[asterisk-users] sip extension compromised, need help blocking brute force attempts
randulo
spamsucks2005 at gmail.com
Mon Jun 30 15:15:49 CDT 2008
Someone should write an asterisk-centric document on this topic, it's
likely to become an issue "someday". Sounds like a great subject for
VoIP USers Conference as well. Any volunteers?
/r
>
> ssh hack detection is easy because each new bruteforce starts with a
> tcp syn, so you can count them and then drop access, on the premise
> that a legitimate user wouldn't need X attempts to get their password
> right.
More information about the asterisk-users
mailing list