<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Sep 1, 2017 at 9:13 AM, Joshua Colp <span dir="ltr"><<a href="mailto:jcolp@digium.com" target="_blank">jcolp@digium.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Fri, Sep 1, 2017, at 09:01 AM, Dave Topping wrote:<br>
> http:/<a href="http://www.theregister.co.uk/2017/09/01/asterisk_admin_patch/" rel="noreferrer" target="_blank">www.theregister.co.uk/<wbr>2017/09/01/asterisk_admin_<wbr>patch/</a><br>
<br>
This specific issue exists in a lot of different implementations and<br>
devices. Unfortunately there's nothing within SDP that guarantees or<br>
provides what the source of media should be for most things. You can<br>
guess that where you are sending (what you are told in the SDP) is the<br>
correct source, but in the case of NAT that isn't true. Using SRTP is<br>
one way to work around this as mentioned on the disclosure[1] from the<br>
reporter. I'm sure the strict RTP implementation will evolve even<br>
further, but we also have to ensure that we don't just start blocking<br>
all RTP so people can't actually place calls. It's certainly a<br>
challenge.<br>
<br>
This is one of the things that WebRTC got right - information is<br>
conveyed that allows you to verify that the sender of media is who you<br>
expect.<br>
<br>
[1]<br>
<a href="https://github.com/EnableSecurity/advisories/tree/master/ES2017-04-asterisk-rtp-bleed" rel="noreferrer" target="_blank">https://github.com/<wbr>EnableSecurity/advisories/<wbr>tree/master/ES2017-04-<wbr>asterisk-rtp-bleed</a></blockquote><div><br></div><div>As Josh mentioned this is an issue with RTP and the SDP and when customers use NAT you need a way to figure out what their external RTP IP is. One option is to use IPv6 so the IP in the SDP is the one and only IP the media should be coming from. Another option is to increase the range of RTP ports in use. By default asterisk uses ports 10,000 to 20,000. You can change that to say use 20,000 to 30,0000 or better yet use 10,000 to 20,0000 widening the range of ports being used.</div><div><br></div><div>Another point to keep in mind is they have to hit the same ports that you are using. Say for instance you have 1000 calls on a box that's 1000 UDP ports being used. If you use a spread of 20,000 ports (and they know this) they have a 1 in 20 chances of hitting a port that you want. Also if you are using strictrtp=yes that means they need to hit the box at the exact moment that the call is being set up. Even if they used say G711 that's roughly 64kbit per second (let's forget about the bits for the IP's, timing etc.)) Now if they spray 5000 ports at once (since they need to hit every call as it is being set up) thats an extra 333 mbits per second of added your traffic. Your monitoring tool (if you don't have one, get one) should pick up on it. One you see the ports being hit you can easily tweak your configs. IMHO It's not different then needing to tweak your fw configs when getting hit with a DDOS attack.</div><div><br></div></div></div></div>