<br><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="im"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
If you meant the user running Asterisk is root, this is a less than optimal<br>
situation that can lead to really big problems.<br>
<br>
Why? Steve please explain. <br>
</blockquote>
<br></div>
Well, if an attacker manages to inject some code and Asterisk is running as root, poof goes your system or you get an astronomical bill from your trunk provider.<br>
<br>
Likewise with file permissions. Suppose you're trying to get something working and you suspect it's a permissions issue so you chmod a bunch of stuff to 777.<br>
<br>
Then suppose a local user with a grudge does something like this:<br>
<br>
echo '#exec rm --farce --recursive /*'\<br>
>>/etc/asterisk/extensions-<u></u>local.conf<br>
<br>
(or whatever your package names one of it's 'include' files.)<br>
<br>
The next time Asterisk reloads the dialplan, poof.<div class="HOEnZb"><div class="h5"><br></div></div></blockquote><div><br></div><div>any link for me so i can learn more about security practices with asterisk? i'm using a public ip. </div>
</div>