[Asterisk-Security] Day early and a dollar short? (IAX2 and SIP
problems)
John Todd
jtodd at loligo.com
Tue Jul 18 08:19:28 MST 2006
DoS notice for IAX2 here: http://xforce.iss.net/xforce/alerts/id/228
Of course, this has been "patched" in => 1.2.10 and is "old news" but
it got me thinking... Are we just as vulnerable with SIP from a
similar threat? I haven't tested, but was wondering if anyone had
real-world examinations or testbed experiments they could share. I
seem to recall some discussion about time-scaled blocking of hosts or
usernames that made repeatedly incorrect requests (similar to the
flap dampening methods with some brands of routers.) Would this
help the problem or introduce a more dangerous threat from potential
memory overloads?
While not exactly on-target, this thread discusses some of the
issues:
http://www.mail-archive.com/asterisk-dev@lists.digium.com/msg20804.html
JT
More information about the Asterisk-Security
mailing list