Тёмный

Surviving a 0-Day: Our Battle with a FreePBX Exploit 

Crosstalk Solutions
Подписаться 449 тыс.
Просмотров 73 тыс.
50% 1

Наука

Опубликовано:

 

26 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 199   
@CraftComputing
@CraftComputing 11 месяцев назад
What a shame Sangoma has fallen so far in the last 5 years. I worked with them quite a bit in the past, but before the core of the team moved to Clearly. When someone tells you who they are, you should listen. No CVE issued, deemed a 'minor' issue, nuked the bug bounty program, refused to pay out, and sparse details about what was patched (and if it was even successful). Add in the hardcoded 'login' password bypass for authentication because they can't be arsed to implement authentication on devices THEY MAKE... what an absolute mess.
@Digitalstorm007
@Digitalstorm007 11 месяцев назад
Sangoma has been on the downward spiral for at least 10 years, not sure why you only say the last 5 years.
@IntrepidTechie
@IntrepidTechie 11 месяцев назад
As someone who works in Digital Forensics and Incident Response, this is an awesome video! I applaud your transparency and the way you explained this attack and your response process. Good communication is the most critical part of response to any incident, and, for what it’s worth, as someone who does this day in and out, you did great here. Keep it up!
@jetblast1212
@jetblast1212 11 месяцев назад
Hopefully Sangoma will do the right thing and turn the project over to an organization that cares. Good luck.
@seantellsit1431
@seantellsit1431 11 месяцев назад
Sangoma? Do the right thing? Nope. Never.
@extramiletechnologyservices
@extramiletechnologyservices 11 месяцев назад
Thank you for not only outlining the problem, but offering a solution. You have demonstrated in your videos that you have a lot of contacts in the VoIP and open source community that you could coordinate this project and not let it die.
@ArthursHD
@ArthursHD 11 месяцев назад
If that's unsuccessful may we fork it?
@TaylorDrue
@TaylorDrue 11 месяцев назад
Thank you Chris, you do the FreePBX community a service, I really hope some minds at Sangoma heeds these words. FREE THE FROG.
@techwrightauto
@techwrightauto 11 месяцев назад
I would love to see a video from you showing how you use and setup Grafana and Zabbix to do this type of monitoring. Thanks for the detailed video of how this hack went down.
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
Good Work Chris! This was well presented. I actually found that exploit video back in September and had looked into that. I had locked my edge firewall down so tight that I was having trouble with my Trunking Service. We know who they are because you love them. So I had to take a different approach. It didn't take much but let me know if you want some info on how we stopped the SIP attack that happened with us almost immediately. If you're interested I'll try and send you an email about it. I have been trying to spread as much information about it as I can and even provided some instructions to our trunking service for suggestions to their customers on how to better secure their PBX internet connections. Thanks for removing my previous comment....after posting it I realized that there might have been a little too much information in there. Keep up the hard work! The information you provide is worth gold.
@Wesrl
@Wesrl 11 месяцев назад
Sangoma has been having issues with their Fax Stations. This issue causes the fax line to silently hangup and it acting like it was it was making the faxes successful but very much wasn’t. We got with Sangoma a few times with many examples and they did not believe us. We had all of medical clients effected. it took our owner threatening them with dropping them for fax and then they acknowledged they knew their was an issue.
@SkittleKicksPlays
@SkittleKicksPlays 10 месяцев назад
You have to understand that the faxing through Fax Station is far different than traditional copper lines. It's never been secure enough to compete with traditional faxing, and honestly it made me scratch my head as to why anyone would want it. All these issues that people have had with Fax Station is never going to go away. The technology is just bad in general, and to be honest it's always better to have a traditional dedicated (copper) fax line just for that one job. Ever hear of a traditional fax being hacked? Yeah me neither.
@alacava
@alacava 11 месяцев назад
I would love a video on how you are monitoring the servers. I'm a big Grafana and Zabbix fan so would like to see what you are monitoring, including what you monitored to catch the hacks.
@CrosstalkSolutions
@CrosstalkSolutions 11 месяцев назад
Yea - it's pretty interesting, and it relates to some custom stuff we had built. The FreePBX firewall (which uses iptables at its core), when disabled does not stop the iptables service, so you can't just monitor iptables status - that's not accurate. But, there is a huge difference in the number of iptables chains/rules when the FreePBX firewall is on or off - so we do a count of those iptables rules, and if it drops below a certain threshold, that creates an error condition in Zabbix/Grafana. There's a bit more to it than that, but that's essentially what we're doing.
@CoolerQ
@CoolerQ 11 месяцев назад
How did you think to add that monitoring? That's definitely useful now that we know about the exploit, but I never would have thought of it beforehand. I would love to see a "best practices" video where you talk about the system-level signals that you monitor.
@Darkk6969
@Darkk6969 11 месяцев назад
@@CoolerQ I'd love to see a video on how this is done so we all can benefit.
@Pozy98
@Pozy98 10 месяцев назад
Chris Thank you for being transparent in this. It opens an eye on how Sangoma is treating Freepbx. I would love if you would do a video or two around the two monitoring software you use to monitor Freepbx and other items. Cheers Richard
@auxmobile
@auxmobile 11 месяцев назад
Since FreePBX is actually competitive to their other products and services that create revenue for them, what Sangoma is doing makes perfect sense; they are slowly but surely killing off the competition...
@jckf
@jckf 11 месяцев назад
10:55 Just a note here: The User-Agent header is part of HTTP, not something like a TCP packet header.
@mibian
@mibian 11 месяцев назад
Good video, TY. It's clear that unless something changes, your only option is to walk away from the product. Sangoma will of course say that you can just move to a paid product, but all the rest of us know, that most of the users utilising the free version, are not "cheap" enterprises/businesses, but rather small entities with no or little money, and few options, so they can not do that.
@blueline15
@blueline15 11 месяцев назад
How are you gonna leave us on this cliffhanger for 14 more hours!? All jokes aside, hope everything went okay. I manage a FreePBX server so I’m a little nervous now to find out more.
@gigabit9823
@gigabit9823 11 месяцев назад
The R2D2 made from the UDM Dream Router is pure genius.
@everyhandletaken
@everyhandletaken 11 месяцев назад
Noticed that too, very cool ☺️
@chris_schenkel
@chris_schenkel 7 месяцев назад
And possibly the only useful purpose for said device.
@clausdk6299
@clausdk6299 11 месяцев назад
I'm SHOCKED how bad their code is!!! ... especially the PHP code.... just WOW.
@francismori7
@francismori7 11 месяцев назад
keep in mind, this is 2023 too!
@mandurphy23
@mandurphy23 11 месяцев назад
Been on FreePBX since 2018; 2 installs, 1 being v14 and the second being v15. Can't believe it's already been 4 years since we had a proper full release and just makes me nervous about the future of my company's phone system. We came from a 1997 NEC system, so even if we keep this one going for 30 years, we'll live, but jeez.... Have you done any looking into the new UniFi Talk service/system? I wonder if that's any good...
@mathesonstep
@mathesonstep 11 месяцев назад
I have long wanted to setup a PBX system, I have watched all your videos on it and am pretty convinced FreePBX is the way to go I love open source software and now I might finally have a reason to set one up. I really don't want to see FreePBX die... I guess it can always be forked
@giancarlosrm
@giancarlosrm 11 месяцев назад
You are absolutely right!!! After more than 20 PBXact ot FreePBX projects We at my company realize that sangona don't want frewPBX to grow up!!! Sad, but there are other projects growing fast!!!
@Gsxrtrix
@Gsxrtrix 11 месяцев назад
What do you recommend?
