<br><br><div class="gmail_quote">On Wed, Feb 20, 2013 at 1:53 AM, Mario Karakanovski <span dir="ltr"><<a href="mailto:mario@ims.bg" target="_blank">mario@ims.bg</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div link="blue" vlink="blue" lang="BG">
<div>
<p class="MsoNormal"><font color="navy" face="Arial"><span style="font-size:10.0pt;font-family:Arial;color:navy" lang="EN-US">Thanks Ken,<u></u><u></u></span></font></p>
<p class="MsoNormal"><font color="navy" face="Arial"><span style="font-size:10.0pt;font-family:Arial;color:navy" lang="EN-US"><u></u> <u></u></span></font></p>
<p class="MsoNormal"><font color="navy" face="Arial"><span style="font-size:10.0pt;font-family:Arial;color:navy" lang="EN-US">It is helpful, but I still
think there is some security issue. I’ve double check configuration. I’ve
try to reproduce the issue trying to do direct call (TCP and UDP) or
authenticate with invalid user, but everything works as expected – calls/authentication
was rejected. I’ve decide to log the traffic – maybe I will be able
to see where is the problem.</span></font></p></div></div></blockquote><br>
</div>What "security issue"? You said that they cannot make calls with the passwords that they've guessed, correct? About the only thing left to do is set up <a href="http://wiki.freeswitch.org/wiki/Fail2ban">fail2ban </a>and just shut the door on them when they fail too many times.<br>
<br>-Michael<br>