Linux-Based Phone System Phones Home 164
An anonymous reader writes to let us know that users of Trixbox, a PBX based on Asterisk, recently discovered that the software has been phoning home with statistics about their installations. It's easy enough to disable, and not particularly steathy (beyond encrypting the data sent back), but customers in the forum are annoyed at not having been informed of the reporting. Trixbox is owned by Fonality, which makes customized PBXs (again based on Asterisk) for paying customers.
Trick Box (Score:5, Funny)
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:3, Funny)
Re:Trick Box (Score:5, Informative)
AsteriskNOW isn't ready for prime-time yet, though it shows promise long-term.
If you don't want to compile Asterisk yourself and yet you still want to use FreePBX (and you really should!), I highly recommend you check out Nerd Vittles, http://www.nerdvittles.com/ [nerdvittles.com] instead -- everything that Trixbox CE could have been.
Re: (Score:2, Informative)
Re: (Score:2, Informative)
Me too! Those guys wanted to work with Trixbox devs, and finally gave up and rolled their own, which is the new PBX-in-Flash voip server. The true open-source devs have released a truely wonderful and solid server. They asked for donations to fund a server, and I'm so impressed with my phone server, humming away for a few weeks already, of course I'm donating; I want more good stuff in the future, and want these PBX-in-Flash devs to stay motivated. Great stuff g
Re: (Score:1)
You can download http://centpbx.org/ [centpbx.org]
Re: (Score:1, Funny)
So? (Score:4, Informative)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
I wonder if to counter-act this, open-source projects will start to release, in addition to the source, all of the compilation settings, etc. which were used to create their released binaries, so that anyone
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Somebody will notice, if it is a popular project. They won't notice from looking at the source, but some people have nothing better to do than run arbitrary binaries in a debugger, looking for anomalies. If it is a network anomaly, such as phoning home, it is even easier, because it w
Re: (Score:2)
a rouge debian developer could easilly upload a compromised binary to the archive without being noticed.
Re: (Score:2)
So?-OSS or Bust. (Score:1, Funny)
Damn! There goes all the FreeBSD battles.
Re: (Score:1)
-----
http://www.internet.gen.tr
Re: (Score:2)
Stats are useful (Score:2)
So what if anonymous stats are collected?
Re:Stats are useful (Score:5, Insightful)
Re:So? (Score:4, Insightful)
Re:So? (Score:5, Informative)
Re: (Score:2)
> installer you've ever used, and never just glossed over any detail.
Yes, of course.
Re:So? (Score:4, Insightful)
Re: (Score:2)
Yes you can (Score:2)
Re: (Score:2)
Re: (Score:2)
They are not in highschool English. They're in legalize that often has a very specific meaning that does not match common usage meaning.
an example- not so bad (Score:2)
Let's look at an excerpt from an MS EULA:
i.Distribution Restrictions. You may not
alter any copyright, trademark or patent notice in the Distributable Code;
use Microsoft's trademarks in your programs' names or in a way that suggests your programs come from or are endor
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
So, unless someone actually is distributing code covered by that EULA specifically for the purposes of running it under WINE, then I really don't see how anyone is violating it simply by using WINE.
Re:an example- TERRIBLE (Score:2)
You must have a very different definition of the word concise.
You take a very small excerpt from a random MS EULA and point out that it can be understood. So what. Quote the other 20 pages and see how reasonable it is. But that sounds like an exaggeration so let me produce something sol
Re: (Score:3, Insightful)
Oh and by the way reading Meliville and Shakespeare is called getting an education. It serves a purpose to learn about other times, other places, other language and about heritage. In contrast, reading a EULA is just a complete waste of time. If one does not understand the difference, then one's education has failed one miserably.
Re: (Score:1)
Wrong (Score:2)
Apparently selling a commercial version of their software doesn't give them enough money, they have to covertly do this as well.
The key mistake they made here is that they made it opt-out and difficult for an inexperienced user to opt-out.
