This article will cover the process of IAX clients configuration in Asterisk. There are three authentication methods that are supported: MD5, plaintext and RSA. The least secure is “plaintext”, which sends passwords cleartext across the net. “md5” uses a challenge/response md5 sum arrangement, but still requires both ends have plain text access to the secret. …
Tag: trunk
Jul 22 2020
Understanding Asterisk IAX authentication
This article explains the process that Asterisk uses to authenticate incoming and outgoing IAX2 connections. Reference to “type=user” in the text below should be assumed to include “type=friend” as well, since a friend can act as a user. The same assumption holds for “type=peer” references below.