@lezlienewlands1337
@lezlienewlands1337 11 месяцев назад
The whole removal of the bug bounty confuses me. Wouldn't you want to know of vulnerabilities in your software before a bad actor finds it and either abuses it or sells it on?
@paulstaf
@paulstaf 11 месяцев назад
It is like offering a reward to someone who finds your puppy, then when they bring the puppy to you, you don't want to pay....you better not lose your puppy again!
@Gigabyte2ar
@Gigabyte2ar 11 месяцев назад
I'm very worried about FreePBX future, but what are the alternatives?
@Iredalicious
@Iredalicious 11 месяцев назад
Why do these systems have any exposure to the public internet at all? Is there not a better way to maintain/manage these systems? Allow-listing IP addresses is a step in the right direction but I would think zero exposure is a better solution entirely.
@CrosstalkSolutions
@CrosstalkSolutions 11 месяцев назад
Agreed - which is why so few of our customers were actually affected. We prefer ZERO open access to the outside world (perhaps just locked down for the SIP trunk) - there are many ways to do this including FreePBX's built-in VPN. But there are just some cases where customers have to have ports open - such as when they have a large work from home user base who are on dynamic IP addresses. In those cases, the Responsive Firewall is really the only line of defense.
@jfltech
@jfltech 11 месяцев назад
With internet exposure, you should lock down the pubic facing services in Linux with either systemd security primitives or containers, this will protect the host and limit the damage even if the service is exploited..
@Mashedpotatoe774
@Mashedpotatoe774 11 месяцев назад
@@CrosstalkSolutionsI can’t see a reason why they would not just use a service like DuckDns so the IP could freely change but still be updated. I don’t miss working with Freepbx. Also limiting the attack ability with services like Unifi’s by geo-blocking all countries excluding the US limiting an attackers entry point to data center servers and private residential and mobile IP addresses. That is what I do at least and just VPN outside if I need to access something from another country. The amount of alerts I get from port scanning alone from Russia, China, India, Africa etc could easily crash a notepad log file. I love the video btw and have been watching for years. Possibly one of the largest reasons I stuck my toes in the MSP world. I would love to see a collaboration with you and @rossmanngroup on getting Freepbx actually open sourced to the fullest potential. I have been thinking about picking up some of Unifi’s phones just to mess around with a buddy, have you had any good experience with them?
@christopherjackson2157
@christopherjackson2157 11 месяцев назад
Figuring out the chronology of a breach is a real challenge sometimes. Sometimes impossible tbh. And once people start to think they'll never figure it out, they no longer do their best work. But without knowing the chronology you can't always identify the hole you need to plug
@TheOnlyEpsilonAlpha
@TheOnlyEpsilonAlpha 11 месяцев назад
I have to address the elephant in the room: is it wise anymore, to have sangoma based systems then? Or would it be better to switch to something else. I mean the “bounty policy” of sangoma seems to be messed up. That researcher deserves his reward and pay out for that
@el_cubano_jlc
@el_cubano_jlc 11 месяцев назад
Taking a moment to give proper recognition to the Blazing Saddles homage. Bravo sir, bravo.
@francismori7
@francismori7 11 месяцев назад
13:50 WORSE THAN THAT! They only replied crying about how he was able to decrypt their ionCube-encoded PHP files!!!
@CrosstalkSolutions
@CrosstalkSolutions 11 месяцев назад
Yea - the whole DEFCON video is worth a watch, but I didn't want to be too deep in the details for this one.
@andybarnard4575
@andybarnard4575 11 месяцев назад
I note you say you only allow connections from authorised IP addresses (on the LAN?) but that this was not sufficient to prevent access. Any idea how this happened? Im wondering if an associated issue with some small business routers cooperates with FreePBX here as the firewall on some routers allow any incoming traffic on port 5600 to cross. You can see this in iptables rules if you have an affected router.
@redes5003red
@redes5003red 9 месяцев назад
thank you!, but also for offering a solution. You have shown in your videos that you have many contacts in the VoIP community
@fredericoferreira5581
@fredericoferreira5581 11 месяцев назад
Good you guys did not suffer much with that cyber attack but something i dont understand you guys have the pbx machines at least hardened and behind a firewall before this correct ?
@hescominsoon
@hescominsoon 11 месяцев назад
Yes ...this was a vulnerability caused by sangoma
@markarca6360
@markarca6360 11 месяцев назад
This was 3CX months ago, but theirs was a supply-chain attack.
@gtreichel
@gtreichel 11 месяцев назад
Great content as usual, thanks! Assuming I don't use any functions of the vulnerable modules, which ones should I disable to reduce my risk?
@ricardomalla6533
@ricardomalla6533 11 месяцев назад
you are a gamechanger my friend. good job
@dzltron
@dzltron 11 месяцев назад
Have you looked at deploying OpenCVE?
@sam_sheridan
@sam_sheridan 11 месяцев назад
Great video and transparency
@mrxmry3264
@mrxmry3264 11 месяцев назад
if i understand this correctly, this hack happened to some PBXs in the cloud, correct? now the question is, are local PBXs also vulnerable? i mean, on my local LAN it would be much harder to do this hack than if the PBX is somewhere out on the internet, right? the way sangoma handled this raises loads of big red flags. what PBX software would you recommend now, after this hack?
@ironfist7789
@ironfist7789 11 месяцев назад
It seems to me based on the hacker presentation like they would have to have access to the actual php page in order to do this. If a spoofed phone or actor could get onto that network and call the code where the php webserver is hosted then they could execute the exploit. I guess if a user was compromised who had access to the webserver or could spoof an IP on the network then this would also be an issue. (I'm doing a lot of guess work here so take all this with a grain of salt).
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
Well....they were. If you trust Sangoma and their fix for it! The vector Chris stated was through a phone app on FreePBX that hosted services on the network to phones. My guess is it was usually used to Provision Sangoma phones. The password for those phones (unprovisioned) was simply "Login" so all you had to do was find a MAC address (NIC Serial Number) that was actually registered with FreePBX and you were in with a few lines of code in php added/modified. All security on the FreePBX server could be bypassed because of this. The best thing to do is restrict only the ports you need on the internet (SIP port, and TLS) and block everything else. And on those ports exposed to the internet you should have IPS, SIP blacklists, and GEOIP filtering guarding them. In my opinion you should never just "trust" another companies product anyway. To directly answer your question. Yes, It COULD be harder. It all depends on how you have your LAN setup as well. If a local device on your LAN could be compromised then no this would be easy. This requires a fair amount of networking knowledge to secure. In general though you are probably fine unless you have things on your LAN hosting things out on the internet. Just be sure you are NOT publicly hosting the provisioning part of FreePBX on the internet and work on Securing those ports as mentioned above and you SHOULD be fine.
@pattithompson6022
@pattithompson6022 11 месяцев назад
Can you do a video on how you configured zabbix to monitor the firewall and your ssh keys? I been looking for a way to do this but have been unable to find anything.
@bryanwalters3610
@bryanwalters3610 11 месяцев назад
I really enjoy your videos, I would love for you to do a video on how to setup zabbix to monitor servers.
@AndrewWells527
@AndrewWells527 11 месяцев назад
MAC address aren't really relevant once you cross a router. The phone must be passing their MAC address as a parameter in API calls...about as verifiable as the user agent.
