>       If you meant the user running Asterisk is root, this is a less than
>> optimal
>>       situation that can lead to really big problems.
>>
>> Why? Steve please explain.
>>
>
> Well, if an attacker manages to inject some code and Asterisk is running
> as root, poof goes your system or you get an astronomical bill from your
> trunk provider.
>
> Likewise with file permissions. Suppose you're trying to get something
> working and you suspect it's a permissions issue so you chmod a bunch of
> stuff to 777.
>
> Then suppose a local user with a grudge does something like this:
>
>         echo '#exec rm --farce --recursive /*'\
>                 >>/etc/asterisk/extensions-**local.conf
>
> (or whatever your package names one of it's 'include' files.)
>
> The next time Asterisk reloads the dialplan, poof.
>
>
any link for me so i can learn more about security practices with asterisk?
i'm using a public ip.
--
_____________________________________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
               http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to