Hi!

I was just testing the digest replay possibilities against Kamailio. (findings: 
http://www.kamailio.org/wiki/tutorials/security/kamailio-security#digest_authentication)

It looks that by default (the typical default configs), a SIP replay attack can 
be done during 300 seconds (?) . 

Now I tried the code snippet from the auth module:

http://kamailio.org/docs/modules/4.1.x/modules/auth.html#auth.p.nonce_count

But my setup can’t seem to find back the digest_challenge. I did read somewhere 
digest_challenge has been taken out of the codebase.

Is the documentation out of sync, or am I really having a facepalm moment? Btw 
I’m on 4.2.

Grtz,
Davy



Op 29-jan.-2014, om 12:37 heeft davy van de moere <davy.van.de.mo...@gmail.com> 
het volgende geschreven:

> I started the pages, to be found :
> 
> http://www.kamailio.org/wiki/tutorials/security/security-threats
> http://www.kamailio.org/wiki/tutorials/security/kamailio-security
> 
> They are a long from being complete, but it's a start, feel free to 
> modify/correct/add content!
> 
> 
> 2013-12-18 davy <davy.van.de.mo...@gmail.com>
> ACK
> 
> :)
> 
> Op 18-dec.-2013, om 15:30 heeft Daniel-Constantin Mierla <mico...@gmail.com> 
> het volgende geschreven:
> 
> > Hello,
> >
> > On 18/12/13 10:53, davy wrote:
> >> Cool, I'll spend some time this weekend to have a first stake in the 
> >> ground on the wiki !
> >
> > great! Just use namespaces when creating new pages, to have a good 
> > structure of the wiki. It can be something under tutorials, such as:
> >
> > tutorials:security:TITLE
> >
> > where TITLE can be what you consider more appropriate, such  as 'how-to', 
> > 'remarks' or what so ever...
> >
> > Cheers,
> > Daniel
> >>
> >> It's better to have our security measures being checked by peers than by 
> >> hackers ;)
> >>
> >>
> >>
> >> Op 18-dec.-2013, om 09:33 heeft Daniel-Constantin Mierla 
> >> <mico...@gmail.com> het volgende geschreven:
> >>
> >>> Hello,
> >>>
> >>> On 17/12/13 17:27, davy wrote:
> >>>> Hi all,
> >>>>
> >>>> we all enjoy our FAIL2BAN and snippets of our Kamailio config when we 
> >>>> see it successfully fight off the "friendly-scanner", and multiple 
> >>>> futile attempts to fool our systems. But it got me thinking…
> >>>>
> >>>> What is a sufficient level of security on our Kamailio machinery… ? Are 
> >>>> we all just doing whatever, or is the nature of the beast, that every 
> >>>> setup is different?
> >>> Indeed, Kamailio being more like a framework, lot of deployments are 
> >>> different, even when targeting same features. In some cases, dictionary 
> >>> attacks don't apply (e.g., carriers interconnect when traffic is allowed 
> >>> by IP address).
> >>>> Eventually while having a beer, we will end up in the discussion 
> >>>> Kamailio is as good (and even much better) as most of the commercially 
> >>>> available SBCs. But, imho, that all depends on the configuration.
> >>>>
> >>>> There are a few good reads available, and on the security front I 
> >>>> personally love Pike, Topoh, Dnssec, Htable and recently I think I'm 
> >>>> doing rather clever stuff with CNXCC… And I do feel comfortable on my 
> >>>> setups, them won't be hacked…
> >>>>
> >>>> But do we have a-sort -of stake in the ground example configuration 
> >>>> which we can consider as being more than sufficiently secure? Some 
> >>>> config where we can tick off all the known security risks for SIP (as 
> >>>> chapter 26 of rfc3261 gives a state of the art back in 2002) Or would 
> >>>> that be a nice idea for a micro project?
> >>> It would be good to create a page (or group or pages) in 
> >>> kamailio.org/wiki to approach security considerations. Besides the well 
> >>> known situations and solutions for attacks, it happens quite often to see 
> >>> new types of attacks, so adding notes there along with hints on how to 
> >>> solve with Kamailio would be very useful for everybody.
> >>>
> >>> Long time ago I made a wiki tutorial on my company site:
> >>> - http://kb.asipto.com/kamailio:usage:k31-sip-scanning-attack
> >>>
> >>> I don't mind being cloned and improved (well, I guess some parts could be 
> >>> trimmed as might not be relevant in general and some need to be updated 
> >>> for latest version).
> >>>
> >>> There are many types of attacks not mentioned there, that can be 
> >>> highlighted for everyone to pay attention, e.g.,:
> >>> - nonce reply (use one time nonce with auth module)
> >>> - proper handling of route headers to avoid preset route headers in 
> >>> initial invite (is done in the default config file, but pointing at it 
> >>> makes people be more careful and don't miss it when building new configs)
> >>>
> >>> Overall, yes, security is a topic very useful, hopefully there are be 
> >>> enough people willing to spend some time and share information.
> >>>
> >>> Cheers,
> >>> Daniel
> >>> -
> >>>
> >>> --
> >>> Daniel-Constantin Mierla - http://www.asipto.com
> >>> http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
> >>>
> >
> > --
> > Daniel-Constantin Mierla - http://www.asipto.com
> > http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
> >
> 
> 

_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to