Looking for a good defense for a bad VoIP provider

I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A

Ouch, that was painful to read. I can't imagine having lived it. When in doubt, dig for Cisco documents because CxO's all know and trust the brand. I'll forward whatever I can find. On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote: I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

I'm not telling you anything you don't already know, but if the web interfaces are exposed, especially with default passwords, they are going to get hacked, likely this weekend, so you might want to prepare the CEO now for the "savings" he's going to see on his first bill. On Mar 25, 2016, at 20:10, Peter E <peeip989 at gmail.com> wrote: Ouch, that was painful to read. I can't imagine having lived it. When in doubt, dig for Cisco documents because CxO's all know and trust the brand. I'll forward whatever I can find. On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote: I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

Wow. I hope there's another side to this story because reading this gives everyone who touches VoIP a bad name. This is really bad. On 3/25/16, 5:15 PM, "VoiceOps on behalf of Peter E" <voiceops-bounces at voiceops.org on behalf of peeip989 at gmail.com> wrote:
I'm not telling you anything you don't already know, but if the web interfaces are exposed, especially with default passwords, they are going to get hacked, likely this weekend, so you might want to prepare the CEO now for the "savings" he's going to see on his first bill.
On Mar 25, 2016, at 20:10, Peter E <peeip989 at gmail.com> wrote:
Ouch, that was painful to read. I can't imagine having lived it.
When in doubt, dig for Cisco documents because CxO's all know and trust the brand. I'll forward whatever I can find.
On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices".
This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs.
We spent the better part of a week ripping their stuff out and putting the network back the way it was.
We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going.
We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely.
They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server.
And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports".
We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money.
The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are:
* We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about.
* The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication.
* We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface.
* Most passwords appear to be factory defaults
* The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...)
* They skimped on proper wiring in a lot of places and have computers jumpered through the phones
* Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data.
* If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data.
* A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc...
I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc...
The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible.
Are there any best-practice documents out there I can provide to the CEO?
I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up.
Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.)
Thanks for listening. :)
-A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

We had a customer who removed their router and connected all the phones directly. Their ISP was happy to hand out individual public IP addresses to each phone. Immediately people started attacking the phones, reprogramming them, and attempting to make phone expensive phone calls. We have blocking for anything really expensive so they didn't get anywhere but it was still a real mess for the customer. Sent from my iPhone
On Mar 25, 2016, at 5:15 PM, Peter E <peeip989 at gmail.com> wrote:
I'm not telling you anything you don't already know, but if the web interfaces are exposed, especially with default passwords, they are going to get hacked, likely this weekend, so you might want to prepare the CEO now for the "savings" he's going to see on his first bill.
On Mar 25, 2016, at 20:10, Peter E <peeip989 at gmail.com> wrote:
Ouch, that was painful to read. I can't imagine having lived it.
When in doubt, dig for Cisco documents because CxO's all know and trust the brand. I'll forward whatever I can find.
On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices".
This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs.
We spent the better part of a week ripping their stuff out and putting the network back the way it was.
We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going.
We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely.
They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server.
And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports".
We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money.
The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are:
* We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about.
* The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication.
* We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface.
* Most passwords appear to be factory defaults
* The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...)
* They skimped on proper wiring in a lot of places and have computers jumpered through the phones
* Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data.
* If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data.
* A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc...
I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc...
The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible.
Are there any best-practice documents out there I can provide to the CEO?
I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up.
Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.)
Thanks for listening. :)
-A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

Here's one. It's obviously CM centric, but covers most of the points you're after: http://www.cisco.com/c/dam/en_us/about/ciscoitatwork/downloads/ciscoitatwork... On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote: I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

I am always amazed on how a company can work like that. Just a bunch of people that don't understand what they are doing and just follow a procedure without regard to what their actions do to others. I would remind the CEO of the Voip company on the price of HIPPA and PCI violations, and put them on notice that the fines will be forwarded to them. Makes the cost of hardware pale by comparison. Not to increase paranoia but I would venture to guess that the hardware may not be brand new, if they are using refurbished phones, God only knows what is on them. -------- Original message -------- From: "Aaron C. de Bruyn" <aaron at heyaaron.com> Date: 3/25/2016 7:56 PM (GMT-05:00) To: voiceops at voiceops.org Subject: [VoiceOps] Looking for a good defense for a bad VoIP provider I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A

Here's a decent (short) article about security: http://www.scmagazine.com/simple-best-practices-for-voip/article/207273/ On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote: I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

Here's an article from a system integrators point of view: http://www.scmagazine.com/simple-best-practices-for-voip/article/207273/ On Mar 25, 2016, at 19:55, Aaron C. de Bruyn <aaron at heyaaron.com> wrote: I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A _______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

Ouch... Sad as it seems, this is more or less standard for a certain segment of the VoIP provider market, where they practice a "drop and run" (out the door mostly) type of install. At $DAYJOB I use to be primary (now tertiary) for a ~1K deployed VoIP extensions. We typically provide data and phone with managed routers onsite, but in cases where there is an existing IT department we will work with them well ahead of time to: 1) plan a roll-out schedule, and 2) establish a separate voice VLAN and external IP (preferably with our router inbetween) that is separate from the rest of their data. It's rare to find in house talent that can properly configure separate DHCP scopes/VLANs and handle VoIP prioritization. Due to the diversity of ways different manufacturers config their phones, building a standard install tool can be a real pain as well. We have had to do a whole lot of work to build custom config tools to do pre-install (firmware/update/initial config sources) and post-install (user config) mostly automagically. Still, some things require manually hitting the phone's web interface. Then comes the maintenance of the config files/firmware and whether those a only saved on the phone locally or on a remote server. I'll respond to a couple things below as to my experience... take from it what you will. On Friday 25 March 2016 16:55:58 Aaron C. de Bruyn wrote: ...
This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords.
Typical for a certain segment of the market... We've had existing customers who decided to switch to someone else without notice either: port out the numbers in the middle of the business day when phones are not even installed or their backend configured to accept the calls or, as you had, show up and start swapping stuff without any planning.
* We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about.
*If* you are dropping them straight into the voice VLAN with direct communication with the phones, with a standard codec (PPTP/IPSEC/etc), yeah this should be a red flag they are not prepared.
* The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication.
This can be a real pain... In some phones it can be real hard to determine if the phone is using network setting received from DHCP, from the phone's config file, or the phones web/keypad interface, particullarly if you are having the phone DHCP from an untagged network, get a VLAN option and jump to that, then DHCP again for the local network. Some phones have non-standard DHCP VLAN options that need to be given in the first and/or second stage. Additionally, some manufacturers have specific DHCP provisioning options that must be given after switching to the VLAN. The above can get even more complicated if the phone is also doing tagging/untagging/pass-thru of data to a computer. Here is a big gotcha.... If you switch the "network" (to wall jack) and "computer" (pass-thru to computer) ports on the phone, a bunch of different models will DHCP/option correctly but then fail to register or fail to connect later. Yet the phone/computer will think the network connection is fine. If the provider can not explicitly give you the required DHCP options at each stage without hesitation, I would try to force the issue with the provider. Either have them hard code the VLAN or move all phones to untagged switch ports on a separate VLAN segment.
* We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface.
As above... this is sadly true for a lot of phones, though I suspect it is so they can remotely full-configure the phone in this case, not make minor extension specific changes. In our setup, we use dynamically-created, time- limited, port forwards and filter rules that allow our only our management address to communicate with specific phones. (I.e. A tech hits the web tool to create a link and connect to phone 3, port 8000 is dynamically forwarded to phone 3 port 80 in the router, then after 60min the forward expires, multiple forward are created sequentially.) But that requires that one of our management routers is between the world and the voice VLAN.
* Most passwords appear to be factory defaults
Not that unusual...<pet-peave>I don;t care what security best practice says, having non-default passwords on fixed internal equipment is a problem. If you leave it defaulted you can always update/change configs as needed, the internal network should always be isolated and never be exposed to external sources anyways. If you set all the phones (across many sites) to your "secret" password, it quickly becomes well known anyways. If you set good passwords on every phone individually, the passwords will be lost and you will have to wipe everything and work from scratch. Additionally, depending on the sales model, the customer may "own" the phone, so having the third party lock the customer out may be a problem. The phones should never be directly exposed in the first place, only allowed to communicate with the PBX and a management addresses as needed. There are already so many phone exploits... If an attacker is on your internal network with the phones, or the phone is exposed to the outside, a config password isn't going to stop them.</pet-peave>
* They skimped on proper wiring in a lot of places and have computers jumpered through the phones
* Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. ... * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data.
Yep... That is why we always specify separate drops (or we are directly managing/monitoring) for phone/data. In the cases where you have to use pass- thru (lack of infrastructure/port availability), there is not a lot that can be done. Locking phone VLANs and then setting port MAC security on your switches may be the only option. A portion of why third-party VoIP is less expensive is because the customer is expected to handle/reuse existing infrastructure wiring.
* A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc...
Yeah, but you could do the same on the PSTN as well, which the same calls will travel.
Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.)
Keep blaming them. Their poor planning and setup is the cause of the downtime. If it comes to working but poor-voice, well then you my have to start looking internally. Properly handling/queuing voice traffic in parallel with data can be a real challenge. Adrian

Reading this post gave me cancer. You have my utmost sympathy. -- Nathan ________________________________________ From: VoiceOps [voiceops-bounces at voiceops.org] On Behalf Of Aaron C. de Bruyn [aaron at heyaaron.com] Sent: Friday, March 25, 2016 4:55 PM To: voiceops at voiceops.org Subject: [VoiceOps] Looking for a good defense for a bad VoIP provider I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc... About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices". This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs. We spent the better part of a week ripping their stuff out and putting the network back the way it was. We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going. We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely. They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server. And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports". We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money. The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are: * We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about. * The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication. * We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface. * Most passwords appear to be factory defaults * The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...) * They skimped on proper wiring in a lot of places and have computers jumpered through the phones * Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data. * If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data. * A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc... I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc... The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible. Are there any best-practice documents out there I can provide to the CEO? I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up. Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.) Thanks for listening. :) -A

Wow--thank you all for your on- and off-list links and advice. I appreciate it. Just to answer a few questions/statements floating around: I have worked with a lot of 'cowboy' VoIP providers in the last 10 years. They were all terrible. But their prices were really good, which is why I think most decision makers choose them. They don't have the experience or knowledge to understand *why* they are so cheap. The phones aren't configured by DHCP. DHCP only gives them an IP, Subnet, Gateway, DNS, and NTP server. For the curious people who were wondering about the network config: The network is identical at all the offices. A decent internet connection connected to a pfSense router we manage. The router has a link to the switch that carries tagged VLANs 'office', 'guest-wap', 'staff-wap', and 'VoIP'. When they installed phones, they brought in a Netgear PoE web-managed switch and jumpered it over to our switch. We pass the office VLAN and the VoIP VLAN to the switch (both are tagged). On their switch we set the ports to accept untagged office VLAN and tagged VoIP VLAN for the phone pass-through connections. Unfortunately as long as they decide to not wire up direct runs to the phones, I don't see an easy way to separate them. If I force traffic into the VoIP VLAN, the phones can't break out, but the computers would be on the wrong network. Meh. Because the VoIP VLAN requires tagged packets, they set the firmware to tag the packets. We have a DHCP server listening in the VoIP VLAN that hands out addresses, but no configuration information. They get an IP, Gateway, DNS, and an NTP server. When the phones come up, sniffing on the connection between the firewall and the switch shows incoming DHCP packets with the VoIP VLAN tag. Once their lease is about half-over the phone requests an updated lease. When it does so, it has the Office VLAN tag (probably because the device dropped the VoIP VLAN tag, and their switch automatically tags un-tagged packets as 'Office'). We allow all TCP/UDP traffic outbound from the VoIP network. According to the provider, we have to forward a bunch of TCP and UDP ports inbound to the phone server or it won't work. I tested. It doesn't work if ports like 5060 aren't allowed in. (I thought the 'NAT issue' was solved a long time ago. I played with Asterisk years ago and never had problems with SIP trunk responses getting back through the firewall.) The VPN we provided them dumps them on to a 192.168.x.x/24 block. The third octet is different for each office. They can then traverse the router out to the VoIP network with no restrictions. They claimed the VPN didn't work because they couldn't talk to the phones. Turns out the phones wouldn't renew their DHCP lease and would drop off the VoIP network to the Office network, and then they would have no contact with the phones. At some of the offices the phones do stay on the correct VLAN and renew their leases. But they aren't able to communicate with the phones through the VPN or port forwarding. After about an hour of playing around, I turned on masquerading. Turns out the phones had no default gateway or it was set wrong. They seem unable to fix the issue and want us to leave the more-complicated masquerading config in our firewall. *sigh* I personally find this whole comedy entertaining and profitable, but I'm slightly irked that my 'perfect' network setup that was identical at every site and a snap to manage is now dented and tarnished. Oh well. Now I'm going to waste my weekend context switching between writing a detailed report to the CEO, preparing one more office they decided to switch tomorrow morning (and told me about ~90 minutes ago), a nice beer, and a few rounds of Halo. ;) Thanks again for all your responses and input. -A On Fri, Mar 25, 2016 at 4:55 PM, Aaron C. de Bruyn <aaron at heyaaron.com> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices".
This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs.
We spent the better part of a week ripping their stuff out and putting the network back the way it was.
We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going.
We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely.
They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server.
And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports".
We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money.
The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are:
* We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about.
* The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication.
* We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface.
* Most passwords appear to be factory defaults
* The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...)
* They skimped on proper wiring in a lot of places and have computers jumpered through the phones
* Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data.
* If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data.
* A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc...
I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc...
The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible.
Are there any best-practice documents out there I can provide to the CEO?
I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up.
Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.)
Thanks for listening. :)
-A

I learned this the hard way, but now I only continue to service customers if they actually understand the value brought by a secure and reliable service. As soon as they want to cut corners, for one reason or another, and that becomes a huge issue (like in your case), I make use of a "termination for convenience" clause that I have in all my contracts and within 90 days I no longer have to service this customer, they can find some other provider to make their lives hell. No more servicing every customer with insane expectations of cost vs benefit. *Rafael Possamai* Founder & CEO at E2W Solutions *office:* (414) 269-6000 *e-mail:* rafael at e2wsolutions.com On Fri, Mar 25, 2016 at 6:55 PM, Aaron C. de Bruyn <aaron at heyaaron.com> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
About two weeks ago, offices suddenly started going offline. After 15-20 minutes of frantically digging, we got a call from a VoIP provider who was apparently told by Company X "we want to use your VoIP service, go get it installed at all our offices".
This VoIP provider walked in to several off the offices and just started yanking out switches that had various VLANs running on them and replacing them with their own Netgear PoE switches with no config and default passwords. They took down tons of virtual servers and SANs.
We spent the better part of a week ripping their stuff out and putting the network back the way it was.
We had a brief meeting with the VoIP provider and told them things need to be planned in advance and we would be happy to work with them to get things going.
We set up a VLAN for VoIP traffic and told them how to cross-connect their switch to ours, what IP ranges to use, and even set up a VPN connection at each office so they could access the equipment remotely.
They they scheduled 6 installs in 3 days and with no testing or communication they came in and hooked things up. I received repeated phone calls in the evenings, mornings, and weekends that they needed huge swaths of ports forwarded so they could remotely program phones and the phone server.
And of course it was all an emergency. As in "we ported the numbers over already and the office is opening in 15 minutes, just forward the damn ports".
We were even told the 6 installs could not be stopped or re-scheduled because the VoIP provider 'went out' on the equipment and really needs to finish the install so they can recoup their money.
The disaster should be coming to a close this weekend, and I'm trying to clean up and gather information for a report to the CEO. My main concerns are:
* We set up VPN connections. The VoIP guys aren't using them. They don't have time to test and/or troubleshoot any issues they are complaining about.
* The devices all have static IPs instead of using DHCP. The phones appear to get a DHCP address off VLAN 100 properly, but when it's time for a renewal they drop the VLAN tag, get switched to the wrong network, and lose communication.
* We were told to set up port forwards to every phone's *HTTP* interface as well as a forward to the phone server HTTPS interface.
* Most passwords appear to be factory defaults
* The CEO of Company X was told the port forward must remain in place and they can not be disabled for 'security reasons' because VoIP phone are not a computer and therefore can't be hacked. (Seriously?!?!! Who cares about hacking when your equipment has default passwords...)
* They skimped on proper wiring in a lot of places and have computers jumpered through the phones
* Because of that, the phones are self-tagging packets with VLAN 100 and the jumpered workstations are un-tagged which required us to accept un-tagged packets on to the network containing patient data.
* If the phones or phone server gets compromised, it seems like it would be real easy to simply drop the VLAN tag and have access to a network containing patient data.
* A quick sniff at our WAN interface shows all the calls and communication are happening with a server over HTTP. I was able to capture voice data in the clear containing patient information, credit card details, etc...
I have worked with professional VoIP companies before. When they do it right, the networks are isolated, phones have their own network drops, no ports are exposed to the internet, etc...
The CEO of Company X appears to only have been informed that the offices were 'switching to VoIP to save costs' and nothing more. He is a very data-oriented guy and loves technical documentation. When we make our case to him, I'd like to back it up with as much 'best practice references' as possible.
Are there any best-practice documents out there I can provide to the CEO?
I know what this provider is doing is horribly wrong and insecure, but the CEO is the kind of person who wants documentation from lots of sources to back it up.
Basically the phone guys are blaming us for all the problems, and we are blaming them for causing several thousand dollars in after-hours emergency site visits and remote work because of poor planning, scheduling, and simply ripping out equipment they know nothing about. (In addition to making the network insecure as hell and not doing their due diligence.)
Thanks for listening. :)
-A
_______________________________________________ VoiceOps mailing list VoiceOps at voiceops.org https://puck.nether.net/mailman/listinfo/voiceops

