On Wed, 2010-01-27 at 11:47 +0100, Administrator TOOTAI wrote:
> Hi,
> 
> we had an attack on a server and we don't understand how it was 
> possible, Asterisk 1.4.28/Debian Lenny 5.1 Attacker came from PALTEL, 
> network 188.161.128.0/18
> 
> Hacked account had following setup:
> 
> [111]
> type=friend
> username=111
> context=from-111
> host=11.22.33.44
> dtmfmode=auto
> qualify=yes
> nat=yes
> canreinvite=no
> defaultip=11.22.33.44
> port=35060
> disallow=all
> allow=ulaw,alaw
> call-limit=2
> 
> Despite this, I saw in my logs that someone hacked this account and 
> could place calls! in logs we have:
> 
> [Jan 27 04:00:13] ERROR[29715] chan_sip.c: Peer '111' is trying to 
> register, but not configured as host=dynamic
> [Jan 27 04:00:13] NOTICE[29715] chan_sip.c: Registration from 
> '<sip:1...@ourasteriskip>' failed for '188.161.152.245' - Peer is not 
> supposed to register
> [Jan 27 04:00:18] VERBOSE[30669] logger.c:     -- Executing 
> [972599400...@from-111:1] NoOp("SIP/111-000016eb", "Incoming call from 
> AAAA") in new stack
> 
> As you see 111 could place a call even having not registered, which he 
> is not supposed to do.
> 
> How is this possible?
> 
> -- 
> Daniel
> 
Check your sip.conf
allowguest=no


-- 
Best regards, Vince Mallow
xmpp: w...@jabber.slan.ru 
web: http://gentoo-way.blogspot.com


-- 
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to