OK Our SIP provided Disabled our account last night on the grounds of Fraud, fair enough. So I check the Call log at the provider and 2 call showed 15 Mins before the email from the provider, both to +38 (not made by us). So 10 points to Voiceflex for the rapid intervention.
Anyway, I want some other view point on security. I will be the first to admit I am a bit slack with security on our own and our customers systems on the bias I don't believe there to be a threat in our setup, but I more than willing to be corrected. I hear more and more about SIP Fraud all the time so I’m concerned that I’m missing something especially given the above although I am suspicious of the above in that It didn’t take place via our PBX but via a direct registration from a US IP.
Our Setup
All PBXs sit behind a firewall (Sonicwall).
The number of ports open varies a bit as this seems to be a bit hit and miss with the various Sonicwall Firmware’s and to a lesser degree IP software level and the combination of the 2. Some require none and NAT takes care of it all others I have needed to open 49152 - 53246 and 5060 for some to work. The UDP timeout is also extended >15 mins in relation to traffic to and from IP of PBX.
No users have Dialin enabled.
none of the User/security accounts have been changed / disabled and are all default.
with exceptions to ours, no customers PBX allow external SIP registrations.
We have a site to site VPN using the Sonicwalls to all customer sites, so remote management takes place over VPN or actually on site.
I consider the Customers & our LANs to be secure though various IPS and other systems in place. I relies leaving the Account defaults in place is a risk but as most of our customers barely know how to use Word and none have Manager installed. They are all small customers 1 – 20 users and I know every single one of them at every site and there technical abilities. We are notified of any 3rd parties on site.
So, Have I overlooked something above?
A side from plugging into the LAN is there any way to remotely manage the IP office if Dialin is not enabled for any user?
If you did have access to the IP Office could you read the detail of the SIP trunk (the password).
As the fraud originated from a US IP I can only assume our SIP Trunk info has been compromised and not our PBX or if it has it has been used to reveal the SIP trunk info.
Anyway, I want some other view point on security. I will be the first to admit I am a bit slack with security on our own and our customers systems on the bias I don't believe there to be a threat in our setup, but I more than willing to be corrected. I hear more and more about SIP Fraud all the time so I’m concerned that I’m missing something especially given the above although I am suspicious of the above in that It didn’t take place via our PBX but via a direct registration from a US IP.
Our Setup
All PBXs sit behind a firewall (Sonicwall).
The number of ports open varies a bit as this seems to be a bit hit and miss with the various Sonicwall Firmware’s and to a lesser degree IP software level and the combination of the 2. Some require none and NAT takes care of it all others I have needed to open 49152 - 53246 and 5060 for some to work. The UDP timeout is also extended >15 mins in relation to traffic to and from IP of PBX.
No users have Dialin enabled.
none of the User/security accounts have been changed / disabled and are all default.
with exceptions to ours, no customers PBX allow external SIP registrations.
We have a site to site VPN using the Sonicwalls to all customer sites, so remote management takes place over VPN or actually on site.
I consider the Customers & our LANs to be secure though various IPS and other systems in place. I relies leaving the Account defaults in place is a risk but as most of our customers barely know how to use Word and none have Manager installed. They are all small customers 1 – 20 users and I know every single one of them at every site and there technical abilities. We are notified of any 3rd parties on site.
So, Have I overlooked something above?
A side from plugging into the LAN is there any way to remotely manage the IP office if Dialin is not enabled for any user?
If you did have access to the IP Office could you read the detail of the SIP trunk (the password).
As the fraud originated from a US IP I can only assume our SIP Trunk info has been compromised and not our PBX or if it has it has been used to reveal the SIP trunk info.