VMR PIN brute force attack resistance

Common attacks on videoconferencing systems include rogue calls — such as Spam Over Internet Telephony (SPIT) or toll fraud call attempts — that are targeted at an organisations SIP (or, more rarely, H.323) infrastructure.

To mitigate such attacks, the Pexip Service platform has an attack prevention layer built in to the Service call control platform. In addition to this Pexip also provides PIN brute force resistance and on all VMRs.

The current blocking policies on PIN attacks are as follows:

  • 5 is the maximum attempts for Web/Desktop app users
  • 3 is the maximum attempts for SIP/H323/Skype4B connections

If more than 20 incorrect PIN entry attempts are made against that VMR in a 10 minute window this will block the VMR. While blocked, it will appear to any callers as though the VMR/alias does not exist any longer and calls to this VMR will fail.


Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request



Please sign in to leave a comment.