[Freeswitch-users] Brute-force attack

jay binks jaybinks at gmail.com
Thu Jun 14 07:23:23 MSD 2012


Strong passwords are a great start, but fail2ban does a little more than
this.

you could move off port 5060 to something un-conventional, meaning your
less likely to get scanned / brute forced.

Jay

On 14 June 2012 12:27, ocset <ocset at the800group.com> wrote:

> Hi
>
> I have deployed Freeswiitch on windows 7 and since there is no fail2ban
> on windows, I was wondering what the real risk is with opening it up to
> the internet. If I was to ensure that all users and passwords were
> extremely difficult to guess (passwords like "2$53E_d7?^2!3s$"), what
> are the risks that I am exposing myself to? Is there a type of DoS for
> voip where hackers can just flood my system with requests simply to be
> malicious?
>
> There are VB windows scripts available that emulate what fail2ban does
> on Linux but I was just wondering whether I really need to implement
> this level of security if I can control the password complexity in
> Freeswitch.
>
> Thanks
> O
>
>
> _________________________________________________________________________
> Professional FreeSWITCH Consulting Services:
> consulting at freeswitch.org
> http://www.freeswitchsolutions.com
>
> 
> 
>
> Official FreeSWITCH Sites
> http://www.freeswitch.org
> http://wiki.freeswitch.org
> http://www.cluecon.com
>
> Join Us At ClueCon - Aug 7-9, 2012
>
> FreeSWITCH-users mailing list
> FreeSWITCH-users at lists.freeswitch.org
> http://lists.freeswitch.org/mailman/listinfo/freeswitch-users
> UNSUBSCRIBE:http://lists.freeswitch.org/mailman/options/freeswitch-users
> http://www.freeswitch.org
>



-- 
Sincerely

Jay
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.freeswitch.org/pipermail/freeswitch-users/attachments/20120614/6545f073/attachment.html 


Join us at ClueCon 2011 Aug 9-11, 2011
More information about the FreeSWITCH-users mailing list