On 9/29/10 3:22 PM, Tony Graziano wrote:
Agreed.
Ouch, this is a good example of limiting the seriousness of an attack
with some basic firewalling up front. It won't go away, but the
effects will certainly be lessened.
security by obscurity isn't the best, but if we have the ability to
swap ports in sipx like FS, we can firewall off port 5060 and use it for
ITSP only.
maybe don't publish srv records anymore.
the patch they have seems to make this problem worse. remote, trunks
and calls on port 5060.
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> *| *SECNAP Network Security Corporation
* Certified SNORT Integrator
* 2008-9 Hot Company Award Winner, World Executive Alliance
* Five-Star Partner Program 2009, VARBusiness
* Best in Email Security,2010: Network Products Guide
* King of Spam Filters, SC Magazine 2008
______________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(r).
For Information please see http://www.secnap.com/products/spammertrap/
______________________________________________________________________
_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/