Because if the phone needs to FTP for its configuration it requires a
password. I think this was mentioned already. If you DO NOT use remote
users, you can SAFELY DELETE that user though. I think this was also
mentioned to you.
On Thu, Nov 15, 2012 at 2:23 PM, Noah Mehl <***@tritonlimited.com> wrote:
> I just tried a fresh install of 4.4.0 and the PlcmSpIp user has a
> password in /etc/shadow, why does this user have a password?
>
> ~Noah
>
> On Nov 15, 2012, at 2:02 PM, Noah Mehl <***@tritonlimited.com> wrote:
>
> I have no remote users at the moment, but that is definitely possible.
>
> I understand the wisdom of locking down ssh to the world, however I have
> almost a hundred linux based servers running this way, and have never had
> an issue. The reason I have never had an issue is that I NEVER use the
> root user or any default users for that matter, and all of my actual users
> are usually directory based, and for high value targets, use two-factor
> auth.
>
> Either way, I have an issue, as I have many entries where this user was
> able to login, and in my opinion is a security problem. As I can account
> for all of the other ssh logins in the logs. And I was indeed "hacked".
> This looks to me like a default user with a default password, and there is
> apparently an active exploit for it.
>
> In the mean time, I have removed outside ssh access.
>
> ~Noah
>
> On Nov 15, 2012, at 1:52 PM, Tony Graziano <***@myitdepartment.net>
> wrote:
>
> This is correct. Do you have any remote users? If not, you can actually
> delete the user because tftp does not user login. The group is correct.
>
> If it were me, and its not, I would make sure whatever firewall I have
> sipx behind is tightened down. There are a couple of ways to do that with
> ssh open, and one was mentioned to you early on in this thread.
>
> For me I don't make SSH available, and I VPN in should I have the need.
> Then I login as a different user and su to root if I need that (dont allow
> root login with ssh either).
>
> On Thu, Nov 15, 2012 at 1:41 PM, Noah Mehl <***@tritonlimited.com> wrote:
>
>> [***@sipx1 etc]# groups PlcmSpIp
>> PlcmSpIp : PlcmSpIp
>>
>> ~Noah
>>
>> On Nov 15, 2012, at 1:35 PM, Tony Graziano <***@myitdepartment.net
>> >
>> wrote:
>>
>> What is the output of:
>>
>> groups PlcmSpIp
>>
>> On Thu, Nov 15, 2012 at 1:28 PM, Noah Mehl <***@tritonlimited.com>wrote:
>>
>>> I can tell you I am the only person who could have made a change, and I
>>> can promise you I would not have made any changes to that user. So, the
>>> bigger question is how is this happening...
>>>
>>> From /etc/passwd:
>>>
>>>
>>> PlcmSpIp:x:500:500::/var/sipxdata/configserver/phone/profile/tftproot:/sbin/nologin
>>>
>>> However if I check /etc/shadow, there is indeed a password for that
>>> user. I certainly didn't set it.
>>>
>>> ~Noah
>>>
>>> On Nov 15, 2012, at 1:18 PM, Tony Graziano <
>>> ***@myitdepartment.net> wrote:
>>>
>>> If you do not have sendmail-cf installed I would do that. I would then
>>> look through the sendmail.m4 file.
>>>
>>> The default settings say ONLY ACCEPT from this box (being sipx).
>>>
>>> passwd PlcmSpIp
>>>
>>> you shouldn't need to do that. Unless you are actually able to
>>> correllate that user login with these occurrences. I have never seen this
>>> happen, but in your case it might be a first.
>>>
>>> You will also need to change all of your phones in order to update
>>> them if they use FTP.
>>>
>>> Have you considered tightening down your SSH config?
>>>
>>> The PlcmSpIp user has no SSH login by default. I tried (as an example)
>>> from my LAN wit IPTABLES OFF and I could not shell.
>>>
>>> So everyone here wants to know... what have you done to that user
>>> account? If it is authenticating via SSH it has been modified. The user
>>> shell is "/sbin/nologin" by default. I still doubt something has been
>>> hacked and rather think that someone has altered the user to make it less
>>> secure. If this is the case, its a result of that action.
>>>
>>> Explain who did what to the user PlcmSpIp.
>>>
>>> On Thu, Nov 15, 2012 at 12:56 PM, Noah Mehl <***@tritonlimited.com>wrote:
>>>
>>>> I'm using "hacked" because as far as I can tell, this is not an smtp
>>>> relay issue. Therefore something on the system is open, and therefore been
>>>> "hacked".
>>>>
>>>> Here is some spam log entries in the maillog:
>>>>
>>>> Nov 14 20:38:28 sipx1 sendmail[31880]: qAF1cSLn031880: from=<***@aol.org>,
>>>> size=349, class=0, nrcpts=1, msgid=<201211150138.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 20:38:28 sipx1 sendmail[31880]: qAF1cSLn031880: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:00, mailer=relay, pri=30349,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 20:38:34 sipx1 sendmail[32547]: qAF1cSLn031880: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:06, xdelay=00:00:01,
>>>> mailer=relay, pri=120349, relay=sentinel1.tranet.net. [74.203.219.99],
>>>> dsn=2.0.0, stat=Sent (Ok: queued as 0F7351C0B53)
>>>> Nov 14 20:39:57 sipx1 sendmail[31945]: qAF1dufN031945: from=<
>>>> ***@rkw-lotus.com>, size=358, class=0, nrcpts=1, msgid=<201211150139.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 20:39:57 sipx1 sendmail[31945]: qAF1dufN031945: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:00, mailer=relay, pri=30358,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 20:39:59 sipx1 sendmail[32547]: qAF1dufN031945: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:02, xdelay=00:00:00,
>>>> mailer=relay, pri=120358, relay=sentinel1.tranet.net. [74.203.219.99],
>>>> dsn=2.0.0, stat=Sent (Ok: queued as 644861C0B57)
>>>> Nov 14 20:40:04 sipx1 sendmail[31953]: qAF1e3Ao031953: from=<
>>>> ***@rkw-lotus.com>, size=358, class=0, nrcpts=1, msgid=<201211150140.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 20:40:04 sipx1 sendmail[31953]: qAF1e3Ao031953: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:00, mailer=relay, pri=30358,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 20:40:15 sipx1 sendmail[32547]: qAF1e3Ao031953: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:11, xdelay=00:00:01,
>>>> mailer=relay, pri=120358, relay=sentinel1.tranet.net. [74.203.219.99],
>>>> dsn=2.0.0, stat=Sent (Ok: queued as ABC431C0B5B)
>>>> Nov 14 20:42:23 sipx1 sendmail[32050]: qAF1gMNl032050: from=<
>>>> ***@rkw-lotus.com>, size=358, class=0, nrcpts=1, msgid=<201211150142.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 20:42:23 sipx1 sendmail[32050]: qAF1gMNl032050: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:00, mailer=relay, pri=30358,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 20:42:26 sipx1 sendmail[32547]: qAF1gMNl032050: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:03, xdelay=00:00:01,
>>>> mailer=relay, pri=120358, relay=sentinel1.tranet.net. [74.203.219.99],
>>>> dsn=2.0.0, stat=Sent (Ok: queued as 488DE1C0B67)
>>>> Nov 14 21:08:02 sipx1 sendmail[32545]: qAF280Fd032545: from=<
>>>> ***@rkw-lotus.com>, size=361, class=0, nrcpts=2, msgid=<201211150208.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 21:08:02 sipx1 sendmail[32545]: qAF280Fd032545: to=<
>>>> ***@hotmail.com>, delay=00:00:00, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:02 sipx1 sendmail[32545]: qAF280Fd032545: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:00, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:08 sipx1 sendmail[32547]: qAF280Fd032545: to=<
>>>> ***@yahoo.co.uk>,<***@hotmail.com>, delay=00:00:06,
>>>> xdelay=00:00:01, mailer=relay, pri=150361, relay=sentinel1.tranet.net.
