This may be workable for incoming calls, but I don't see how you can get the ATA to create the secret for initiating a call. You'd also need to mess with your infrastructure a bit. Your DHCP server needs to give the ATA the IP for a "special" DNS server that can fool the ATA into talking to your box instead of Vonage. Your box then needs to forward the registration request, substituting it's own address. You'll probably be able to register and receive calls that way. To send calls, you'd have to learn the secret, or somehow get the ATA to initiate the call (maybe by plugging it into an FXO port... But hey, then you're already connected anyway...)
I think if you're attempting to go that route, maybe it's smarter to simply impersonate the ATA entirely and retrieve the set-up information from Vonage. Watch for TFTP traffic and see what goes back and forth (changing the bandwidth-saver option on my ATA186 usually initates a reload). I have a general idea on how to crack the ATA186 config info, couldn't tell you what to do with the Motorola. If you do end up writing a little piece of software that impersonates an ATA, that would be worth a few bucks to me, because I can unplug the hardware ata and cancel my softline... > -----Original Message----- > From: Wolfgang S. Rupprecht > [mailto:[EMAIL PROTECTED] > Sent: Friday, July 09, 2004 3:09 PM > To: [EMAIL PROTECTED] > Subject: Re: [Asterisk-Users] vonage.ca * integration possible? > > > > [EMAIL PROTECTED] (Brian McSpadden) writes: > > Your problem with doing this is this line right below...you have no > > idea what your authentication secret is. This is a closely guarded > > secret of Vonage. They don't have any interest in letting anyone do > > this. The closest you could do would be a softphone, > unlimited inbound > > and 500 mins outbound calling. There are sample configs floating > > around out there to make that work. > > > > On Fri, 9 Jul 2004 10:28:06 -0400 (EDT), [EMAIL PROTECTED] > > <[EMAIL PROTECTED]> wrote: > > > > Authorization: Digest username="1905XXXXXXX", > > > > realm="216.115.25.187", nonce="720170349", > > > > uri="sip:bspgroup1.bsp.vonage.net:5061", > > > > response="6a2fe5ec7b98a098aaf82a7dfc1340aa", algorithm=MD5 > > I thought the same thing at first, but then started wondering > about a man-in-the-middle attack. > > Supposed asterisk simply used the Motorola ATA as a "dongle" > and forwarded any tough authentication questions to the ATA > and forwarded the ATA's answers back to the remote SIP > server? Could that be made to work? _______________________________________________ Asterisk-Users mailing list [EMAIL PROTECTED] http://lists.digium.com/mailman/listinfo/asterisk-users To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
