Re: [asterisk-users] Security tests

2010-05-02 Thread Daniel Bareiro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, Steve. On Fri, Apr 23, 2010 at 22:38:49 -0300, Steve Totaro wrote: Perhaps it was not very clear, but yes, I was talking about this. I believe that I found the cause of the problem. The cause by which I was not seeing VoIP traffic between

Re: [asterisk-users] Security tests

2010-04-23 Thread Daniel Bareiro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El jueves 22 de abril del 2010 a las 14:33:01 -0300, Philipp von Klitzing escribió: Hi! Hi, Philipp. But it draws attention to me between the PC with softphone and the telephone I see traffic ARP or ICMP that could make to try between the

Re: [asterisk-users] Security tests

2010-04-23 Thread Steve Totaro
On Fri, Apr 23, 2010 at 9:14 PM, Daniel Bareiro daniel-lis...@gmx.netwrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 El jueves 22 de abril del 2010 a las 14:33:01 -0300, Philipp von Klitzing escribió: Hi! Hi, Philipp. But it draws attention to me between the PC with softphone

Re: [asterisk-users] Security tests

2010-04-22 Thread Philipp von Klitzing
Hi! But it draws attention to me between the PC with softphone and the telephone I see traffic ARP or ICMP that could make to try between the equipment but does not see RTP. Is there some special consideration that it must to observe? Your English is seriously twisted, making your question

Re: [asterisk-users] Security tests

2010-04-22 Thread Gordon Henderson
On Thu, 22 Apr 2010, Philipp von Klitzing wrote: Hi! But it draws attention to me between the PC with softphone and the telephone I see traffic ARP or ICMP that could make to try between the equipment but does not see RTP. Is there some special consideration that it must to observe? Your

[asterisk-users] Security tests

2010-04-21 Thread Daniel Bareiro
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all! In the network of my house I was testing the security with my Asterisk installation. The first test that I'm doing is an man in the middle attack. In this scenary, the attacker is a virtual machine that it tries to see the SIP traffic