📄 security.tex
字号:
\subsection{Introduction}PLEASE READ THE FOLLOWING IMPORTANT SECURITY RELATED INFORMATION.IMPROPER CONFIGURATION OF ASTERISK COULD ALLOW UNAUTHORIZED USE OF YOURFACILITIES, POTENTIALLY INCURRING SUBSTANTIAL CHARGES.Asterisk security involves both network security (encryption, authentication)as well as dialplan security (authorization - who can access services inyour pbx). If you are setting up Asterisk in production use, please makesure you understand the issues involved.\subsection{Network Security}If you install Asterisk and use the "make samples" command to installa demonstration configuration, Asterisk will open a few ports for acceptingVoIP calls. Check the channel configuration files for the ports and IP addresses.If you enable the manager interface in manager.conf, please make sure thatyou access manager in a safe environment or protect it with SSH or otherVPN solutions.For all TCP/IP connections in Asterisk, you can set ACL lists thatwill permit or deny network access to Asterisk services. Please checkthe "permit" and "deny" configuration options in manager.conf andthe VoIP channel configurations - i.e. sip.conf and iax.conf.The IAX2 protocol supports strong RSA key authentication as well asAES encryption of voice and signalling. The SIP channel does notsupport encryption in this version of Asterisk.\subsection{Dialplan Security}First and foremost remember this:USE THE EXTENSION CONTEXTS TO ISOLATE OUTGOING OR TOLL SERVICES FROM ANYINCOMING CONNECTIONS.You should consider that if any channel, incoming line, etc can enter anextension context that it has the capability of accessing any extensionwithin that context.Therefore, you should NOT allow access to outgoing or toll services incontexts that are accessible (especially without a password) from incomingchannels, be they IAX channels, FX or other trunks, or even untrustedstations within you network. In particular, never ever put outgoing tollservices in the "default" context. To make things easier, you can includethe "default" context within other private contexts by using:\begin{astlisting}\begin{verbatim} include => default\end{verbatim}\end{astlisting}in the appropriate section. A well designed PBX might look like this:\begin{astlisting}\begin{verbatim}[longdistance]exten => _91NXXNXXXXXX,1,Dial(DAHDI/g2/${EXTEN:1})include => local[local]exten => _9NXXNXXX,1,Dial(DAHDI/g2/${EXTEN:1})include => default[default]exten => 6123,Dial(DAHDI/1)\end{verbatim}\end{astlisting}DON'T FORGET TO TAKE THE DEMO CONTEXT OUT OF YOUR DEFAULT CONTEXT. Thereisn't really a security reason, it just will keep people from wanting toplay with your Asterisk setup remotely.\subsection{Log Security}Please note that the Asterisk log files, as well as information printed to theAsterisk CLI, may contain sensitive information such as passwords and callhistory. Keep this in mind when providing access to these resources.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -