[asterisk-users] A new hack?
Terry Brummell
terry at brummell.net
Sat Nov 26 06:02:16 CST 2011
Install & Configure Fail2Ban then the host will be blocked from
connecting. And no, it's not new.
-----Original Message-----
From: asterisk-users-bounces at lists.digium.com
[mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of Gordon
Henderson
Sent: Saturday, November 26, 2011 6:55 AM
To: Asterisk Users Mailing List Discussion
Subject: [asterisk-users] A new hack?
Or just an old one that I've not noticed before...
Seeing lines like this in the logs:
[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=E2lb2p9BOJ
[Nov 26 08:47:17] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=XMDRarBM2w
[Nov 26 08:47:19] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=AaTE0L0oRj
[Nov 26 08:47:21] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=igsN240Wr5
[Nov 26 08:47:23] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=E8Nkbs0Aye
[Nov 26 08:47:25] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=LEvpc7tK6B
[Nov 26 08:47:27] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=WrIoZ92YPz
[Nov 26 08:47:29] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=kuGTjXr7Pd
[Nov 26 08:47:31] NOTICE[789] chan_sip.c: Sending fake auth rejection
for user "VOIP" <sip:VOIP at 85.25.145.176>;tag=ygQBLSjH1m
etc.
The IP address is presumably the IP address of some compromised host (in
Germany in this case, but I've noticed others around the globe so the
software doing it would appear to be widespread) - it's not a host that
should be connecting in.
I supect that some SIP PBX somewhare is vulnerable to having an account
called "VOIP", so this remote attack is trying to compromise that
account.
At least it's only once every 2 seconds, so in that respect no worse
than
the multitude of pop/smtp/imap/ssh type attacks that hackers try...
I've seen it on several servers now, always for account VOIP. I'm
presuming the "fake rejection" is the side-effect of using
alwaysauthreject in sip.conf. (if-so, then it's doing the right thing)
But something to look out for just in-case..
Gordon
--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
http://www.asterisk.org/hello
asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-users
More information about the asterisk-users
mailing list