Forum Replies Created
-
AuthorPosts
-
in reply to: IP’s not blocked despite SecAst saying they are #6627
The most likely cause is that the banned IP’s are not being handled properly by the firewall. There is also a known issue with fail2ban – in case you are attempting to run fail2ban alongside SecAst.
If you are using local IPtables to block attackers, ensure that the SECAST chain exists, and that the first rule on the INPUT chain jumps to target chain SECAST. For example, the command “iptables –L” should show something like:
Chain INPUT (policy ACCEPT)
target prot opt source destination
SECAST all — anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain SECAST (1 references)
target prot opt source destination
RETURN all — anywhere anywherein reply to: SecAst ignoring attacker #6626The most likely cause is that Asterisk is not providing enough information about an account violation.
If you are running Asterisk 13 or later, then you should tell SecAst to use the AMI for talking to Asterisk (don’t use a security log file). This exposes a lot more information to SecAst.
If you must use the Asterisk log file, please send that log file and the SecAst log file to support for assistance in identifying the attack type and adjusting your setting to recognize the attack.
in reply to: Attacker IP is not available and can’t be blocked #6625The attacker is providing a fake IP address (your server) as the source IP address in the SIP header, and this confuses Asterisk and results in the above error. SecAst is able to detect this type of attack and block the attacker at the network edge.
Digium is aware of the underlying issue and has resolved it in Asterisk version 10 and later, but older Asterisk versions will not receive updated code. (Some users have posted changes to the Asterisk C code but this is beyond most users to apply). In versions of Asterisk 10 through 12, you can enable the Asterisk security log as described here: https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger) to view more accurate error messages; and you can tell SecAst to use the security log you specified (as described in the detailed installation guide).
However, there are still dangers remaining from this type of attack. In version 13 and later of Asterisk you should not be using a security log file, and instead set SecAst to use the AMI for notification of events. Setting SecAst to use the AMI not only increases the speed and accuracy of blocking attackers, it allows SecAst access to detailed caller behavior which can be used to identify fraud and hacking before any damage has been done.
If SecAst communicates with Asterisk through the AMI then numerous other protective measures are also enabled, including detection of stolen credentials, suspicious dialing patterns, etc.
in reply to: Incomplete startup email #6624The SecAst executable has started, but a critical connection to Asterisk has not been successful. This in turn is preventing SecAst from protecting the Asterisk server.
A delay in starting Asterisk, or a delay in Asterisk responding to SecAst may be the root cause, and no action is needed as the connection will succeed momentarily. Depending on the alert settings, a successful start email may be forthcoming. If not, examine the secast.log file for clues as to what Asterisk connection has been unsuccessful. The most common cause is that the AMI is unavailable because either the Asterisk is not started (yet), or the AMI connection settings mismatch.
in reply to: SecAst shuts down unexpectedly with AMI error #6623Confirm that your Asterisk (AMI) configuration in secast.conf matches the AMI configuration in manager.conf. If you are certain the interface credentials, port, and settings are correct, please contact support for further assistance.
in reply to: SecAst logs not rotating #6622The SecAst log file or its parent directory has world write permissions, and newer versions of logrotate do not allow this to rotate. Manually running logrotate shows the results below:
$logrotate -d -v secast
reading config file secast
Handling 1 logs
rotating pattern: /var/log/secast after 1 days (7 rotations)
empty log files are rotated, old logs are removed
considering log /var/log/secast
error: skipping “/var/log/secast” because parent directory has insecure permissionsThe solution is to uncomment the line in the /etc/logrotate.d/secast file to allow rotating regardless of permission:
su root rootin reply to: Shared library error on start #6621One or more shared libraries are not installed. The solution is to ensure that all prerequisite libraries are installed.
First, use the “ldd” command to show what libraries SecAst needs, and are available. You should see something like this:
root@pbx~$ ldd secast-0.345.3.0-x86_64-ub12/secast
linux-vdso.so.1 => (0x00007ffffbded000)
libQt5Sql.so.5 => not found
libQt5Xml.so.5 => not found
libQt5Network.so.5 => not found
libQt5Core.so.5 => not found
libpthread.so.0 => /lib/x86_64-linuxgnu/
libpthread.so.0 (0x00007ff6b71c4000)
libstdc++.so.6 => /usr/lib/x86_64-linuxgnu/
libstdc++.so.6 (0x00007ff6b6ec3000)
libgcc_s.so.1 => /lib/x86_64-linuxgnu/
libgcc_s.so.1 (0x00007ff6b6cad000)
libc.so.6 => /lib/x86_64-linux-gnu/libc.so.6
(0x00007ff6b68ed000)
/lib64/ld-linux-x86-64.so.2 (0x00007ff6b73ef000)
libm.so.6 => /lib/x86_64-linux-gnu/libm.so.6
(0x00007ff6b65f0000)Based on the response shown in your case, you will have to add the missing libraries (normally through your package manager like apt-get or yum). In the above example case, the Qt libraries are missing; see section 5 of the instructions for details on how to add the Qt libraries.
in reply to: GLIBC error #6620The wrong SecAst package has been installed. SecAst is looking for libraries that are more modern (recent) than those offered by your Linux distribution.