The correct move would have been to provide a separate page during the install that said in big bold letters,
"WOULD YOU LIKE TO SUBMIT YOUR USAGE, HA
Re: (Score:2)
If they want to sell that inf
Re: (Score:2)
Without being cynical. Oh wait, I can't do it that way..
There's one reason, because it makes for a story that seems on first glance to be sensational, and thus survives the firehose.
Is Microsoft Invading Slashdot? (Score:1)
Re: (Score:1)
Re: (Score:2)
Why not? Almost every IT "professional" I have to deal with on a daily basis advocates the same. It seems that since every n00b and his dog is advocating it then it must work!
Re: (Score:2)
eh? (Score:4, Insightful)
What's the problem here?
Re: (Score:1)
Re: (Score:2)
if the data is encrypted then only those that know how to decrypt the data can read it, everyone else has no idea what that data is
Not completely true. Once you dive into the source, you can verify whether the information that's being packaged is indeed the information they say they're collecting. Their EULA (apparently) says they're collecting the information, so you know they have it. But what of anybody who intercepts it? Granted, it's not particularly useful information, but it's good standard procedure to encrypt this sort of thing anyway, especially when the client has the benefit of the transparency of OSS.
Re: (Score:1)
Re: (Score:2)
The problem is that they forgot basic civility and politeness. They didn't ask for permission to collect information about my installation. I ma
Re: (Score:2, Interesting)
Re: (Score:2)
Yes they did, in the user agreement. People just didn't read it.
I think that's a perfectly reasonable place to say that they will be collecting information. People say "but nobody reads those", but if you get vendors to start putting all those reminders somewhere else, then that new place will soon become thick with notifications and people will stop reading it too.
If you care enough to be upset about something like t
Re: (Score:2)
We're too much of a warning label society as it is. "Warning, about to connect to another VOIP phone." "Warning
Re:eh? (Score:5, Insightful)
First of all, your claim isn't true. Here's what it currently sends back the output of: Note that it sends the registration data on every request. Which means the other data isn't anonymous.
But, and this is much more alarming, it also can execute arbitrary commands. It connects to the remote server, asks it what to execute, and then executes it. That's VERY scary, no matter what is currently collected. Imagine a hacker getting access to the server customers connect to.
Re: (Score:2)
Does this software run setuid root?
Of course, even if it is not, this is a huge issue.
Re: (Score:2)
Re: (Score:2, Interesting)
Just the fact that the trixbox developers have shown a serious lack of understanding when it comes to security makes it a lot more likely that a hacker can gain access to the webserver that's being hit on by all the installed trixboxes. All you do then is tell it to go download and install some tasty rootkit.
Presto. Instant botnet for some script kiddie to
Re: (Score:2)
1. I KNOW update services get back executables and I can take the expected precautions. Something which is supposed to simply send data back I do not ASSUME also executes random commands from a server, that's just utterly baffling and stupid and counter-intuitive.
2. I either run update programs manually or I have them only automatically tell me there are updates. Updates are NOT installed automatically and it is unlikely that I would miss a hack of the windows servers.
3. Upd
Re: (Score:2)
This is why linux distros have moved towards digitally signing thier repositries and if MS has any sense then they will have done the same for windows update.
Of course if the master key and the distribution network are both comprimised then it gets about this nasty but I would imagine they take quite substantial precautions to stop this happening.
Re: (Score:2)
Well that would suck donkeyballs. You know what would suck even more? If you were a Fonality Customer. The same company also runs Fonality (PBXtra) and with that service all changes are made on their servers first and then their servers change the settings in Asterisk on your phone server. I used this service and it worked well for almost everything we wanted it to do. They had 24 hour service if the phone system ever went down. I've call
Re: (Score:2)
Re: (Score:2)
Connects to the servers at home and DOWNLOADS a list of commands to execute as root.
From the comments on the file:
# This file is design to be executed regularly by an external controller such as cron.
# It retrieves a list of commands to be executed from the specified URI and executes them, saving the output
# and returning it to the webserver as an encrypted string.
So a quick and dirty analysis shows the following:
If someone poisons your DN
Security Vuln (Score:5, Informative)
Mod parent up (Score:5, Informative)
In what universe does this seem like a good idea?