>>>> [74.203.219.99], dsn=2.0.0, stat=Sent (Ok: queued as 1FAFD1BFD89)
>>>> Nov 14 21:08:12 sipx1 sendmail[32549]: qAF28A1h032549: from=<
>>>> ***@rkw-lotus.com>, size=361, class=0, nrcpts=2, msgid=<201211150208.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 21:08:12 sipx1 sendmail[32549]: qAF28A1h032549: to=<
>>>> ***@hotmail.com>, delay=00:00:01, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:12 sipx1 sendmail[32549]: qAF28A1h032549: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:01, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:23 sipx1 sendmail[32547]: qAF28A1h032549: to=<
>>>> ***@yahoo.co.uk>,<***@hotmail.com>, delay=00:00:12,
>>>> xdelay=00:00:00, mailer=relay, pri=150361, relay=sentinel1.tranet.net.
>>>> [74.203.219.99], dsn=2.0.0, stat=Sent (Ok: queued as 4A9911BFD9F)
>>>> Nov 14 21:08:37 sipx1 sendmail[32559]: qAF28Z2x032559: from=<
>>>> ***@rkw-lotus.com>, size=361, class=0, nrcpts=2, msgid=<201211150208.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 21:08:37 sipx1 sendmail[32559]: qAF28Z2x032559: to=<
>>>> ***@hotmail.com>, delay=00:00:01, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:37 sipx1 sendmail[32559]: qAF28Z2x032559: to=<
>>>> ***@yahoo.co.uk>, delay=00:00:01, mailer=relay, pri=60361,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 21:08:39 sipx1 sendmail[32547]: qAF28Z2x032559: to=<
>>>> ***@yahoo.co.uk>,<***@hotmail.com>, delay=00:00:03,
>>>> xdelay=00:00:00, mailer=relay, pri=150361, relay=sentinel1.tranet.net.
>>>> [74.203.219.99], dsn=2.0.0, stat=Sent (Ok: queued as 62A2D1BFDAB)
>>>> Nov 14 22:34:23 sipx1 sendmail[1047]: qAF3YKuO001047: from=<
>>>> ***@rkw-lotus.com>, size=5874, class=0, nrcpts=1, msgid=<201211150334.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 14 22:34:23 sipx1 sendmail[1047]: qAF3YKuO001047: to=<
>>>> ***@hotmail.com>, delay=00:00:01, mailer=relay, pri=35874,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 14 22:34:25 sipx1 sendmail[32547]: qAF3YKuO001047: to=<
>>>> ***@hotmail.com>, delay=00:00:03, xdelay=00:00:02, mailer=relay,
>>>> pri=125874, relay=sentinel1.tranet.net. [74.203.219.99], dsn=2.0.0,
>>>> stat=Sent (Ok: queued as 479D81C0BDE)
>>>> Nov 15 01:50:09 sipx1 sendmail[3176]: qAF6o7o5003176: from=<
>>>> ***@rkw-lotus.com>, size=5874, class=0, nrcpts=1, msgid=<201211150650.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 15 01:50:09 sipx1 sendmail[3176]: qAF6o7o5003176: to=<
>>>> ***@hotmail.com>, delay=00:00:01, mailer=relay, pri=35874,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 15 01:50:14 sipx1 sendmail[32547]: qAF6o7o5003176: to=<
>>>> ***@hotmail.com>, delay=00:00:06, xdelay=00:00:03, mailer=relay,
>>>> pri=125874, relay=sentinel1.tranet.net. [74.203.219.99], dsn=2.0.0,
>>>> stat=Sent (Ok: queued as 309221C0F12)
>>>> Nov 15 03:19:19 sipx1 sendmail[4123]: qAF8JHpS004123: from=<
>>>> ***@rkw-lotus.com>, size=5874, class=0, nrcpts=1, msgid=<201211150819.
>>>> ***@sipx1.sip.tranet.net>, proto=SMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 15 03:19:19 sipx1 sendmail[4123]: qAF8JHpS004123: to=<
>>>> ***@hotmail.com>, delay=00:00:00, mailer=relay, pri=35874,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 15 03:19:23 sipx1 sendmail[32547]: qAF8JHpS004123: to=<
>>>> ***@hotmail.com>, delay=00:00:04, xdelay=00:00:01, mailer=relay,
>>>> pri=125874, relay=sentinel1.tranet.net. [74.203.219.99], dsn=2.0.0,
>>>> stat=Sent (Ok: queued as 6B4E11C0F51)
>>>> Nov 15 03:26:33 sipx1 sendmail[4210]: qAF8Q78r004210: from=<
>>>> ***@rkw-lotus.com>, size=5925, class=0, nrcpts=50,
>>>> msgid=<***@sipx1.sip.tranet.net>, proto=SMTP,
>>>> daemon=MTA, relay=localhost.localdomain [127.0.0.1]
>>>>
>>>> As opposed to a normal entry:
>>>>
>>>> Nov 15 10:02:23 sipx1 sendmail[11170]: qAFF2NI4011170:
>>>> from=<***@localhost>, size=335352, class=0, nrcpts=1,
>>>> msgid=<1578812003.338.1352991743551.
>>>> ***@sipx1.sip.tranet.net>, proto=ESMTP, daemon=MTA,
>>>> relay=localhost.localdomain [127.0.0.1]
>>>> Nov 15 10:02:23 sipx1 sendmail[11170]: qAFF2NI4011170: to=<
>>>> ***@signmuseum.org>, delay=00:00:00, mailer=relay, pri=365352,
>>>> dsn=4.4.3, stat=queued
>>>> Nov 15 10:02:40 sipx1 sendmail[10780]: qAFF2NI4011170: to=<
>>>> ***@signmuseum.org>, delay=00:00:17, xdelay=00:00:14,
>>>> mailer=relay, pri=455352, relay=sentinel1.tranet.net. [74.203.219.99],
>>>> dsn=2.0.0, stat=Sent (Ok: queued as 501B41C1CBE)
>>>>
>>>> So, they are being generated locally, as far as I can tell.
>>>>
>>>> ~Noah
>>>>
>>>> On Nov 15, 2012, at 12:42 PM, Todd Hodgen <***@frontier.com>
>>>> wrote:
>>>>
>>>> +1****
>>>>
>>>> *From:* sipx-users-***@list.sipfoundry.org [mailto:sipx-
>>>> users-***@list.sipfoundry.org]*On Behalf Of *Michael Picher
>>>> *Sent:* Thursday, November 15, 2012 7:49 AM
>>>> *To:* Discussion list for users of sipXecs software
>>>> *Subject:* Re: [sipx-users] Hacked SipXecs 4.4****
>>>> ** **
>>>> yes, and using the word hacked as your subject is not particularly...
>>>> helpful...****
>>>>
>>>> ** **
>>>> On Thu, Nov 15, 2012 at 3:32 PM, Tony Graziano <
>>>> ***@myitdepartment.net> wrote:****
>>>> you really need to look at the mail log to see where the mail is
>>>> coming from regardless of your firewall settings. It can actually come from
>>>> inside you see.****
>>>>
>>>> ** **
>>>> On Thu, Nov 15, 2012 at 9:29 AM, Noah Mehl <***@tritonlimited.com>
>>>> wrote:****
>>>> I am seeing more spam in my mail queue. I have iptables installed,
>>>> and here are my rules:
>>>>
>>>> Chain INPUT (policy ACCEPT)
>>>> target prot opt source destination
>>>> RH-Firewall-1-INPUT all -- anywhere anywhere
>>>>
>>>> Chain FORWARD (policy ACCEPT)
>>>> target prot opt source destination
>>>> RH-Firewall-1-INPUT all -- anywhere anywhere
>>>>
>>>> Chain OUTPUT (policy ACCEPT)
>>>> target prot opt source destination
>>>>
>>>> Chain RH-Firewall-1-INPUT (2 references)
>>>> target prot opt source destination
>>>> ACCEPT all -- anywhere anywhere
>>>> ACCEPT icmp -- anywhere anywhere icmp any
>>>> ACCEPT esp -- anywhere anywhere
>>>> ACCEPT ah -- anywhere anywhere
>>>> ACCEPT udp -- anywhere 224.0.0.251 udp
>>>> dpt:mdns
>>>> ACCEPT udp -- anywhere anywhere udp dpt:ipp
>>>> ACCEPT tcp -- anywhere anywhere tcp dpt:ipp
>>>> ACCEPT all -- anywhere anywhere state
>>>> RELATED,ESTABLISHED
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:pcsync-https
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:http
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:xmpp-client
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:5223
>>>> ACCEPT all -- 192.168.0.0/16 anywhere
>>>> ACCEPT udp -- anywhere anywhere state NEW
>>>> udp dpt:sip
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:sip
>>>> ACCEPT tcp -- anywhere anywhere state NEW
>>>> tcp dpt:sip-tls
>>>> ACCEPT udp -- sip02.gafachi.com anywhere state NEW
>>>> udp dpts:sip:5080
>>>> ACCEPT udp -- 204.11.192.0/22 anywhere state NEW
>>>> udp dpts:sip:5080
>>>> REJECT all -- anywhere anywhere
>>>> reject-with icmp-host-prohibited
>>>>
>>>> As far as I can tell, no one should be able to use port 25 from the
>>>> world. Also, sendmail is only configured to allow relay from localhost:
>>>>
>>>> [***@sipx1 ~]# cat /etc/mail/access****
>>>>
>>>> # Check the /usr/share/doc/sendmail/README.cf file for a description
>>>> # of the format of this file. (search for access_db in that file)
>>>> # The /usr/share/doc/sendmail/README.cf is part of the sendmail-doc
>>>> # package.
