Solved

asterisk pbx daemon user rights to //etc/asterisk vs. root

Posted on 2009-07-02
2
461 Views
Last Modified: 2013-11-12
I recently installed Astersik 1.4.25.1 as a second asterisk server, on Ubuntu 9.0.4.  My primary is running 1.4.23.1 running on Ubuntu 8.10 .. I noticed that on 1.4.25.1, //etc/asterisk is owned by the user "Asterisk - pbx daemon" ... And on 1.4.23.1, that directory is owned by root.

I would assume that having Asterisk being the owner would hold less security risks, because if the box were compromised through asterisk, then they would not be getting the root information.... But what password is the "Asterisk" user using?  Is this in fact a better and more secure setup?  Does anyone know if this is something new in the 1.4.25.1 release?
0
Comment
Question by:jkockler
  • 2
2 Comments
 
LVL 4

Author Comment

by:jkockler
ID: 24769854
Update:

I have also upgraded my 8.10 ubuntu box to 9.0.4.  Upon doing so I had to reinstall Asterisk, because of errors when starting it.

Now Asterisk is the owner o //var/spool/asterisk ... and I am not able to view the contents.  That is rather annoying and would like to know how to allow myself access.

Even more troubling is the fact that now Asterisk is not able to start on boot up.  I have to launch a terminal after boot, run "sudo asterisk" before I can even connect to the CLI.  I would imagine Asterisk can not start on boot because of a permissions issues, because i see a quick error message about it, to the effect of, unable to start asterisk, access to pid denied.  

Any thoughts as to what the deal is with changed permission settings in Ubuntu 9.0.4?
0
 
LVL 4

Accepted Solution

by:
jkockler earned 0 total points
ID: 24777194
This question never received any responses.   I did find a fix for Asterisk not starting on boot up in ubuntu though.

http://www.voipuser.org/forum_topic_3621.html
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now