[VOIPSEC] Attacks in the wild: brute force password hacking
Stephen Kingham
Stephen.Kingham at aarnet.edu.au
Wed May 24 01:59:40 CDT 2006
Hi
We have also discussed similar problems and come to a similar conclusion
for a solution, ie a damping of incoming messages.
However we have not seen such an attack yet :-|.
Stephen Kingham
John Todd wrote:
> I've witnessed within the last few days a brute force attack on SIP
> REGISTER requests in some type of automated fashion. I'm wondering
> if others have seen similar issues on their networks who would be
> interested in sharing any experiences publicly or privately.
>
> A brute-force password attack was launched against a SIP-based PBX in
> what appeared to be an attempt to guess passwords. Queries were
> coming in about 10 per second. Extension/identities were
> incrementing during each attempt, and it appeared that a full range
> of extensions were cycled over and over with the new password. The
> User-Agent: string was almost certainly falsified (it reports
> "Polycom".) I can provide more details to anyone who is interested
> in the specifics.
>
> I don't know when this problem was discovered in relation to the time
> that it started. The extension ranges that were being attacked were
> valid extensions, unknown to anyone other than the administrator of
> the system, which was primarily a testbed (leading to an assumption
> of random scanning for UDP 5060 responses on public IP addresses as
> the vector for the attacker.) Some brief testing against Asterisk
> shows that there are different replies when a valid extension versus
> an invalid extension is supplied in a REGISTER attempt (no surprise
> there, since an unknown user will result in an immediate "404" error
> upon REGISTER attempt, while a known user but bad nonce during
> REGISTER will result in a "401" error.) Therefore, it may be the
> case that the attacker scanned a large number of sequential or random
> extensions until a valid range was discovered, then the range was
> narrowed and password brute-force attacks started once valid SIP
> identities were established. This is a guess, but it fits the
> evidence at hand.
>
> While Asterisk was the platform under attack, this is not an
> Asterisk-specific attack method. The brute-force method used is
> applicable to any SIP registrar/proxy that accepts and processes such
> requests. The method by which the attacker may have obtained valid
> SIP peers (presentities) on Asterisk has been identified, and
> Asterisk has since been patched (SVN-TRUNK and 1.2 TRUNK) to include
> a method that allows administrators to obscure SIP response codes on
> INVITE, SUBSCRIBE, and REGISTER from 404 to 401 in the case of
> non-existant hosts ("alwaysauthreject" option in sip.conf.) Thanks
> to Kevin Fleming for quick turnaround on this. While Asterisk does
> not seem from current evidence to be vulnerable to any particular
> password attack method, it is the case that previous versions to
> today are farm-able for valid extensions on which attacks may be
> attempted.
>
> The attack does not seem to be a "bot" attack, as only one IP address
> was originating requests, but of course that can quickly change based
> on the intent of the attacker and their resource availability.
> Blocking the attack is simply performed with an IP address filter on
> the router or filter table on the host. However, this is obviously
> insufficient for larger scale problems where multiple attacking hosts
> or targets are involved. A more complete solution has been discussed
> which would involve a dampening system that would slow replies (or
> ignore requests) for any authentication methods for individual
> presentities based on frequency of requests for that presentity or
> frequency of requests from that originating host. Are there comments
> on the usefulness or validity of such a dampening system? Has anyone
> deployed such a system already, and could you speak to the results of
> such a method?
>
> JT
>
>
>
> Example packets (not a full transaction, IP addresses obscured) look like this:
>
> Origin (SIP UA): 10.1.1.1
> Destination (SIP registrar): 172.16.16.16
>
> REGISTER sip:171.16.16.16;transport=udp SIP/2.0
> Via: SIP/2.0/UDP 10.1.1.1:1025;branch=z9hG4bKa53940dcDB34E039
> From: "2665" <sip:2665 at 171.16.16.16>;tag=52F481E6-70A248F5
> To: <sip:2665 at 171.16.16.16>
> CSeq: 1 REGISTER
> Call-ID: 9c0014fa-b7ec2828-facb896f at 10.0.100.14
> Contact: <sip:2665 at 10.1.1.1:1025;transport=udp>;methods="INVITE, ACK,
> BYE, CANCEL, OPTIONS, INFO, MESSAGE, SUBSCRIBE, NOTIFY, PRACK,
> UPDATE, REFER"
> User-Agent: PolycomSoundPointIP-SPIP_600-UA/1.3.0
> Max-Forwards: 70
> Expires: 3600
> Content-Length: 0
>
>
>
>
> _______________________________________________
> Voipsec mailing list
> Voipsec at voipsa.org
> http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
>
More information about the Voipsec
mailing list