[asterisk-dev] Asterisk Network Security Idea	(using	tcp_wrappers)
    Venefax 
    venefax at gmail.com
       
    Sun Mar 29 16:44:33 CDT 2009
    
    
  
Can you elaborate about the "Rsh" problem? Maybe I am fool and just found
out.
F.A.
-----Original Message-----
From: asterisk-dev-bounces at lists.digium.com
[mailto:asterisk-dev-bounces at lists.digium.com] On Behalf Of Steve Edwards
Sent: Sunday, March 29, 2009 5:32 PM
To: Asterisk Developers Mailing List
Subject: Re: [asterisk-dev] Asterisk Network Security Idea (using
tcp_wrappers)
On Sun, 29 Mar 2009, Joseph Benden wrote:
> I also don't think that we can accept the blame for system admins who
> have not properly learned who to take care of their machines. If they
> are broken into because they left Rsh exposed; is it really our fault?
> If they leave SIP wide open with no password and default context can
> place international calls; is it our fault?
I disagree here.
If some of the recent posts to this list are any indication, Asterisk is 
being deployed by people who have no effing clue.
While, distributing default open and vulnerable configurations *may* not 
carry any legal responsibility, I feel an ethical responsibility not to 
hand out the pointy scissors to children.
Part of the acceptance factor of an IT product is how it's security is 
perceived in the "press." If every Asterisk server is vulnerable to script 
kiddies "out of the box," it will earn a reputation that will be difficult 
to overcome.
Thanks in advance,
------------------------------------------------------------------------
Steve Edwards      sedwards at sedwards.com      Voice: +1-760-468-3867 PST
Newline                                             Fax: +1-760-731-3000
_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--
asterisk-dev mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-dev
    
    
More information about the asterisk-dev
mailing list