It's bad security practise for your border router to house your phone service or be a wifi AP. Just saying.
> On 2017/Jun/02, at 1:01 PM, David Lochrin <[email protected]> wrote: > > Recently I bought a modem / router / firewall / etc. which includes a VoIP > (FXS) port from an Australian supplier (it wasn't bought on the 'net!). This > device seems to be widely distributed by ISPs for NBN connectivity, however I > soon found some problems. > > (1) The default telephony configuration was entirely Chinese so the > call-progress tones and ring cadence were those for China, though this has > apparently been rectified in a subsequent firmware update. However URLs > associated with the H248 and MGCP (Media Gateway Control Protocol Gateway) > protocols, while technically valid in that context, still link to Chinese > corporations. > > (2) If a user's ISP doesn't prepend their area code to 8-digit dialled > numbers, then it's necessary to dial the whole 10 digits, even when calling > the people next door. Of course this issue raises wider questions because a > POTS subscriber's area code is physically associated with their copper but a > VoIP service is portable. > > (3) Pottering around in the O/S revealed two URLs linked to a European site > but with no obviously valid purpose, which immediately raised suspicions of a > back-door or other security issue. The supplier responded that "I agree that > this files have no obvious purpose and have been left for no obvious reason > but I can confirm that it is not suspicious and does not compromise security > or firewall of the device." How they arrived at this comforting conclusion > wasn't stated. > > (4) Whirlpool commentary indicated significant performance & stability > problems, although it seems these have all recently been fixed too with the > latest firmware update. > > > This device and a Huawei product appear to be physically identical, though > the latter may have more features. I'd guess it all comes from China Inc. > one way or another. > > It's interesting to reflect that the NBN project originally placed NBN > hardware of known performance in customer premises. However the > "multi-technology mix" relies on unknown third-party devices, except possibly > for FTTP services. Who do I now complain to regarding poor voice quality - > the ACA? > > Has Malcolm's new cyber-security Tsar considered these sorts of issues? > Suppose 50% of the NBN terminating devices supplied to Australian users > contained malware (of whatever origin) which could be operated in a > controlled way... > > David L. > _______________________________________________ > Link mailing list > [email protected] > http://mailman.anu.edu.au/mailman/listinfo/link -- Kim Holburn IT Network & Security Consultant T: +61 2 61402408 M: +61 404072753 mailto:[email protected] aim://kimholburn skype://kholburn - PGP Public Key on request _______________________________________________ Link mailing list [email protected] http://mailman.anu.edu.au/mailman/listinfo/link
