Quantcast
Channel: VOIP-info.org Page Changes
Viewing all articles
Browse latest Browse all 2667

Fail2Ban (with iptables) And Asterisk

$
0
0
Diff from version 88 to 90 (current)

@@ -333,6 +333,6 @@

 * For those who may want a bit of additional security, this thread on [http://pbxinaflash.com/forum/showthread.php?t=5018|iptables rate limiting] at the [http://pbxinaflash.com/forum/index.php|PBX in a Flash Forum] discusses a possible way to limit the number of attempts a bot can make at registering before fail2ban kicks in (e.g., if the bot is so fast it can make many attempts before fail2ban detects that many > 3).
 * You may also want to consider adding ((Asterisk security through geographic IP address restriction))
 * See [http://www.opensolutions.ie/blog/2010/09/sip-brute-force-attacks/] for a quick howto on using Fail2ban with Ubuntu/Debian as well as some discussion on SIP brute force attacks.
-* An alternative to fail2ban which is more simple (but of course less configurable) [http://www.dumaisnet.ca/index.php?article=35794ced17be93fdb1a28f73f754512c]
+* An alternative to fail2ban which is more simple (but of course less configurable). __New version__ using Perl Net::Pcap. Unlike fail2ban, this tool does not peek into asterisk logs. [http://www.dumaisnet.ca/index.php?article=35794ced17be93fdb1a28f73f754512c]
 * Alternate using __Perl__ and __iptables__: [http://www.teamforrest.com/blog/171/asterisk-no-matching-peer-found-block/|Team Forrest - Automatically Block Failed SIP Peer Registrations]
 * You can also use the free [http://www.network-systems-solutions.net/voipblocklist.php|VoIP Block List] by itself or combined with fail2ban to protect your server. This is a list of hostile IP addresses you should consider proactively blocking - the IPs are gathered from various honey-pots and from other VoIP users who report hacking attempts on their systems to the list.
UserCommentTimeVersion
dumais2015-03-30 10:5590
dumais2015-03-30 10:5189

Viewing all articles
Browse latest Browse all 2667

Trending Articles