Skip to content

Commit 87bafba

Browse files
seanbrightgtjoseph
authored andcommitted
Deployment: Revise/Restore some 'Important Security Considerations' docs.
1 parent 5bb1127 commit 87bafba

File tree

3 files changed

+69
-19
lines changed

3 files changed

+69
-19
lines changed

docs/Deployment/Important-Security-Considerations/Asterisk-Security-Webinars.md

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -3,33 +3,21 @@ title: Asterisk Security Webinars
33
pageid: 21463708
44
---
55

6-
Asterisk VoIP Security - Part 1 of 3
7-
====================================
8-
9-
10-
VoIP Fraud: Current Threats From A Law Enforcement Perspective
6+
# Asterisk Security Webinars
117

8+
## VoIP Fraud: Current Threats From A Law Enforcement Perspective
129
Special Agent Michael McAndrews, FBI
1310

11+
<iframe width="560" height="315" src="https://www.youtube.com/embed/ZO1xon4P-rg?si=mnDpGrvsTdM90nPX" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
1412

15-
315420
16-
Asterisk VoIP Security - Part 2 of 3
17-
====================================
18-
19-
20-
VoIP Security Best Practices
13+
## VoIP Security Best Practices
2114

2215
Dan York, Chairman, Best Practices Group, VoIP Security Alliance
2316

17+
<iframe width="560" height="315" src="https://www.youtube.com/embed/6_WjMq3842o?si=84recPhwztlO6GQk" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
2418

25-
315420
26-
Asterisk VoIP Security - Part 3 of 3
27-
====================================
28-
29-
30-
Securing Asterisk Systems
19+
## Securing Asterisk Systems
3120

3221
Jared Smith, Training Manager, Digium
3322

34-
35-
315420
23+
<iframe width="560" height="315" src="https://www.youtube.com/embed/B-t-B1pdx5I?si=Z-iPrWs3cWnItCcT" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
# Dialplan Security
2+
3+
First and foremost remember this:
4+
5+
!!! danger "Extension Isolation"
6+
7+
Use the extension contexts to isolate outgoing or toll services from any incoming connections.
8+
9+
You should consider that if any channel, incoming line, etc. can enter
10+
an extension context that it has the capability of accessing any
11+
extension within that context.
12+
13+
Therefore, you should **not** allow access to outgoing or toll
14+
services in contexts that are accessible (especially without a
15+
password) from incoming channels, be they IAX channels, FX or other
16+
trunks, or even untrusted stations within your network. In particular,
17+
never ever put outgoing toll services in the "default" context. To
18+
make things easier, you can include the "default" context within other
19+
private contexts by using:
20+
21+
```
22+
include => default
23+
```
24+
25+
in the appropriate section. A well designed PBX might look like this:
26+
27+
```
28+
[longdistance]
29+
exten => _91NXXNXXXXXX,1,Dial(DAHDI/g2/${EXTEN:1})
30+
include => local
31+
32+
[local]
33+
exten => _9NXXNXXX,1,Dial(DAHDI/g2/${EXTEN:1})
34+
include => default
35+
36+
[default]
37+
exten => 6123,1,Dial(DAHDI/1)
38+
```
39+
40+
!!! tip "Remove Demo Contexts"
41+
42+
Do not forget to take the `demo` context out of your default
43+
context. There isn't really a security reason, it just will keep
44+
people from wanting to play with your Asterisk setup remotely.
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
# Important Security Considerations
2+
3+
The pages in this section provide specific warnings about security
4+
that are pertinent to Asterisk. Just because you're already familiar
5+
with securing your Linux machine, doesn't mean you can skip this
6+
section.
7+
8+
!!! danger
9+
10+
Please read the following important security related
11+
information. Improper configuration of Asterisk could allow
12+
unauthorized use of your facilities, potentially incurring
13+
substantial charges.
14+
15+
Asterisk security involves both network security (encryption,
16+
authentication) as well as dialplan security (authorization - who can
17+
access services in your pbx). If you are setting up Asterisk in
18+
production use, please make sure you understand the issues involved.

0 commit comments

Comments
 (0)