@Patmorgan235Us
@Patmorgan235Us 11 месяцев назад
You could have a factory install certificate with the MAC in the SAN
@RogerCrane-yx8qd
@RogerCrane-yx8qd 11 месяцев назад
My question is. Are the freepbx servers on prem, cloud hosted or crosstalk hosted? If they are on prem, then what host was used to connect to the freepbx servers? Then that host is most likely still compromised! And they are not in the clear! Plus how was that host compromised? Your clients need to have a full IR performed, if it has not already been done. My thoughts anyways! Hope you'll are able to completely remedy the intrusion. It does not seem that the freepbx servers were the point of entry into the network. G'Day
@maverickmace9100
@maverickmace9100 11 месяцев назад
Where did u get that stand for the UDR? I want one for mine. It looks so cool
@scotty562
@scotty562 11 месяцев назад
Im not sure i fully understand. I have my pbx behind a firewall with the only incoming port 5060 open from our sip trunk server. Was i still vulnerable?
@netoeli
@netoeli 11 месяцев назад
I figure this would happened at one point or another, Freepbx has so many modules available , they have too much development going on with little extensive testing for security vulnerabilities.
@SkittleKicksPlays
@SkittleKicksPlays 10 месяцев назад
Um. Most of their devs left Sangoma. Including Andrew Nagy.
@mccuba48
@mccuba48 11 месяцев назад
Will that affect users that set up the pbx with a text editor editing /usr/local/etc/asterisk/ manually ?
@danilodistefanis5990
@danilodistefanis5990 11 месяцев назад
Better alternative to FreePBX?
@victoredwards5714
@victoredwards5714 11 месяцев назад
I'm still curious how this hack occurred and targeted networks with the FreePBX server. In order to get the MAC address of a phone registered on the system wouldn't the hacker need LAN access?
@schwingedeshaehers
@schwingedeshaehers 11 месяцев назад
Depending on how it works, buy one, and get a Mac address that u can use
@jasonellis7217
@jasonellis7217 11 месяцев назад
I love your videos! Thank you for sharing! 🙂
@Mysticsam86
@Mysticsam86 11 месяцев назад
If you want to fork FreePBX you can do that. Sangoma cant stop you. You just need to remove all connections to Sangoma on your fork.
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
Well yeah, except one other problem......as stated in the video by the guy that found the exploit. Some of the code is NOT opensource. This means it's not a complete opensource project. I'm not even sure it would work without that closed code. BUT!....if someone picked it up and just hired developers to look at it and take care of what's needed they might be able to just....make an alternative to Sangoma's version of it.
@Mysticsam86
@Mysticsam86 11 месяцев назад
@@JonGeorge-j6h okey as you say: You will have to figure that out and see if it is possible to work around that. I though it was as opensource as PFSense for example and that has been forked.
@everyhandletaken
@everyhandletaken 11 месяцев назад
Sounded like there is some closed source content, so perhaps not the simplest task… The bigger issue with forking this, is you have to spread the word to those that are using FreePBX, so they migrate away. Much easier to take over the project & provide new releases, as then existing & future users benefit from a properly maintained product.
@cll1out
@cll1out 11 месяцев назад
Isn’t this exactly what IncrediblePBX did? Seemingly based on FreePBX but a lot of the commercial modules are stripped out but with other security minded features added in.
@HablaKK
@HablaKK 11 месяцев назад
awesome keep it up
@MrGingerFatCat
@MrGingerFatCat 11 месяцев назад
Great video
@Subgunman
@Subgunman 11 месяцев назад
Why don’t the original developers release a better version of something similar to FPBX. Giving this project to independent developers in effect would be direct competition to their cloud based systems and servers.
@fataugie
@fataugie 11 месяцев назад
Right as I was getting ready to investigate a VOIP solution.....
@coreykunak1
@coreykunak1 11 месяцев назад
Love the blazing saddles shirt
@gbengaayodeji6480
@gbengaayodeji6480 11 месяцев назад
It will be a great thing for sangoma to do the needful immediately and I'm sure there's turn of support that will be gotten if it's let go to open source community
@markjacksonpulver3546
@markjacksonpulver3546 11 месяцев назад
I little confused. If FreePBX is open source, what stops anyone just spawning a copy and take over?
@FlorianGT396
@FlorianGT396 11 месяцев назад
How did you detect, that your auth file was changed?
