MediaWiki API の結果

このページは JSON 形式を HTML で表現したものです。HTML はデバッグに役立ちますが、アプリケーションでの使用には適していません。

format パラメーターを指定すると出力形式を変更できます 。JSON 形式の非 HTML 版を閲覧するには、format=json を設定してください。

詳細情報については 完全な説明文書または API のヘルプを参照してください。

{
    "batchcomplete": "",
    "continue": {
        "gapcontinue": "SandBox",
        "continue": "gapcontinue||"
    },
    "query": {
        "pages": {
            "1515": {
                "pageid": 1515,
                "ns": 0,
                "title": "SIP-Fail2ban",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "IAX\u3067\u306eFail2ban\u306f'''[[IAX-Fail2ban]]'''\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002\n==fail2ban==\n\u30ed\u30b0\u30d5\u30a1\u30a4\u30eb\u3068iptables\u3092\u5229\u7528\u3057\u305f\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u306e\u4e00\u7a2e\u3002Brute Force\u30a2\u30bf\u30c3\u30af\u306e\u5bfe\u7b56\u306b\u4f7f\u3044\u3084\u3059\u3044\u3002<br>\n:http://www.fail2ban.org/\n:http://sourceforge.net/projects/fail2ban/\niptables\u304a\u3088\u3073python\u3092\u5fc5\u8981\u3068\u3057\u307e\u3059\u3002\u6700\u65b0\u306eFail2ban\u3067\u306fAsterisk\u306b\u3082\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u3002\n\n==CentOS==\nCentOS\u3067\u306fepel\u304b\u3089yum\u3067\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3059\u3002\n yum install -y epel-release\n yum --enablerepo=epel -y install fail2ban\nyum\u3067\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u305f\u6700\u65b0\u306eFail2Ban\u306fAsterisk\u306e\u30ed\u30b0\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\u3092\u5909\u66f4\u3057\u3001\u30ed\u30fc\u30ab\u30eb\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3092\u4f5c\u6210\u3059\u308b\u3060\u3051\u3067\u4f7f\u7528\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<BR>\n\u307e\u305aAsterisk\u306elogger.conf\u3092\u4fee\u6b63\u3057\n [general]\n ; Customize the display of debug message time stamps\n ; this example is the ISO 8601 date format (yyyy-mm-dd HH:MM:SS)\n ; see strftime(3) Linux manual for format specifiers\n dateformat=%F %T\ndateformat\u306e\u7b87\u6240\u306e\u30b3\u30e1\u30f3\u30c8(;)\u3092\u5916\u3057\u3066\u6709\u52b9\u306b\u3057\u3001Asterisk\u3092\u518d\u8d77\u52d5\u3057\u307e\u3059\u3002<br>\n/etc/fail2ban/\u306b\u4ee5\u4e0b\u306e\u5185\u5bb9\u306ejail.local\u3068\u3044\u3046\u30d5\u30a1\u30a4\u30eb\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002\u30d5\u30a1\u30a4\u30eb\u304c\u3042\u308b\u5834\u5408\u306b\u306f\u4fee\u6b63\u3057\u307e\u3059\u3002\n [DEFAULT]\n ignoreip =\n backend = polling\n bantime = 3600  ; 1hour\n maxretry= 5\n usedns = no\n \n [asterisk]\n enabled = true\nfail2ban\u3092\u8d77\u52d5\u3059\u308b\u3068\u76e3\u8996\u304c\u59cb\u307e\u308a\u307e\u3059\u3002\n\n\n===\u8d77\u52d5\u306e\u78ba\u8a8d===\niptables -L\u3067iptables\u306e\u72b6\u614b\u3092\u78ba\u8a8d\u3059\u308b\u3068fail2ban\u3067ban\u3055\u308c\u305fIP\u30a2\u30c9\u30ec\u30b9\u7b49\u304c\u78ba\u8a8d\u3067\u304d\u307e\u3059\u3002\n