Tech

Domain name filter

Published on:

September 8, 2015

The simple filter on our PBX for the domain name was that we were throwing the baby out with the bathwater. It was simply not possible to define exceptions. That made it practically impossible to use the feature in a real deployment. If the system administrator white-listed IP addresses, traffic from there would still be ignored if the domain name did not match. Adding that back in to the filter solves many of the trunk related problems, as admins can just add the IP addresses for the trunks.

Is is a long time ago that we introduced a simple, but powerful way to keep unwanted traffic away from the PBX: Just look at the domain name of incoming requests.

It seems, however, that this feature becomes useful only after the world really starts to use hosted PBX. Unfortunately not only the customers are starting to use the PBX in the cloud. As the hosted PBX goes mainstream, it also becomes a target for Crime, Inc.

One disadvantage of IPv4 is that there are only a relatively few IP addresses in the world. Scanners can and they do go from one IP address to the next and check out if there is anything coming back from that address. In the old times they primarily checked port 80 for HTTP or some other easy-to-exploit ports like an open FTP. Today the gangsters have added port 5060 to their checklist.

The problem will get a lot smaller when the world has switched to IPv6. There is will be a lot harder to just dumb-scan the possible IP addresses. In an IPv6 environment, scanners would have to first get the DNS name for the server before it can know a valid IPv6 address. Unless the service providers are assigning IPv6 addresses in a way that the hackers can predict.

The simple filter on our PBX for the domain name was that we were throwing the baby out with the bathwater. It was simply not possible to define exceptions. That made it practically impossible to use the feature in a real deployment. If the system administrator white-listed IP addresses, traffic from there would still be ignored if the domain name did not match. Adding that back in to the filter solves many of the trunk related problems, as admins can just add the IP addresses for the trunks.

While adding IP addresses would make it possible to use the domain filter feature, it would still be inconvenient. In environments where tenants can bring their own trunks, it would be even a pain to keep up with the changes that clients make to their trunks.

Because of this, we added a second reason why a packet would let through even though the domain does not match. This would be if the packet comes from a trunk, and the IP address where it was coming from was associated with that trunk. This can happen by automatic resolving of the DNS addresses for the trunk, or by explicit association of certain IP addresses with trunks.

With the new filter method the domain filter becomes a powerful, yes fast and easy way to fend off most of the unwanted traffic on the PBX. The domain name serves like an addition to the password, something that an outside attacker will not guess easily.

The new domain name filter will be available in version 5.3.

Latest Articles

View All

Seamless Compatibility: Htek and Vodia Announce Joint Webinar

Vodia and Htek are hosting a joint webinar to showcase the seamless compatibility between the Vodia PBX and Htek’s full IP phone lineup, including the UCV(Pro) smart video series and UC900 business phones. Eric Altman and Hector Hao will present key insights on product capabilities, cost-effective deployment, industry use cases, and provisioning workflows, with Stephen Yu joining for live Q&A. Attendees will learn how the combined Vodia Htek solution delivers a powerful, scalable communications experience for education, hospitality, and other sectors.

December 9, 2025

FCC Revises Cybersecurity Requirements for Telecommunications Companies

The FCC has reversed its January 2025 cybersecurity ruling for telecom providers, eliminating the proposed national standards and annual certification requirements under CALEA. The change reduces formal compliance obligations, but it does not lessen the risks facing carriers as cyberattacks grow more frequent and more sophisticated. The reversal underscores how essential it is for service providers to rely on platforms built with strong inherent protections.

November 27, 2025

V70 Preview Release: A First Look at What’s Coming

The V70 preview build is now available for testing, giving partners and administrators an early opportunity to explore the updated administrator interface, improved performance from multicore media processing, cross-tenant BLF, snapshot creation and restoration, centralized remote provisioning, and updated Debian and CentOS builds. This pre-release version is intended for evaluation and feedback while we finalize the production-ready release for early 2026.

November 20, 2025