Advise: Read threads initiated by you thoroughly. Read: http://blog.sipvicious.org/ to know more about the tool we all face > every once a while. >
Regards, Qasim On Tue, Oct 9, 2012 at 2:27 PM, Engineer voip <forvo...@gmail.com> wrote: > Hi All, > thank you for your reply, Know i want to simulate an attacker to test if > my fail2ban and pike module works good. > someone has an idea to do that? > > 2012/10/9 SamyGo <govoi...@gmail.com> > >> Hi, >> >> Very nice suggestions by Brett. I remember there are regular thread like >> these on the mailing lists and people share a lot of experiences. AFAIR >> there was some service which contains the IP addresses of known attackers >> available for users. OP needs to do some searching in this regard to >> collect more ideas. >> >> * Nothing is _NOT_ CPU cycles free * >> >> I'm not sure about sip vicious but if I were to detect and hack a SIP >> server I'd first start by sending OPTIONS on its ports. Mostly that's where >> things kick off. Changing the user-agent field is nothing big, so question >> is how do you know a hacker is about to get angry !! >> >> I'd say it needs a time populated repository and a well crafted shell >> script to maintain the list of Hacker IPs captured in the past and use it >> across all the servers or devices. Let me explain the idea. >> >> * ii)* - For any incoming packets one needs to look-up the hacker's >> listing and detect if a known hacker or not. >> *i)* - Take fail2ban for example, or pike module , or iptables rate >> limit mechanism to initially detect a new born hacker trying to access your >> sip server (yes will take few minutes to finally conclude that a particular >> source IP is hacker) - Store that IP in your hacker's listing. >> *iii)* - Use an intelligent script to share the detected hacker's IP >> across all the other SIP servers and router devices/firewall to block the >> traffic at network layer. >> >> *Critical Exceptions:* >> Always ensure that the IP which is going to get blocked across the whole >> network perimeter is not your own server or within the same subnet as >> your's. It shouldn't be localhost as well.(Hint: IP spoofing) >> >> *Focus on Security rather Friendly-scanner:* >> * >> * >> One need to secure each and everything when it comes to security, just >> one layer security i.e fail2ban or iptables or pike module is never >> enough. Like Brett said you can drop packets once detected a "very friendly >> scanner", how about a customer who wants to toy with your service ! how >> about a massive DoS attack !! drop() won't help alone. iptables needs to be >> there to stop the packets from even reaching the SIP server app, then again >> why should the server's NIC be chocked up by that massive DoS ! your >> firewall or networking device should stop the packets from entering the >> network ! >> >> This is just not enough: How about a different unique new tool which >> sends malicious or malformed SIP packets to crash the server !! its just >> one packet but malformed -- all the above measures WILL fail !! Obviously >> needs to go one step ahead and use SNORT or anything like IDS+IPS to verify >> that the packet going through the network is not malformed. >> >> Thats pretty much it for now. There are things which I've forgotten to >> write at the moment OR might not even know which I expect some one else may >> like to add. >> >> Networks and Data Security is a huge field, and VoIP security alone has >> hundreds of book on the topic. >> >> *Interesting threads to read: * >> * >> * >> http://lists.opensips.org/pipermail/users/2010-November/015243.html >> http://lists.opensips.org/pipermail/users/2011-June/018271.html >> Read: http://blog.sipvicious.org/ to know more about the tool we all >> face every once a while. >> Fail2ban for openSIPS :: >> http://www.opensips.org/Resources/DocsTutFail2ban >> >> >> -- >> Best Regards >> Sammy >> >> >> >> >> >> >> >> >> On Mon, Oct 8, 2012 at 6:31 PM, Brett Nemeroff <br...