[asterisk-dev] auto blacklisting "script kiddies"

Walt Reed asterisk at linuxguy.com
Thu Apr 26 08:18:35 MST 2007


On Thu, Apr 26, 2007 at 05:26:01PM +0300, Tzafrir Cohen said:
> On Thu, Apr 26, 2007 at 03:08:19PM +0100, Steve Kennedy wrote:
> > Would it not be a good idea if Asterisk would auto-blacklist single IP
> > addresses that attempted multiple SIP or other registrations.
> > 
> > The attacks I've seen seem to be scripted and aren't particularly
> > clever, so an auto back-off system or just lock from that IP address
> > after a particular number of registration attempts. This could be
> > specified as a config variable (as in number of attempts before lock).
> > 
> > Locked IP's could then be manually unlocked, or unlocked after a time
> > period (or in combination, locked wait some time, unlock and if more
> > attempts continue, lock for a longer time period etc).
> > 
> > This isn't going to defeat any kind of serious attack, but would deter
> > the script kiddies out there. It also potentially wont work for ITSPs
> > etc, but for smaller installs it could be just the solution?
> 
> Blocking is better done by the firewall. There are already a number of
> programs that adapt firwall or do whatever custom operation based on
> certain conditions in the log.
> 
> Also: how simple is it to spoof a single packet for the purpose of
> banning an IP address? e.g.: me spoofing a false packet from your IP
> address to Gizmo.
> 
> Are Asterisk's log well-suited for automated parsing by log parsers?

Log parsing for this kind of thing is pretty hackish. It would be nice
to have support in Asterisk to identify offenders. I agree that the
blocking is best done by the firewall however as you can block not only
asterisk access, but ALL access if you wish.

For a starting point, one could look at the "denyhosts" tool.


More information about the asterisk-dev mailing list