Displaying 20 results from an estimated 1000 matches similar to: "[Bug 1458] New: Consider allowing for variable interpolation"
2015 Sep 13
4
Fail2ban
Hello
I'm using the Fail2ban. I configuration below. I want to try to
prevent the continuous password. Fail2ban password that does not
prevent this form. (Asterisk 1.8 / Elastix interface)
What could be the problem ?
Asterisk log;
"Registration from '<sip:3060 at sip.x.eu;transport=UDP>' failed for
'x.x.x.x:32956' - Wrong password"
Fail2ban asterisk
2015 Jan 08
4
SEMI OFF-TOPIC - Fail2ban
Hi list , someone on the list has seen this type of connection
attempts in asterisk, fail2ban does not stop
2015-01-08 14:59:47] SECURITY[21515] res_security_log.c:
SecurityEvent="ChallengeSent",EventTV="1420750787-386840",Severity="Informational",Service="SIP",EventVersion="1",AccountID="sip:100 at
2015 Sep 14
2
Fail2ban
I solved the problem. "action.d/iptables-custom.conf" include only udp.
service fail2ban restart
Thank you.
On Sun, Sep 13, 2015 at 9:17 PM, Andres <andres at telesip.net> wrote:
> On 9/13/15 11:16 AM, Gokan Atmaca wrote:
>>
>> Hello
>>
>> I'm using the Fail2ban. I configuration below. I want to try to
>> prevent the continuous password.
2017 Mar 01
3
fail2ban Asterisk 13.13.1
Hello, fail2ban does not ban offending IP.
NOTICE[29784] chan_sip.c: Registration from
'"user3"<sip:1005 at asterisk-ip:5060>' failed for 'offending-IP:53417' - Wrong
password
NOTICE[29784] chan_sip.c: Registration from
'"user3"<sip:1005 at asterisk-ip:5060>' failed for ?offending-IP:53911' -
Wrong password
systemctl status
2017 Mar 02
3
fail2ban Asterisk 13.13.1
If this is a small site, I recommend you download the free version of SecAst
(www.telium.ca <http://www.telium.ca> ) and replace fail2ban. SecAst does
NOT use the log file, or regexes, to match etc.instead it talks to Asterisk
through the AMI to extract security information. Messing with regexes is a
losing battle, and the lag in reading logs can allow an attacker 100+
registration
2020 Jun 18
10
[Bug 1434] New: Usability improvements, enabling creation of complex firewalls
https://bugzilla.netfilter.org/show_bug.cgi?id=1434
Bug ID: 1434
Summary: Usability improvements, enabling creation of complex
firewalls
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2020 Aug 28
4
[Bug 1456] New: Consider eliding empty variables if expanded within an element list
https://bugzilla.netfilter.org/show_bug.cgi?id=1456
Bug ID: 1456
Summary: Consider eliding empty variables if expanded within an
element list
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2020 Aug 28
1
[Bug 1457] New: Consider implementing functionality equivalent to iptables-apply
https://bugzilla.netfilter.org/show_bug.cgi?id=1457
Bug ID: 1457
Summary: Consider implementing functionality equivalent to
iptables-apply
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2020 Jul 01
5
[Bug 1438] New: nft generates wrong intervals for sets with auto-merge
https://bugzilla.netfilter.org/show_bug.cgi?id=1438
Bug ID: 1438
Summary: nft generates wrong intervals for sets with auto-merge
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo
2013 Dec 12
3
Puppetlabs-firewall and Logging
We''re testing out the Puppetlabs-Firewall module. And it seems I''m either
missing something fundamental or Logging/Accpet works/doesn''t work in an
irregular way. I would be most grateful for some input.
*COMMON:*
firewall { ''002 accept related established rules INPUT'': proto => ''all'',
state =>
2015 Jan 09
0
SEMI OFF-TOPIC - Fail2ban
Hello;
Did you remember to uncomment the dateformat in
/etc/asterisk/logger.conf? That's necessary for fail2ban to work.
Logger.conf
[general]
dateformat=%F %T
Regards;
John
-----Original Message-----
From: asterisk-users-bounces at lists.digium.com
[mailto:asterisk-users-bounces at lists.digium.com] On Behalf Of ricky
gutierrez
Sent: Thursday, January 08, 2015 4:38 PM
To: Asterisk
2019 Dec 30
24
[Bug 1392] New: nft stalls on EGAIN upon repeatedly flushing and populating a set
https://bugzilla.netfilter.org/show_bug.cgi?id=1392
Bug ID: 1392
Summary: nft stalls on EGAIN upon repeatedly flushing and
populating a set
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: nft
2017 Mar 22
5
[Bug 1135] New: When used as a script interpreter, nft fails if extra arguments are passed
https://bugzilla.netfilter.org/show_bug.cgi?id=1135
Bug ID: 1135
Summary: When used as a script interpreter, nft fails if extra
arguments are passed
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2017 Aug 23
3
[Bug 1175] New: Document limitations on identifier names
https://bugzilla.netfilter.org/show_bug.cgi?id=1175
Bug ID: 1175
Summary: Document limitations on identifier names
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2018 Oct 17
1
[Bug 1283] New: names must be strings
https://bugzilla.netfilter.org/show_bug.cgi?id=1283
Bug ID: 1283
Summary: names must be strings
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2020 Aug 13
7
[Bug 1449] New: nft ipv4 set with interval issue
https://bugzilla.netfilter.org/show_bug.cgi?id=1449
Bug ID: 1449
Summary: nft ipv4 set with interval issue
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: blocker
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2017 Aug 23
7
[Bug 1176] New: Invalid identifiers produce unhelpful error messages
https://bugzilla.netfilter.org/show_bug.cgi?id=1176
Bug ID: 1176
Summary: Invalid identifiers produce unhelpful error messages
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at
2019 Mar 07
6
[Bug 1325] New: Reproducible NULL ptr deref upon checking trivial nftables ruleset in Linux 5.0
https://bugzilla.netfilter.org/show_bug.cgi?id=1325
Bug ID: 1325
Summary: Reproducible NULL ptr deref upon checking trivial
nftables ruleset in Linux 5.0
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
2019 Mar 30
4
[Bug 1330] New: Parse error for importing set with netmask
https://bugzilla.netfilter.org/show_bug.cgi?id=1330
Bug ID: 1330
Summary: Parse error for importing set with netmask
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Sep 13
20
[Bug 1464] New: Trying to populate a set raises a netlink error "Could not process rule: No space left on device"
https://bugzilla.netfilter.org/show_bug.cgi?id=1464
Bug ID: 1464
Summary: Trying to populate a set raises a netlink error "Could
not process rule: No space left on device"
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal