Editorial

Passwords Passwords Passwords

Published on:

April 26, 2013

Passwords remain a crucial vulnerability despite the best security measures. Even with technologies like TLS, SRTP, and certificates securing phone calls, weak passwords still expose systems to attacks. Hackers use automated scanners to find open SIP ports and exploit weak passwords. To address this, snom ONE 5.0.9 now highlights accounts with weak passwords and shows which part is vulnerable. While the system can generate secure passwords, administrators must avoid “No Security” settings to prevent exposure. Implementing strong password policies is a key defense against unauthorized access and potential system misuse.

For those who have a flashback when they see the title: you are right. This is not the first time I am writing about passwords.

But passwords remain to be a major problem. We add such fancy things like TLS, certificates, SRTP and all kinds of things to make phone calls as secure as possible and then users are using passwords like “password”. Passwords remain the Achilles' heel of securing the system.

As long as you run the PBX in a trusted environment, trivial passwords are convenient and usually nothing happens. But once that you start to expose the system to the public internet, things can change. There are scanners out there that act like sharks smelling blood. Once they found an open SIP port, they start trying out accounts and once they find one, they try out passwords. Everything automated, and including passwords lists like “password”, “secure”, “verysecure” and so on. Then once they were able to get access, they reprogram their least cost routers and route the traffic through your system. Innocent people making calls to some expensive destinations might be using your system.

In 5.0.9 we added a feature back and improved it that shows which accounts have weak passwords. We don’t only show which account may be exposed, but we also show which part is weak. This all depends on the password policy of the system. Again, if you decide to put that to “accept anything” there is not much the system can do.

We also have other features that make extensions secure—for example a dropdown in the accounts view that generates long passwords and PIN that are difficult to guess. Also, when the system starts up it generates initial passwords that are also quite random. Entering new passwords is governed by the global system setting of the password policy. This is set to “medium”. Administrators changing this to “No Security” must know that they are potentially exposing the system to scanners, just for the convenience of entering simple passwords.

Large IT companies like Google are discussion about introducing new authentication methods such as two-factor authentication. If you think how many email accounts has and how much work it will be to change the authentication for them, you will understand how serious the problem is and how serious those companies take the problem. Passwords and PIN are something that the PBX user knows; however when it comes to something that the user has things get trickier in the PBX environments. Many users have a VoIP phone with a certificate, and we are already using the certificate built into the phone to authenticate the device with that. So when a user is using a phone that was provisioned using a manufacturer certificate in the phone, and the user has to enter a PIN when making an international call, then we have a two-factor authentication. This can be the reality today with snom ONE already. However it does not solve the problem of customers using soft phones or phones that don’t have a certificate built-in. Also, realistically, entering a PIN for every outbound call is making users life harder than it has to be.

We will have to see in the future if we for example allow international calls only from devices that have a certificate built-in. Or at least something like international calls can be made only from phones that were automatically provisioned and a security token was loaded into the device.

For today, the bottom line for me is that administrators should keep their password policy at “medium”. Having good password would be already huge step in the right direction.

Latest Articles

View All

Webinar | Real-Time Media Streaming in Vodia PBX: AI, Call Transcription, and Security in V69.5.6

Join Vodia Networks on April 8 for a live, in-depth webinar on how real-time media streaming is powering the future of voice communication. Discover how Vodia PBX version 69.5.6 enables seamless AI integration, live call transcription using the Whisper API, and secure voice data handling. Hosted by Sales Engineer Eric Altman and VoIP Engineer Hamlet Collado, this session will walk you through real-world use cases, including OpenAI and Google Speech-to-Text integrations, MS Teams support, and new security features. You’ll also get a first look at Vodia’s AI roadmap and have the opportunity to ask your questions during a live Q&A.

March 28, 2025

The Vodia PBX On-Premise Whisper AI Deployment​

Whisper, OpenAI’s Automatic Speech Recognition system, delivers multilingual, noise-tolerant, and technical-language-ready transcription through a streamlined encoder-decoder architecture. With Vodia PBX’s integration, organizations can choose between using OpenAI’s service or hosting Whisper AI locally for complete data sovereignty and control. This on-premise option ensures that sensitive call data stays within your infrastructure while still benefiting from powerful transcription capabilities. To explore deployment options, see our Whisper AI on-premise setup documentation, review a self-hosted integration example, or follow our cloud-based call transcription guide.

March 27, 2025

Vodia at Enterprise Connect 2025: Embracing AI and Advancing Communications

Vodia Sales Engineer Eric Altman attended Enterprise Connect 2025 on March 18 and 19, where he connected with partners and gained insight into the future of enterprise communications. AI was the clear focus of the event, with discussions centered on agentic systems, chatbots, and generative technologies. “It was certainly the main element in the atmosphere,” Eric noted. He also shared his excitement about Vodia PBX version 69.5.6, which includes real-time AI integration with OpenAI and call transcription using the Whisper API. The event confirmed that AI is rapidly becoming a core component of modern communication platforms—and Vodia is well-positioned to lead the way.

March 26, 2025