[EMAIL PROTECTED] (Brian McSpadden) writes:
> Your problem with doing this is this line right below...you have no
> idea what your authentication secret is. This is a closely guarded
> secret of Vonage. They don't have any interest in letting anyone do
> this. The closest you could do would be a softphone, unlimited inbound
> and 500 mins outbound calling. There are sample configs floating
> around out there to make that work.
> 
> On Fri, 9 Jul 2004 10:28:06 -0400 (EDT), [EMAIL PROTECTED]
> <[EMAIL PROTECTED]> wrote:
> > >         Authorization: Digest username="1905XXXXXXX", realm="216.115.25.187", 
> > > nonce="720170349", uri="sip:bspgroup1.bsp.vonage.net:5061", 
> > > response="6a2fe5ec7b98a098aaf82a7dfc1340aa", algorithm=MD5

I thought the same thing at first, but then started wondering about a
man-in-the-middle attack.  

Supposed asterisk simply used the Motorola ATA as a "dongle" and
forwarded any tough authentication questions to the ATA and forwarded
the ATA's answers back to the remote SIP server?  Could that be made
to work?

-wolfgang
-- 
Wolfgang S. Rupprecht                http://www.wsrcc.com/wolfgang/
openbsd amd64 http://www.wsrcc.com/wolfgang/ftp/asterisk-openbsd35.patch
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to