>>>> #
>>>> # by default we allow relaying from localhost...
>>>> Connect:localhost.localdomain RELAY
>>>> Connect:localhost RELAY
>>>> Connect:127.0.0.1 RELAY****
>>>> Can someone please help me figure out where this spam is coming from?
>>>> Thanks.
>>>>
>>>> ~Noah****
>>>>
>>>> On Oct 13, 2012, at 10:17 AM, Noah Mehl <***@tritonlimited.com> wrote:
>>>>
>>>> > I did not change the configuration of anything related to the
>>>> PlcmSpIp user. It does however make me feel better that it is related to
>>>> the vsftpd service and the polycom phones.
>>>> >
>>>> >> From /etc/passwd:
>>>> >
>>>> >
>>>> PlcmSpIp:x:500:500::/var/sipxdata/configserver/phone/profile/tftproot:/sbin/nologin
>>>> >
>>>> > So, that user cannot ssh to a shell. So I don't think it was that.
>>>> >
>>>> > ~Noah
>>>> >
>>>> > On Oct 12, 2012, at 9:05 AM, Tony Graziano <
>>>> ***@myitdepartment.net> wrote:
>>>> >
>>>> >> ... more -- its a user that does not have login to the OS itself,
>>>> just
>>>> >> vsftpd, which is restricted to certain commands and must present a
>>>> >> request for its mac address in order to get a configuration file. It
>>>> >> is not logging into linux unless someone changed the rights of the
>>>> >> user.
>>>> >>
>>>> >> On Fri, Oct 12, 2012 at 7:30 AM, George Niculae <***@ezuce.com>
>>>> wrote:
>>>> >>> On Fri, Oct 12, 2012 at 2:26 PM, Tony Graziano
>>>> >>> <***@myitdepartment.net> wrote:
>>>> >>>> this is not a valid system user unless you have manually added it
>>>> to the
>>>> >>>> system. I do think the logs would show more if access was granted.
>>>> Why are
>>>> >>>> you exposing sshd to the outside world with an acl or by
>>>> protecting it at
>>>> >>>> your firewall?
>>>> >>>>
>>>> >>>
>>>> >>> PlcmSpIp is the user used by polycom phones for fetching config
>>>> from server
>>>> >>>
>>>> >>> George
>>>> >>> _______________________________________________
>>>> >>> sipx-users mailing list
>>>> >>> sipx-***@list.sipfoundry.org
>>>> >>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>> >>
>>>> >>
>>>> >>
>>>> >> --
>>>> >> ~~~~~~~~~~~~~~~~~~
>>>> >> Tony Graziano, Manager
>>>> >> Telephone: 434.984.8430
>>>> >> sip: ***@voice.myitdepartment.net
>>>> >> Fax: 434.465.6833
>>>> >> ~~~~~~~~~~~~~~~~~~
>>>> >> Linked-In Profile:
>>>> >> http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
>>>> >> Ask about our Internet Fax services!
>>>> >> ~~~~~~~~~~~~~~~~~~
>>>> >>
>>>> >> Using or developing for sipXecs from SIPFoundry? Ask me about
>>>> sipX-CoLab 2013!
