similar to: (no subject)

Displaying 20 results from an estimated 5000 matches similar to: "(no subject)"

2013 Jan 02
8
Auto ban IP addresses
Greetings all, I have been seeing a lot of [Jan 2 16:36:31] NOTICE[7519]: chan_sip.c:23149 handle_request_invite: Sending fake auth rejection for device 100<sip:100 at 108.161.145.18>;tag=2e921697 in my logs lately. Is there a way to automatically ban IP address from attackers within asterisk ? Thank you
2017 Feb 21
2
Which tool to automatically restart Asterisk ?
Why not to use Fail2ban https://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk *Tahir Almas* Managing Partner ICT Innovations http://www.ictinnovations.com http://www.ictbroadcast.com Leveraging open source in ICT On Tue, Feb 21, 2017 at 12:28 AM, Tzafrir Cohen <tzafrir.cohen at xorcom.com> wrote: > On Mon, Feb 20, 2017 at 11:36:24AM -0300, Victor
2011 Jul 26
3
file2ban
I want to add an entry to a database every time a brute force registration attempt is done. from this database we are updating cisco routers with our ban list so our entire network is protected. The database side of things is working and has been for some time. I really would like to add the file2ban side of it to protect our asterisk system better. How would I best go about doing this
2009 May 11
4
Fail2Ban and the Dovecot log
Hi, Is there any way to disable the "dovecot: " at the beginning of each line of the log? Fail2Ban responds poorly to it. I know there are a number of sites with "failregex" strings for Fail2Ban and Dovecot, but I've tried them all, and they don't work, at least with the latest Fail2ban and the latest Dovecot. The Fail2Ban wiki is pretty clear about why there
2010 Nov 22
5
Someone has hacked into our system
Someone has hacked into our system and is making calls overseas. How can I: 1. Find out the where the calls are originating from? 2. Block all calls that are not authorized? Our system is in the USA. Only calls from inside our LAN are allowed. Thank you, Gary Kuznitz -------------- next part -------------- An HTML attachment was scrubbed... URL:
2017 Aug 17
3
Detecting DoS attacks via SIP
Well, correct me if I'm wrong, but I would say this conversation you have posted is a bit outdated, now fail2ban can be used with asterisk security log https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger. On Thu, Aug 17, 2017, 4:53 AM Telium Technical Support <support at telium.ca> wrote: > Keep in mind that the attacks you are seeing in the log are ONLY the
2010 Mar 18
3
Free Daily Asterisk News iPhone and iPod Touch app
Hi all, I've released another free app for the iPhone and iPod touch - this one lets you read the Daily Asterisk News. Hope you enjoy it :D http://www.venturevoip.com/news.php?rssid=2371 -- Cheers, Matt Riddell Managing Director _______________________________________________ http://www.venturevoip.com/news.php (Daily Asterisk News) http://www.venturevoip.com/exchange.php (Full ITSP
2017 Feb 20
2
Which tool to automatically restart Asterisk ?
Hi, Oliver. Maybe something like this (add this script to your crontab): ------------------------8<-------------------------- #!/bin/bash # # File: asterisk-watchdog.sh # Date: 2015.05.26 # Build: v1.0 # Brief: Secuencia para monitorizar procesos. # # ${PATH}: Variable de entorno con las rutas a los ejecutables. PATH=/bin:/sbin:/usr/bin:/usr/sbin # ${DAEMON}:
2009 Oct 02
3
app_hackblock to prevent SIP/IAX reg trolling
Has anyone written an app that monitors SIP/IAX registration attempts? A couple of clients are being flooded with SIP registrations (but the source IP changes every few hours so IPtables won't do).. I would think that any attempt to reg 5 times with a bad password should cause a 5 minute timeout until reg is considered again. Has anyone written such an app? The name app_hackblock is my
2015 Jun 23
2
dovecot auth using 100% CPU
Jorge Bastos <mysql.jorge at decimal.pt> wrote: > What do you see in the logs? > My guess is that someone is trying a brute force auth against you, Thanks Jorge, I think this is the answer. I'm using dovecot for exim4 SMTP authentication. The exim4 logs show brute force attacks. -- Edward.
