Thanks a lot. Your explanation make me to feel happy now :) It is know
clear to me whole scene. 

Thanks again!

On Wed, 2010-02-24 at 11:12 -0500, Robert Joly wrote:
> > Hi again. Yesterday we changed the password for this user 
> > that was compromised, but last nigh around 1 o'clock i see 
> > that there were another tries to call through our system. 
> > Something is really going wrong. As Tony explained this looks 
> > like something related with sipxproxy. The only records that 
> > i see for these requests are in sipregister.log and sipXproxy.log
> > 
> > Something very interesting for me in the log records were the 
> > following things.
> > 
> > In several places i see that proxy returns to user: "Proxy 
> > Authentication Required". But after several tries it looks to 
> > me that user bypass authentication problem and make the call to To:
> > <sip:00930820...@mysipserver.domain.tld> and get Not Found Message. 
> 
> If a malicious person discovered your sipXecs IP address and is
> publically reachable, then that person can send SIP INVITEs to your
> system all day long even without any users on your system being
> compromised.  sipXecs will accept the INVITE, look at the called URI and
> try to route it.  If it cannot map the URI to any destination using
> configured aliases, registration data or dialplans then a 404 Not Found
> gets sent back.  On the other hand, if the URI maps to a destination,
> that sipXproxy will check whether that destination requires permissions.
> If it does, the caller will be challenged and that caller will only be
> able to successfully complete the call if it knows the credentials of a
> local SIP user that has the required permissions. If the call does not
> require any permissions, it will just go through.
> 
> So, to make a long story short, based on your observations, nothing
> indicates that a user has been compromised.  What is clear is that
> someone found your SIP Proxy in the network and is trying to use it to
> make expensive calls.  These attempts to make such calls will fall so
> long as every dialplan in your sipXecs requires at least one permission
> and that SIP passwords for your users are non-trivial.
> 
> 
> > 
> > This looks to me really that this user is able to do calls 
> > and bypass somehow Proxy Authorization. How this can be? Is 
> > sipXproxy has some security vulnerabilities? I blocked this 
> > ip in firewall, but anyway i need to find a way to make this 
> > more secure.
> > 
> > How this user bypass proxy authorization (if it had bypassed)? 
> > 
> > How to protect my system from this? 
> > 
> > This extension is set on hard phone, so everything should be ok.
> > 
> > I attach logs from sipregister and sipXproxy.
> > 
> > On Tue, 2010-02-23 at 05:07 -0500, Tony Graziano wrote:
> > > that looks like a proxy log. the call is being initiated 
> > from a user 
> > > line, but the user is "xxx'd" out by you.
> > > 
> > > 
> > > Since the call is using TCP, my guess is that it is a 
> > remote user or a 
> > > user with softphone, and the user has been hacked.
> > > 
> > > 
> > > Since the user has to pass through the proxy credentials in 
> > order to 
> > > place a call, and if you feel the user has been compromised, you 
> > > should remove the user or change the users credentials and have 
> > > him/her get their system checked out before providing them with the 
> > > credentials to authenticate.
> > > 
> > > 
> > > It is also possible a user changed their softphone 
> > username/password 
> > > to say "anon anon" and is trying to place the call.
> > > 
> > > On Tue, Feb 23, 2010 at 4:38 AM, an...@iguanait.com 
> > > <an...@iguanait.com> wrote:
> > >         Hi again. We have installed sipxecs-4.0.4-017289 on 
> > Centos 5.
> > >         
> > >         This morning i saw a very strange records in my sipregister
> > >         logs.
> > >         
> > >         It looks that somebody is trying (or it registered
> > >         successfully)
> > >         register and make calls through our system with one of our
> > >         extension.
> > >         I checked on Call Details Records screen and i see that call
> > >         to
> > >         00930820128 has failed. I cannot see any other records for
> > >         this
> > >         registration and call in logs.
> > >         
> > >         FROM             TO          START           
> > DURATION  STATUS
> > >         anon anon - xxx0 00930820128 2/23/10 6:43 AM 0 
> > seconds Failed
> > >         
> > >         Was this extension hacked? How can i protect my system from
> > >         this kind of
> > >         things?
> > >         
> > >         I attached sipregister logs.
> > >         
> > >         _______________________________________________
> > >         sipx-users mailing list sipx-users@list.sipfoundry.org
> > >         List Archive: http://list.sipfoundry.org/archive/sipx-users
> > >         Unsubscribe:
> > >         http://list.sipfoundry.org/mailman/listinfo/sipx-users
> > >         sipXecs IP PBX -- http://www.sipfoundry.org/
> > > 
> > > 
> > > 
> > > --
> > > ======================
> > > Tony Graziano, Manager
> > > Telephone: 434.984.8430
> > > Fax: 434.984.8431
> > > 
> > > Email: tgrazi...@myitdepartment.net
> > > 
> > > LAN/Telephony/Security and Control Systems Helpdesk:
> > > Telephone: 434.984.8426
> > > Fax: 434.984.8427
> > > 
> > > Helpdesk Contract Customers:
> > > http://www.myitdepartment.net/gethelp/
> > > 
> > > Why do mathematicians always confuse Halloween and Christmas?
> > > Because 31 Oct = 25 Dec.
> > > 
> > > 
> > 
> > 


_______________________________________________
sipx-users mailing list sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users
Unsubscribe: http://list.sipfoundry.org/mailman/listinfo/sipx-users
sipXecs IP PBX -- http://www.sipfoundry.org/

Reply via email to