In breaking news, Sangoma have announced that Multi Factor Authentication for FreePBX, a commercial module with a hotly contentious ongoing yearly fee, will from April 1 2025, be completely free, for FreePBX users, and no, this I'm assured isn't an April Fools teaser.
It's good to see Sangoma starting to take the open source FreePBX security seriously - unlike they've been doing in the past where you got security by paying for it. I wonder if this means they'll render my age old hack on asterisk to secure chan_spy useless in a near future update too, one can only hope.
The quality of aussiebroadband "support" /cough/ continues to amaze me, apparently, now they can not even read.
On Monday 27/1/25, my automated network monitoring and control scripting emailed me saying that it has disabled IPv6 on the router as it was repeatedly failing route testing (after 8hrs).
In 2020 when RedHat took over CentOS, many predicted it was with the intent of destroying it, being derived from RHEL it was a direct competitor, some say those people have been vindicated, as that's exactly what RedHat did, and its short life-span replacement, CentOS Stream, is just another Fedora, this left FreePBX devs in a bind.
Asterisk and FreePBX allow for a myriad of customisations, some of these however need hand editing asterisk files as well as some FreePBX configuring (due to how FreePBX uses its database and overwrites some asterisk files), so some things you just can't entirely do from within FreePBX, or in asterisk (when using FreePBX that is), like set up Lenny, or provide a Weather service.
Let me start by saying Synology NAS's may have a place if you are a complete Windows only network. Disk Station makes it easy to configure shares, and when homes is enabled it's easy to backup file history and Windows system images, even storing multimedia, and if the Synology DS is the only media server/streamer on your LAN, you can even use Synology Media Server at a pinch - but it's not suitable for much else.
MTA-STS and TLS-RPT are security-type mechanisms that go hand-in-hand which we use to make declarations to other Mail Servers (via DNS) that we only want to accept encrypted connections for MTA transactions.
It tells others that they shouldn't try deliver mail to us if a secure TLS connection can't be established to our Mail Servers. For this to be effective, you must first configure DNSSEC.