@FlorianGT396
@FlorianGT396 11 месяцев назад
But how got the attacker root level access? Is the PBX application running under the root user?
@schwingedeshaehers
@schwingedeshaehers 11 месяцев назад
Probably at least a part of it.
@hhernandeza06
@hhernandeza06 11 месяцев назад
Chris, I hope that one day in the near future clearlyip get the freepbx project ownership back. Also they need to get it on a red hat distro like Rocky Linux
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
The original creator still owns his code for FreePBX. Even the code he wrote for Sangoma. He's just really not wanting to walk on Sangoma as the came to an agreement a few years ago over the signing key for FreePBX. It's just easier not to kick a hornets nest. Hopefully Sangoma would consider giving it back to him or selling it back to him.
@local-admin
@local-admin 11 месяцев назад
I honestly had to do something when azure reset the root password for some reason and I had no access to root.
@mikea8659
@mikea8659 9 месяцев назад
So as a freePBX user where do we go from here?
@colindawson4818
@colindawson4818 11 месяцев назад
FreePBX is dead, if I was looking for a PBX system, I would walk right past FreePBX.
@80robina
@80robina 10 месяцев назад
What would you say is the best other opensource PBX system
@PhuketMyMac
@PhuketMyMac 11 месяцев назад
Hopefully they’ll listen
@lancetheman28
@lancetheman28 11 месяцев назад
I lost my freepbx database last month. Wonder if some of this was at play.
@Rettro404
@Rettro404 10 месяцев назад
Honestly if you took ownership it'd probably become the best pbx hands down for home and business.
@MikeHarris1984
@MikeHarris1984 11 месяцев назад
why has FreePBX dropped all development?!??! and lettting things like other PHP vulnerabilities and such.... makes me wonder how many other zero day exploits are active in the software??? I am going to watch that DEFCON vid next... I hadnt seen that one.... I love the Defcon confrence sessions... There is so much cool stuff people are able to do and figure out.
@ironfist7789
@ironfist7789 11 месяцев назад
sounded like a $$$ issue with maintenance and they want you on the paid version... though if they get a bad reputation I could see it hurting their paid part.
@Blakspire
@Blakspire 11 месяцев назад
The Sheriff is near!
@jackcarr2763
@jackcarr2763 11 месяцев назад
Does they offer Boarder Session Controller?
@cmer79
@cmer79 11 месяцев назад
Wow. Clearly deploying FreePBX is just risky and insecure nowadays. Sangoma cannot be trusted. This is such a rookie bug.
@rallias1
@rallias1 11 месяцев назад
Wait, if it's an open source product, why're they using ioncube?
@davepusey
@davepusey 11 месяцев назад
A true ethical hacker would not have publicly disclosed a vulnerability as serious as that until it had been confirmed it had been fully patched. What he did there was unnecessarily put your customers and other in the position of being targeted by the malicious hackers with a known working exploit.
@schwingedeshaehers
@schwingedeshaehers 11 месяцев назад
What if a company doesn't patch? Don't publish it?
@davepusey
@davepusey 11 месяцев назад
@@schwingedeshaehers You could issue a warning, but certainly not publish the technical details on how to actually carry out the exploit.
@schwingedeshaehers
@schwingedeshaehers 11 месяцев назад
@@davepusey and if they still not update? There are researchers, that had problems, because they reported a vuln, and they didn't publish it. Iirc more than a year later, they were raided by police, because the vulnerability was used, even if they didn't publish anything, and didn't use it.
@kingofl337
@kingofl337 4 месяца назад
Why would Sangoma release FreePBX? If they let it die it reduces competition. If they sell or give it away they introduce another competitor.
@billhiers6715
@billhiers6715 11 месяцев назад
Whats going to replace FreepBX, is ClearlyIP going to fork it?
