SECURITY 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. ==== Security Notes with Asterisk ====
  2. PLEASE READ THE FOLLOWING IMPORTANT SECURITY RELATED INFORMATION.
  3. IMPROPER CONFIGURATION OF ASTERISK COULD ALLOW UNAUTHORIZED USE OF YOUR
  4. FACILITIES, POTENTIALLY INCURRING SUBSTANTIAL CHARGES.
  5. First and foremost remember this:
  6. USE THE EXTENSION CONTEXTS TO ISOLATE OUTGOING OR TOLL SERVICES FROM ANY
  7. INCOMING CONNECTIONS.
  8. You should consider that if any channel, incoming line, etc can enter an
  9. extension context that it has the capability of accessing any extension
  10. within that context.
  11. Therefore, you should NOT allow access to outgoing or toll services in
  12. contexts that are accessible (especially without a password) from incoming
  13. channels, be they IAX channels, FX or other trunks, or even untrusted
  14. stations within you network. In particular, never ever put outgoing toll
  15. services in the "default" context. To make things easier, you can include
  16. the "default" context within other private contexts by using:
  17. include => default
  18. in the appropriate section. A well designed PBX might look like this:
  19. [longdistance]
  20. exten => _91NXXNXXXXXX,1,Dial(Zap/g2/${EXTEN:1})
  21. include => local
  22. [local]
  23. exten => _9NXXNXXX,1,Dial(Zap/g2/${EXTEN:1})
  24. include => default
  25. [default]
  26. exten => 6123,Dial(Zap/1)
  27. DON'T FORGET TO TAKE THE DEMO CONTEXT OUT OF YOUR DEFAULT CONTEXT. There
  28. isn't really a security reason, it just will keep people from wanting to
  29. play with your asterisk setup remotely.