text stringlengths 0 152 |
|---|
Conclusion 340 |
20. WebRTC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 |
The Browser as a Telephone 343 |
Preliminary Knowledge 344 |
Configuring Asterisk for WebRTC 345 |
x |
| |
Table of Contents |
Cyber Mega Phone 347 |
More About WebRTC 349 |
Conclusion 350 |
21. System Monitoring and Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 |
logger.conf 351 |
Reviewing Asterisk Logs 353 |
Logging to the Linux syslog Daemon 354 |
Verifying Logging 355 |
Log Rotation 355 |
Call Detail Records 356 |
CDR Contents 356 |
Dialplan Applications 357 |
cdr.conf 358 |
Backends 359 |
Example Call Detail Records 364 |
Caveats 364 |
Channel Event Logging 365 |
Conclusion 365 |
22. Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 |
Scanning for Valid Accounts 367 |
Authentication Weaknesses 368 |
Fail2ban 368 |
Installation 369 |
Configuration 369 |
Encrypted Media 371 |
Dialplan Vulnerabilities 371 |
Securing Asterisk Network APIs 373 |
Other Risk Mitigation 373 |
Resources 375 |
Conclusion—A Better Idiot 375 |
23. Asterisk: A Future for Telephony. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 |
The Telephone Is Dead (Except When It’s Not) 378 |
Communications Overload 378 |
The Problems with Open Source Development 379 |
The Future of Asterisk 380 |
WebRTC 380 |
The Future of Telephony 380 |
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 |
Table of Contents |
| |
xi |
Foreword |
When contemplating the foreword for every edition of this book, we always had more |
people we’d like contributions from than pages we could spare. In this fifth edition, |
we’ve again asked a select group of people from the Asterisk community to write a |
few words about Asterisk from their perspective. |
Joshua Colp (Senior Software Developer, |
Sangoma/Digium) |
Over 15 years ago, I downloaded Asterisk onto my laptop and placed my first VoIP |
call using IAX2 to the Digium PBX. I held my breath in anticipation, waiting to hear a |
voice, until finally the sound of Allison came out of my laptop. At that point I knew |
there was something special to Asterisk. It lit this spark of interest and imagination in |
me: my laptop had actually placed a call! The realization that with only a little effort I |
could take calls and do with them what I wanted was addictive and exciting—a senti‐ |
ment shared by many to this day. |
Asterisk today is vastly different from how it was during that time. In the past, it was |
primarily focused on being a PBX. It had all of the features and continued to gain new |
ones to propel it further into that area. Over time, however, the project has evolved to |
one where Asterisk is a toolkit that can be used alone or in combination with other |
projects to build things. It’s there to spark the question of “Can I do this?” in your |
mind and allow you to see it through. |
This simple question is what drives many of the decisions made about Asterisk and |
its direction. “Is this right for the users?”, “Is this what people truly need?,” “Does this |
break things?,” and “Can they build what they want with this?” Together, these ques‐ |
tions help ensure that people can realize their ideas. This is what excites me about |
Asterisk today—seeing people use the tools to create something new without |
hindrance. |
xiii |
I think that, going forward, this will continue for Asterisk. It will continue to add new |
tools and functionality to provide greater flexibility and options for those building |
things, while respecting its legacy and how users already use it. It will continue to be |
part of bigger and better solutions, some of which may not even come to mind now. |
We’ve only taken a few steps forward and have many to go. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.