[Asterisk-Users] Q. on key sniffing/spoofing
Matt Lawson
matt at 1control.com
Fri Sep 12 06:56:09 MST 2003
Hi everyone,
I'd like to set up the RSA keys for the IAX registration, but have a
couple of Q's. I have the manual and can follow the instructions, but I
want to understand the limitations.
First, understand there will be a central Asterisk (which has the
private key?) and several remote Asterisks (which are as automated as
possible, and each have the same public key?). We don't want the remote
Asterisks to be able to spoof each other.
1. Do I have to type in the same "PEM passphrase" on both the central
(at our office) and the remote asterisk? Or can the remote one just do
"init keys" or "asterisk -i" without needing anything else. I
understand the key has to be copied over there.
2. What's to stop someone from sniffing and spoofing the data coming
from a remote Asterisk just as easily as a plaintext password. Could
Joe Blow set up an Asterisk at his house, and give it the same public
key, and it would register as whichever one he wanted (assuming he could
guess an installation name).
3. What information is actually contained in the encrypted message from
the remote Asterisk?
Is the solution to create a separate key pair for each remote system, so
that no two systems have the same public key? I'm assuming Asterisk can
handle different keys from each one.
Thanks,
Matt
More information about the asterisk-users
mailing list