This Gist contains my IPTables rules for securing the Asterisk VoIP server. The "string" module is used to identify legitimate users and block attackers.
Learn how to set up your personal VoIP server
↓ ↓ ↓ Scroll down for the IPTables rules ↓ ↓ ↓
#!/usr/bin/env bash | |
# The MIT License (MIT) | |
# | |
# Copyright (c) 2014 Arun Babu Neelicattu | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
D/Wire (29964): http-outgoing-0 << "BEGIN:VTIMEZONE[\n]" | |
D/Wire (29964): http-outgoing-0 << "TZID:America/Montevideo[\n]" | |
D/Wire (29964): http-outgoing-0 << "BEGIN:STANDARD[\n]" | |
D/Wire (29964): http-outgoing-0 << "DTSTART:18980628T000000[\n]" | |
D/Wire (29964): http-outgoing-0 << "TZOFFSETFROM:-0344[\n]" | |
D/Wire (29964): http-outgoing-0 << "TZOFFSETTO:-0344[\n]" | |
D/Wire (29964): http-outgoing-0 << "TZNAME:MMT[\n]" | |
D/Wire (29964): http-outgoing-0 << "END:STANDARD[\n]" | |
D/Wire (29964): http-outgoing-0 << "BEGIN:STANDARD[\n]" | |
D/Wire (29964): http-outgoing-0 << "TZOFFSETFROM:-0330[\n]" |
#!/bin/bash | |
# Ardour 5 in Fedora 24 | |
sudo dnf install -y aubio aubio-devel dnf fftw-devel flac-devel gtkmm gtkmm24 gtkmm-2.4 \ | |
gtkmm24-devel jack-audio-connection-kit-devel jack-devel libflac-devel liblo-devel liblrdf-devel \ | |
liblv2-devel libogg-devel libsamplerate-devel libsndfile-devel lilv-devel lrdf-devel lv2-devel \ | |
rubberband-devel samplerate-devel serd-0 serd-devel sord-devel sratom-devel taglib-devel vamp-plugin-sdk-devel | |
./waf configure | |
umask 022; sudo ./waf install |
This Gist contains my IPTables rules for securing the Asterisk VoIP server. The "string" module is used to identify legitimate users and block attackers.
Learn how to set up your personal VoIP server
↓ ↓ ↓ Scroll down for the IPTables rules ↓ ↓ ↓
server { | |
listen 80; | |
listen [::]:80; | |
root /var/www/owaspsummit.org; | |
index index.html | |
server_name owaspsummit-test.org; |
user www-data; | |
worker_processes auto; | |
pid /run/nginx.pid; | |
events { | |
worker_connections 768; | |
# multi_accept on; | |
} | |
http { |
<!DOCTYPE html> | |
<html> | |
<head> | |
{{ partial "header.html" . }} | |
</head> | |
<body> | |
{{ partial "menu.html" . }} | |
<div class="page-content"> | |
<div class="participants"> | |
<div class="container"> |
This is how you can take an OpenVPN .ovpn config file and extract the certificates/keys required to import the profile into NetworkManager.
[client] | |
ssl | |
ssl-cert=/etc/mysql/client-cert.pem | |
ssl-key=/etc/mysql/client-key.pem | |
[mysqld] | |
ssl | |
ssl-cipher=DHE-RSA-AES256-SHA | |
ssl-ca=/etc/mysql/ca-cert.pem | |
ssl-cert=/etc/mysql/server-cert.pem |
I hereby claim:
To claim this, I am signing this object: