Someone should write an asterisk-centric document on this topic, it's likely to become an issue "someday". Sounds like a great subject for VoIP USers Conference as well. Any volunteers?
/r > > ssh hack detection is easy because each new bruteforce starts with a > tcp syn, so you can count them and then drop access, on the premise > that a legitimate user wouldn't need X attempts to get their password > right. _______________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- AstriCon 2008 - September 22 - 25 Phoenix, Arizona Register Now: http://www.astricon.net asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