Re:Mod parent up (Score:4, Informative)
What a terrible design! I worked for a couple of years on a FOSS product whose commercial version phoned home by design. It was a small server that allowed remote configuration changes via our NOC. The idea was to provide basic systems admin functionality for multiple geographically dispersed servers. Man-in-the-middle attacks - in either direction - were one of the primary concerns, second only to the privacy of the customer.
We vetted every byte, incoming or outgoing; we worried constantly about both sides of the the authentication process, addressed DNS poisoning and coped properly with pwned clients as well. We never ever passed anything but text between the server and the NOC. Even anti-virus signature updates were performed out-of-band with the 'phone-home' process.
Allowing execution of arbitrarily defined scripts is a disaster in the making. The trust model is entirely wrong, for one thing. I understand now why the manufacturer didn't want to talk about, because no sysadmin in his right mind[*] would accept that someone outside the organisation should ever have the right to run arbitrary code on their boxes without prior vetting.
*****
[*] Unfortunately, 'sysadmins in their right mind' is a far-too-small subset of all sysadmins....
Re: (Score:2)
Of course if said software was installed in the first place then the vetting process is obviously completely worthless anyway...
Re: (Score:2)
Do you disagree with the usage of software like CFEngine and Puppet? They work in an identical fashion. The key difference is who controls the server which issues the updates, however even then, most people blindly take updates to their OS, so the same trust issues apply there.
Re: (Score:2)
Yes, that's right. This is the same software that pays my checks AND takes payments for city services. And the company wants to have our servers here connect up over http ( not https ) to pull sql scripts to run.
This about says it all (Score:5, Informative)
From the forum:
I used to be the lead developer.. (Score:5, Informative)
The only other slightly information-divulging bit of information was the built-in IRC client did a 'uname -n' and specified what distro the client was running. It broadcast that in a 'notice' to the FreePBX channel. This was highlighted on the IRC page, with exactly what would be sent.
FreePBX has NEVER 'phoned home'. I would be amazingly upset if it was doing so now. Trixbox, on the other hand, may do that, but please do NOT link the FreePBX project with it.
--Rob
Re:I used to be the lead developer.. (Score:5, Informative)
So, when someone mistakenly says 'trixbox does...' they usually mean 'freepbx does...' as FreePBX is the GUI Trixbox uses to configure Asterisk.
--Rob
Make your own Linux-based PBX system (Score:5, Insightful)
--
Educational microcontroller kits for the digital generation. [nerdkits.com]
Re: (Score:2, Informative)
They're pieces of crap. Do yourself a favor and get yourselves phones intended for real business use.
Cisco and Polycom make the later.
Re: (Score:2)
Kerry already addressed this in his blog (Score:2, Informative)
http://www.trixbox.org/trixboxs-new-hardware-audting-tool [trixbox.org]
Opt-OUT? (Score:1)
All opt-out does (for anything, not just this) is tell me I'd *REALLY* want to turn it off, because someone figures the only way to get it switched on is to have it on by default and at least some will miss it or fear changing any default settings.
way out of proportion (Score:1)
"my phone system is transmitting my credit card number to a multi-million dollar commercial entity who is only interested in robbing all the people who use its FREE software solution, because this established entity doesnt make any money on their commerc
Um (Score:4, Insightful)
Re: (Score:3, Insightful)
It is possible for a person to be unhappy about two different things. And I don't recall anyone saying anything about the phone companies, including whether they were more or less upset about this or that.
Re:Um (Score:4, Insightful)
Min.
And now the obligitory MS Comment (Score:1)
but since it's an "open source" tool it's
* not that big of a deal
* Shoulda been obvious to you n00b
* Duh Read the EULA
Hypocrites all
Linux needs something like Zone Alarm (Score:2)
It's another example of why Linux needs something like the functionality that Zone Alarm provides whereby an interactive user is always prompted before a program is allowed to connect to the internet. I for one do not want any program whatsoever to be able to connect to the outside world before I have expressly given my permission.
