1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.
  2. If you had a PIAF Forum account in the vBulletin days, log in with your old credentials. Otherwise, sign up again and we'll get you back in business as soon as we can.
  3. A serious FreePBX vulnerability has been reported. Update your Framework Module immediately. Click here for details.

Orgasmatron 5.1/5.2 Fixes

Discussion in 'Bug Reporting and Fixes' started by wardmundy, Feb 27, 2010.

  1. wardmundy Nerd Uno

    A couple of bugs have reared their ugly heads. Here is a thread with the fixes.
  2. wardmundy Nerd Uno

    Update for Installs Before Friday afternoon, 2/27/2010

    For those that installed Orgasmatron 5.1 before mid-afternoon on Friday, 2/27/2010, please execute the following commands after logging into your server as root:


    Syntax for adding additional user with ARI webaccess only:

    htpasswd /usr/local/apache/passwd/wwwpasswd ari password
  3. wardmundy Nerd Uno

    Update for Installs Before Late Saturday, 2/28/2010

    For those that installed Orgasmatron 5.1 before 2:30 p.m. EST on Saturday, 2/28/2010, you also will need to apply this patch or all sorts of apps won't work since the extensions_custom.conf dialplan was broken by an earlier "improvement." Log into your server as root and execute the following commands:


    And, yes, we know the second command is being executed twice. That is required!
  4. wardmundy Nerd Uno

    CID Superfecta Password for AsteriDex

    If you receive an error that CID Superfecta cannot access the AsteriDex database, simply log into your server as root and run the following commands:

    HTML:
    mysql -uroot -ppassw0rd asterisk <<EOF
    use asterisk;
    UPDATE superfectaconfig SET value='passw0rd' WHERE source='Default_AsteriDex' AND field='DB_Password' LIMIT 1 ;
    EOF
    
    
    
    You also may need to change the maint password in CID Superfecta to match the password you set with passwd-master!
  5. wardmundy Nerd Uno

    IPkall CallerID Glitch

    Be aware that with some IPkall numbers, an incorrect CallerID Number is passed with incoming calls from Google Voice. Rather than displaying your Google Voice number, IPkall sends 2062040232. This will cause the phone you are using to place outbound calls to ring as if you're receiving a second call, i.e. Call Waiting-like behavior. The fix is two steps.

    #1 Log into your server as root, edit /etc/asterisk/extensions_custom.conf, and scroll to the bottom of the file. In the [custom-park] context, the entry for s,2 sets GVNUM to your Google Voice number. Carefully remove your Google Voice number and replace it with 2062040232. Save your changes: Ctrl-X, Y, then Enter. Then asterisk -rx "dialplan reload"

    #2 With a web browser, log into FreePBX. You'll need to make one additional change. Edit the gv-ringback Inbound Route and remove your Google Voice number from the Caller ID Number field. Save your change and reload.
  6. wardmundy Nerd Uno

    Starting to look like Google Voice may actually be spoofing the CallerID on calls to IPkall numbers as a cost-saving measure. Correct CallerID is passed if you call your IPkall number from a non-GV number. Because IPkall is an ILEC, it would receive less of a revenue share on calls from within its own network. In this case the spoofed CallerID appears to be on the IPkall network. :crazy: Stay tuned!
  7. wardmundy Nerd Uno

    SIP Security Vulnerability

    There is a very serious security vulnerability that needs to be patched by loading the very latest version of FreePBX Framework as soon as it becomes available for your version of FreePBX. Just displaying a call report in the FreePBX browser could compromise your system.

    The 2.5 and 2.6 patches (which are what you need with Orgasmatron builds) already have been released. Load this patch IMMEDIATELY by opening FreePBX with a browser and...

    Setup, Module Admin, Check for Updates on Line, Upgrade All

    2.5.2.3: #4223 Security Vulnerability
    2.6.0.2: #3805, #3707, #4188, #4223 Security Vulnerability
  8. wardmundy Nerd Uno

    Orgasmatron Reminders: A bug was discovered that caused scheduling of some reminders to fail because of 2 missing directories. The fix is here: http://nerd.bz/dwO0fd

    Our apologies.

Share This Page