>>>> >>
>>>> >> --
>>>> >> LAN/Telephony/Security and Control Systems Helpdesk:
>>>> >> Telephone: 434.984.8426
>>>> >> sip: ***@voice.myitdepartment.net
>>>> >>
>>>> >> Helpdesk Customers: http://myhelp.myitdepartment.net
>>>> >> Blog: http://blog.myitdepartment.net
>>>> >> _______________________________________________
>>>> >> sipx-users mailing list
>>>> >> sipx-***@list.sipfoundry.org
>>>> >> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>> >
>>>> >
>>>> > Scanned for viruses and content by the Tranet Spam Sentinel service.
>>>> > _______________________________________________
>>>> > sipx-users mailing list
>>>> > sipx-***@list.sipfoundry.org
>>>> > List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>>
>>>> _______________________________________________
>>>> sipx-users mailing list
>>>> sipx-***@list.sipfoundry.org
>>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/****
>>>>
>>>>
>>>> ****
>>>> ** **
>>>> --
>>>> ~~~~~~~~~~~~~~~~~~
>>>> Tony Graziano, Manager
>>>> Telephone: 434.984.8430
>>>> sip: ***@voice.myitdepartment.net
>>>> Fax: 434.465.6833
>>>> ~~~~~~~~~~~~~~~~~~
>>>> Linked-In Profile:
>>>> http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
>>>> Ask about our Internet Fax services!
>>>> ~~~~~~~~~~~~~~~~~~****
>>>> ** **
>>>> **** <http://sipxcolab2013.eventbrite.com/?discount=tony2013>
>>>> *Using or developing for sipXecs from SIPFoundry? Ask me about
>>>> sipX-CoLab 2013!
>>>>
>>>> <http://sipxcolab2013.eventbrite.com/?discount=tony2013>*
>>>> <http://sipxcolab2013.eventbrite.com/?discount=tony2013>****
>>>>
>>>> ** **
>>>> LAN/Telephony/Security and Control Systems Helpdesk:****
>>>> Telephone: 434.984.8426****
>>>> sip: ***@voice.myitdepartment.net****
>>>> ** **
>>>> Helpdesk Customers: http://myhelp.myitdepartment.net****
>>>> Blog: http://blog.myitdepartment.net****
>>>>
>>>> _______________________________________________
>>>> sipx-users mailing list
>>>> sipx-***@list.sipfoundry.org
>>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/****
>>>>
>>>>
>>>> ****
>>>> ** **
>>>> --
>>>> Michael Picher, Director of Technical Services
>>>> eZuce, Inc.****
>>>> 300 Brickstone Square****
>>>> Suite 201****
>>>> Andover, MA. 01810****
>>>> O.978-296-1005 X2015
>>>> M.207-956-0262
>>>> @mpicher <http://twitter.com/mpicher> ****
>>>> linkedin<http://www.linkedin.com/profile/view?id=35504760&trk=tab_pro>
>>>> www.ezuce.com****
>>>> ** **
>>>> ------------------------------------------------------------------------------------------------------------
>>>> ****
>>>> There are 10 kinds of people in the world, those who understand
>>>> binary and those who don't.****
>>>> ** **
>>>> _______________________________________________
>>>> sipx-users mailing list
>>>> sipx-***@list.sipfoundry.org
>>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>>
>>>>
>>>>
>>>> ÂÂ
>>>>
>>>> _______________________________________________
>>>> sipx-users mailing list
>>>> sipx-***@list.sipfoundry.org
>>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>>
>>>
>>>
>>>
>>> --
>>> ~~~~~~~~~~~~~~~~~~
>>> Tony Graziano, Manager
>>> Telephone: 434.984.8430
>>> sip: ***@voice.myitdepartment.net
>>> Fax: 434.465.6833
>>> ~~~~~~~~~~~~~~~~~~
>>> Linked-In Profile:
>>> http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
>>> Ask about our Internet Fax services!
>>> ~~~~~~~~~~~~~~~~~~
>>>
>>> Using or developing for sipXecs from SIPFoundry? Ask me about
>>> sipX-CoLab 2013!