Give the way companies like Sony & Microsoft have behaved in the past vis a vis "phoning home" & rootkits etc. I no trust any program
Re: (Score:2)
First off, you wouldn't use anything you didn't actually compile yourself, would you? While you're at it, you better look over the code for anything that someone submitted without completely checking also. There are thousands of users out there depending on YOU for the well-being of their systems. Be part of the team. Use (and verify) open source.
Assuming all users are going to do this is the first step in any open source venture. If you're not capab
Our bias (Score:3, Insightful)
So if an OSS project does the same why should be any less outraged? Its still a violation of any sort of professional ethics. It doesn't matter that the script is in clear text on the system, who here has the time to go through every script on a new installation of their favorite distribution?
We trust the package suppliers to disclose anything we need to know about. If that trust is breached we call them to task on it.
Well the trust has been breached in this case and the community needs to call the developer to task on it so that it's clear that this sort of behavior is unacceptable. I've read some comments that you're getting it for free. So it would be acceptable for Linus to start including arbitrary command execution backdoors into the kernel?
Remember the Trojan Horse didn't have a price tag attached either!
Min
Additional interesting articles about this issue (Score:3, Insightful)
The freePBX team has also commented [freepbx.org] on the issue. In short they want to make it clear that running arbitrary commands sent from the Fonality server is a trixbox/Fonality issue and has nothing to do with freePBX. FreePBX's "phone home" functionality is just a "check for updates" sort of thing. Of course if the modules are not digitally signed and verified, then a man in the middle attack is still possible and malicious versions of modules with a little "extra goodness" added could be sent to the pbx for automatic installation.
tribox is a bad deal from the getgo (Score:3, Interesting)
Ive run A@H 1 and 2 and even trixbox... and i must say... ever since KerryG and fonality took full control and essentially "killed" the A@H branding/identity/ethic/attitude the projec has gone seriously downhill.
Ive had run-ins with kerry before... and all ill say in this public forum is that the guy really isnt a positive influence.
The forking of the porject into CE and Commercial versions was only exacerbating the underlying shift towards an essentially exploitive distro. Requiring a internet connection to trixbox in order to configure your own box? requiring a user account on their site to configure what is obstensibly supposed to be open source based projects? Maybe these actions arent WRONG per say... but cetainly the ethics are questionable.
The truth is, ever since it went this way, ive actually decided NOT to upgrade my A@H 1.3 version. The bells and whistles arent really worth it.
Im hoping some other distro, or fork will come along that remains true to the principals they started with.
Its really sad to see, consdiering how excelent the work that went into A@H / trixbox is. These guys have done a wonderfull job packaging several complicated and time-consuming products together into an easy and accesable distro. However... somewhere along the way someone *cough* kerry *cough* fonality *cough* decided to push those efforts into LOCK-IN style profitability.
(theres nothing wrong with getting commercial support pacakges... but forcing people to sign up to your organization and forking a far less than active sub-version on your comomunity is an insult)
Re: (Score:2)
TB [trixbox.org] phone home!?
Re: (Score:1)
Re: (Score:2)
Because the very meme "phone home" is a reference to that quote in the movie.
Re: (Score:1)
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Indie Rock Pete? [dieselsweeties.com] Is that you?
Re: (Score:2)
Indie Rock Pete would use Plan 9.
Re: (Score:1)
My main concern is the system is checking for any new commands off their server to execute this is disturbing kerry didnt mention this feature in his blog when he came clean about the stats collection.
Hopefully there will be options to still transmit some statistics but still be able to disable remote
Re: (Score:2)
Re: (Score:2)
Happy with 2k, which works pretty well? Sorry, we're moving everyone to XP, so we'll strong-arm the hardware vendors into XP-only drivers (which precludes the victim from buying new hardware WITHOUT buying XP), and, of course, the latest licenses for applications code will be XP-only, and, although it is quite illegal, we'll require you to use an MS-Windows OS to fetch updates, even for applications.
Happ
Re: (Score:2)
-Mike