Forum Replies Created

Viewing 15 posts - 226 through 240 (of 254 total)
  • Author
    Posts
  • Avatar photoTelium Support Group
    Member
    Post count: 258

    The most likely cause is that the banned IP’s are not being handled properly by the firewall. There is also a known issue with fail2ban – in case you are attempting to run fail2ban alongside SecAst.

    If you are using local IPtables to block attackers, ensure that the SECAST chain exists, and that the first rule on the INPUT chain jumps to target chain SECAST. For example, the command “iptables –L” should show something like:

    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    SECAST all — anywhere anywhere
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    Chain SECAST (1 references)
    target prot opt source destination
    RETURN all — anywhere anywhere

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The most likely cause is that Asterisk is not providing enough information about an account violation.

    If you are running Asterisk 13 or later, then you should tell SecAst to use the AMI for talking to Asterisk (don’t use a security log file). This exposes a lot more information to SecAst.

    If you must use the Asterisk log file, please send that log file and the SecAst log file to support for assistance in identifying the attack type and adjusting your setting to recognize the attack.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The attacker is providing a fake IP address (your server) as the source IP address in the SIP header, and this confuses Asterisk and results in the above error. SecAst is able to detect this type of attack and block the attacker at the network edge.

    Digium is aware of the underlying issue and has resolved it in Asterisk version 10 and later, but older Asterisk versions will not receive updated code. (Some users have posted changes to the Asterisk C code but this is beyond most users to apply). In versions of Asterisk 10 through 12, you can enable the Asterisk security log as described here: https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger) to view more accurate error messages; and you can tell SecAst to use the security log you specified (as described in the detailed installation guide).

    However, there are still dangers remaining from this type of attack. In version 13 and later of Asterisk you should not be using a security log file, and instead set SecAst to use the AMI for notification of events. Setting SecAst to use the AMI not only increases the speed and accuracy of blocking attackers, it allows SecAst access to detailed caller behavior which can be used to identify fraud and hacking before any damage has been done.

    If SecAst communicates with Asterisk through the AMI then numerous other protective measures are also enabled, including detection of stolen credentials, suspicious dialing patterns, etc.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The SecAst executable has started, but a critical connection to Asterisk has not been successful. This in turn is preventing SecAst from protecting the Asterisk server.

    A delay in starting Asterisk, or a delay in Asterisk responding to SecAst may be the root cause, and no action is needed as the connection will succeed momentarily. Depending on the alert settings, a successful start email may be forthcoming. If not, examine the secast.log file for clues as to what Asterisk connection has been unsuccessful. The most common cause is that the AMI is unavailable because either the Asterisk is not started (yet), or the AMI connection settings mismatch.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    Confirm that your Asterisk (AMI) configuration in secast.conf matches the AMI configuration in manager.conf. If you are certain the interface credentials, port, and settings are correct, please contact support for further assistance.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The SecAst log file or its parent directory has world write permissions, and newer versions of logrotate do not allow this to rotate. Manually running logrotate shows the results below:

    $logrotate -d -v secast
    reading config file secast
    Handling 1 logs
    rotating pattern: /var/log/secast after 1 days (7 rotations)
    empty log files are rotated, old logs are removed
    considering log /var/log/secast
    error: skipping “/var/log/secast” because parent directory has insecure permissions

    The solution is to uncomment the line in the /etc/logrotate.d/secast file to allow rotating regardless of permission:

    su root root

    Avatar photoTelium Support Group
    Member
    Post count: 258

    One or more shared libraries are not installed. The solution is to ensure that all prerequisite libraries are installed.

    First, use the “ldd” command to show what libraries SecAst needs, and are available. You should see something like this:

    root@pbx~$ ldd secast-0.345.3.0-x86_64-ub12/secast
    linux-vdso.so.1 => (0x00007ffffbded000)
    libQt5Sql.so.5 => not found
    libQt5Xml.so.5 => not found
    libQt5Network.so.5 => not found
    libQt5Core.so.5 => not found
    libpthread.so.0 => /lib/x86_64-linuxgnu/
    libpthread.so.0 (0x00007ff6b71c4000)
    libstdc++.so.6 => /usr/lib/x86_64-linuxgnu/
    libstdc++.so.6 (0x00007ff6b6ec3000)
    libgcc_s.so.1 => /lib/x86_64-linuxgnu/
    libgcc_s.so.1 (0x00007ff6b6cad000)
    libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6
    (0x00007ff6b68ed000)
    /lib64/ld-linux-x86-64.so.2 (0x00007ff6b73ef000)
    libm.so.6 => /lib/x86_64-linux-gnu/libm.so.6
    (0x00007ff6b65f0000)

    Based on the response shown in your case, you will have to add the missing libraries (normally through your package manager like apt-get or yum). In the above example case, the Qt libraries are missing; see section 5 of the instructions for details on how to add the Qt libraries.

