Hello Tony!
27 Jun 18 08:07, you wrote to me:
TL> Yes, it's easy to open up security holes with VoIP PBXs,
It was my own fault, when I upgraded an experiment with the voip on my
cellphone from the lan to the wan, without installing a more robust
password.
TL> and there's so
TL> many probes these days. I've had to block SIP inbound on my VPN
TL> router
TL> (which is relatively open), because there was a constant stream of SIP
TL> probes and I was using softphones and ATAs as extensions at one stage.
I cannot block Sip, as I hase users on the WAN with dynamic adresses.
I do use a dynamic generation of blocking rules on my firewall, but those
take time. Probes can be heavy, sometimes whole 4 mumber blocks are scanned
within a few secconds. Another type of probes that apparenty is automated is
forwarding of calls to a specific caller. If that succeeds, they have found
the hole they are looking for and they start to offer services and also
make long call to expensive numbers abroad, to generate income there.
My impression is that probes on SIP surpass the probes on my mailserver in
quantity.
Kees
--- GoldED+/LNX 1.1.5
* Origin: As for me, all I know is that, I know nothing. (2:280/5003.4)
|