Displaying 20 results from an estimated 100 matches similar to: "Unauthenticated calls from a specific IP"
2006 Feb 08
3
Basics - help with models &controllers...
I have looked at many rails apps source code from the web and it seems
there is no best practice when designing the database schema and
models.
For example surely it is recommended to include your foreign keys and
constraints at the database level? Some people just rely on the
activerecord associations, and don''t bother even placing a field for the
foreign key in the tables?
I
2010 Jan 12
5
Multi-Tenant Parking
Has anyone managed to get multi-parking lot call parking working correctly? I've had several attempts at it, and never seem to be able to get it to go properly - (actually, at all):
I've most recently done this with 1.6.1.x, and now 1.6.2.x, with no luck in either case. What I've been "trying" is the following:
features.conf
[general]
parkext => 100
[featuremap]
2006 Aug 14
14
A mock which extends rather than replaces a class?
While running tests, we would like to instrument some of the classes
under test. We still want the classes to do exactly what they currently
do, but we would like them to do more when running in the test
environment.
Clearly we can (and currently do) just extend the objects "on the fly"
where necessary, but this is a bit messy - we''d like some centralised
way to always
2006 Aug 02
1
REST and functional tests
Just playing around with converting an apps to the new REST goodness in
edge rails, and I''m trying to work out how to convert/write the
functional tests.
Is the recommended way to explicitly use the actions (e.g. get :show,
:id => ...; post :create,..., etc) and test the routes separately, or
duplicate the request, in which case how is that done get "/", :id => 5
2008 Feb 18
1
realtime table customization to track iax registrations
Hello,
I'm experimenting with Asterisk and MySQL.
Up to know I've just put iax.conf in a MySQL database and it seems to
work: when a Iax2 client registers the corrispondent row in db is
updated. Good.
However when I have many asterisk boxes pointing to the same db a
problem arises: I need an additional column in iax_buddies table called
for example "Asterisk ID" which tells me on
2008 Apr 28
8
NetApp vfiler example scripts
Hi,
For anyone who is interested; I created some basic scripts based on my
current iSCSI block script.
http://kinkrsoftware.nl/contrib/xen/block-netapp
http://kinkrsoftware.nl/contrib/xen/netapp-lun.py
Basically these two scripts allow you to start a vfiler with a qtree of
customers. You log in the NetApp upon boot, and can use:
netapp://customer1/disk1
It is work in progress... because I
2008 Apr 28
8
NetApp vfiler example scripts
Hi,
For anyone who is interested; I created some basic scripts based on my
current iSCSI block script.
http://kinkrsoftware.nl/contrib/xen/block-netapp
http://kinkrsoftware.nl/contrib/xen/netapp-lun.py
Basically these two scripts allow you to start a vfiler with a qtree of
customers. You log in the NetApp upon boot, and can use:
netapp://customer1/disk1
It is work in progress... because I
2004 Oct 14
10
HTB
Hi all
I''m new in this list and i hope to lear and to help if possible.
But firt i need help :-(
I have this messege in my syslog when my classes and qdiscs goes down.
Can any one know what does it mean?
Thnx in advance.
Yannick Arrimadas Bot
Oct 14 16:09:27 pototogorri kernel: HTB init, kernel part version 3.17
Oct 14 16:09:27 pototogorri kernel: Unable to handle kernel paging
2015 Jun 23
4
[LLVMdev] Improving the quality of debug locations / DbgValueHistoryCalculator
Here is a proposal for improving DbgValueHistoryCalculator and the
overall quality of debug locations.
Focus: This is about lowering the DBG_VALUE machine instructions to
DWARF location lists.
Non-focus: This is not about (typical -O0) variables that permanently
reside at a frame index and are described with dbg.declare intrinsics
in the IR. These variables are stored in the MMI side-table and
2007 Mar 04
4
Rails functional testing and Mocha
I''ve always wanted to be able to do stuff like this in my functional
tests
c = customers(:customer_1)
c.expects(:great_customer_service)
post :service_customer, :id => c.id
This of course fails because inside the rails action a different
instance of customer is used. Some of the time setting your
expectation/stubbing on Customer.any_instance works, but it''s not
2019 Jan 26
3
INVITE from DID: No matching endpoint found but completes the call anyway
I have a trunk set up for the DID from my provider:
[my_provider]
type=registration
outbound_auth=my_provider
server_uri=sip:sip.example.com
client_uri=sip:my_username at sip.example.com
retry_interval=60
[my_provider]
type=auth
auth_type=userpass
password=123456
username=my_username
[my_provider]
type=aor
contact=sip:sip.example.com:5060
[my_provider]
type=endpoint
context=from-my_provider
2018 May 18
0
Disconnecting unauthenticated IMAP entities faster?
> On 18 May 2018, at 20.19, David Hubbard <dhubbard at dino.hostasaurus.com> wrote:
>
> Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded?
>
> We're having an issue where blocks of IP's from China and similar locations are
2008 Feb 27
0
Prevent unauthenticated PDC users to login locally
Hi,
I've configured my samba server as a PDC and joint some windowsXP clients to
it. So far so good. However I'm able to login into windows even when the
domain controller refuses to authenticate the user. The user is not able to
access the shares but can use the local machine. How can I prevent windows
to login the user locally when the domain controller refuses authentication?
thankz,
2023 Mar 19
1
Minimize sshd log clutter/spam from unauthenticated connections
To radically cut down on SSH log spam you can also hide it completely behind a firewall, and allow access only by some port knocking sequence.
I quite like having a process listen on port 53 and wait for a dns query containing a totp string to grant (temporary) access; that's a 2fa, and doing a "host 123456. my-ip" is easily automated in a shell script as well...
2023 Jun 11
0
Minimize sshd log clutter/spam from unauthenticated connections
On 10.06.23 11:19, Carsten Andrich wrote:
> For the time being, I've deployed a quasi-knocking KISS solution that
> sends an unencrypted secret via a single UDP packet. Server side is
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> realized entirely with nftables
... frankly, for that reason, I like fwknop (in my case, straight from
OS repos) better ... I'd still have to see fwknopd exit
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Unauthenticated calls allowed from SIP channel |
| | driver
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Unauthenticated calls allowed from SIP channel |
| | driver
2005 Jun 23
1
Rate Limit Unauthenticated connections ?
I am seeing a recent increase in SSH harvesting attempts and brute
forcing in the log of my system.
I'm interested in opening up some discussion around what OpenSSH can do
itself to counter measure against:
* DoS attack where too many unauthenticated connections are open. I'm
not interested in stopping the professional saboteur but the casual
script kiddie (to use IRC terms) from
2023 Mar 18
2
Minimize sshd log clutter/spam from unauthenticated connections
I guess you might find fail2ban useful.
It scans logfiles (like /var/log/sshd.log), and when it sees too many authentication failures from an IP address (or network range) it can issue commands to drop any further attempts via a firewall.
By having it read its own logfile it's possible to have repeated offenders be cut out for longer and longer time spans.
2018 May 18
2
Disconnecting unauthenticated IMAP entities faster?
Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded?
We're having an issue where blocks of IP's from China and similar locations are crawling IP ranges trying common login credentials, and hanging the connections open in the process. We have clients