    Avatar photoTelium Support Group
    Member
    Post count: 258
    in reply to: GLIBC error #6620

    The wrong SecAst package has been installed. SecAst is looking for libraries that are more modern (recent) than those offered by your Linux distribution.

    If you are sure you downloaded the right SecAst package then try a system wide update using your package manager (eg: “yum update”). Otherwise, return to the Telium web site and download a more suitable SecAst package.

    If you don’t see a SecAst package that exactly matches your Linux distribution, try downloading the package for the oldest Linux distribution. The
    LTS (Long Term Support) versions of Red Hat (eg: v6) and Ubuntu (eg: v12) are usually the best packages to try.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The archive you downloaded is incomplete and/or contains errors.

    The solution is to try again to download the file again. Before expanding the archive, check the md5sum value and compare it to that shown on the Telium website for that file.

    Some browsers / locations have difficulty downloading large files, in which case Telium recommends using FTP to transfer the file instead.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The solution is to enable debug for the sync id which is generating the warning, then examine the /tmp/haast.sync.XXX.debuglog file for details of the warning. If the warning is correct or acceptable then no further action is required. If you wish to eliminate the warning completely you can edit the pre or post-sync script file to remove reference to the data (or correct the file to match your implementation).

    Avatar photoTelium Support Group
    Member
    Post count: 258

    The solution is to enable debug for the syncjob id which is generating the warning, then examine the /pbxsync/id.pbxsync.XXX.debuglog file for details of the warning. If the warning is correct or acceptable then no further action is required. If you wish to eliminate the warning completely you can edit the pre or post-sync script file to remove reference to the data (or correct the file to match your implementation).

    Avatar photoTelium Support Group
    Member
    Post count: 258
    in reply to: Logs not rotating #6617

    The HAAst log file or its parent directory has world write permissions, and newer versions of logrotate do not allow this to rotate. Manually running logrotate shows the results below:

    $logrotate -d -v haast
    reading config file haast
    Handling 1 logs
    rotating pattern: /var/log/haast after 1 days (7 rotations)
    empty log files are rotated, old logs are removed
    considering log /var/log/haast
    error: skipping “/var/log/haast” because parent directory has insecure permissions

    The solution is to uncomment the line in the /etc/logrotate.d/haast file to allow rotating regardless of permission:

    su root root

    Avatar photoTelium Support Group
    Member
    Post count: 258

    HAAst performance data written to the database is recorded using the timetamp of the source system, and they are displayed in the order they arrived. If entries from different servers appear out of order, that means that the clocks on the two servers are out of sync.

    The solution is to install the network time service (NTP) on both peers and ensure they synchronize from the same source.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    Something significant has changed in regards to the computer’s hardware profile. If you are attempting to move your license to a new hardware platform please contact support@autocommander.aws2.ocg.ca for assistance.

    If you are not moving your license to another hardware platform and have not changed the hardware in any way then something else has gone wrong and we’re here to help. This symptom has been reported with HAAst installed in a virtual machine and the VM has undergone a virtual hardware revision upgrade. Similarly, if you have modified various BIOS settings your system might report hardware differently.

    As a workaround restart the HAAst service, or restart the virtual machine guest. Please generate a new license request and send it, along with a haast log file showing your failed restart attempt (including the license rejection messages), and we will generate a new key for you and help you figure out what changed (so long as the system still has a maintenance agreement in place).

    Please note that physical and virtual machines do not just change their configurations on their own – so be careful you don’t invalidate your license by experimenting with hardware or VM settings. Activate your license only after you have finished configuring your hardware.

    Avatar photoTelium Support Group
    Member
    Post count: 258

    You are experiencing a network/routing issue somewhere on your network. It could be an ARP table is corrupt somewhere, or a device is simply not routing packets out the interface it should. This type of problem is common with multihoming (this is not a HAAst issue, it’s a network issue).

    A complete solution is beyond the scope of this document. In fact, understanding and diagnosing ARP cache and routing problems is complex – don’t expect a simple answer. If you want to ensure that your Asterisk server is sending packets out the right interface on a multihomed system, you can set an iproute policy as follows:

    1. edit the /etc/iproute2/rt_tables file and add the following line:

    200 haastrt


    2. add the following two lines to your asterisk.start.pre file (assuming the device you are dynamically creating is called eth0.haast):

    ip rule add dev eth0.haast table haastrt
    ip route add default dev eth0.haast table haastrt


    3. Reboot your system and retry the ping test mentioned above.

    If the problem remains then the most likely cause if your router.

Viewing 15 posts - 226 through 240 (of 254 total)