search for: unauthentication

Displaying 20 results from an estimated 424 matches for "unauthentication".

Did you mean: authentication
2006 Oct 12
5
unauthenticated calls
Hi list, i noticed from the cli my asterisk box is accepting unauthenticated calls how can i prevent this? CLI: -- Accepting UNAUTHENTICATED call from 192.168.0.2: > requested format = gsm, > requested prefs = (), > actual format = ulaw, > host prefs = (g729|ulaw|alaw), > priority = mine -------------- next part -------------- An HTML
2023 Mar 18
4
Minimize sshd log clutter/spam from unauthenticated connections
Dear OpenSSH developers, a publicly accessible sshd on port 22 generates a lot of log clutter from unauthenticated connections. For an exemplary host on a university network, sshd accumulates 5~20k log lines on a single day (more than 90% of the total amount of syslog lines). That is despite the host having a restricted configuration (no SSH password authentication, firewall rate limit for
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Unauthenticated calls allowed from SIP channel | | | driver
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Unauthenticated calls allowed from SIP channel | | | driver
2023 Mar 18
1
Minimize sshd log clutter/spam from unauthenticated connections
modern syslog daemons (including rsyslog, which is default on just about every linux system) allow you to filter efficiently on the message contents, not just the severity, so you can opt to throw out the messages you don't want. I advocate for a slightly different way of dealing with it, filter these messages from your main logstream, but put them into either a script directly, or a
2018 May 18
2
Disconnecting unauthenticated IMAP entities faster?
Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded? We're having an issue where blocks of IP's from China and similar locations are crawling IP ranges trying common login credentials, and hanging the connections open in the process. We have clients
2005 Jun 23
1
Rate Limit Unauthenticated connections ?
I am seeing a recent increase in SSH harvesting attempts and brute forcing in the log of my system. I'm interested in opening up some discussion around what OpenSSH can do itself to counter measure against: * DoS attack where too many unauthenticated connections are open. I'm not interested in stopping the professional saboteur but the casual script kiddie (to use IRC terms) from
2018 May 18
0
Disconnecting unauthenticated IMAP entities faster?
> On 18 May 2018, at 20.19, David Hubbard <dhubbard at dino.hostasaurus.com> wrote: > > Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded? > > We're having an issue where blocks of IP's from China and similar locations are
2004 Jul 29
1
Unauthenticated calls from a specific IP
Skipped content of type multipart/alternative-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: image/jpeg Size: 4055 bytes Desc: not available Url : http://lists.digium.com/pipermail/asterisk-users/attachments/20040729/85af8309/attachment.jpeg
2008 Feb 27
0
Prevent unauthenticated PDC users to login locally
Hi, I've configured my samba server as a PDC and joint some windowsXP clients to it. So far so good. However I'm able to login into windows even when the domain controller refuses to authenticate the user. The user is not able to access the shares but can use the local machine. How can I prevent windows to login the user locally when the domain controller refuses authentication? thankz,
2018 Feb 23
6
RADIUS
John Hodrien wrote: > On Thu, 22 Feb 2018, hw wrote: > >> That seems neither useful, nor feasible for customers wanting to use the >> wireless network we would set up for them with their cell phones.? Are cell >> phones even capable of this kind of authentication? > > Yes, entirely capable.? WPA2-Enterprise isn't some freakish and unusual > solution. Ok, so
2009 Nov 12
3
allowguest defaults to yes for SIP
In your sip.conf file allowguest defaults to yes. This means that anyone that can reach the SIP ports on that system has access to make unauthenticated calls, by default. The administrator actually has to go in and turn it off to prevent unauthenticated SIP calls (in whatever context [general] points at). Does anyone else agree with me that this is a poor default? I'd like to see the
2018 May 17
2
Decoding SIP register hack
I need some help understanding SIP dialog. Some actor is trying to access my server, but I can't figure out what he's trying to do ,or how. I'm getting a lot of these warnings. [May 17 10:08:08] WARNING[1532]: chan_sip.c:4068 retrans_pkt: Retransmission timeout reached on transmission _zIr9tDtBxeTVTY5F7z8kD7R.. for seqno 101 With SIP DEBUG I tracked the Call-ID to this INVITE :
2013 May 15
1
Puppet 3.2.0-0.1rc2.el6 SSL problem
I am having an issue adding new clients to puppet. The master is not accepting connections from unauthenticated clients, even though my auth.conf that worked with v3.1.1 has not changed. If I test ssl via curl -k, the puppet master returns "can''t convert nil into String" to the client. The http log on the master shows a 400 return code. Also note, I''m using
2023 Mar 19
1
Minimize sshd log clutter/spam from unauthenticated connections
To radically cut down on SSH log spam you can also hide it completely behind a firewall, and allow access only by some port knocking sequence. I quite like having a process listen on port 53 and wait for a dns query containing a totp string to grant (temporary) access; that's a 2fa, and doing a "host 123456. my-ip" is easily automated in a shell script as well...
2023 Jun 11
0
Minimize sshd log clutter/spam from unauthenticated connections
On 10.06.23 11:19, Carsten Andrich wrote: > For the time being, I've deployed a quasi-knocking KISS solution that > sends an unencrypted secret via a single UDP packet. Server side is ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > realized entirely with nftables ... frankly, for that reason, I like fwknop (in my case, straight from OS repos) better ... I'd still have to see fwknopd exit
2006 Nov 22
0
in Asterisk Manger its Unauthentication User and Host ..........
Hello Users......... I'm Now doing on Asterisk Manager for My knowledge Growth, Can anybody explan me on Asterisk Manager settings....... in manager.conf [general] enabled =yes port = 5038 bindaddr = 192.168.2.75 displayconnects = yes [hyperion] secret = hyperion permit=192.168.2.76/255.255.255.0 deny=0.0.0.0/0.0.0.0 read = system,call,log,verbose,command,agent,user write =
2023 Mar 18
3
Minimize sshd log clutter/spam from unauthenticated connections
On 18.03.23 14:34, David Lang wrote: > modern syslog daemons (including rsyslog, which is default on just > about every linux system) allow you to filter efficiently on the > message contents, not just the severity, so you can opt to throw out > the messages you don't want. > > I advocate for a slightly different way of dealing with it, filter > these messages from
2018 Feb 22
4
RADIUS
Gordon Messmer wrote: > On 02/14/2018 08:37 AM, hw wrote: >> Then what?? How do I make it so that the users are actually able to authenticate? > > > Look for documentation on 802.11x authentication for the specific client you want to authenticate. Thanks, I figured it is what I might need to look into. How about a client that uses PXE boot? > WiFi is pretty
2006 Apr 24
1
E1 testing
Skipped content of type multipart/alternative-------------- next part -------------- Console logs from Asterisk A: Executing Dial("SIP/test0-5821", "Zap/6/327557670||Tt") in new stack -- Requested transfer capability: 0x00 - SPEECH -- Called 6/327557670 -- Zap/6-1 is proceeding passing it to SIP/test0-5821 -- Accepting UNAUTHENTICATED call from 195.66.73.122: