[asterisk-bugs] [Asterisk 0017509]: Bruteforce hack

Asterisk Bug Tracker noreply at bugs.digium.com
Tue Jun 15 22:48:17 CDT 2010


A NOTE has been added to this issue. 
====================================================================== 
https://issues.asterisk.org/view.php?id=17509 
====================================================================== 
Reported By:                mn3250
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   17509
Category:                   Channels/chan_sip/General
Reproducibility:            always
Severity:                   feature
Priority:                   normal
Status:                     new
Asterisk Version:           1.4.32 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2010-06-15 21:07 CDT
Last Modified:              2010-06-15 22:48 CDT
====================================================================== 
Summary:                    Bruteforce hack
Description: 
Lately there are some registration attempts from different IPs to register
to my servers. Both on SIP and IAX.
Is it possible to think of disabling an IP source not to be able to
register for a few minutes after some unsuccessful registration attempts?
Since wrong user/pass cannot be handled in firewall, can there be a new
feature in Asterisk to do it?
====================================================================== 

---------------------------------------------------------------------- 
 (0123464) Jamuel (reporter) - 2010-06-15 22:48
 https://issues.asterisk.org/view.php?id=17509#c123464 
---------------------------------------------------------------------- 
Take a look at the fail2ban package if you are dealing with a linux w/
iptables host. YMMV but
http://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk
should get you pretty close. 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2010-06-15 22:48 Jamuel         Note Added: 0123464                          
======================================================================




More information about the asterisk-bugs mailing list