>>> <http://sipxcolab2013.eventbrite.com/?discount=tony2013>
>>>
>>>
>>> LAN/Telephony/Security and Control Systems Helpdesk:
>>> Telephone: 434.984.8426
>>> sip: ***@voice.myitdepartment.**net<***@voice.myitdepartment.net>
>>>
>>> Helpdesk Customers: http://myhelp.myitdepartment.**net<http://myhelp.myitdepartment.net/>
>>> Blog: http://blog.myitdepartment.net
>>> _______________________________________________
>>> sipx-users mailing list
>>> sipx-***@list.sipfoundry.org
>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>
>>>
>>>
>>> ÂÂ
>>>
>>> _______________________________________________
>>> sipx-users mailing list
>>> sipx-***@list.sipfoundry.org
>>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>>
>>
>>
>>
>> --
>> ~~~~~~~~~~~~~~~~~~
>> Tony Graziano, Manager
>> Telephone: 434.984.8430
>> sip: ***@voice.myitdepartment.net
>> Fax: 434.465.6833
>> ~~~~~~~~~~~~~~~~~~
>> Linked-In Profile:
>> http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
>> Ask about our Internet Fax services!
>> ~~~~~~~~~~~~~~~~~~
>>
>> Using or developing for sipXecs from SIPFoundry? Ask me about
>> sipX-CoLab 2013!
>> <http://sipxcolab2013.eventbrite.com/?discount=tony2013>
>>
>>
>> LAN/Telephony/Security and Control Systems Helpdesk:
>> Telephone: 434.984.8426
>> sip: ***@voice.myitdepartment.**net<***@voice.myitdepartment.net>
>>
>> Helpdesk Customers: http://myhelp.myitdepartment.**net<http://myhelp.myitdepartment.net/>
>> Blog: http://blog.myitdepartment.net
>> _______________________________________________
>> sipx-users mailing list
>> sipx-***@list.sipfoundry.org
>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>
>>
>>
>> ÂÂ
>>
>> _______________________________________________
>> sipx-users mailing list
>> sipx-***@list.sipfoundry.org
>> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>>
>
>
>
> --
> ~~~~~~~~~~~~~~~~~~
> Tony Graziano, Manager
> Telephone: 434.984.8430
> sip: ***@voice.myitdepartment.net
> Fax: 434.465.6833
> ~~~~~~~~~~~~~~~~~~
> Linked-In Profile:
> http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
> Ask about our Internet Fax services!
> ~~~~~~~~~~~~~~~~~~
>
> Using or developing for sipXecs from SIPFoundry? Ask me about sipX-CoLab
> 2013!
> <http://sipxcolab2013.eventbrite.com/?discount=tony2013>
>
>
> LAN/Telephony/Security and Control Systems Helpdesk:
> Telephone: 434.984.8426
> sip: ***@voice.myitdepartment.**net<***@voice.myitdepartment.net>
>
> Helpdesk Customers: http://myhelp.myitdepartment.**net<http://myhelp.myitdepartment.net/>
> Blog: http://blog.myitdepartment.net
> _______________________________________________
> sipx-users mailing list
> sipx-***@list.sipfoundry.org
> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>
>
>
> ÂÂ
> _______________________________________________
> sipx-users mailing list
> sipx-***@list.sipfoundry.org
> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>
>
>
> ÂÂ
>
> _______________________________________________
> sipx-users mailing list
> sipx-***@list.sipfoundry.org
> List Archive: http://list.sipfoundry.org/archive/sipx-users/
>
--
~~~~~~~~~~~~~~~~~~
Tony Graziano, Manager
Telephone: 434.984.8430
sip: ***@voice.myitdepartment.net
Fax: 434.465.6833
~~~~~~~~~~~~~~~~~~
Linked-In Profile:
http://www.linkedin.com/pub/tony-graziano/14/4a6/7a4
Ask about our Internet Fax services!
~~~~~~~~~~~~~~~~~~
Using or developing for sipXecs from SIPFoundry? Ask me about sipX-CoLab
2013!
<http://sipxcolab2013.eventbrite.com/?discount=tony2013>
--
LAN/Telephony/Security and Control Systems Helpdesk:
Telephone: 434.984.8426
sip: ***@voice.myitdepartment.net
Helpdesk Customers: http://myhelp.myitdepartment.net
Blog: http://blog.myitdepartment.net