Were having some intermittent network difficulties that may affect the Asterisk community services listed below. You may experience an outage for a few minutes sometime during the next 30 minutes to an hour while we swap out some networking equipme..
Author : Pavel Espinal
As system administrator, monitoring the continuity of services is vital. Today I would like to highlight some tools that could come in handy for VoIP monitoring.NagiosFor those of you who didnt know it, Nagios can be configured to monitor pretty m..
The Asterisk Development Team has announced the release of Asterisk 10.5.0. This release is available for immediate download. The release of Asterisk 10.5.0 resolves several issues reported by the community and would have not been possible with..
On Sunday, April 29th, 2012, the Asterisk community services listed below will be undergoing maintenance (software upgrades and updates). The services will be shut down at approximately 9:00 PM CDT (2:00 AM April 30th UTC), and will return no la..
In the Skinny channel driver, KEYPAD_BUTTON_MESSAGE events are queued for processing in a buffer allocated on the heap, where each DTMF value that is received is placed on the end of the buffer. Since the length of the buffer is never checked,..
A user of the Asterisk Manager Interface can bypass a security check and execute shell commands when they lack permission to do so. Under normal conditions, a user should only be able to run shell commands if that user has System class authorizati..
To put it simply, is the process where Asterisk tries to redirect the RTP media stream to go directly from the caller to the callee. Be careful that some devices do not support this (especially if one of them is behind a NAT). The default setting..
If you were asking if E&M over E1 signalling works on top of R2, ISDN and where can you find a sample Dahdi configuration? Then, no it doesn’t. E&M signalling is the same layer as R2 and ISDN. It is an alternative to them, not anot..
Decrementing the CSeq header field value is directly in violation of RFC 3261. From section 22.2: When a UAC resubmits a request with its credentials after receiving a 401 (Unauthorized) or 407 (Proxy Authentication Required) response, it M..