ups, replied to wrong message -- ignore this and previous message in
this thread.
Daniel
On 16/04/14 13:32, Daniel-Constantin Mierla wrote:
Hello,
On 16/04/14 12:49, Daniel-Constantin Mierla wrote:
Hello,
On 16/04/14 09:52, Keith wrote:
Hi All,
I am looking to apply some security on invi
Hello,
On 16/04/14 12:49, Daniel-Constantin Mierla wrote:
Hello,
On 16/04/14 09:52, Keith wrote:
Hi All,
I am looking to apply some security on invites so I only accept from
IP addresses in the address table or authenticated users. I have the
address table bit working but I am struggling wi
Hello,
On 16/04/14 09:52, Keith wrote:
Hi All,
I am looking to apply some security on invites so I only accept from
IP addresses in the address table or authenticated users. I have the
address table bit working but I am struggling with the authenticated
users bit. Wondering if anyone has don
Hi All,
I am looking to apply some security on invites so I only accept from IP
addresses in the address table or authenticated users. I have the address
table bit working but I am struggling with the authenticated users bit.
Wondering if anyone has done it? I was thinking of using the location ta
Hi!
I was just testing the digest replay possibilities against Kamailio. (findings:
http://www.kamailio.org/wiki/tutorials/security/kamailio-security#digest_authentication)
It looks that by default (the typical default configs), a SIP replay attack can
be done during 300 seconds (?) .
Now I t
I started the pages, to be found :
http://www.kamailio.org/wiki/tutorials/security/security-threats
http://www.kamailio.org/wiki/tutorials/security/kamailio-security
They are a long from being complete, but it's a start, feel free to
modify/correct/add content!
2013-12-18 davy
> ACK
>
> :)
>
ACK
:)
Op 18-dec.-2013, om 15:30 heeft Daniel-Constantin Mierla
het volgende geschreven:
> Hello,
>
> On 18/12/13 10:53, davy wrote:
>> Cool, I'll spend some time this weekend to have a first stake in the ground
>> on the wiki !
>
> great! Just use namespaces when creating new pages, to hav
Hello,
On 18/12/13 10:53, davy wrote:
Cool, I'll spend some time this weekend to have a first stake in the ground on
the wiki !
great! Just use namespaces when creating new pages, to have a good
structure of the wiki. It can be something under tutorials, such as:
tutorials:security:TITLE
On 12/18/2013 06:11 AM, davy wrote:
But I think two aspects might be very handy. A first would be to list
all the attacks on VoIP networks known to man, and how Kamailio can
help defending on this, with e.g. config snippets, …
A second which I personally find very interesting, is how we can hav
Alex,
Thx for your prompt feedback!
We could conclude that stating something like "This config is the best way to
secure your Kamailio", is a contradictio in terminis ;)
But I think two aspects might be very handy. A first would be to list all the
attacks on VoIP networks known to man, and ho
Davy,
I would also weigh on the side of saying that Kamailio security, even in
a best-practical, common denominator kind of way, is inextricably bound
up in the specificity of how Kamailio is being used, the role it's
playing as a network element, the topology in which it is participating,
et
Awesome :)
Op 18-dec.-2013, om 11:02 heeft "Olle E. Johansson" het
volgende geschreven:
>
> On 18 Dec 2013, at 10:53, davy wrote:
>
>> Cool, I'll spend some time this weekend to have a first stake in the ground
>> on the wiki !
>>
>> It's better to have our security measures being checked
On 18 Dec 2013, at 10:53, davy wrote:
> Cool, I'll spend some time this weekend to have a first stake in the ground
> on the wiki !
>
> It's better to have our security measures being checked by peers than by
> hackers ;)
Thank you, Davy!
When you've got a template, ping me. I can send out i
Cool, I'll spend some time this weekend to have a first stake in the ground on
the wiki !
It's better to have our security measures being checked by peers than by
hackers ;)
Op 18-dec.-2013, om 09:33 heeft Daniel-Constantin Mierla
het volgende geschreven:
> Hello,
>
> On 17/12/13 17:27, d
Hello,
On 17/12/13 17:27, davy wrote:
Hi all,
we all enjoy our FAIL2BAN and snippets of our Kamailio config when we see it successfully
fight off the "friendly-scanner", and multiple futile attempts to fool our
systems. But it got me thinking…
What is a sufficient level of security on our Ka
Hi all,
we all enjoy our FAIL2BAN and snippets of our Kamailio config when we see it
successfully fight off the "friendly-scanner", and multiple futile attempts to
fool our systems. But it got me thinking…
What is a sufficient level of security on our Kamailio machinery… ? Are we all
just doin
Hi
Thinking about what to have multiple proxy according to their use would
have to have different gateways for each proxy, right?. If you have the
same gateway for different types of use of proxy, the gateway will have
to look for so that proxy is the incoming traffic and send it. You might
a
2011/6/16 Anto :
> Is there any way to implement something that detects unusual behavior on the
> user (referred to countries that do not ever called, excessive traffic,
> etc)?.
This requirement is too complex to implement it in a generic module
(IMHO). For example, if we are a Spanish telco oper
El 16/06/11 12:44, Henning Westerholt escribió:
Hi Anto,
having different systems is one solution, you could also just use internally
in one server different traffic classes for the user sets you have.
You should also look into the htable module for account/ password brute force
detection. If yo
On Thursday 16 June 2011, Anto wrote:
> After reading the modules pike, pipelimit, etc. I wanted to know what
> measures can be used in the proxy, because like me, there will be more
> people interested ;-).
>
> We see that the module pike is a good security measure, but for users with
> many ch
Hi
After reading the modules pike, pipelimit, etc. I wanted to know what
measures can be used in the proxy, because like me, there will be more
people interested ;-).
We see that the module pike is a good security measure, but for users
with many channels, we used the configuration of users
21 matches
Mail list logo