[asterisk-bugs] [Asterisk 0017509]: Bruteforce hack
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Jun 15 21:07:07 CDT 2010
The following issue has been SUBMITTED.
======================================================================
https://issues.asterisk.org/view.php?id=17509
======================================================================
Reported By: mn3250
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 17509
Category: Channels/chan_sip/General
Reproducibility: always
Severity: feature
Priority: normal
Status: new
Asterisk Version: 1.4.32
JIRA:
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2010-06-15 21:07 CDT
Last Modified: 2010-06-15 21:07 CDT
======================================================================
Summary: Bruteforce hack
Description:
Lately there are some registration attempts from different IPs to register
to my servers. Both on SIP and IAX.
Is it possible to think of disabling an IP source not to be able to
register for a few minutes after some unsuccessful registration attempts?
Since wrong user/pass cannot be handled in firewall, can there be a new
feature in Asterisk to do it?
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2010-06-15 21:07 mn3250 New Issue
2010-06-15 21:07 mn3250 Asterisk Version => 1.4.32
2010-06-15 21:07 mn3250 Regression => No
2010-06-15 21:07 mn3250 SVN Branch (only for SVN checkouts, not tarball
releases) => N/A
======================================================================
More information about the asterisk-bugs
mailing list