[asterisk-users] Asterisk secure fine tune - stop attack
motty cruz
motty.cruz at gmail.com
Thu Sep 4 10:12:02 CDT 2014
Thanks, looks like fail2ban is the way to go, I would prefer a different
alternatives if there is one. I tried deny=IP/netmask but did not work for
me, in sip.conf. seems like fail2ban is what you all are using, so I will
give it a try.
Thanks,
On Thu, Sep 4, 2014 at 7:58 AM, Thorsten Göllner <tg at ovm-group.com> wrote:
>
> Am 04.09.2014 16:44, schrieb motty cruz:
>
> Hi All,
> I see this kind of attack on our Asterisk Server, do you know how to block
> that IP?
>
> [Sep 4 07:41:06] NOTICE[7375]: chan_sip.c:23375 handle_request_invite:
> Call from '' (213.136.81.166:9306) to extension '34422' rejected because
> extension not found in context 'default'.
>
>
> You should not invest time in blocking single IPs. Take a look at
> "fail2ban".
> http://www.fail2ban.org/wiki/index.php/Asterisk
>
> -Thorsten-
>
> --
> _____________________________________________________________________
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> New to Asterisk? Join us for a live introductory webinar every Thurs:
> http://www.asterisk.org/hello
>
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-users
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20140904/eb40379b/attachment.html>
More information about the asterisk-users
mailing list