<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Avoiding the $100,000 Phone Bill: A Primer on Asterisk Security	</title>
	<atom:link href="https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/</link>
	<description>Ward Mundy&#039;s Technobabblelog</description>
	<lastBuildDate>Wed, 09 Dec 2015 12:50:48 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Alex Inoa		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-13652</link>

		<dc:creator><![CDATA[Alex Inoa]]></dc:creator>
		<pubDate>Fri, 18 Feb 2011 18:53:27 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-13652</guid>

					<description><![CDATA[This is an awesome article]]></description>
			<content:encoded><![CDATA[<p>This is an awesome article</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: ward		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-13577</link>

		<dc:creator><![CDATA[ward]]></dc:creator>
		<pubDate>Wed, 09 Feb 2011 16:00:35 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-13577</guid>

					<description><![CDATA[And here&#039;s &lt;a href=&quot;http://nerd.bz/fp3fiy&quot; rel=&quot;nofollow&quot;&gt;another good reminder&lt;/a&gt; for those that leave their WiFi routers unprotected. This could be you!]]></description>
			<content:encoded><![CDATA[<p>And here&#8217;s <a href="http://nerd.bz/fp3fiy" rel="nofollow">another good reminder</a> for those that leave their WiFi routers unprotected. This could be you!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: ward		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-12997</link>

		<dc:creator><![CDATA[ward]]></dc:creator>
		<pubDate>Sun, 21 Nov 2010 12:10:29 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-12997</guid>

					<description><![CDATA[For an interesting look at our current efforts to incorporate a VoIP Blacklist into PBX in a Flash, see &lt;a href=&quot;http://pbxinaflash.com/forum/showthread.php?t=8735&quot; rel=&quot;nofollow&quot;&gt;this thread&lt;/a&gt; on the forums.]]></description>
			<content:encoded><![CDATA[<p>For an interesting look at our current efforts to incorporate a VoIP Blacklist into PBX in a Flash, see <a href="http://pbxinaflash.com/forum/showthread.php?t=8735" rel="nofollow">this thread</a> on the forums.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: bumi akin		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-12709</link>

		<dc:creator><![CDATA[bumi akin]]></dc:creator>
		<pubDate>Thu, 04 Nov 2010 13:08:31 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-12709</guid>

					<description><![CDATA[and just a few days ago, this actually happened to someone else. see the story at &lt;a href=&quot;http://nerd.bz/9yLpbV&quot; rel=&quot;nofollow&quot;&gt;ComputerWorld&lt;/a&gt;:  &quot;Security Manager&#039;s Journal: Slammed with a $100,000 phone bill&quot;]]></description>
			<content:encoded><![CDATA[<p>and just a few days ago, this actually happened to someone else. see the story at <a href="http://nerd.bz/9yLpbV" rel="nofollow">ComputerWorld</a>:  "Security Manager&#8217;s Journal: Slammed with a $100,000 phone bill"</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: carl		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-11191</link>

		<dc:creator><![CDATA[carl]]></dc:creator>
		<pubDate>Thu, 20 May 2010 23:57:02 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-11191</guid>

					<description><![CDATA[Guys For a novice the default security errors on the status page show no method of fixing:
#Default SQL Password Used
#Warning Default Asterisk Manager Password Used

How are these changed?

&lt;i&gt;[WM: If you are running &lt;em&gt;PBX in a Flash&lt;/em&gt;, both of these applications are protected by the root and FreePBX passwords. You can hide the warning messages by following the instructions at &lt;a href=&quot;http://pbxinaflash.com/forum/showthread.php?t=665&quot; rel=&quot;nofollow&quot;&gt;this link&lt;/a&gt;.]&lt;/i&gt;]]></description>
			<content:encoded><![CDATA[<p>Guys For a novice the default security errors on the status page show no method of fixing:<br />
#Default SQL Password Used<br />
#Warning Default Asterisk Manager Password Used</p>
<p>How are these changed?</p>
<p><i>[WM: If you are running <em>PBX in a Flash</em>, both of these applications are protected by the root and FreePBX passwords. You can hide the warning messages by following the instructions at <a href="http://pbxinaflash.com/forum/showthread.php?t=665" rel="nofollow">this link</a>.]</i></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: dimmyr		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-10590</link>

		<dc:creator><![CDATA[dimmyr]]></dc:creator>
		<pubDate>Mon, 15 Feb 2010 09:25:58 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-10590</guid>

					<description><![CDATA[Speaking out of almost complete ignorance about VOIP VPNs - if I connect to my DD-WRT router or a Windows machine with PPTP using my iPhone, and made a SIP call using iSip or any other iPhone compatible software, would the call be encrypted?

