[freeswitch-sec] Fraud

Brian West brian at freeswitch.org
Thu Aug 15 23:50:29 MSD 2013

I found that doing a reverse on the IP to regular spam RBLs results in hits on most attempts to connect.

On Aug 15, 2013, at 2:49 PM, Raymond Chandler <intralanman at freeswitch.org> wrote:

> Ken and I talked about building something into e164.org to allow you to do dnsbl-like queries there and get info on a specific IP or TN. Any interest in seeing that come to fruition?
> There are obvious issues with being able to verify that a TN really belongs to the person calling you (not being spoofed), but maybe the STIR workgroup stuff will help in that regard (in a year or two?).
> -Ray

Brian West
brian at freeswitch.org
FreeSWITCH Solutions, LLC
Brookfield, WI 53008-2531
Twitter: @FreeSWITCH_Wire

T: +1.918.420.9001  |  F: +1.918.420.9002  |  M: +1.918.424.WEST
iNUM: +883 5100 1420 9001
ISN: 410*543
PGP Key: http://www.bkw.org/key.txt (AB93356707C76CED)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
Url : http://lists.freeswitch.org/pipermail/freeswitch-sec/attachments/20130815/4506dc0a/attachment.bin 

Join us at ClueCon 2013 Aug 6-8, 2013
More information about the freeswitch-sec mailing list