[Asterisk-Dev] How Can i send Email using vc++
Muhammad Asim Sajjad
asim.sajjad at asanewtech.com
Mon Dec 12 00:36:00 MST 2005
Hi Gurus
Can any one help me how can i send email using vc++
Regard
Asim
----- Original Message -----
From: "John Todd" <jtodd at loligo.com>
To: <asterisk-dev at lists.digium.com>
Sent: Monday, December 12, 2005 12:12 PM
Subject: [Asterisk-Dev] Asterisk Manager encryption
> [Hopefully I'm not duplicating effort, but I'm sure others have come
> up with these ideas already. Apologies if this is a rehash of some
> conversation already under way, but I haven't yet heard about it.
> Searching through code did not reveal any hidden encryption tools in
> manager.c, but I could just be overlooking them.]
>
> I have several Asterisk servers on the Wild Internet that I'd like to
> be able to reach without "tunneling" the connections via SSH. I'd
> love for the Flash Operator Panel, Asterisk Manager Proxy, and
> anything else that talks to Asterisk's Manager API to be able to do
> so without relying on ssh port forwarding to ensure a secure
> connection.
>
> Why:
>
> 1: Creation of SSH tunnels requires adding a user on the system,
> which introduces security issues when cross-domain access is required.
>
> 2: Creation of SSH tunnels requires that SSH be running with a
> consistent security model across all destinations.
>
> 3: I am a big believer in encryption in the protocol, and not
> relying on tunnels. Tunnels suck. If you disagree with this point,
> don't read further.
>
>
> So, I would propose something like this:
>
> 1) A new configuration option in the manager.conf file is added,
> which would be "encrypt". Values would be:
> yes = After login, all communications would be encrypted with the
> shared secret key of the manager user, regardless of client desires
> no = After login, no communications would be encrypted, regardless
> of client desires.
> optional = Client may specify encryption with "Encrypt: Yes"
> action keyword during login (this is the default if nothing is
> specified)
>
> 2) Regardless of if the session has been started with a "secure"
> key phrase exchange, it should be the case that the shared secret key
> between the client and server should be used as a seed for a stream
> cipher or other method of encrypting the traffic between the client
> and the server. These details are a bit beyond my grasp, but it is
> clear that very sensitive information is flowing out of manager
> interface connections. There will be (are?) third-party services
> across the "big-I" Internet which may wish to connect to remote
> Asterisk servers, and currently those sessions are unprotected.
> There exist in Asterisk some encryption libraries which may be suited
> for this task already if they can just be re-used in this
> environment, though I'm not familiar enough with them to say that
> they will work with minimal effort.
>
> This almost implies a new restriction on the MD5 exchange of
> passphrases for Manager logins - as a security-conscious
> administrator, I would like to forbid (globally, or per user) any
> logins that were not using the poorly-documented (but functional!)
> MD5 password exchange methods already in the Manager API, if only to
> prevent the repeated blasting of secure data across the unsecure
> network. Maybe "secure=[yes,no,optional]" as a new modifier?
>
>
> Who would do at least the encryption part? I don't know. I'm not
> yelling at anyone to do it, but I'm identifying the problem,
> suggesting a method, and if there is some programmer who wants to
> take up the task (hey, Dave Troy! have another Jolt and get on this,
> eh? ;-) I can throw them a few bucks. But a very few bucks, so
> hopefully this will be done by someone out of need and merit, and not
> by funding.
>
>
> EXAMPLE NOTES
>
> Here is a really basic sample of what I'd expect to see if I were to
> connect to the manager interface and try to log in as a user that had
> "encrypt=yes" specified for that user ID. (For those of you
> struggling with MD5 login processes, I created my Challenge-response
> by typing "md5 -s 617153281foobar" on a shell line to generate my Key
> below, though the addition of the non-existent "Encrypt" command will
> cause an actual login to fail.)
>
>
> [test-user]
> secret=foobar
> encrypt=yes
> deny=0.0.0.0/0.0.0.0
> permit=127.0.0.1/255.255.255.255
> permit=10.0.0.0/255.255.255.0
>
>
> [root at bunkhouse asterisk]# telnet localhost 5038
> Trying 127.0.0.1...
> Connected to localhost.
> Escape character is '^]'.
> Asterisk Call Manager/1.0
> Action: Challenge
> AuthType: MD5
>
> Response: Success
> Challenge: 617153281
>
> Action: Login
> AuthType: MD5
> Username: test-user
> Key: 50eb4a3b155f6c4913ed3345dcba21e0
> Encrypt: Yes
>
> Response: Success
> Message: Authentication accepted
> Message: Encryption started with shared keys
>
> <binary encrypted data starts to flow here, containing Manager events>
>
>
>
> JT
> _______________________________________________
> --Bandwidth and Colocation provided by Easynews.com --
>
> Asterisk-Dev mailing list
> To UNSUBSCRIBE or update options visit:
> http://lists.digium.com/mailman/listinfo/asterisk-dev
More information about the asterisk-dev
mailing list