Blue Box #78: Cisco IP phone vulnerabilties, WiFi handset insecurity, IETF security-related news, VoIP security news, listener comments and more

Synopsis:  Blue Box #78: Cisco IP phone vulnerabilties, WiFi handset insecurity, IETF security-related news, VoIP security news, listener comments and more


Welcome to Blue Box: The VoIP Security Podcast #78, a 40-minute podcast  from Dan York and Jonathan Zar covering VoIP security news, comments and opinions.   

Download the show here (MP3, 17MB) or subscribe to the RSS feed to download the show automatically. 

NOTE: This show was originally recorded on February 25, 2008. Yes, that was two months ago… we know!

You may also listen to this podcast right now:

Show Content:

Comments, suggestions and feedback are welcome either as replies to this post  or via e-mail to blueboxpodcast@gmail.com.  Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows.  You may also call the listener comment line at either +1-415-830-5439 or via SIP to ‘bluebox@voipuser.org‘ to leave a comment there. 

Thank you for listening and please do let us know what you think of the show.

One thought on “Blue Box #78: Cisco IP phone vulnerabilties, WiFi handset insecurity, IETF security-related news, VoIP security news, listener comments and more

  1. Aswath

    Your ID on legitimate traffic that resembles SPIT points out the ironic situation that vocal proponents of “Stupid Network” are in the process of introducing intelligence in the Middle. My position is that it should be handled only at the ends. If you take the recommendation of RFC 5039, we need three things – strong authentication, white list and an “external” introduction scheme. I recommend that we use OpenID for authentication and request those ID providers to mediate “letters” like iName providers do. For quick reference if you want to send an email to me when you know only my iName, then you send the note via a web page to my provider who will ensure that it is not from a bot and will forward it to me; I can send my reply via the provider as well. This way the dependence on the Middle is sufficiently minimized and there is no concern about the Middle being over eager and impacting legitimate scenarios that you identify. We have implemented such a scheme in EnThinnai.

Comments are closed.