Seven Steps to Better SIP Security with Asterisk

In case any of you were wondering why there has been a fairly notable upswing in the attacks happening on SIP endpoints, the answer is “script kiddies.” In the last few months, a number of new tools have made it easy for knuckle-draggers to attack and defraud SIP endpoints, Asterisk-based systems included. There are easily-available tools that scan networks looking for SIP hosts, and then scan hosts looking for valid extensions, and then scan valid extensions looking for passwords.


You can take steps, NOW, to eliminate many of these problems. I think the community is interested in coming up with an integrated Asterisk-based solution that is much wider in scope for dynamic protection (community-shared blacklists is the current thinking) but that doesn’t mean you should wait for some new tool to defend your systems. You can IMMEDIATELY take fairly common-sense measures to protect your Asterisk server from the bulk of the scans and attacks that are on the increase. The methods and tools for protection already exists – just apply them, and you’ll be able to sleep more soundly at night.

Seven Easy Steps to Better SIP Security on Asterisk:

1) Don’t accept SIP authentication requests from all IP addresses. Use the “permit=” and “deny=” lines in sip.conf to only allow a reasonable subset of IP addresess to reach each listed extension/user in your sip.conf file. Even if you accept inbound calls from “anywhere” (via [default]) don’t let those users reach authenticated elements! Contiued …

Related Posts

How to dual-boot Kali Linux 1.0.9 and Windows 7/8 on a PC with UEFI firmware The last dual-boot tutorial on Kali Linux I wrote was back in March 2013 (see Dual-boot Windows 7 and Kali Linux), and that was on a computer with Leg...
How to dual-boot Windows 8 and Fedora 21 on a PC with UEFI firmware So Fedora 21 has been released, and my attempt to upgrade my main computer from Fedora 20 to Fedora 21 KDE failed. Since the cause is not something I ...
How to dual-boot BackTrack 5 R2 and Ubuntu 12.04 BackTrack Linux is now known as Kali Linux. You may read all Kali Linux articles and tutorial at http://linuxbsdos.com/category/kali-linux. Yet a...
How to dual-boot Linux Mint 17.2, Windows 10, Windows 8.1 on a PC with UEFI firmware This tutorial shows how to dual-boot Linux Mint 17.2 and either Windows 10 or Windows 8.1 on a single hard disk drive and on a computer with UEFI firm...
Mandriva Linux 2009 Titbits Mandriva Linux 2009 was recently released to the public. Here we provide some titbits from Mandriva One, one of the free editions of Mandriva Linux 20...
How to dual-boot BackTrack 5 R2 and Windows 7 alongside each other BackTrack Linux is now known as Kali Linux. You may read all Kali Linux articles and tutorial at http://linuxbsdos.com/category/kali-linux. BackT...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*