similar to: VOIP wiretapping article

Displaying 20 results from an estimated 100 matches similar to: "VOIP wiretapping article"

2004 Jul 14
2
RE: [Asterisk-User] asterisk compile problem
From: "Nik Martin" <nmartin@radiancetech.com>> To: <asterisk-users@lists.digium.com>> Subject: RE: [Asterisk-Users] asterisk compile problem Date: Wed, 14 Jul 2004 09:22:38 -0500 Organization: Radiance Technologies, Inc. Reply-To: asterisk-users@lists.digium.com Fletcher Bonds wrote: >> Hello all >> >> As of 5pm PST today (7/13), I pulled
2004 May 18
1
VoiceMailMain dumps user back into my incoming context after leaving a message
I have a dial plan that includes a company phone directory as a main menu option. If they just sit at the main menu, after 20 seconds, they are transferred to the operator. If the user picks an extension from the directory, they are transferred to the proper extension. If the called number is not available, they are transferred into VoiceMailMain. They leave a message, and hang up. The hang
2008 Feb 05
1
is encrypted iax safe and secure?
Hello, I'm doing some research concerning iax encryption, I haven't find any clients (softphones or hardphones) which implement so I have not tested it yet. There was also this message on asterisk-security mailing list http://archives.free.net.ph/message/20070507.101933.222987b2.en.html which got no answers and this makes me think that this iax encryption is not much interesting for the
2005 Aug 08
1
FCC to require wiretaps from VoIP providers
Scary. http://www.eff.org/news/archives/2005_08.php#003876 -- PGP/GPG: 5C9F F366 C9CF 2145 E770 B1B8 EFB1 462D A146 C380
2007 Aug 30
1
FYI
http://www.wired.com/print/politics/security/news/2007/08/wiretap
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the communication and repeat the action. What if an intruder notice that there's a secure session starting (by guessing at the dst IP address and unintelligible payload) and then start capturing all the packets on this session for the purpose of repeating the whole session again? The secure user could add/delete interfaces and
2004 Jun 10
1
Manager logic to pickup a ringing extension
Can the Manager Redirect command transfer a ringing SIP extension? I'm trying to implement a Camp On feature, and having failed to do it in Dial Plan logic, am trying to do it with manager logic. If an arbitrary Sip extension is ringing, I need the ability to pick up that extension from any other phone. What little docs there are on Manager commands shows Redirect takes these parameters:
2017 Mar 07
1
LDAP logins failing after installing Samba 4.4.5
>> Hi all, >> >>   >> I had an LDAP application (mailserver) running on Samba 4.1.3 which >> wrked flawlessly. Also using an LDAP browser with a simple bind >> worked OK. >> >> I than replaced the Samba installation with version 4.5 and the LDAP >> functionality broke. I first thought it had to do with a non-SSL or >> non -TLS and
2010 Dec 15
5
Allegations regarding OpenBSD IPSEC
Some of you probably already read this: http://marc.info/?l=openbsd-tech&m=129236621626462&w=2 Interesting...I wonder what is the impact of all this on FreeBSD code. We may very well suppose that any government or corporation funded code can theoretically have some kind of backdoor inside. --Andy
2004 Apr 05
4
Spring VON Wrap Up
Having just returned from four days at the VON show in Santa Clara, I thought I would submit a "highlights" message. I hope others who attended the show will take the opportunity to add, as there was far more to see than I can cover on my own. [VoIP IS BIG] First, I have to say that VoIP is BIG. It is the buzz technology of the day. The show was packed, and everybody there was there
2006 Dec 11
3
VPN As SIP Tunneling?
Hi All Could a VPN be used to help with SIP Tunneling and QoS issues. State 1: Two IP Networks Connected via the Public Internet transmitting VoIP Traffic Say a VoIP User and VoIP Termination Provider. Each side can put QoS onto their part, but if QoS does NOT exist between them then call quality will be bad anyhow. State 2: Same as above except a VPN tunnel is setup between each side. Thus
2000 May 01
3
Status of SSH 2.0 protocol support?
Just to bring everyone up to date, could we get a report on the status of support for the 2.x protocol? The home page says "next major release" - is that 1.3 or 2.0? And is there any feel for when it'll be generally available? -- John Hardin Internal Systems Administrator Apropos Retail Management Systems, Inc. <johnh at aproposretail.com>
2000 Mar 04
1
Where is the tarball for Solaris
I'm trying to install openssh-1.2.2 on a Solaris 7 box. I've downloaded the file openssh-1.2.2.tar.gz from ftp://thermo.stat.ncsu.edu/pub/openssh/files/ and http://the.wiretapped.net/security/cryptography/ssh/OpenSSH/files/. neither of theses tar's include the configure program as referenced in the INSTALL file. Where can I obtain the full distribution that will build on a Soalris 7
2007 Jul 12
0
No subject
in clear over network, therefore wiretapping the connection is not enough to steal iax2 credentials. Media traffic will be encrypted when someone will implement it on client side, however even then, Called and Callee will be in clear. Best Regards, Claudio Internet Email Confidentiality Footer -------------------------------------------------------------------------=
2006 Feb 19
2
possible rails -> postgresql bug
Hi I have a problem accessing an array field in a Postgresql database. Here is the table definition. View "neil.flashing_codes" Column | Type | Modifiers -------------+-----------------------+----------- code | character varying(10) | description | text | folds | integer[] | View definition: SELECT
2002 Aug 03
0
Quick Note: Obtaining Public Info on YOU!
---NOTICE--- This is a Notice that an iDetect 2002 user is currently doing research on you. This is not a real Detective. You can do a little investigating for yourself by getting iDetect 2002. You will also get A list of people who have done Investigations on you and your family. ---Read Below--- Now you can learn EVERYTHING about your friends, neighbors,
2003 Jul 28
10
IPSec
Hi All, I need to configure a VPN between a FreeBSD-4.8 box and a Linux (FreeS/WAN) box. In the Linux side, the network administrator installed FreeS/WAN with RSA authentication without IKE support. Does anybody knows if is possible to make my FreeBSD box connect a VPN with the Linux box? If so, could point me to a documentation about how to install IPSec with RSA authentication and how to make
2004 Jun 09
0
Call Pickup problem in Asterisk with SIP phones
I'm having a tough time getting call pickup to work on *. Here's my configuration: X100P with T-1, channels 1-4 voice <---> * <---CISCO 7960 with SIP 6.0 Image A call comes in, and * picks up and presents a menu. Caller chooses extension, (in this case ext 103, SIP/wsmith) Wsmith is sitting in my office, hears his phone ringing, picks up my phone, gets dial tone, and presses
2004 Jun 14
0
If IAX client is not logged in/registered, Dial plan executes BUSY vs UNAVAILABLE
If I have an IAX client (Firefly softphone in this example), and the client is not registered at the moment because they are not connected to the network and someone dial that extension, they get the user's "I'm on the phone at the moment" message vs. the "I'm unavailable" message. Is this by design? Here's the extension in question's dialplan:
1998 May 19
7
Bind Overrun Bug and Linux
[mod: Just to show you that people DO get bitten after a bugwarning has gone out on linux-security..... -- REW] -----BEGIN PGP SIGNED MESSAGE----- Content-Type: text/plain; charset=us-ascii Has anyone been hit with the Bind Inverse Query Buffer Overrun on their Linux servers? We have had 3 servers attacked using this expoit and all of the machines had several binaries replaced with trojan