[asterisk-users] Hacking attempt, Asterisk 1.4

A J Stiles asterisk_list at earthshod.co.uk
Thu Feb 20 06:06:43 CST 2014


On Thursday 20 Feb 2014, Brynjolfur Thorvardsson wrote:
> Every few weeks we get an attack that lasts about a minute or two,
> resulting in our AGI script being overloaded.
> 
> What happens is that somebody seems to be trying to connect from our server
> – in my cdrs log I can see that they use a four digit number for source,
> destination and caller id, e.g.
> 
> clid: 7321
> src: 7321
> dst: 7321
> channel: SIP/xx.xx.xx.xx-aaaaaaaa

Assuming that it's the AGI script that is the bottleneck, how about simply 
checking in the dialplan that the ${CALLERID(num)} is different from ${EXTEN} 
before executing the AGI script?  

-- 
AJS

Answers come *after* questions.



More information about the asterisk-users mailing list