@j340_official
@j340_official 11 месяцев назад
Say Sayonara to Sangoma
@fbifido2
@fbifido2 11 месяцев назад
Please do a video on how they got into your system, even with all the firewalls. what was configure wrongly? Did your firewall also have a zero-day issue?
@zuighemdanmaar752
@zuighemdanmaar752 11 месяцев назад
you didn't watch the video, did you? it's all in there
@r000tbeer
@r000tbeer 11 месяцев назад
Have you tried watching the video?
@HiltonT69
@HiltonT69 11 месяцев назад
Please watch the video before making a comment that clearly shows you didn't watch the video.
@jfltech
@jfltech 11 месяцев назад
Firewalls cannot help you when the service you are allowing inside itself is compromised..
@GreenFrogMMG
@GreenFrogMMG 11 месяцев назад
This makes me wonder...Is development work still being done on Asterisk, the underlying engine of FreePBX? I mean, I see releases happening, latest one was July 2023, but how "motivated" are they to "improve" it? I assume Asterisk is the underlying engine of their cloud and paid products, which would tell me at least that they are motivated. Just curios (I got my feet wet in this field hacking asterisk files many years ago....freepbx has been a god send to make configuration much easier and faster).
@geek3point0
@geek3point0 11 месяцев назад
Asterisk is the engine for all of their commercial products so it is the one thing that does get focus. Note that focus is centric to what has a proper business case for any of their commercial solutions.
@marksapollo
@marksapollo 11 месяцев назад
Oh no! You are right though everyone gets hacked. I hope it’s resolved soon.
@mrwonk
@mrwonk 11 месяцев назад
That's really messed up that they changed their bug-bounty program after he found and notified them about a problem with their software. Just going to make them a target...
@NickMach007
@NickMach007 11 месяцев назад
Oh no!
@chaosjosh
@chaosjosh 11 месяцев назад
They're a public company....check out their share price SANG. They won't be around much longer.
@NetBandit70
@NetBandit70 11 месяцев назад
Not everyone gets hacked.
@joanelietheiligerruiz3144
@joanelietheiligerruiz3144 11 месяцев назад
what about use a sip proxy before expose the pbx to internet ?
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
It would be better to use an SBC (Session Boarder Controller). SIP proxies seem to cause more problems than they solve. You might also look into DPI/IPS (Deep Packet Inspection/Intrusion Prevention System) systems on firewalls. They look at network traffic and block or notify bad stuff based on rules you setup.
@batvetone
@batvetone 11 месяцев назад
So it's not a PHP problem. It's the poorly written application, happened to be in PHP.
@KennethLongcrier
@KennethLongcrier 11 месяцев назад
Why was the bug bounty program pulled? Your reasoning for ClearIP for assistance instead of Sangoma is probably a clear indication of why they are scrapping their Bug Bounty program.
@CrosstalkSolutions
@CrosstalkSolutions 11 месяцев назад
I don't believe that Sangoma has commented publicly on the bug bounty program being pulled. I would also love to hear an explanation about that.
@ehudgavron9086
@ehudgavron9086 11 месяцев назад
Passkeys are great toys for people who don't use Linux or Chromebooks. If you thought carrying around a Yubikey was bad, now you can be tethered to your smartphone. Sangoma? FreePBX? Stewardship. I would work for your venture. [If you knew me you'd understand that's the highest compliment.]
@mpxz999
@mpxz999 11 месяцев назад
Sangoma removing their bug bounty is really the cherry on top hahaha! No integrity
@johnwfmak
@johnwfmak 11 месяцев назад
Can ClearlyIP or the new Owner just Fork it under a new name?
@CrosstalkSolutions
@CrosstalkSolutions 11 месяцев назад
Easier said than done - in order to fork, you'd have to remove any reference to Sangoma, FreePBX, etc. and also unwind any development related to their commercial modules. Plus, you'd lose the branding.
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
@@CrosstalkSolutions This is true Chris, but have you possibly considered asking the community to help you do this? Vates did this with Xen Server and created XCP-ng which had phenomenal financial support from the community. Would you be willing to take this on if the community was behind you on it?
