VoIP Mailing List Archives
Mailing list archives for the VoIP community |
|
View previous topic :: View next topic |
Author |
Message |
support at telium.ca Guest
|
Posted: Wed Dec 02, 2015 4:54 pm Post subject: [asterisk-users] Failed to authenticate device 100 |
|
|
The details of the source IP are available in the asterisk security log (if you have that enabled) – but that particular attack hides its address from the messages file.
It’s essential that you secure your PBX; there are options ranging from free to commercial. Have a look at:
http://www.voip-info.org/wiki/view/Asterisk+security
It’s easy to get a $20,000 phone bill, so take securing your PBX seriously.
-M-
From: asterisk-users-bounces@lists.digium.com [mailto:asterisk-users-bounces@lists.digium.com] On Behalf Of Motty
Sent: Wednesday, December 02, 2015 1:12 PM
To: Asterisk Users Mailing List - Non-Commercial Discussion; motty.cruz@gmail.com
Subject: [asterisk-users] Failed to authenticate device 100
Hello, I continued to see this errors in the logs:
[2015-12-02 10:05:57] NOTICE[19949]: chan_sip.c:23277 handle_request_invite: Failed to authenticate device 100<sip:100@xx.xx.xx.xx> ([email]sip:100@xx.xx.xx.xx[/email]);tag=10cdeaf7
how do I guard against this kinds of attacks? Also, to get the IP address from where this attack come from I use the following command "tcpdump -lni eth0 -f "udp port 5060" is there an easy way to get the attacker's IP?
Thanks,
Motty |
|
Back to top |
|
|
motty.cruz at gmail.com Guest
|
Posted: Thu Dec 03, 2015 11:58 am Post subject: [asterisk-users] Failed to authenticate device 100 |
|
|
Thanks M,
I have security enable,
; output security messages to the file named "Security"
security => security
I see the file created in /var/log/asterisk/security but is empty, and in /var/log/asterisk/messages I see the following:
[2015-12-03 06:52:32] NOTICE[19949] chan_sip.c: Failed to authenticate device 100<sip:100@X.X.X.X> ([email]sip:100@X.X.X.X[/email]);tag=a121ab55
X.X.X.X is the IP of my Server, I don't know who is the attacker IP unless I monitor for the server using the following command:
tcpdump -lni eth0 -f "udp port 5060"
Please advise.
Thanks,
Motty
On 12/02/2015 01:53 PM, Telium Technical Support wrote:
Quote: | #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca p.MsoNormal, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca li.MsoNormal, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: "Times New Roman","serif"; color: black; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca a:link, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca span.MsoHyperlink { color: blue; text-decoration: underline; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca a:visited, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca span.MsoHyperlinkFollowed { color: purple; text-decoration: underline; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca p.MsoAcetate, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca li.MsoAcetate, #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca div.MsoAcetate { margin: 0in 0in 0.0001pt; font-size: 8pt; font-family: "Tahoma","sans-serif"; color: black; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca span.spelle { } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca span.EmailStyle18 { font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125); } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca span.BalloonTextChar { font-family: "Tahoma","sans-serif"; color: black; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca .MsoChpDefault { font-size: 10pt; } #mid_001801d12d4b_db2f6ad0_918e4070__telium_ca div.WordSection1 { page: WordSection1; } <![endif]--> <![endif]-->
The details of the source IP are available in the asterisk security log (if you have that enabled) – but that particular attack hides its address from the messages file.
It’s essential that you secure your PBX; there are options ranging from free to commercial. Have a look at:
http://www.voip-info.org/wiki/view/Asterisk+security
It’s easy to get a $20,000 phone bill, so take securing your PBX seriously.
-M-
From: asterisk-users-bounces@lists.digium.com (asterisk-users-bounces@lists.digium.com) [mailto:asterisk-users-bounces@lists.digium.com (asterisk-users-bounces@lists.digium.com)] On Behalf Of Motty
Sent: Wednesday, December 02, 2015 1:12 PM
To: Asterisk Users Mailing List - Non-Commercial Discussion; motty.cruz@gmail.com (motty.cruz@gmail.com)
Subject: [asterisk-users] Failed to authenticate device 100
Hello, I continued to see this errors in the logs:
[2015-12-02 10:05:57] NOTICE[19949]: chan_sip.c:23277 handle_request_invite: Failed to authenticate device 100<sip:100@xx.xx.xx.xx> ([email]sip:100@xx.xx.xx.xx[/email]);tag=10cdeaf7
how do I guard against this kinds of attacks? Also, to get the IP address from where this attack come from I use the following command "tcpdump -lni eth0 -f "udp port 5060" is there an easy way to get the attacker's IP?
Thanks,
Motty
|
|
|
Back to top |
|
|
|
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
Powered by phpBB © 2001, 2005 phpBB Group
|