&lt;i&gt;[WM: If the call is passing through the VPN tunnel it will be encrypted.]&lt;/i&gt;]]></description>
			<content:encoded><![CDATA[<p>Speaking out of almost complete ignorance about VOIP VPNs &#8211; if I connect to my DD-WRT router or a Windows machine with PPTP using my iPhone, and made a SIP call using iSip or any other iPhone compatible software, would the call be encrypted?</p>
<p><i>[WM: If the call is passing through the VPN tunnel it will be encrypted.]</i></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Steve Davies		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-10568</link>

		<dc:creator><![CDATA[Steve Davies]]></dc:creator>
		<pubDate>Tue, 09 Feb 2010 12:26:12 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-10568</guid>

					<description><![CDATA[I just helped somebody whose box was hacked - and it prompts me just to post.

The article is very much focussed on IP security.  But this site was exploited via Asterisk voicemail.  They had the &quot;dialout&quot; option enabled in voicemail.conf and the hackers gained access through an insecure mailbox PIN and used the dialout feature to make international calls.

So be very careful about the &quot;dialout&quot; and &quot;callback&quot; options in voicemail.conf.

Regards,
Steve]]></description>
			<content:encoded><![CDATA[<p>I just helped somebody whose box was hacked &#8211; and it prompts me just to post.</p>
<p>The article is very much focussed on IP security.  But this site was exploited via Asterisk voicemail.  They had the "dialout" option enabled in voicemail.conf and the hackers gained access through an insecure mailbox PIN and used the dialout feature to make international calls.</p>
<p>So be very careful about the "dialout" and "callback" options in voicemail.conf.</p>
<p>Regards,<br />
Steve</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Adam		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-9269</link>

		<dc:creator><![CDATA[Adam]]></dc:creator>
		<pubDate>Fri, 01 May 2009 01:03:50 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-9269</guid>

					<description><![CDATA[Another option is to use prepaid SIP where account shuts down after the funding is exhausted.  I feed mine $20 at a time and that is all I have at risk.]]></description>
			<content:encoded><![CDATA[<p>Another option is to use prepaid SIP where account shuts down after the funding is exhausted.  I feed mine $20 at a time and that is all I have at risk.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Michael Orr		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-9229</link>

		<dc:creator><![CDATA[Michael Orr]]></dc:creator>
		<pubDate>Mon, 20 Apr 2009 00:30:14 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-9229</guid>

					<description><![CDATA[Excellent article. I have a trixbox system currently powered down. I may have been hacked since the box was making connections out to someone, haven&#039;t had a chance to do an analysis. SBC suspended my DSL supposedly because something from my home network was phishing. Your article and my recent experience just confirms I didn&#039;t harden the system properly. Going to replace the trixbox with PBX in a Flash..]]></description>
			<content:encoded><![CDATA[<p>Excellent article. I have a trixbox system currently powered down. I may have been hacked since the box was making connections out to someone, haven&#8217;t had a chance to do an analysis. SBC suspended my DSL supposedly because something from my home network was phishing. Your article and my recent experience just confirms I didn&#8217;t harden the system properly. Going to replace the trixbox with PBX in a Flash..</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Michael S Collins		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-7053</link>

		<dc:creator><![CDATA[Michael S Collins]]></dc:creator>
		<pubDate>Sat, 31 Jan 2009 19:44:12 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-7053</guid>

					<description><![CDATA[Ward,

Excellent information! This is exactly what users, admins, and especially bean-counters need to know about. A small investment in security can yield big dividends, the best of which is probably being able to sleep at night. :)

For those concerned about telecom system security you might also want to check out the way FreeSWITCH does things. It is &quot;secure by default&quot; as the devs are properly paranoid.