2019 Apr 11
5
Mail account brute force / harassment
On Thu, 11 Apr 2019 at 13:24, Marc Roos via dovecot <dovecot at dovecot.org> wrote: > > > Say for instance you have some one trying to constantly access an > account > > > Has any of you made something creative like this: > > * configure that account to allow to login with any password > * link that account to something like /dev/zero that generates infinite
2007 Oct 25
1
Cisco 79xx logon/logoff
Hi All, I'd like to know if anyone has figured out a way to be able to have users logon/logoff manually from Cisco 79xx phones (with SIP firmware loaded)? Scenario is, user walks into office, sits at a random desk, and logs onto the phone. The system would need to "log them off" of the last hardphone they were on, and then configure the new phone for their extension. We're
2011 Dec 29
2
Interesting attack tonight & fail2ban them
I happened to be in the cli tonight as some (208.122.57.58) initiated a simple attack - just trying to make long distance calls from outside context. Although harmless, this went on for several minutes as the idiot just used up my bandwidth with SIP messages. Here's and example: [2011-12-28 22:53:42] NOTICE[9635]: chan_sip.c:14035 handle_request_invite: Call from '' to extension
2011 Nov 30
12
duqu
There's an article on slashdot about the Duqu team wiping all their intermediary c&c servers on 20 Oct. Interestingly, the report says that they were all (?) not only linux, but CentOS. There's a suggestion of a zero-day exploit in openssh-4.3, but both the original article, and Kaspersky labs (who have a *very* interesting post of the story) consider that highly unlikely, and the
2010 Apr 10
10
Being attacked by an Amazon EC2 ...
Just a "heads-up" ... my home asterisk server is being flooded by someone from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it - they're trying to send SIP subscribes to one account - and they're flooding the requests in - it's averaging some 600Kbits/sec of incoming UDP data or about 200 a second )-: This is much worse than anything else I've
2019 Apr 11
1
Mail account brute force / harassment
Marc, There is a strategy loosely referred to as "choose your battles well" :-) Let the others bother with their own problems. If you can, hack the server and dump the 500GB - you'll be using resources transferring the 500GB as the other server receives it. Two servers wasting resources because you think you are punishing an offender! On Thu, 11 Apr 2019 at 13:43, Marc Roos
2007 Apr 08
2
IP Tables block for POP3 attacks with Dovecot
Has anyone implemented a script to block IPs which are attacking on POP3 ports using dovecot logs to indicate repetitive failed login attempts? sshblack does this nicely for ssh (port 22) attacks by monitoring the /var/log/secure file. I am considering rewriting this to POP3 port (110), but if it has already been done, I sure don't need the practice. Thanks!
2013 Apr 06
13
script to detect dictionary attacks
Hi has someone a script which can filter out dictionary attacks from /var/log/maillog and notify about the source-IPs? i know about fail2ban and so on, but i would like to have a mail with the IP address for two reasons and avoid fail2ban at all because it does not match in the way we maintain firewalls * add the IP to a distributed "iptables-block.sh" and distribute it to any
2019 Apr 11
1
Mail account brute force / harassment
> Am 11.04.2019 um 12:43 schrieb Marc Roos via dovecot <dovecot at dovecot.org>: > > Please do not assume anything other than what is written, it is a > hypothetical situation > > > A. With the fail2ban solution > - you 'solve' that the current ip is not able to access you > - it will continue bothering other servers and admins > - you get the
2018 Aug 30
6
getting invites to rtp ports ??
On Wed, Aug 29, 2018 at 6:20 PM Telium Support Group <support at telium.ca> wrote: > Depending on log trolling (Asterisk security log) misses a lot, and also > depends on the SIP/PJSIP folks to not change message structure (which has > already happened numerous time). If you are comfortable hacking > chan_sip.c you may prefer to get the same messages from the AMI. It still