Chain f2b-asterisk-tcp (1 references)\n target     prot opt source               destination\n REJECT     all  --  46.17.42.180         anywhere            reject-with icmp-port-unreachable\n RETURN     all  --  anywhere             anywhere\n \n Chain f2b-asterisk-udp (1 references)\n target     prot opt source               destination\n REJECT     all  --  46.17.42.180         anywhere            reject-with icmp-port-unreachable\n RETURN     all  --  anywhere             anywhere\n\u30c7\u30d5\u30a9\u30eb\u30c8\u3067\u306fban\u6642\u9593\u306f1\u6642\u9593\u3067\u3059\u3002\n\n==INVITE\u306b\u3088\u308bBrute force\u653b\u6483\u3078\u306e\u5bfe\u7b56==\nREGISTER\u30e1\u30c3\u30bb\u30fc\u30b8\u306b\u3088\u308b\u653b\u6483\u4ee5\u5916\u306b\u3001INVITE\u306b\u3088\u308bBrute force\u653b\u6483\u3082\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\n\n\u3053\u306e\u653b\u6483\u6642\u306b\u51fa\u529b\u3055\u308c\u308b\u30ed\u30b0\u30e1\u30c3\u30bb\u30fc\u30b8\u306f\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u3082\u306e\u306b\u306a\u308a\u307e\u3059\u3002\n\n Failed to authenticate user \"Anonymous\" <sip:anonymous@192.168.1.2>;tag=as105e401c \n\n\u3053\u306e\u30ed\u30b0\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u653b\u6483\u5143IP\u30a2\u30c9\u30ec\u30b9\u304c\u3001FROM\u30d8\u30c3\u30c0\u306b\u8a18\u8f09\u3055\u308c\u3066\u3044\u308bIP\u30a2\u30c9\u30ec\u30b9\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002\n\n\u3053\u306e\u307e\u307e\u3067\u306f\u3001NAT\u914d\u4e0b\u306e\u30b5\u30fc\u30d0\u30fc\u304b\u3089\u306e\u653b\u6483\u3084\u3001FROM\u30d8\u30c3\u30c0\u304c\u507d\u88c5\u3055\u308c\u305f\u5834\u5408\u306bfail2ban\u3067\u5bfe\u5fdc\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u305b\u3093\u3002\n\n\u305d\u3053\u3067\u3001Asterisk\u3078\u30d1\u30c3\u30c1\u3092\u5f53\u3066\u3066\u3001\u5b9f\u969b\u306e\u653b\u6483\u5143IP\u30a2\u30c9\u30ec\u30b9\u3092\u8868\u793a\u3059\u308b\u3088\u3046\u306b\u4fee\u6b63\u3057\u307e\u3059\u3002\n\n===Asterisk\u3078\u30d1\u30c3\u30c1\u3092\u5f53\u3066\u308b===\n\n\u6b21\u306e\u3088\u3046\u306a\u30d1\u30c3\u30c1\u3092Asterisk\u306b\u9069\u7528\u3057\u307e\u3059\u3002\n\n\u3053\u306e\u30d1\u30c3\u30c1\u306fAsterisk-1.4.40\u3092\u5bfe\u8c61\u306b\u3057\u3066\u3044\u307e\u3059\u304c\u30011.6\u7cfb\u30011.8\u7cfb\u306b\u3082\u540c\u69d8\u306e\u4fee\u6b63\u3067\u5bfe\u5fdc\u3067\u304d\u307e\u3059\u3002\n\n --- asterisk-1.4.40.orig/channels/chan_sip.c    2011-01-05 02:11:48.000000000 +0900\n +++ asterisk-1.4.40/channels/chan_sip.c 2011-03-10 17:59:26.000000000 +0900\n @@ -15456,7 +15456,7 @@\n                                 ast_log(LOG_NOTICE, \"Sending fake auth rejection for user %s\\n\", get_header(req, \"From\"));\n                                 transmit_fake_auth_response(p, SIP_INVITE, req, XMIT_RELIABLE);\n                         } else {\n -                               ast_log(LOG_NOTICE, \"Failed to authenticate user %s\\n\", get_header(req, \"From\"));\n +                               ast_log(LOG_NOTICE, \"Failed to authenticate user %s (%s:%d)\\n\", get_header(req, \"From\"), ast_inet_ntoa(sin->sin_addr), ntohs(sin->sin_port));\n                                 transmit_response_reliable(p, \"403 Forbidden\", req);\n                         }\n                         p->invitestate = INV_COMPLETED;\n \n\u3053\u3061\u3089\u306f Asterisk-1.8.23.0 \u7528\u3067\u3059\u3002Asterisk-11.5.1 \u3067\u3082\u307b\u307c\u540c\u3058\u30b3\u30fc\u30c9\u304c\u4f7f\u3048\u307e\u3059\u3002\n\n --- asterisk-1.8.23.0/channels/chan_sip.c.orig  2013-08-02 11:41:03.233638321 +0900\n +++ asterisk-1.8.23.0/channels/chan_sip.c       2013-12-06 14:51:08.698990909 +0900\n @@ -22673,7 +22673,7 @@\n                         return 0;\n                 }\n                 if (res < 0) { /* Something failed in authentication */\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response(p, \"403 Forbidden\", req);\n                         sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n                         return 0;\n @@ -23334,7 +23334,7 @@\n                         goto request_invite_cleanup;\n                 }\n                 if (res < 0) { /* Something failed in authentication */\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response_reliable(p, \"403 Forbidden\", req);\n                         p->invitestate = INV_COMPLETED;\n                         sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n @@ -25164,7 +25164,7 @@\n                 p->lastinvite = seqno;\n                 return 0;\n         } else if (auth_result < 0) {\n -               ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", get_header(req, \"From\"));\n +               ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                 transmit_response(p, \"403 Forbidden\", req);\n                 sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n                 ast_string_field_set(p, theirtag, NULL);\n @@ -25384,7 +25384,7 @@\n                 if (res == AUTH_CHALLENGE_SENT) /* authpeer = NULL here */\n                         return 0;\n                 if (res != AUTH_SUCCESSFUL) {\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response(p, \"403 Forbidden\", req);\n \n                         pvt_set_needdestroy(p, \"authentication failed\");\n\nAsterisk 11.23.1\u7528\u30d1\u30c3\u30c1\u3067\u3059\u3002\n\n --- channels/chan_sip.c.orig    2016-09-09 01:28:35.000000000 +0900\n +++ channels/chan_sip.c 2016-10-28 23:26:38.985774935 +0900\n @@ -18751,7 +18751,7 @@ static void receive_message(struct sip_p\n                         return;\n                 }\n                 if (res < 0) { /* Something failed in authentication */\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", sip_get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", sip_get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response(p, \"403 Forbidden\", req);\n                         sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n                         return;\n @@ -24963,7 +24963,7 @@ static int handle_request_options(struct\n                         return 0;\n                 }\n                 if (res < 0) { /* Something failed in authentication */\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", sip_get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", sip_get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response(p, \"403 Forbidden\", req);\n                         sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n                         return 0;\n @@ -25798,7 +25798,7 @@ static int handle_request_invite(struct\n                         goto request_invite_cleanup;\n                 }\n                 if (res < 0) { /* Something failed in authentication */\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", sip_get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", sip_get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response_reliable(p, \"403 Forbidden\", req);\n                         p->invitestate = INV_COMPLETED;\n                         sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n @@ -27788,7 +27788,7 @@ static int handle_request_publish(struct\n                 p->lastinvite = seqno;\n                 return 0;\n         } else if (auth_result < 0) {\n -               ast_log(LOG_NOTICE, \"Failed to authenticate device %s\\n\", sip_get_header(req, \"From\"));\n +               ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s)\\n\", sip_get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                 transmit_response(p, \"403 Forbidden\", req);\n                 sip_scheddestroy(p, DEFAULT_TRANS_TIMEOUT);\n                 ast_string_field_set(p, theirtag, NULL);\n @@ -28003,7 +28003,7 @@ static int handle_request_subscribe(stru\n                 if (res == AUTH_CHALLENGE_SENT) /* authpeer = NULL here */\n                         return 0;\n                 if (res != AUTH_SUCCESSFUL) {\n -                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s for SUBSCRIBE\\n\", sip_get_header(req, \"From\"));\n +                       ast_log(LOG_NOTICE, \"Failed to authenticate device %s (%s) for SUBSCRIBE\\n\", sip_get_header(req, \"From\"), ast_sockaddr_stringify(addr));\n                         transmit_response(p, \"403 Forbidden\", req);\n \n                         pvt_set_needdestroy(p, \"authentication failed\");\n\n\n\n\u30d1\u30c3\u30c1\u3092\u5f53\u3066\u3066\u3001Asterisk\u3092\u30b3\u30f3\u30d1\u30a4\u30eb\u3057\u76f4\u3057\u3001\u518d\u8d77\u52d5\u3057\u307e\u3059\u3002\n\n\u3059\u308b\u3068\u3001\u5148\u307b\u3069\u306e\u653b\u6483\u6642\u306e\u30ed\u30b0\u306f\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u51fa\u529b\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3059\u3002\n\n Failed to authenticate user \"Anonymous\" <sip:anonymous@192.168.1.2>;tag=as105e401c (123.45.67.89:5060)\n\n\u30ed\u30b0\u306e(\u3000)\u5185\u306b\u653b\u6483\u5143\u306e\u5b9fIP\u30a2\u30c9\u30ec\u30b9\u304c\u8868\u793a\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u308a\u3001\u3053\u308c\u3092\u5143\u306bfail2ban\u3067\u653b\u6483\u3092\u691c\u77e5\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\n\n===fail2ban\u3078\u8a2d\u5b9a\u3092\u8ffd\u52a0===\n\n\u4fee\u6b63\u3057\u305f\u30ed\u30b0\u306b\u5408\u308f\u305b\u305f\u30d5\u30a3\u30eb\u30bf\u8a2d\u5b9a\u3092fail2ban\u306b\u8ffd\u52a0\u3057\u307e\u3059\u3002\n\n/etc/fail2ban/filter.d/asterisk.conf \u306e failregex \u306e\u9805\u76ee\u306b\u4ee5\u4e0b\u3092\u8ffd\u52a0\u3057\u307e\u3059\u3002\n\n NOTICE.* .*: Failed to authenticate user .* \\(<HOST>:.*\\)\n\n\u30d5\u30a3\u30eb\u30bf\u8ffd\u52a0\u5f8c\u3001fail2ban\u3092\u518d\u8d77\u52d5\u3057\u8a2d\u5b9a\u5b8c\u4e86\u3067\u3059\u3002\n\n==security\u30ed\u30b0\u306e\u8a2d\u5b9a==\n/etc/asterisk/logger.conf\u306b\n [logfiles]\n security => security\n\u3092\u8ffd\u52a0\uff08\u30b3\u30e1\u30f3\u30c8\u89e3\u9664\uff09\u3057\u3066\u3001/var/log/asterisk/security\u306b\u3067\u304d\u308b\u30ed\u30b0\u3092fail2ban\u306b\u76e3\u8996\u3055\u305b\u308b\u65b9\u6cd5\u3082\u3042\u308a\u307e\u3059\u3002\n\n==\u30b9\u30c6\u30fc\u30bf\u30b9\u78ba\u8a8d==\nfail2ban-client \u30b3\u30de\u30f3\u30c9\u3067\u554f\u3044\u5408\u308f\u305b\u308b\u306e\u304c\u3044\u3044\u3067\u3059\u3002\n # \u30b3\u30de\u30f3\u30c9\u4e00\u89a7\n fail2ban-client\n \n # \u6709\u52b9\u306ajail\u4e00\u89a7\n fail2ban-client status\n \n # jail\u540d\"asterisk\"\u306e\u30b9\u30c6\u30fc\u30bf\u30b9 \n fail2ban-client status asterisk\n \n # \u624b\u52d5\u3067ban/unban\n fail2ban-client set asterisk banip 11.22.33.44\n fail2ban-client set asterisk unbanip 11.22.33.44\nban\u3055\u308c\u3066\u308b\u3053\u3068\u306b\u306a\u3063\u3066\u3044\u3066\u3082\u3001action\u304c\u6b63\u3057\u304f\u66f8\u3051\u3066\u3044\u306a\u3044\u3068\u5b9f\u969b\u306b\u306ffirewalld\u3084iptables\u306a\u3069\u306b\u53cd\u6620\u3055\u308c\u305a\u3001\u653b\u6483\u3055\u308c\u3063\u3071\u306a\u3057\u3082\u3042\u308a\u5f97\u308b\u306e\u3067\u3001\u6319\u52d5\u78ba\u8a8d\u304c\u5927\u4e8b\u3067\u3059\u3002<br>\nfail2ban-server \u30b3\u30de\u30f3\u30c9\u306f\u76f4\u63a5\u53e9\u3044\u3066\u306f\u3044\u3051\u306a\u3044\u3088\u3046\u3067\u3059\u3002<br>\n\u307e\u305f\u306f\u3001\u30ed\u30b0\u30d5\u30a1\u30a4\u30eb /var/log/fail2ban.log \u3092\u898b\u3066\u3082\u3044\u3044\u3067\u3059\u3002\n\n== CentOS 8 ==\n\nAsterisk16, CentOS 8\u3067\u3082\u540c\u69d8\u306bepel\u304b\u3089dnf\u3067\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3059\u3002<BR>\nCentOS 8\u3067\u306f\u3001iptables\u3067\u306f\u306a\u304f\u3001nftables\u53ca\u3073firewalld\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u307e\u3059\u304c\u3001\u554f\u984c\u306a\u304f\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u3002\n dnf install -y epel-release\n dnf --enablerepo=epel -y install fail2ban fail2ban-systemd\n\nAsterisk\u306elogger.conf\u306e\u5909\u66f4\u3001/etc/fail2ban/jail.local\u306e\u4f5c\u6210\u306f\u4e0a\u8a18\u3001[[#CentOS|\u4ee5\u524d\u306eCentOS]]\u3068\u540c\u69d8\u306b\u3057\u3066\u304f\u3060\u3055\u3044\u3002<BR>\n\u3057\u304b\u3057\u30012020\u5e748\u67087\u65e5\u6642\u70b9\u3067\u306f\u3001\u3053\u3053\u3067fail2ban\u3092\u8d77\u52d5\u3057\u3066\u3082\n 2020-08-07 16:39:54,981 fail2ban.transmitter    [58697]: WARNING Command ['server-stream', [['set', 'syslogsocket', 'auto']\n (\u7565)\n Received ValueError('Action firewallcmd-rich-rules already exists',)\n 2020-08-07 16:39:54,981 fail2ban                [58697]: ERROR   NOK: ('Action firewallcmd-rich-rules already exists',)\n\n\u3068\u3044\u3046\u30a8\u30e9\u30fc\u304c\u51fa\u3066\u52d5\u304d\u307e\u305b\u3093\u3002\u3055\u3057\u3042\u305f\u308a\u306e\u56de\u907f\u7b56\u3068\u3057\u3066/etc/fail2ban/jail.d/00-firewalld.conf\u3092\u6b21\u306e\u3088\u3046\u306b\u5909\u66f4\u3057\u307e\u3059\u3002\n (\u7565)\n [DEFAULT]\n banaction = firewallcmd-ipset\n banaction_allports = firewallcmd-ipset\n #banaction = firewallcmd-rich-rules[actiontype=<multiport>]\n #banaction_allports = firewallcmd-rich-rules[actiontype=<allports>]\n\n\u3053\u308c\u3067fail2ban\u3092\u8d77\u52d5\u3059\u308b\u3068\u76e3\u8996\u304c\u59cb\u307e\u308a\u307e\u3059\u3002\n systemctl enable fail2ban\n systemctl start fail2ban\n\n\u7a3c\u50cd\u72b6\u614b\u306e\u78ba\u8a8d\u3068\u3057\u3066\u306f\u3001\u4e0a\u8a18fail2ban-client\u30b3\u30de\u30f3\u30c9\u307e\u305f\u306f\u3001\u6b21\u306e\u30b3\u30de\u30f3\u30c9\u304c\u4f7f\u7528\u3067\u304d\u307e\u3059\u3002\n ipset --list\n\nAsterisk 16\u53ca\u3073[[Asterisk pjsip|pjsip]]\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u3068\u3001Asterisk\u306b\u30d1\u30c3\u30c1\u3092\u5f53\u3066\u308b\u7b49\u3057\u306a\u304f\u3066\u3082[[#INVITE\u306b\u3088\u308bBrute force\u653b\u6483\u3078\u306e\u5bfe\u7b56|INVITE\u306b\u3088\u308bBrute force\u653b\u6483]]\u3082\u9632\u5fa1\u3067\u304d\u308b\u3088\u3046\u3067\u3059\u3002"
                    }
                ]
            },
            "835": {
                "pageid": 835,
                "ns": 0,
                "title": "STP1960",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "==steepletone STP1960==\n\u30c0\u30a4\u30e4\u30eb\u5f0f\u30a2\u30ca\u30ed\u30b0\u96fb\u8a71\u6a5f\u3002\u30a2\u30ca\u30ed\u30b02\u7dda\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3002<br>\n<br>\n\u666e\u901a\u306b\u9ed2\u96fb\u8a71\u3067\u3059\u3088\u30fc<br>\n[[\u753b\u50cf:r_phone01.JPG|320 px]]<br>\n<br>\n\u3068\u898b\u305b\u304b\u3051\u3066\u304a\u3044\u3066\u30fb\u30fb\u30fb<br>\n[[\u753b\u50cf:r_phone02.JPG|320 px]]<br>\n==\u79d8\u5bc6==\n\u3061\u3087\u3063\u3068\u8003\u3048\u308c\u3070\u308f\u304b\u308b\u4ed5\u7d44\u3002<br>\n\u5b9f\u306f\u3053\u306e\u96fb\u8a71\u6a5f\u306f\u5358\u306b\u666e\u901a\u306e\u30a2\u30ca\u30ed\u30b0\u96fb\u8a71\u6a5f\u3002\u666e\u901a\u306a\u3089\u30d7\u30c3\u30b7\u30e5\u30dc\u30bf\u30f3\u306e\u3042\u308b\u3068\u3053\u308d\u3092\u3001\u3042\u3048\u3066\u30ed\u30fc\u30bf\u30ea\u30fc\u30c0\u30a4\u30e4\u30eb\u306b\u3057\u3066\u3042\u308b\u3060\u3051\u3067\u3001\u4e2d\u8eab\u7684\u306b\u306f\u4eca\u306e\u30a2\u30ca\u30ed\u30b0\u96fb\u8a71\u6a5f\u3068\u540c\u3058\u3067\u3059\u3002\u306a\u306e\u3067\u3001\u30c0\u30a4\u30e4\u30eb\u3092\u56de\u3059\u3068PB\u4fe1\u53f7\u304c\u51fa\u308b\u306e\u3067\u3001\u4eca\u306eATA\u3084\u30a2\u30ca\u30ed\u30b0\u30fb\u30a4\u30f3\u30bf\u30d5\u30a7\u30fc\u30b9\u3067DP\u304c\u4f7f\u3048\u306a\u3044\u3082\u306e\u306b\u63a5\u7d9a\u3057\u3066\u3082\u4f7f\u3048\u308b\u512a\u308c\u3082\u306e(?)\u3002<br>\nPB\u4fe1\u53f7\u3092\u51fa\u3059\u305f\u3081\u30c0\u30a4\u30e4\u30eb\u306b'*','#'\u304c\u3042\u308b\u308f\u3051\u3067\u3059\u3002<br>\n\u30d9\u30eb\u306f\u30e1\u30ab\u30cb\u30ab\u30eb\u30fb\u30d9\u30eb\u3067\u30ea\u30f3\u30ea\u30f3\u9cf4\u308a\u307e\u3059\u3002<br>\n\u54c1\u8cea\u7684\u306b\u306f\u305d\u308c\u307b\u3069\u5927\u3057\u305f\u3082\u3093\u3058\u3083\u3042\u308a\u307e\u305b\u3093\u3002<br>\n\n==\u6a5f\u80fd==\n*\u96fb\u6e90\u4e0d\u8981\n:\u96fb\u8a71\u7dda\u306e\u7d66\u96fb\u306e\u307f\u3067\u52d5\u4f5c\u3059\u308b\n*\u30de\u30cb\u30e5\u30a2\u30eb\u306b\u306fDP/PB\u5207\u308a\u66ff\u3048\u304c\u3042\u308b\u304c\u5b9f\u6a5f\u306b\u306f\u7121\u3044(\u82f1\u56fd\u4ed5\u69d8\u306e\u305f\u3081?)<br>\n*\u30ea\u30c0\u30a4\u30e4\u30eb(\u6307\u6b62\u3081\u3092\u62bc\u3059\u3068\u30ea\u30c0\u30a4\u30e4\u30eb\u3059\u308b)\n*\u30b9\u30d4\u30fc\u30ab\u30d5\u30a9\u30f3(\u30c0\u30a4\u30e4\u30eb\u4e2d\u592e\u90e8\u5206\u3092\u62bc\u3059)\n:\u8a66\u3057\u3066\u307f\u305f\u3089\u4f55\u3068\u306a\u304f\u4f7f\u3048\u308b\u611f\u3058\u3002\u30de\u30a4\u30af\u304c\u3069\u3053\u306a\u306e\u304b\u3088\u304f\u308f\u304b\u3089\u306a\u3044\u3002\n*\u6ce8\u610f\n:\u30ca\u30f3\u30d0\u30fc\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u975e\u5bfe\u5fdc\u306a\u306e\u3067\u3001ATA\u306e\u63a5\u7d9a\u6642\u306b\u306fCID\u4fe1\u53f7\u3092OFF\u306b\u3059\u308b\u3053\u3068\u3002\u7279\u306b\u65e5\u672c\u306eTA\u985e\u3067\u306f\u7740\u4fe1\u3067\u304d\u306a\u3044\u3053\u3068\u304c\u591a\u3044\u3002\n\n==\u5165\u624b\u65b9\u6cd5==\neBay.co.uk\u3067\u58f2\u3063\u3066\u307e\u3059\u3002\"rotary phone boxed\"\u3067\u691c\u7d22\u3059\u308b\u3068\u51fa\u3066\u304f\u308b\u306f\u305a\u3002\u4ed6\u306b\u8d64\u8272\u3082\u3042\u308a\u3002<br>\n==Steepletone==\nhttp://www.qe01.dial.pipex.com/<br>\n*\u96fb\u8a71\u6a5f\n:http://www.qe01.dial.pipex.com/steepletone_products_uk_013.htm<br>"
                    }
                ]
            }
        }
    }
}