Preferences

Polycom phones are really great... I deployed VOIP for my employer some years ago and put in about 40 Polycom devices in 4 states. They're not cheap, but full featured and very well made.

You could also get an ATA (https://www.amazon.com/Grandstream-HT801-Single-Port-Telepho...) and plug a traditional phone into it. I used one of these at home for a long time. Just realized it's still plugged in an running and I threw out my last analog phone over a year ago!!!


And ATA's are an excellent backdoor into computer networks because the caller ID uses an old dialup modem protocol...
A big thank you to everyone responding with information, apologies for responding only here. It looks like there is indeed still a lot for me to learn, but now I have some pointers. I have been meaning to get my hands dirty with SIP for some time, dreaming of a setup with multiple accounts and control over things like when each account allows incoming calls, etc. But, as Terry_Roll indicated, there seems to be plenty of security considerations as well which makes me somewhat uncomfortable.

Also found the /r/VOIP subreddit [1] which has plenty of reading.

[1]: https://teddit.net/r/VOIP

Could you elaborate? What's the attack vector here?
You have a device that is capable of handling the caller ID standard which passes data using the v23 dial up protocol. https://en.wikipedia.org/wiki/Caller_ID#Regional_differences

Can you remotely update firmware on modems?

Some devices can be updated remotely as these helpful guides explain. https://www.draytek.co.uk/support/guides/fw-remote https://www.ewon.biz/technical-support/pages/firmware/modem-...

So can a specially crafted string from the phone line be used to update firmware on ATA's? If they can handle v23 protocols for Caller ID, this indicates some modem capabilities does it not? So can the device differentiate which interfaces the commands are coming in on?

Why do people implicitly trust the telco's? Here in the UK, if you can get fast broadband, basically anything above ADSL2+, you'll be connected to a Broadcom cabinet. Broadcom have their bugs as well, you can find them on their website, but its a less common attack vector because its not public facing as such, unlike calling a business on their freephone number and then getting a second dial tone like in the old days of phone phreaking.

TLDR is just look at these devices as circuit boards, convention can be used to hide attack vectors and whilst the circuit design can help make a device secure, the easier or more convenient it is to update a device, the easier it is to hack, its not like taking a EEPROM out to blank under UV light and re flash it, is it?

V.23 FSK is just the name of modulation. You can have CLIP receiver as separate IC (https://www.microsemi.com/product-directory/caller-id/4305-m...) or as some DFT code with Goertzel algorithm with maybe 0.1 MIPS DSP budget allowed. No sane person would add full modem capabilities to this.

That said, PABXs I worked with have built-in software modems (both POTS and ISDN, needs to be explicitely enabled) with remote management capability and there is also dedicated web portal for management even if device is behind NAT (paid feature). Whether you want to trust hardware/software you have no control of - that's another story. For "big" PABXs partnership between manufacturer and installers usually lasts for years.

This item has no comments currently.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal