:Pine.LNX.4.64.0902080945470.5685@anvil.nuitari.net"
type="cite">
<blockquote type="cite">
<pre wrap="">On Sat, 2009-02-07 at 21:54 -0500, Alex Balashov wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Agreed strongly.
1) For one, it sounds like you allowed remote root logins directly via
SSH via password. Many people seem to do this for convenience. This is
VERY BAD and should NEVER, EVER be allowed under any circumstances.
Only password access to user accounts should be permitted 100% of the time.
2) Secondly, SSH should really not be open to the public at all. With
some hosts, that just can't be helped (public access boxes). For a PBX,
there is absolutely no reason why SSH should be open to anyone but you.
My SSH on all servers is firewalled to everyone in the world and I can
only get in through an OpenVPN management VPN. If for some reason that
fails or I am on a host that doesn't have a client, there are a few IPs
that are allowed in as a back door. That's it.
</pre>
</blockquote>
<pre wrap="">
Having the ssh server at the default port and accepting password
authentication its a security problem waiting to happen.
Looking at firewall logs you can see that the ssh port is scanned
routinely and brute force attacks happen all the time.
If you need to have ssh access open, move it a another port,disable
password auth and use only publickey auth.
Also as I see more and more companies implementing a strict "no incoming
ports open" policy (which is good), an option is to have a reverse ssh
tunnel.
<a class="moz-txt-link-freetext" href="http://skoroneos.blogspot.com/2009/01/doing-reverse-ssh-tunnel-embedded-way.html">http://skoroneos.blogspot.com/2009/01/doing-reverse-ssh-tunnel-embedded-way.html</a>
I have implemented this in our embedded asterisk distro and now works
with the dialplan also.
i.e you trigger the connection from inside by dialing a number
</pre>
</blockquote>
<pre wrap=""><!---->
There are other ways too, including port knocking.
For SIP bruteforce attack, I use fail2ban to monitor the logs and firewall
any attacks,in addition to having strong passwords and long sip user ids.
_______________________________________________
--Bandwidth and Colocation Provided by <a class="moz-txt-link-freetext" href="http://www.api-digital.com">http://www.api-digital.com</a>--
asterisk-biz mailing list
To UNSUBSCRIBE or update options visit:
<a class="moz-txt-link-freetext" href="http://lists.digium.com/mailman/listinfo/asterisk-biz">http://lists.digium.com/mailman/listinfo/asterisk-biz</a>
</pre>
</blockquote>
</body>
</html>