[VoiceOps] Asterisk Security
Peter Beckman
beckman at angryox.com
Wed Aug 5 12:45:28 EDT 2009
On Wed, 5 Aug 2009, J. Oquendo wrote:
> The fact that if you used fail2ban, I can insert whatever network I like
> via packetcrafting and give you headaches for days. Imagine that for a
> moment - blocking I don't know say... 0.0.0.0 or better yet, if someone
> has an axe to grind with you and is capable (not difficult) of tracking
> down your address ranges. They could do some really cruddy stuff like
> have your own servers/netblocks block themselves out, have your servers
> block out your default route and the list goes on and on.
Absolutely. Use of such a tool has to be with the realization that the
tool can be used against you, and that you need to really know your
network, and how your firewall works.
> Multiple that by all of your netblocks, clients' static netblocks, etc.
> It would be a horrible thing to maintain.
I disagree. A single file with a mix of netblocks, static and dynamic
DNS, and customer IP addresses that allows for inline comments can be used
in multiple applications.
For the most part, most of your production IP services are already
firewalled with an explicit whitelist. When you need production IP
services available to the world (HTTP, SIP if you are handling NAT'ed
customer devices), a tool that supports whitelisting and dynamically
blocks for Z seconds non-whitelisted IPs and hosts that fail to
authenticate (or do something) X times in Y seconds is valuable.
The shell script examples you posted are bad for production, because they
block on the first failed attempt, and have no method for unblocking.
The tools being discussed (sshguard, fail2ban, others) block hosts for Z
seconds only after X failures in Y seconds. This is useful to proactively
protect the availability of your services in the following instances:
* This means a tinkerer who screws up their Asterisk config and blasts
you with 150 registration requests a minute would get blocked for 15
minutes before being able to try again, forcing the customer to maybe
realize something isn't right, and for you to optionally be notified
of the block, and maybe call the person proactively to help, AND
proactively protecting your SIP registration server from being DOS'ed
by a newbie.
* Drive-by brute force. 150 failed auths in 1 minute indicate an
attempted brute force attack.
* Packetcrafting usefulness is diminished by your whitelist. While
packetcrafting could be used to temporarily disconnect one of your
non-whitelisted customers, at least you'd know about the block and
could make an informed decision to either whitelist the client
temporarily or permanently.
Sometimes it will have a previously unthought of bad result on your
services, which you then consider and fix. It may not be perfect, but
neither is getting brute forced and having thousands of dollars of calls
made on your dime, or having your customers offline because of one bad
tinkerer DOSing your services at 2am while you sleep.
Beckman
---------------------------------------------------------------------------
Peter Beckman Internet Guy
beckman at angryox.com http://www.angryox.com/
---------------------------------------------------------------------------
More information about the VoiceOps
mailing list