similar to: Unauthenticated calls from a specific IP

Displaying 20 results from an estimated 100 matches similar to: "Unauthenticated calls from a specific IP"

2006 Feb 08
3
Basics - help with models &controllers...
I have looked at many rails apps source code from the web and it seems there is no best practice when designing the database schema and models. For example surely it is recommended to include your foreign keys and constraints at the database level? Some people just rely on the activerecord associations, and don''t bother even placing a field for the foreign key in the tables? I
2010 Jan 12
5
Multi-Tenant Parking
Has anyone managed to get multi-parking lot call parking working correctly? I've had several attempts at it, and never seem to be able to get it to go properly - (actually, at all): I've most recently done this with 1.6.1.x, and now 1.6.2.x, with no luck in either case. What I've been "trying" is the following: features.conf [general] parkext => 100 [featuremap]
2006 Aug 14
14
A mock which extends rather than replaces a class?
While running tests, we would like to instrument some of the classes under test. We still want the classes to do exactly what they currently do, but we would like them to do more when running in the test environment. Clearly we can (and currently do) just extend the objects "on the fly" where necessary, but this is a bit messy - we''d like some centralised way to always
2006 Aug 02
1
REST and functional tests
Just playing around with converting an apps to the new REST goodness in edge rails, and I''m trying to work out how to convert/write the functional tests. Is the recommended way to explicitly use the actions (e.g. get :show, :id => ...; post :create,..., etc) and test the routes separately, or duplicate the request, in which case how is that done get "/", :id => 5
2008 Feb 18
1
realtime table customization to track iax registrations
Hello, I'm experimenting with Asterisk and MySQL. Up to know I've just put iax.conf in a MySQL database and it seems to work: when a Iax2 client registers the corrispondent row in db is updated. Good. However when I have many asterisk boxes pointing to the same db a problem arises: I need an additional column in iax_buddies table called for example "Asterisk ID" which tells me on
2008 Apr 28
8
NetApp vfiler example scripts
Hi, For anyone who is interested; I created some basic scripts based on my current iSCSI block script. http://kinkrsoftware.nl/contrib/xen/block-netapp http://kinkrsoftware.nl/contrib/xen/netapp-lun.py Basically these two scripts allow you to start a vfiler with a qtree of customers. You log in the NetApp upon boot, and can use: netapp://customer1/disk1 It is work in progress... because I
2008 Apr 28
8
NetApp vfiler example scripts
Hi, For anyone who is interested; I created some basic scripts based on my current iSCSI block script. http://kinkrsoftware.nl/contrib/xen/block-netapp http://kinkrsoftware.nl/contrib/xen/netapp-lun.py Basically these two scripts allow you to start a vfiler with a qtree of customers. You log in the NetApp upon boot, and can use: netapp://customer1/disk1 It is work in progress... because I
2004 Oct 14
10
HTB
Hi all I''m new in this list and i hope to lear and to help if possible. But firt i need help :-( I have this messege in my syslog when my classes and qdiscs goes down. Can any one know what does it mean? Thnx in advance. Yannick Arrimadas Bot Oct 14 16:09:27 pototogorri kernel: HTB init, kernel part version 3.17 Oct 14 16:09:27 pototogorri kernel: Unable to handle kernel paging
2015 Jun 23
4
[LLVMdev] Improving the quality of debug locations / DbgValueHistoryCalculator
Here is a proposal for improving DbgValueHistoryCalculator and the overall quality of debug locations. Focus: This is about lowering the DBG_VALUE machine instructions to DWARF location lists. Non-focus: This is not about (typical -O0) variables that permanently reside at a frame index and are described with dbg.declare intrinsics in the IR. These variables are stored in the MMI side-table and
2007 Mar 04
4
Rails functional testing and Mocha
I''ve always wanted to be able to do stuff like this in my functional tests c = customers(:customer_1) c.expects(:great_customer_service) post :service_customer, :id => c.id This of course fails because inside the rails action a different instance of customer is used. Some of the time setting your expectation/stubbing on Customer.any_instance works, but it''s not
2019 Jan 26
3
INVITE from DID: No matching endpoint found but completes the call anyway
I have a trunk set up for the DID from my provider: [my_provider] type=registration outbound_auth=my_provider server_uri=sip:sip.example.com client_uri=sip:my_username at sip.example.com retry_interval=60 [my_provider] type=auth auth_type=userpass password=123456 username=my_username [my_provider] type=aor contact=sip:sip.example.com:5060 [my_provider] type=endpoint context=from-my_provider
2018 May 18
0
Disconnecting unauthenticated IMAP entities faster?
> On 18 May 2018, at 20.19, David Hubbard <dhubbard at dino.hostasaurus.com> wrote: > > Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded? > > We're having an issue where blocks of IP's from China and similar locations are
2008 Feb 27
0
Prevent unauthenticated PDC users to login locally
Hi, I've configured my samba server as a PDC and joint some windowsXP clients to it. So far so good. However I'm able to login into windows even when the domain controller refuses to authenticate the user. The user is not able to access the shares but can use the local machine. How can I prevent windows to login the user locally when the domain controller refuses authentication? thankz,
2023 Mar 19
1
Minimize sshd log clutter/spam from unauthenticated connections
To radically cut down on SSH log spam you can also hide it completely behind a firewall, and allow access only by some port knocking sequence. I quite like having a process listen on port 53 and wait for a dns query containing a totp string to grant (temporary) access; that's a 2fa, and doing a "host 123456. my-ip" is easily automated in a shell script as well...
2023 Jun 11
0
Minimize sshd log clutter/spam from unauthenticated connections
On 10.06.23 11:19, Carsten Andrich wrote: > For the time being, I've deployed a quasi-knocking KISS solution that > sends an unencrypted secret via a single UDP packet. Server side is ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ > realized entirely with nftables ... frankly, for that reason, I like fwknop (in my case, straight from OS repos) better ... I'd still have to see fwknopd exit
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Unauthenticated calls allowed from SIP channel | | | driver
2008 Mar 18
0
AST-2008-003: Unauthenticated calls allowed from SIP channel driver
Asterisk Project Security Advisory - AST-2008-003 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Unauthenticated calls allowed from SIP channel | | | driver
2005 Jun 23
1
Rate Limit Unauthenticated connections ?
I am seeing a recent increase in SSH harvesting attempts and brute forcing in the log of my system. I'm interested in opening up some discussion around what OpenSSH can do itself to counter measure against: * DoS attack where too many unauthenticated connections are open. I'm not interested in stopping the professional saboteur but the casual script kiddie (to use IRC terms) from
2023 Mar 18
2
Minimize sshd log clutter/spam from unauthenticated connections
I guess you might find fail2ban useful. It scans logfiles (like /var/log/sshd.log), and when it sees too many authentication failures from an IP address (or network range) it can issue commands to drop any further attempts via a firewall. By having it read its own logfile it's possible to have repeated offenders be cut out for longer and longer time spans.
2018 May 18
2
Disconnecting unauthenticated IMAP entities faster?
Hello, given the 2015 revision date, I was curious if anyone can confirm https://wiki2.dovecot.org/Timeouts is still accurate where the 'before login' IMAP timeout remains hard coded? We're having an issue where blocks of IP's from China and similar locations are crawling IP ranges trying common login credentials, and hanging the connections open in the process. We have clients