Well,

About sipvicious, just put a kamailio in front of asterisk and just drop all messages with user agents corrreponding to these messages. Spivicious first send options messages, read the user agent and drop if it's corresponding to one of the user agents well known to be used.

In Kamailio (to be updtaed) I have :


### Country check
    if (is_method("OPTIONS") || is_method("REGISTER"))
    {
avp_db_query("SELECT sql_cache country FROM ip_country inner join GeoLiteCity on GeoLiteCity.locId = ip_country.locId WHERE MBRCONTAINS(ip_poly, POINTFROMWKB(POINT(INET_ATON('$si'), 0))) limit 1;" , "$avp(s:countryCode)"); if ($avp(s:countryCode) !="BE" && $avp(s:countryCode) !="FR" && $avp(s:countryCode) !="LU" && $avp(s:countryCode) !="MA" && $avp(s:countryCode) !="ES" && $avp(s:countryCode) !="IT" && $avp(s:countryCode) !="DE" )
        {
xlog("L_NOTICE", "------------------> Probable Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm" );
        }
    }

### Hackers check
    if($ua=="friendly-scanner"){
xlog("L_NOTICE", "------------------> Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm - DROP" );
        drop();
    }
    if($ua=="sundayddr"){
xlog("L_NOTICE", "------------------> Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm - DROP" );
        drop();
    }
    if($ua=="sip-scan"){
xlog("L_NOTICE", "------------------> Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm - DROP" );
        drop();
    }
    if($ua=="iWar"){
xlog("L_NOTICE", "------------------> Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm - DROP" );
        drop();
    }
    if($ua=="sipsak"){
xlog("L_NOTICE", "------------------> Attack attempt from countrycode : $avp(s:countryCode) - $si - $fu - $ua - $rm - DROP" );
        drop();
    }

When sipvicious doesn't receive answer, it stops scanning the server :)

Best regards,

Olivier

Le 2/06/11 17:06, Paul Hayes a écrit :
On 01/06/11 16:13, Allen David Niven wrote:
what does ossec give u that fail2ban does not ?
thx and cheers



Replied to list so others can find this in the future if they want to.

I haven't spent a lot of time investigating fail2ban as I was already using ossec before I saw much talk about fail2ban with Asterisk.

Anyway as far as I can see my main advantage is that OSSEC has multiple levels of incidents. So I can create rules to send emails out for unusual activity that might not necessarily require an IP block but needs checking out.

My fear with something that just watches Asterisk logs for a very specific known attack metric and then blocks IP(s) based on that is what happens when the attackers start doing something different?

Fail2ban may well do all this as well, I don't know but I find OSSEC does it very well and the XML rules and log decoders are very versatile.

cheers,
Paul.

--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
              http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users



--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
              http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
  http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to