[asterisk-bugs] [JIRA] (ASTERISK-20722) Preventing Password attacks
Michael L. Young (JIRA)
noreply at issues.asterisk.org
Sat Nov 24 10:39:45 CST 2012
[ https://issues.asterisk.org/jira/browse/ASTERISK-20722?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Michael L. Young closed ASTERISK-20722.
---------------------------------------
Resolution: Not A Bug
> Preventing Password attacks
> ---------------------------
>
> Key: ASTERISK-20722
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-20722
> Project: Asterisk
> Issue Type: Improvement
> Security Level: None
> Components: Channels/chan_sip/Security Framework
> Affects Versions: 10.8.0
> Environment: All
> Reporter: Ron Wheeler
>
> When someone tries to attack a SIP account Asterisk helps them out by responding quickly.
> When an asterisk systm is attacked by applying random passwords, it would be good to be able to slow the attacker down by specifying a high number oof milliseconds to respond to a wrong password or username.
> This would at least slow it down and eventually they would go away.
> No one with a valid password would be affected and it should be easy to do.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira
More information about the asterisk-bugs
mailing list