Someone should write an asterisk-centric document on this topic, it's
likely to become an issue "someday". Sounds like a great subject for
VoIP USers Conference as well. Any volunteers?

/r

>
> ssh hack detection is easy because each new bruteforce starts with a
> tcp syn, so you can count them and then drop access, on the premise
> that a legitimate user wouldn't need X attempts to get their password
> right.

_______________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --

AstriCon 2008 - September 22 - 25 Phoenix, Arizona
Register Now: http://www.astricon.net

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to