[asterisk-security] Person Trying to Register on my Asterisk multiple times

Johansson Olle E oej at edvina.net
Fri Jan 23 15:51:46 CST 2009


23 jan 2009 kl. 22.36 skrev Christopher Gray:

> Hello:
>
> Beginning on January 6, it appears that somebody has been trying to  
> hack into
> my Asterisk.  They have tried on the 7th, 9th, and the 20th.  The  
> messages file
> in /var/log/Asterisk shows entries like this:
>
> [Jan 20 13:39:40] NOTICE[5130] chan_sip.c: Registration from
> '"1072963462"<sip:1072963462 at 198.144.206.28>' failed for  
> '212.174.78.60' - No matching peer found
>
> [Jan 20 13:39:41] NOTICE[5130] chan_sip.c: Registration from
> '"100"<sip:100 at 198.144.206.28>' failed for '212.174.78.60' - No  
> matching peer found
>
> [Jan 20 13:39:41] NOTICE[5130] chan_sip.c: Registration from
> '"101"<sip:101 at 198.144.206.28>' failed for '212.174.78.60' - No  
> matching peer found
>
> [Jan 20 13:39:41] NOTICE[5130] chan_sip.c: Registration from
> '"102"<sip:102 at 198.144.206.28>' failed for '212.174.78.60' - No  
> matching peer found
>
> [Jan 20 13:39:41] NOTICE[5130] chan_sip.c: Registration from
> '"103"<sip:103 at 198.144.206.28>' failed for '212.174.78.60' - No  
> matching peer found
>
> The sip:101 sip:102 and so on goes up until sip:9975.  This began at  
> 13:39:40
> and ended at 13:42:51.  Entries began at line 970 of the log file  
> and ended at
> 8016 for a total of 7,041 occurrences.
>
> How worried should I be about this and what should I do to stop  
> further
> attempts?

Attacks are never fun. Use the ACL (permit/deny)  in sip.conf to block  
this IP or range of IPs at least.
Or use IPtables. There are a lot of IPtables scripts to prevent this  
kind of attacks if you look at the
solutions for the very common SSH attacks that keep testing multiple  
usernames. Maybe someone on the list has a version for SIP attempts  
over TCP and/or UDP?

It's always good to have a bit less obvious peer names than the ones  
they test. Don't use usernames or extension numbers. Make sure you  
separate the namespaces. Kevin usually suggest Ethernet MAC addresses,  
which are harder to guess, but still relates to something even though  
they do have a well-known pattern.

Finally, it's important to make sure you have good passwords. There's  
no reason to have simple passwords in something you only install in  
software in devices or applications. There's no user who has to learn  
to remember the MD5 auth secrets.

That's my 10 cents. Please, list, fill in and correct me when wrong!
/O





More information about the asterisk-security mailing list