@nemeroff.com>wrote: >> >>> First of all, >>> This is an attack from sipvicious. It is an *attack*. It will be very >>> high rate (cps) and you do *not* want to use anything that consumes >>> resources to attempt to block it. >>> >>> First recommendation is to use iptables. In addition, you *should* put a >>> check in your config for friendly-scanner and drop() the packet. Do not >>> reply with a sip code. You want to be invisible to the attacker. If you >>> reply with a sip code, they'll just scan you attempting to find a request >>> combination that will return a usable result. >>> >>> 1. Do whatever you can to not use CPU resources to block this >>> 2. Don't look like a SIP server to source IPs you do not recognize >>> >>> I guarantee, if you look like a SIP server, you will get brutally >>> attacked from unsolicited sources. >>> >>> Read up on the fail2ban docs for asterisk. They have some good ideas in >>> there on how to perform intrusion detection and how to automatically add >>> offending traffic to fail2ban. You can do something similar in OpenSIPs. >>> >>> I would be very curious to hear about other people's experiences using >>> the Pike module to block this type of traffic. For what it's worth, I've >>> seen attack traffic high enough in bandwidth to saturate a pretty beefy >>> internet connection and I've even seen it crash routers. If you can avoid >>> them finding you in the first place, that would be a much better option. >>> -Brett >>> >>> >>> On Mon, Oct 8, 2012 at 7:53 AM, Engineer voip <forvo...@gmail.com>wrote: >>> >>>> Hi, >>>> I'm trying to use pike module and i'm using the script above, but when >>>> i execute this command " opensipsctl fifo pike_list" >>>> i don't get any address blocked >>>> My opensips config is: >>>> >>>> loadmodule "pike.so" >>>> modparam("pike", "sampling_time_unit", 10) >>>> modparam("pike", "reqs_density_per_unit", 30) >>>> modparam("pike", "remove_latency", 120) >>>> modparam("pike", "check_route","pike") # enable automatic checking >>>> modparam("pike", "pike_log_level",1) >>>> >>>> route[pike] >>>> { >>>> if (src_ip==x.x.x.x ||src_ip==gw_ip) # Trusted IP >>>> xlog("L_INFO", "in pike route "); >>>> drop(); >>>> } >>>> >>>> have you an idea please toresolve that? >>>> >>>> 2012/10/8 SamyGo <govoi...@gmail.com> >>>> >>>>> Hi, >>>>> Relax it says its Friendly !! >>>>> >>>>> But still if you want to block it you've many options i.e in >>>>> opensips.cfg start put a condition $ua =~ "friendly-scanner". If matched >>>>> return stateless some error. >>>>> Other option is to use pike module. >>>>> Another option is use fail2ban for opensips logs. >>>>> More sophisticated options involve firewalls with IPS and IDS modules. >>>>> >>>>> I hope it was helpful. >>>>> >>>>> BR >>>>> Sammy >>>>> On Oct 8, 2012 2:33 PM, "Engineer voip" <forvo...@gmail.com> wrote: >>>>> >>>>>> Hi All, >>>>>> I receveid several packets of registration from a "friendly-scanner" on >>>>>> my opensips server >>>>>> how can i do to block that please?? >>>>>> >>>>>> -- >>>>>> >>>>>> Best Regards. >>>>>> >>>>>> >>>>>> >>>>>> _______________________________________________ >>>>>> Users mailing list >>>>>> Users@lists.opensips.org >>>>>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users >>>>>> >>>>>> >>>>> _______________________________________________ >>>>> Users mailing list >>>>> Users@lists.opensips.org >>>>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users >>>>> >>>>> >>>> >>>> >>>> -- >>>> >>>> Best Regards. >>>> >>>> >>>> >>>> _______________________________________________ >>>> Users mailing list >>>> Users@lists.opensips.org >>>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users >>>> >>>> >>> >>> _______________________________________________ >>> Users mailing list >>> Users@lists.opensips.org >>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users >>> >>> >> >> _______________________________________________ >> Users mailing list >> Users@lists.opensips.org >> http://lists.opensips.org/cgi-bin/mailman/listinfo/users >> >> > > > -- > > Best Regards. > > > > _______________________________________________ > Users mailing list > Users@lists.opensips.org > http://lists.opensips.org/cgi-bin/mailman/listinfo/users > >
_______________________________________________ Users mailing list Users@lists.opensips.org http://lists.opensips.org/cgi-bin/mailman/listinfo/users