[asterisk-users] sip extension compromised, need help blocking brute force attempts

randulo spamsucks2005 at gmail.com
Mon Jun 30 15:15:49 CDT 2008


Someone should write an asterisk-centric document on this topic, it's
likely to become an issue "someday". Sounds like a great subject for
VoIP USers Conference as well. Any volunteers?

/r

>
> ssh hack detection is easy because each new bruteforce starts with a
> tcp syn, so you can count them and then drop access, on the premise
> that a legitimate user wouldn't need X attempts to get their password
> right.



More information about the asterisk-users mailing list