Cool, I'll spend some time this weekend to have a first stake in the ground on 
the wiki !

It's better to have our security measures being checked by peers than by 
hackers ;)



Op 18-dec.-2013, om 09:33 heeft Daniel-Constantin Mierla <mico...@gmail.com> 
het volgende geschreven:

> Hello,
> 
> On 17/12/13 17:27, davy wrote:
>> Hi all,
>> 
>> we all enjoy our FAIL2BAN and snippets of our Kamailio config when we see it 
>> successfully fight off the "friendly-scanner", and multiple futile attempts 
>> to fool our systems. But it got me thinking…
>> 
>> What is a sufficient level of security on our Kamailio machinery… ? Are we 
>> all just doing whatever, or is the nature of the beast, that every setup is 
>> different?
> Indeed, Kamailio being more like a framework, lot of deployments are 
> different, even when targeting same features. In some cases, dictionary 
> attacks don't apply (e.g., carriers interconnect when traffic is allowed by 
> IP address).
>> 
>> Eventually while having a beer, we will end up in the discussion Kamailio is 
>> as good (and even much better) as most of the commercially available SBCs. 
>> But, imho, that all depends on the configuration.
>> 
>> There are a few good reads available, and on the security front I personally 
>> love Pike, Topoh, Dnssec, Htable and recently I think I'm doing rather 
>> clever stuff with CNXCC… And I do feel comfortable on my setups, them won't 
>> be hacked…
>> 
>> But do we have a-sort -of stake in the ground example configuration which we 
>> can consider as being more than sufficiently secure? Some config where we 
>> can tick off all the known security risks for SIP (as chapter 26 of rfc3261 
>> gives a state of the art back in 2002) Or would that be a nice idea for a 
>> micro project?
> It would be good to create a page (or group or pages) in kamailio.org/wiki to 
> approach security considerations. Besides the well known situations and 
> solutions for attacks, it happens quite often to see new types of attacks, so 
> adding notes there along with hints on how to solve with Kamailio would be 
> very useful for everybody.
> 
> Long time ago I made a wiki tutorial on my company site:
> - http://kb.asipto.com/kamailio:usage:k31-sip-scanning-attack
> 
> I don't mind being cloned and improved (well, I guess some parts could be 
> trimmed as might not be relevant in general and some need to be updated for 
> latest version).
> 
> There are many types of attacks not mentioned there, that can be highlighted 
> for everyone to pay attention, e.g.,:
> - nonce reply (use one time nonce with auth module)
> - proper handling of route headers to avoid preset route headers in initial 
> invite (is done in the default config file, but pointing at it makes people 
> be more careful and don't miss it when building new configs)
> 
> Overall, yes, security is a topic very useful, hopefully there are be enough 
> people willing to spend some time and share information.
> 
> Cheers,
> Daniel
> -
> 
> -- 
> Daniel-Constantin Mierla - http://www.asipto.com
> http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
> 

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to