Seguridad en Asterisk Con Fail2ban
Seguridad en Asterisk Con Fail2ban
Seguridad en Asterisk Con Fail2ban
fail2ban
en
Asterisk
con
Ahora
ingresamos
la
carpeta
de
archivos
para
los
filtros
de
Fail2Ban
cd /etc/fail2ban/filter.d
Creamos el archivo asterisk.conf
vi asterisk.conf
Pegamos en el archivo la siguiente informacin
# Fail2Ban configuration file
#
#
# $Revision: 250 $
#
# Read common prefixes. If any customizations available read them from
# common.local
#before = common.conf
[Definition]
#_daemon = asterisk
# Option: failregex
# Notes.: regex to match the password failures messages in the logfile. The
# host must be matched by a group named host. The tag <HOST> can
# be used for standard IP/hostname matching and is only an alias for
# (?:::f{4,6} ?(?P<host>S+)
# Values: TEXT
#
failregex = NOTICE.* .*: Registration from .* failed for <HOST> Wrong password
NOTICE.* .*: Registration from .* failed for <HOST> No matching peer found
NOTICE.* .*: Registration from .* failed for <HOST> Username/auth name mismatch
NOTICE.* .*: Registration from .* failed for <HOST> Device does not match ACL
NOTICE.* .*: Registration from .* .* failed for <HOST> Peer is not supposed to register
NOTICE.* .*: <HOST> failed to authenticate as .*$
NOTICE.* .*: No registration for peer .* (from <HOST>
NOTICE.* .*: Host <HOST> failed MD5 authentication for .* (.*)
NOTICE.* .*: Failed to authenticate user .*@<HOST>.*
# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex
iptables-asterisk
Bueno, como vemos Fail2Ban es una herramienta de gran ayuda para proteger nuestros
servidores asterisk, prximamente veremos nuevas formas de asegurar nuestros
servidores
de
telefona
Fuente http://www.fenixsolutions.com.ar/telefonia/asterisk/seguridad-en-asterisk-confail2ban/
http://www.fenixsolutions.com.ar/
ip.