This experimental patch seeks to integrate AutoBan intrusion detection and prevention system
(c.f. https://github.com/mlan/docker-asterisk/tree/master/src/autoban, credits @mlan)
as a possibly more swift in response, yet also more lightweight alternative to Fail2Ban.
AutoBan listens and responds directly to Asterisk AMI events 'InvalidAccountID', 'InvalidPassword', 'ChallengeResponseFailed' and 'FailedACL' , a technically more straightforward approach (compared to Fail2Ban) that is also employed by SecAst(R).
I have successfully build an according image which I am currently testing (_docker.io/hobbit00378/izpbx-asterisk:20.16.6mwe).
This experimental patch seeks to integrate AutoBan intrusion detection and prevention system (c.f. https://github.com/mlan/docker-asterisk/tree/master/src/autoban, credits @mlan) as a possibly more swift in response, yet also more lightweight alternative to Fail2Ban.
AutoBan listens and responds directly to Asterisk AMI events 'InvalidAccountID', 'InvalidPassword', 'ChallengeResponseFailed' and 'FailedACL' , a technically more straightforward approach (compared to Fail2Ban) that is also employed by SecAst(R).
I have successfully build an according image which I am currently testing (_docker.io/hobbit00378/izpbx-asterisk:20.16.6mwe).