If you are sure you downloaded the right SecAst package then try a system wide update using your package manager (eg: “yum update”). Otherwise, return to the Telium web site and download a more suitable SecAst package.
If you don’t see a SecAst package that exactly matches your Linux distribution, try downloading the package for the oldest Linux distribution. The
LTS (Long Term Support) versions of Red Hat (eg: v6) and Ubuntu (eg: v12) are usually the best packages to try.in reply to: Error untarring package #6619The archive you downloaded is incomplete and/or contains errors.
The solution is to try again to download the file again. Before expanding the archive, check the md5sum value and compare it to that shown on the Telium website for that file.
Some browsers / locations have difficulty downloading large files, in which case Telium recommends using FTP to transfer the file instead.
in reply to: Warning on sync completion #6618The solution is to enable debug for the sync id which is generating the warning, then examine the /tmp/haast.sync.XXX.debuglog file for details of the warning. If the warning is correct or acceptable then no further action is required. If you wish to eliminate the warning completely you can edit the pre or post-sync script file to remove reference to the data (or correct the file to match your implementation).
in reply to: Warning on sync completion #6838The solution is to enable debug for the syncjob id which is generating the warning, then examine the /pbxsync/id.pbxsync.XXX.debuglog file for details of the warning. If the warning is correct or acceptable then no further action is required. If you wish to eliminate the warning completely you can edit the pre or post-sync script file to remove reference to the data (or correct the file to match your implementation).
in reply to: Logs not rotating #6617The HAAst log file or its parent directory has world write permissions, and newer versions of logrotate do not allow this to rotate. Manually running logrotate shows the results below:
$logrotate -d -v haast
reading config file haast
Handling 1 logs
rotating pattern: /var/log/haast after 1 days (7 rotations)
empty log files are rotated, old logs are removed
considering log /var/log/haast
error: skipping “/var/log/haast” because parent directory has insecure permissionsThe solution is to uncomment the line in the /etc/logrotate.d/haast file to allow rotating regardless of permission:
su root rootin reply to: Log entries out of order in web GUI #6616HAAst performance data written to the database is recorded using the timetamp of the source system, and they are displayed in the order they arrived. If entries from different servers appear out of order, that means that the clocks on the two servers are out of sync.
The solution is to install the network time service (NTP) on both peers and ensure they synchronize from the same source.
in reply to: License file rejected #6615Something significant has changed in regards to the computer’s hardware profile. If you are attempting to move your license to a new hardware platform please contact support@autocommander.aws2.ocg.ca for assistance.
If you are not moving your license to another hardware platform and have not changed the hardware in any way then something else has gone wrong and we’re here to help. This symptom has been reported with HAAst installed in a virtual machine and the VM has undergone a virtual hardware revision upgrade. Similarly, if you have modified various BIOS settings your system might report hardware differently.
As a workaround restart the HAAst service, or restart the virtual machine guest. Please generate a new license request and send it, along with a haast log file showing your failed restart attempt (including the license rejection messages), and we will generate a new key for you and help you figure out what changed (so long as the system still has a maintenance agreement in place).
Please note that physical and virtual machines do not just change their configurations on their own – so be careful you don’t invalidate your license by experimenting with hardware or VM settings. Activate your license only after you have finished configuring your hardware.
in reply to: Peerlink disconnects on occasion #6614You are experiencing a network/routing issue somewhere on your network. It could be an ARP table is corrupt somewhere, or a device is simply not routing packets out the interface it should. This type of problem is common with multihoming (this is not a HAAst issue, it’s a network issue).
A complete solution is beyond the scope of this document. In fact, understanding and diagnosing ARP cache and routing problems is complex – don’t expect a simple answer. If you want to ensure that your Asterisk server is sending packets out the right interface on a multihomed system, you can set an iproute policy as follows:
1. edit the /etc/iproute2/rt_tables file and add the following line:
200 haastrt
2. add the following two lines to your asterisk.start.pre file (assuming the device you are dynamically creating is called eth0.haast):
ip rule add dev eth0.haast table haastrt
ip route add default dev eth0.haast table haastrt
3. Reboot your system and retry the ping test mentioned above.If the problem remains then the most likely cause if your router.
-
AuthorPosts