On 28/03/16 21:24, Rafael Possamai wrote:
I learned this the hard way, but now I only continue to service customers if they actually understand the value brought by a secure and reliable service. As soon as they want to cut corners, for one reason or another, and that becomes a huge issue (like in your case), I make use of a "termination for convenience" clause that I have in all my contracts and within 90 days I no longer have to service this customer, they can find some other provider to make their lives hell.
No more servicing every customer with insane expectations of cost vs benefit. [...]
On Fri, Mar 25, 2016 at 6:55 PM, Aaron C. de Bruyn <aaron at heyaaron.com <mailto:aaron at heyaaron.com>> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
A lot of my business consists on designing and deploying custom VoIP platform, with that we include free support for a while and then a flat fee. Given that our systems are at the core of the network, every time there is an issue with a call, we are hit first for support, even in many of cases is so obvious the fault is somewhere else. Also, working with open source, we deliver everything to customers and sometimes they do changes, coming back to our support when something no longer works. To handle such cases, we added more clauses to restrict when the free/flat fee support applies: - if someone changes the system without informing us and getting our approval, then the free support is lost and it is charged extra per incident - if reported issues are not related to out systems or the fault is not our system, then we also charge extra per incident (while we are sort of quite flexible here, it gives the tools to stop when the other side is abusing or the work is consistent given the actual agreement) So I agree with Rafael -- it is not worth it with customers that expect you fix for free (at no additional cost) what others broke, under an agreement that you asserted a different environment, which was changed without any consultation with you. Daniel -- Daniel-Constantin Mierla Co-Founder Kamailio SIP Server Project http://www.asipto.com http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda Kamailio World Conference, Berlin, May 18-20, 2016 - http://www.kamailioworld.com

Agreed. Just to be clear, we *do* charge when it's someone else's fault. Company X was billed for all the time we spent fixing after the VoIP provider rolled through. -A On Mon, Mar 28, 2016 at 1:51 PM, Daniel-Constantin Mierla <miconda at gmail.com
wrote:
On 28/03/16 21:24, Rafael Possamai wrote:
I learned this the hard way, but now I only continue to service customers if they actually understand the value brought by a secure and reliable service. As soon as they want to cut corners, for one reason or another, and that becomes a huge issue (like in your case), I make use of a "termination for convenience" clause that I have in all my contracts and within 90 days I no longer have to service this customer, they can find some other provider to make their lives hell.
No more servicing every customer with insane expectations of cost vs benefit.
[...]
On Fri, Mar 25, 2016 at 6:55 PM, Aaron C. de Bruyn <aaron at heyaaron.com> wrote:
I'll try to make this short: I am an IT contractor for "Company X" that has ~26 offices around the western US. We are paid a flat fee to manage every office, keep things secure, train and assist users, etc...
A lot of my business consists on designing and deploying custom VoIP platform, with that we include free support for a while and then a flat fee. Given that our systems are at the core of the network, every time there is an issue with a call, we are hit first for support, even in many of cases is so obvious the fault is somewhere else. Also, working with open source, we deliver everything to customers and sometimes they do changes, coming back to our support when something no longer works.
To handle such cases, we added more clauses to restrict when the free/flat fee support applies:
- if someone changes the system without informing us and getting our approval, then the free support is lost and it is charged extra per incident - if reported issues are not related to out systems or the fault is not our system, then we also charge extra per incident (while we are sort of quite flexible here, it gives the tools to stop when the other side is abusing or the work is consistent given the actual agreement)
So I agree with Rafael -- it is not worth it with customers that expect you fix for free (at no additional cost) what others broke, under an agreement that you asserted a different environment, which was changed without any consultation with you.
Daniel
-- Daniel-Constantin Mierla Co-Founder Kamailio SIP Server Projecthttp://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda Kamailio World Conference, Berlin, May 18-20, 2016 - http://www.kamailioworld.com
participants (9)
-
aaron@heyaaron.com
-
alex.lopez@opsys.com
-
caalvarez@gmail.com
-
choprboy@dakotacom.net
-
d@d-man.org
-
miconda@gmail.com
-
nathana@fsr.com
-
peeip989@gmail.com
-
rafael@e2wsolutions.com