Quote from: Mango on June 16, 2015, 07:21:13 PM
Better yet, place your device behind a firewall.
There have been reports - very few, but not nonexistant - of scanners finding and attempting to exploit VoIP equipment with port numbers above 6000. If your VoIP equipment is behind a restricted cone NAT firewall, the firewall will only allow traffic from your service provider to reach your equipment. For everyone else, there will not be any indication that VoIP hardware even exists.
No doubt excellent advice, but a lot of folks (including me
) probably have no idea what that means and are too lazy (including me) to Google it. I think my port is exposed by a stun server (yeah, go ahead, beat me down for that) since the OBi is behind a router (not expensive) that serves as a firewall of sorts and there are no port forwards setup in the router. The OBi is not registered to either IPKall (not allowed) nor Callcentric (don't want to). I guess I could go figure out the IP addresses for IPKall and Callcentric and put them in the X_AccessList but I'm too lazy. I'm so lazy I'm surprised I'm even typing this message. Someone in another post suggested using ports in the 20000 to 65535? range. I didn't go that extreme because it would have involved typing extra digits (you know that lazy thing).
Is someone going to commandeer my OBi and launch rockets or something? Or will my phone just ring again at 2am if someone finds my port? I have no virtual PBX and am too lazy to go figure that tech out as well.
<serious>But seriously, what are the risks of a hacker taking over the OBi if they find an open SIP port?</serious>
I always enjoy your informative posts and hope you see the hopefully humorous spirit I have while writing this.
I'm no network guru and if you can't tell already, this stuff ceased to be fun for me months ago.