Moderators: gerski, enjay, williamconley, Op3r, Staydog, gardo, mflorell, MJCoate, mcargile, Kumba, Michael_N
DomeDan wrote:Its a brute-force attack, you should setup a firewall to only allow traffic from addresses you need to connect to.
I've read that setting:
alwaysauthreject=yes
allowguest=no
is a good idea too
[Aug 1 19:32:12] -- Executing [52553603050@trunkinbound:1] AGI("SIP/525536030506-00000005", "agi-DID_route.agi") in new stack
[Aug 1 19:32:12] -- Launched AGI Script /var/lib/asterisk/agi-bin/agi-DID_route.agi
[Aug 1 19:32:12] ERROR[7730]: utils.c:967 ast_carefulwrite: write() returned error: Broken pipe
[Aug 1 19:32:12] -- AGI Script agi-DID_route.agi completed, returning 0
[Aug 1 19:32:12] -- Executing [9998811112@default:1] Wait("SIP/525536030506-00000005", "2") in new stack
[Aug 1 19:32:14] -- Executing [9998811112@default:2] Answer("SIP/525536030506-00000005", "") in new stack
[Aug 1 19:32:14] -- Executing [9998811112@default:3] Playback("SIP/525536030506-00000005", "ss-noservice") in new stack
[Aug 1 19:32:14] -- <SIP/525536030506-00000005> Playing 'ss-noservice' (language 'en')
[Aug 1 19:32:19] -- Executing [9998811112@default:4] Playback("SIP/525536030506-00000005", "vm-goodbye") in new stack
[Aug 1 19:32:19] -- <SIP/525536030506-00000005> Playing 'vm-goodbye' (language 'en')
[Aug 1 19:32:19] == Spawn extension (default, 9998811112, 4) exited non-zero on 'SIP/525536030506-00000005'
[Aug 1 19:32:19] -- Executing [h@default:1] DeadAGI("SIP/525536030506-00000005", "agi://127.0.0.1:4577/call_log--HVcauses--PRI-----NODEBUG-----0---------------") in new stack
[Aug 1 19:32:19] -- AGI Script agi://127.0.0.1:4577/call_log--HVcauses--PRI-----NODEBUG-----0--------------- completed, returning 0
williamconley wrote:bad user or password and your system is set to ALWAYS reject and say the user does not exist. This way a brute force attacker will not be able to guess at user names until they get lucky, and then guess at passwords for the user. All rejects are "user" rejects.
Users browsing this forum: Google [Bot], Majestic-12 [Bot] and 60 guests