Displaying 20 results from an estimated 435 matches for "unauthentication".
Did you mean:
authentication
2006 Oct 12
5
unauthenticated calls
Hi list,
i noticed from the cli my asterisk box is accepting unauthenticated calls
how can i prevent this?
CLI:
-- Accepting UNAUTHENTICATED call from 192.168.0.2:
> requested format = gsm,
> requested prefs = (),
> actual format = ulaw,
> host prefs = (g729|ulaw|alaw),
> priority = mine
-------------- next part --------------
An HTML
2023 Mar 18
4
Minimize sshd log clutter/spam from unauthenticated connections
Dear OpenSSH developers,
a publicly accessible sshd on port 22 generates a lot of log clutter
from unauthenticated connections. For an exemplary host on a university
network, sshd accumulates 5~20k log lines on a single day (more than 90%
of the total amount of syslog lines). That is despite the host having a
restricted configuration (no SSH password authentication, firewall rate
limit for
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Unauthenticated calls allowed from SIP channel |
| | driver
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Unauthenticated calls allowed from SIP channel |
| | driver
2023 Mar 18
1
Minimize sshd log clutter/spam from unauthenticated connections
modern syslog daemons (including rsyslog, which is default on just about every
linux system) allow you to filter efficiently on the message contents, not just
the severity, so you can opt to throw out the messages you don't want.
I advocate for a slightly different way of dealing with it, filter these
messages from your main logstream, but put them into either a script directly,
or a
2018 May 18
2
Disconnecting unauthenticated IMAP entities faster?
Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded?
We're having an issue where blocks of IP's from China and similar locations are crawling IP ranges trying common login credentials, and hanging the connections open in the process. We have clients
2005 Jun 23
1
Rate Limit Unauthenticated connections ?
I am seeing a recent increase in SSH harvesting attempts and brute
forcing in the log of my system.
I'm interested in opening up some discussion around what OpenSSH can do
itself to counter measure against:
* DoS attack where too many unauthenticated connections are open. I'm
not interested in stopping the professional saboteur but the casual
script kiddie (to use IRC terms) from
2018 May 18
0
Disconnecting unauthenticated IMAP entities faster?
> On 18 May 2018, at 20.19, David Hubbard <dhubbard at dino.hostasaurus.com> wrote:
>
> Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded?
>
> We're having an issue where blocks of IP's from China and similar locations are
2004 Jul 29
1
Unauthenticated calls from a specific IP
Skipped content of type multipart/alternative-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/jpeg
Size: 4055 bytes
Desc: not available
Url : http://lists.digium.com/pipermail/asterisk-users/attachments/20040729/85af8309/attachment.jpeg
2008 Feb 27
0
Prevent unauthenticated PDC users to login locally
Hi,
I've configured my samba server as a PDC and joint some windowsXP clients to
it. So far so good. However I'm able to login into windows even when the
domain controller refuses to authenticate the user. The user is not able to
access the shares but can use the local machine. How can I prevent windows
to login the user locally when the domain controller refuses authentication?
thankz,
2018 Feb 23
6
RADIUS
John Hodrien wrote:
> On Thu, 22 Feb 2018, hw wrote:
>
>> That seems neither useful, nor feasible for customers wanting to use the
>> wireless network we would set up for them with their cell phones.? Are cell
>> phones even capable of this kind of authentication?
>
> Yes, entirely capable.? WPA2-Enterprise isn't some freakish and unusual
> solution.
Ok, so
2009 Nov 12
3
allowguest defaults to yes for SIP
In your sip.conf file allowguest defaults to yes. This means that
anyone that can reach the SIP ports on that system has access to make
unauthenticated calls, by default. The administrator actually has to go
in and turn it off to prevent unauthenticated SIP calls (in whatever
context [general] points at).
Does anyone else agree with me that this is a poor default? I'd like to
see the
2018 May 17
2
Decoding SIP register hack
I need some help understanding SIP dialog. Some actor is trying to
access my server, but I can't figure out what he's trying to do ,or how.
I'm getting a lot of these warnings.
[May 17 10:08:08] WARNING[1532]: chan_sip.c:4068 retrans_pkt:
Retransmission timeout reached on transmission
_zIr9tDtBxeTVTY5F7z8kD7R.. for seqno 101
With SIP DEBUG I tracked the Call-ID to this INVITE :
2013 May 15
1
Puppet 3.2.0-0.1rc2.el6 SSL problem
I am having an issue adding new clients to puppet. The master is not
accepting connections from unauthenticated clients, even though my
auth.conf that worked with v3.1.1 has not changed. If I test ssl via curl
-k, the puppet master returns "can''t convert nil into String" to the
client. The http log on the master shows a 400 return code. Also note,
I''m using
2023 Mar 19
1
Minimize sshd log clutter/spam from unauthenticated connections
To radically cut down on SSH log spam you can also hide it completely behind a firewall, and allow access only by some port knocking sequence.
I quite like having a process listen on port 53 and wait for a dns query containing a totp string to grant (temporary) access; that's a 2fa, and doing a "host 123456. my-ip" is easily automated in a shell script as well...
2023 Jun 11
0
Minimize sshd log clutter/spam from unauthenticated connections
On 10.06.23 11:19, Carsten Andrich wrote:
> For the time being, I've deployed a quasi-knocking KISS solution that
> sends an unencrypted secret via a single UDP packet. Server side is
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> realized entirely with nftables
... frankly, for that reason, I like fwknop (in my case, straight from
OS repos) better ... I'd still have to see fwknopd exit
2006 Nov 22
0
in Asterisk Manger its Unauthentication User and Host ..........
Hello Users.........
I'm Now doing on Asterisk Manager for My knowledge Growth, Can anybody
explan me on Asterisk Manager settings.......
in manager.conf
[general]
enabled =yes
port = 5038
bindaddr = 192.168.2.75
displayconnects = yes
[hyperion]
secret = hyperion
permit=192.168.2.76/255.255.255.0
deny=0.0.0.0/0.0.0.0
read = system,call,log,verbose,command,agent,user
write =
2023 Mar 18
3
Minimize sshd log clutter/spam from unauthenticated connections
On 18.03.23 14:34, David Lang wrote:
> modern syslog daemons (including rsyslog, which is default on just
> about every linux system) allow you to filter efficiently on the
> message contents, not just the severity, so you can opt to throw out
> the messages you don't want.
>
> I advocate for a slightly different way of dealing with it, filter
> these messages from
2018 Feb 22
4
RADIUS
Gordon Messmer wrote:
> On 02/14/2018 08:37 AM, hw wrote:
>> Then what?? How do I make it so that the users are actually able to authenticate?
>
>
> Look for documentation on 802.11x authentication for the specific client you want to authenticate.
Thanks, I figured it is what I might need to look into. How about
a client that uses PXE boot?
> WiFi is pretty
2006 Apr 24
1
E1 testing
Skipped content of type multipart/alternative-------------- next part --------------
Console logs from Asterisk A:
Executing Dial("SIP/test0-5821", "Zap/6/327557670||Tt") in new stack
-- Requested transfer capability: 0x00 - SPEECH
-- Called 6/327557670
-- Zap/6-1 is proceeding passing it to SIP/test0-5821
-- Accepting UNAUTHENTICATED call from 195.66.73.122: