Displaying 20 results from an estimated 300 matches similar to: "911 @ Zap Channel Breakin"
2006 Apr 10
7
Asterisk BRI in the USA
Hey all,
It such a shame that BRI technology is such a flop in the USA. For a
small office such as mine it would be a great product. So her goes my
question.... What is a known asterisk working BRI card that will
operate in the USA. I need to weigh price/quality. I need to do
DID/DDI (or what ever you want to call it). Asterisk will do everything
else I need. The ILEC has at the other
2006 Nov 07
3
connect Sipura with Asterisk - both behind NAT
Does anybody have a good link how to connect Sipura with Asteriks, both
behind NAT? I'm using FWD but their connection is like a weather
(especially IAX), I need something more reliable.
I was thinking of using stun and/or proxy but can not find any good link
explaining how to setup Linux server
--
#Joseph
2007 Jun 28
1
CDR Log analizer software
Hello all,
I'm looking for software for my asterisk logs that will compile the
information into nice web-based charts and graphs. Something that works
similar to webalizer for apache. I want to be able to spot trends of
usage, call volume levels, disconnect/failure levels, and basically see
exactly where my system has been at over the past day/week/month, etc.
. I would prefer for
2007 Jan 26
1
WellTech 380x Gateway
Ok this is a simple question...
What has been your experience with the WellTech 38xx series (I'm looking
specifically at the 3802)
VoIP gateway? I'm looking for a good (and hopefully not too expensive)
VoIP/T.38 gateway for my office.
Asterisk intergration is not a major factor at this time but may be
later on. How well does it work? Is Echo
a problem? Do the T.38 capablities
2007 Feb 07
3
Linux Kernel Timer Frequency and Asterisk
Ok here is a real geek question,
I building my own linux kernel for my asterisk system and came across
the kernel setting for the timer frequency. I have one of 3 hardcode
choices 100Hz, 250 Hz and 1000Hz. From what I understand the default
Freq was changed from 100Hz in kernel 2.4 to 1000Hz (1KHz) in kernel
2.6. Timing is a BIG issue in asterisk with all the TDM and zap channel
stuff.
2006 May 16
1
Delay when ringing internal extensions on incoming zap call
I have a TDM400P with 2 FXO cards and I'm using Asterisk@Home 2.8
I noticed that when I place a call to the analog lines from outside,
Asterisk takes a while to actually ring the extension the call is
being sen to.
I've been doing some tests, calling from my cellphone and here is what I see...
- After the first ring on my cell, Asterisk logs to the CLI that is
has an incoming call
-
2004 Jun 14
1
breakin' dovecot
I know this is cruel, but I figured out a way to break dovecot,
temporarily. The really great news is that it recovers nicely.
I'm also not sure if anything can be done about this, since I've seen
the same thing happen with courier-imap, uw-imap, and maybe cyrus-imap.
I used cyrus-imap for such a short period of time that I didn't get to
really test it much.
how to...
(this
2006 May 17
7
Quad BRI card
Hi all
Does Digium make a quad BRI card? I can't see anything of the sort on their
page but I thought they might call it something else in the States.
Failing that, can anyone recommend a make/model that would handle 4 BRI ports?
--
Cheers
Wayne
2018 Oct 05
5
[Bug 13645] New: Improve efficiency when resuming transfer of large files
https://bugzilla.samba.org/show_bug.cgi?id=13645
Bug ID: 13645
Summary: Improve efficiency when resuming transfer of large
files
Product: rsync
Version: 3.0.9
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: core
Assignee:
2005 May 05
1
Weird authentication difference between smbclient and smbmount
Hello
I already posted this in smb-clients, but seeing the load difference
I repost in the samba list.
I am currently using samba 3.0.10 with kernel 2.6.9.
In the doc one is encouraged to use 'security = user' level.
If I then connect with 'smbclient //machine/share -U myname%mypass' all works
well. But when I try to mount the share localy with
smbmount //machine/share
2006 Dec 18
1
GXP2000, Linksys RV082 Firewall / NAT, Registrations
Hello,
We have several clients with GXP2000 in their network and behind NAT. We
have one particular client that has several GXP2000 behind a Linksys RV082
VPN Firewall/Router which is doing NAT services. According to SIP packet
inspection, it detects it's a symmetric NAT.
The problem we have is that even though we have configured Asterisk AND
the GXP2000 to register every 60 minutes, they
2006 May 06
3
www.SavaJe.com
While not strictly on topic I think this could be an interesting
opportunity for the Asterisk development community.
As some of you might already know JavaOne will be happening in San
Francisco in 2 weeks time http://java.sun.com/javaone/sf/
I wanted to draw your attention to an interesting company that will be
exhibiting there called www.Savaje.com <http://www.savaje.com/> more
2017 Sep 19
0
How to track attempted breakins, authentication failure logging
Hai Mark,
I see the bugreport for this is still untouched.
https://bugzilla.samba.org/show_bug.cgi?id=11998
Is vfs_full_audit not an option?
with %I you can log the IP address of the client machine.
But i dont know if that wil work of if vfs_full_audit hase that option.
With something like this.
full_audit:prefix = %u|%I|%m|%S
full_audit:failure = connect
full_audit:success = connect
2001 Jun 01
1
recent breakins
>From http://www.apache.org/info/20010519-hack.html:
"The ssh client at SourceForge had been compromised to log outgoing names
and passwords, so the cracker was thus able get a shell on apache.org."
user's ssh --> SF's ssh --> apache.org's sshd
So basically the user's password was entered in the clear to an untrusted
program (SF's ssh). Never mind that
2001 Jun 01
0
Disabling Password-based auth? (was RE: recent breakins)
Crap. I hit send too fast. Last sentence in
first paragraph should have read "no completely
secure way" for authentication to be passed--
because the agent-based forwarding program
could have been compromised as well--except for
the cases already mentioned such as SRP and
RSAAuth where the auth. information is better
protected.
Even if the SF server had been capable of forwarding
the
2001 Jun 01
1
Disabling Password-based auth? (was RE: recent breakins)
All--
But it's not as simple as forwarding the password-based
authentication. Regardless of what method was used to
SSH from system one (user's) to system two (SF), the
user then started up *a second* SSH session to go
from two (SF) to three (Apache). There is no effective
way for any authentication information from the first
session to be passed to the second, in my mind.
Remember
2017 Sep 19
3
How to track attempted breakins, authentication failure logging
This may have been asked before, but I can't find it. I am getting repeated external attempted
to log into our AD/DC (running Samba 4.4.14). In /var/log/samba/log.samba I get entried like:
2017/09/19 05:02:25.562957, 2] ../source4/auth/ntlm/auth.c:430(auth_check_password_recv)
auth_check_password_recv: sam_ignoredomain authentication for user [HPRS\333] FAILED with error
2010 May 27
2
Pattern matching - how to ignore numbers after 10 digits
All:
Yesterday I discovered something interesting. I dialed 1800ANCESTRY
from the asterisk system I am testing and got the number doesn't exist
message. I then dialed the same number from our old system and it went
through.
I realized that the "Y" in ancestry made the number too long, and went
back to my dialplan.
How do I ignore numbers that are too long? Obviously,
2017 Sep 19
1
How to track attempted breakins, authentication failure logging
On Tue, 2017-09-19 at 17:02 +0200, L.P.H. van Belle via samba wrote:
> Hai Mark,
>
> I see the bugreport for this is still untouched.
> https://bugzilla.samba.org/show_bug.cgi?id=11998
I've closed that bug now.
Extensive work has been done to add this feature to Samba 4.7, due out
this week:
https://wiki.samba.org/index.php/Setting_up_Audit_Logging
Two new debug classes,
2001 Jun 02
3
Recent breakins / SSHD root hole?
The trojaned ssh client is nothing new to the hacker community, and the
statement in the previous thread claiming
"This type of man-in-the-middle attack (trojaned ssh) is not theoretical
anymore, and password authentication is broken."
is an example of how many poeple still think "hacking" is something very
difficult and nothing short of a genius is required to make the