-MC

&lt;i&gt;[WM: We like paranoid. We all sleep better. :-) ]&lt;/i&gt;]]></description>
			<content:encoded><![CDATA[<p>Ward,</p>
<p>Excellent information! This is exactly what users, admins, and especially bean-counters need to know about. A small investment in security can yield big dividends, the best of which is probably being able to sleep at night. 🙂</p>
<p>For those concerned about telecom system security you might also want to check out the way FreeSWITCH does things. It is "secure by default" as the devs are properly paranoid.</p>
<p>-MC</p>
<p><i>[WM: We like paranoid. We all sleep better. 🙂 ]</i></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6788</link>

		<dc:creator><![CDATA[Ed]]></dc:creator>
		<pubDate>Wed, 28 Jan 2009 18:40:01 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6788</guid>

					<description><![CDATA[Hi Ward,

Your points about hardening systems are all spot-on.  Sad to say I got hacked a few months ago in spite of having hardened my system (FreePBX 1.4).

I check my logs daily, so I discovered a spike in call volume pretty quickly.  I took the PBX offline to make backups of all the log files and configuration, then started my analysis to find and close the breach.  

It turns out the hacker found my open SIP ports and kept trying to authenticate with various extension/password combinations until he/she found one that worked.  They were then able to log into an extenstion on my PBX remotely and place outbound calls.  My passwords were short enough that they could be brute-forced and have since been changed.

I&#039;ll be upgrading to FreePBX 1.5, but want to know if under FreePBX 1.4 there&#039;s any way to prevent extensions from logging in remotely.

If I can add to your list, I&#039;d offer the following suggestions:

* Use the PIN feature to restrict access for international calls, or block them altogether.  I also use an ENUM trunk to see if the call can be made for free.
* Make sure your passwords are long and complex.  They&#039;re stored in your device configuration so you don&#039;t need to enter them each time -- you can afford to make one you won&#039;t remember!

And, of course, check your logs regularly!]]></description>
			<content:encoded><![CDATA[<p>Hi Ward,</p>
<p>Your points about hardening systems are all spot-on.  Sad to say I got hacked a few months ago in spite of having hardened my system (FreePBX 1.4).</p>
<p>I check my logs daily, so I discovered a spike in call volume pretty quickly.  I took the PBX offline to make backups of all the log files and configuration, then started my analysis to find and close the breach.  </p>
<p>It turns out the hacker found my open SIP ports and kept trying to authenticate with various extension/password combinations until he/she found one that worked.  They were then able to log into an extenstion on my PBX remotely and place outbound calls.  My passwords were short enough that they could be brute-forced and have since been changed.</p>
<p>I&#8217;ll be upgrading to FreePBX 1.5, but want to know if under FreePBX 1.4 there&#8217;s any way to prevent extensions from logging in remotely.</p>
<p>If I can add to your list, I&#8217;d offer the following suggestions:</p>
<p>* Use the PIN feature to restrict access for international calls, or block them altogether.  I also use an ENUM trunk to see if the call can be made for free.<br />
* Make sure your passwords are long and complex.  They&#8217;re stored in your device configuration so you don&#8217;t need to enter them each time &#8212; you can afford to make one you won&#8217;t remember!</p>
<p>And, of course, check your logs regularly!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Dan		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6775</link>

		<dc:creator><![CDATA[Dan]]></dc:creator>
		<pubDate>Wed, 28 Jan 2009 02:00:41 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6775</guid>

					<description><![CDATA[I installed PiaF 1.1 and have updated periodically since. I don&#039;t seem to have fail2ban installed at all. I tried to run the fail2ban-update script, but it says I need to have fail2ban installed first. What&#039;s the recommended way to install fail2ban?

&lt;i&gt;[WM: Get your existing system up to date with the latest version of FreePBX and do a FreePBX backup. Copy that backup to another machine. Then install the latest version of PBX in a Flash and get that machine up to the latest version of FreePBX. Create a FreePBX backup. Now copy the off-site backup you previously made to the new backup directory and restore it using FreePBX. Finally, run the fail2ban-update script again, and you&#039;ll be all set.]&lt;/i&gt; ]]></description>
			<content:encoded><![CDATA[<p>I installed PiaF 1.1 and have updated periodically since. I don&#8217;t seem to have fail2ban installed at all. I tried to run the fail2ban-update script, but it says I need to have fail2ban installed first. What&#8217;s the recommended way to install fail2ban?</p>
<p><i>[WM: Get your existing system up to date with the latest version of FreePBX and do a FreePBX backup. Copy that backup to another machine. Then install the latest version of PBX in a Flash and get that machine up to the latest version of FreePBX. Create a FreePBX backup. Now copy the off-site backup you previously made to the new backup directory and restore it using FreePBX. Finally, run the fail2ban-update script again, and you&#8217;ll be all set.]</i> </p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Andrew		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6755</link>

		<dc:creator><![CDATA[Andrew]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 16:31:12 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6755</guid>

					<description><![CDATA[One additional thing I do b/c I have phones that connect to my server using dynamic IPs is that I add the PIN feature to any long distance or international calls. Each person is assigned their own PIN. It&#039;s a small thing, but it&#039;s one extra step to prevent automated calling in case someone did manage to guess our extensions and passwords.]]></description>
			<content:encoded><![CDATA[<p>One additional thing I do b/c I have phones that connect to my server using dynamic IPs is that I add the PIN feature to any long distance or international calls. Each person is assigned their own PIN. It&#8217;s a small thing, but it&#8217;s one extra step to prevent automated calling in case someone did manage to guess our extensions and passwords.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: John Senay		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6750</link>

		<dc:creator><![CDATA[John Senay]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 15:26:49 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6750</guid>

					<description><![CDATA[Ward,

I think you need a good tutorial on how to use ssh to build a tunnel between the outside system to the internal asterisk system behind the firewall.

http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/


If someone has to have external gui access, use ssh to set it up.

JJS]]></description>
			<content:encoded><![CDATA[<p>Ward,</p>
<p>I think you need a good tutorial on how to use ssh to build a tunnel between the outside system to the internal asterisk system behind the firewall.</p>
<p><a href="http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/" rel="nofollow ugc">http://thinkhole.org/wp/2006/05/10/howto-secure-firefox-and-im-with-putty/</a></p>
<p>If someone has to have external gui access, use ssh to set it up.</p>
<p>JJS</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Robert Keller		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6746</link>

		<dc:creator><![CDATA[Robert Keller]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 14:48:34 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6746</guid>

					<description><![CDATA[Ward, excellent article. When XP came out, it was fun for a while to connect a fresh XP box directly to the internet and use a stopwatch to time how long before it became compromised. Usually under a minute.

The same can be said of almost anything you place on the net these days.

I applaud the efforts the PiaF team has made to make the PiaF distro easy to lockdown, use fail2ban and Hamachi VPN. 

I have good stories, but this is to say thanks and I am happy to purchase a PiaF Flash if they are available.

cosmicwombat]]></description>
			<content:encoded><![CDATA[<p>Ward, excellent article. When XP came out, it was fun for a while to connect a fresh XP box directly to the internet and use a stopwatch to time how long before it became compromised. Usually under a minute.</p>
<p>The same can be said of almost anything you place on the net these days.</p>
<p>I applaud the efforts the PiaF team has made to make the PiaF distro easy to lockdown, use fail2ban and Hamachi VPN. </p>
<p>I have good stories, but this is to say thanks and I am happy to purchase a PiaF Flash if they are available.</p>
<p>cosmicwombat</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Reginald W		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6742</link>

		<dc:creator><![CDATA[Reginald W]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 13:44:24 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6742</guid>

					<description><![CDATA[One other thing that I&#039;ve been thinking of is what if you had TWO hardware routers on your network. The first, connected to your main internet pipe would have wifi access to allow any computer to get wireless if needed. The second would be wired ONLY and which would have the PIAF system sitting behind it, thus requiring anyone trying to get in to have to go through two layers of security to get access. Don&#039;t know how well this would work. I thought of doing this for an internal network or even two internal networks to cut down on the amount of traffic on each leg of the network. I don&#039;t know enough about how the router/switches would handle the traffic out to each leg, how different router/switches would interact with each other and whether traffic would bottleneck and make it unworkable. I haven&#039;t had time to set up a wired-only router to test it to see if this is something that would work well. 

It should/would cut down on the amount of logs to sort through, as anything that came in through the net that tried to get into the wired only network should be more easily seen and acted upon. The main network would be like a fence around the house whie the second network would be the house itself and thus (theoretically) more secure if the proper security measures are implemented on each network.

For the paranoid, a third network would be like the safe inside the house. Remember to poke holes in the tin foil hat that surrounds the router or it will get too hot and stop working.]]></description>
			<content:encoded><![CDATA[<p>One other thing that I&#8217;ve been thinking of is what if you had TWO hardware routers on your network. The first, connected to your main internet pipe would have wifi access to allow any computer to get wireless if needed. The second would be wired ONLY and which would have the PIAF system sitting behind it, thus requiring anyone trying to get in to have to go through two layers of security to get access. Don&#8217;t know how well this would work. I thought of doing this for an internal network or even two internal networks to cut down on the amount of traffic on each leg of the network. I don&#8217;t know enough about how the router/switches would handle the traffic out to each leg, how different router/switches would interact with each other and whether traffic would bottleneck and make it unworkable. I haven&#8217;t had time to set up a wired-only router to test it to see if this is something that would work well. </p>
<p>It should/would cut down on the amount of logs to sort through, as anything that came in through the net that tried to get into the wired only network should be more easily seen and acted upon. The main network would be like a fence around the house whie the second network would be the house itself and thus (theoretically) more secure if the proper security measures are implemented on each network.</p>
<p>For the paranoid, a third network would be like the safe inside the house. Remember to poke holes in the tin foil hat that surrounds the router or it will get too hot and stop working.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Reginald W		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6740</link>

		<dc:creator><![CDATA[Reginald W]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 13:33:42 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6740</guid>

					<description><![CDATA[Thanks for the heads up and training on securing a PIAF system. It is always useful to know these things.

I remember reading about turning OFF Plug N Play in routers as there is ZERO security on it from the users network, so that if a computer was compromised INSIDE the network, it could access the router and open up holes in the router. I have it turned OFF and have told others about turning it OFF as well. Unfortunately it is ON by default on my router. It would be nice if this was OFF by default on all routers, or if the router could be updated with it being OFF instead of being on by default. Hope that helps fill another hole in the wall.]]></description>
			<content:encoded><![CDATA[<p>Thanks for the heads up and training on securing a PIAF system. It is always useful to know these things.</p>
<p>I remember reading about turning OFF Plug N Play in routers as there is ZERO security on it from the users network, so that if a computer was compromised INSIDE the network, it could access the router and open up holes in the router. I have it turned OFF and have told others about turning it OFF as well. Unfortunately it is ON by default on my router. It would be nice if this was OFF by default on all routers, or if the router could be updated with it being OFF instead of being on by default. Hope that helps fill another hole in the wall.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rafael Cortes		</title>
		<link>https://nerdvittles.com/avoiding-the-100000-phone-bill-a-primer-on-asterisk-security/comment-page-1/#comment-6737</link>

		<dc:creator><![CDATA[Rafael Cortes]]></dc:creator>
		<pubDate>Tue, 27 Jan 2009 13:03:21 +0000</pubDate>
		<guid isPermaLink="false">http://nerdvittles.com/?p=580#comment-6737</guid>

					<description><![CDATA[One more tip... Update your asterisk regularly... 
I had a former client who would not update because he did not want to pay us the $50 we charged to do the security update that was posted after the many asterisk hacked on November, he got a bill for $500 over the usual bill, he called us and bought the maintenance contract. 

If you install for other keep a record of your clients and every time there is a security update call your clients, explain the issue and try to make them a deal to update! It give us all a bad name if asterisk gets hacked. Please be responsible.

BTW Great post Ward, security is often overlooked, and is one of the most important parts of any network, let alone a PBX.]]></description>
			<content:encoded><![CDATA[<p>One more tip&#8230; Update your asterisk regularly&#8230;<br />
I had a former client who would not update because he did not want to pay us the $50 we charged to do the security update that was posted after the many asterisk hacked on November, he got a bill for $500 over the usual bill, he called us and bought the maintenance contract. </p>
<p>If you install for other keep a record of your clients and every time there is a security update call your clients, explain the issue and try to make them a deal to update! It give us all a bad name if asterisk gets hacked. Please be responsible.</p>
<p>BTW Great post Ward, security is often overlooked, and is one of the most important parts of any network, let alone a PBX.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