@galen__
@galen__ 11 месяцев назад
LOL at their attempt to delete the Bounty page. It’s still on their public server, if you view source of the old pageId 😂
@dave24-73
@dave24-73 11 месяцев назад
This is what happens when money becomes more important then the product, you ultimately kill the goose that laid the golden egg. Greed destroys so many companies these days. They need to be aware of potential reputation damage, look at Unity as an example. If they allow free pbx to decline under their own label people may stop dealing with them full stop. Better separate the two now or add more development to it.
@UnixGoldBoy
@UnixGoldBoy 11 месяцев назад
Sangoma is dead in the water and forever tainted.
@davidew98
@davidew98 11 месяцев назад
Reach out to me if you take over the project. I’d like to try to help as much as I can.
@jfwfreo
@jfwfreo 11 месяцев назад
If FreePBX is open source, maybe its time for someone to fork it and create a new version without all the issues.
@zadekeys2194
@zadekeys2194 11 месяцев назад
Sorry you had to experiance this. Nmap cve scan on a weekly / bi-weekly bases is a simple step in the right direction.
@HopelessAutistic
@HopelessAutistic 11 месяцев назад
Open source, open standards, publishers that give out the source code for free but yet want to make money for their work...this hot mess makes you appreciate them 1A2 key systems huh?
@darkkknight74
@darkkknight74 11 месяцев назад
man love your content but that white string or cable hanging over a blue wall draws attention from your video
@balla2172
@balla2172 11 месяцев назад
The actually just. Tells? Us. That? Saying goma really does not care about the security of their product
@jeffsadowski
@jeffsadowski 11 месяцев назад
This is one area I do not see anything else close in the open source community to replace the open source asterisk and the only real feature complete version of asterisk is from FreePBX. Seems to work good but it looks like a dying project.
@PosiP
@PosiP 11 месяцев назад
Just give it back to Tony
@hescominsoon
@hescominsoon 11 месяцев назад
time for clearlyip to fork freepbx?
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
Totally agree! They are the only ones that seem to know what they are doing.
@hescominsoon
@hescominsoon 11 месяцев назад
sangoma is acting scummy...raking a root exploit as minor...removing their bug bounty...
@JonGeorge-j6h
@JonGeorge-j6h 11 месяцев назад
In my opinion they were acting that way back when the creator of FreePBX left Sangoma for similar reasons. Even worse is how they treat people on their forums looking for support from the community.
@TJWood
@TJWood 11 месяцев назад
When corpo gets to write the patch notes and manage the bug bounty programs... 0 faith..
@HiltonT69
@HiltonT69 11 месяцев назад
Sangoma sounds like scum with their Bug Bounty poor response. And FreePBX is barely ever maintained and kept up to date...
@pepeshopping
@pepeshopping 11 месяцев назад
“Everyone gets hacked!”. Said the helpless “pro” techies.
Далее
Top 5 Tips for Easy Online Privacy
21:36
Просмотров 55 тыс.
Yes, I still use a landline.
11:27
Просмотров 15 тыс.
How Hackers Move Through Networks (with Ligolo)
20:01
Просмотров 271 тыс.
RingCentral Exposed: How They Rip Off Businesses
10:07
You Need to Learn This! Cloudflare Tunnel Easy Tutorial
33:53
Starlink Mini In-Depth Setup and Review
17:20
Просмотров 481 тыс.
The Home Server I've Been Wanting
18:14
Просмотров 13 тыс.
КОМП-ФРАНКЕНШТЕЙН
1:00
Просмотров 104 тыс.
iPhone vs Samsung
0:25
Просмотров 10 млн
iPhone 16 Pro Max - Ochib ko'ramiz
10:54
Просмотров 159 тыс.
Самый дорогой iPHONE 16 PRO MAX #shorts
0:58