[asterisk-dev] Rate limiting traffic to address potential DoS issues?

Andrew Kohlsmith akohlsmith-asterisk at benshaw.com
Tue Oct 10 06:10:42 MST 2006


On Saturday 07 October 2006 23:07, Rich Adamson wrote:
> Really had not thought to much about the source of the "improper/bogus"
> packets, but since I'm heavily involved with I/T security assessments,
> my comments were more oriented towards what might reduce the load on an
> asterisk box when a hacker (or otherwise tosses packets at asterisk.
> Wasn't thinking at all in terms of broken clients and such.

Wouldn't you have to keep track of "who"?  Or was the intention to simply stop 
responding to *all* SIP packets?  If so, that seems like an easy DoS...  
Easier than what we currently have.

-A.


More information about the asterisk-dev mailing list