On 9/29/10 3:22 PM, Tony Graziano wrote:
Agreed.

Ouch, this is a good example of limiting the seriousness of an attack with some basic firewalling up front. It won't go away, but the effects will certainly be lessened.
security by obscurity isn't the best, but if we have the ability to swap ports in sipx like FS, we can firewall off port 5060 and use it for ITSP only.

maybe don't publish srv records anymore.

the patch they have seems to make this problem worse. remote, trunks and calls on port 5060.

--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948-2259
ISN: 1259*1300
> *| *SECNAP Network Security Corporation

   * Certified SNORT Integrator
   * 2008-9 Hot Company Award Winner, World Executive Alliance
   * Five-Star Partner Program 2009, VARBusiness
   * Best in Email Security,2010: Network Products Guide
   * King of Spam Filters, SC Magazine 2008


______________________________________________________________________
This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.secnap.com/products/spammertrap/
______________________________________________________________________  
_______________________________________________
sipx-users mailing list
sipx-users@list.sipfoundry.org
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to