From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id B3C231389E2 for ; Fri, 26 Dec 2014 08:59:40 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id A0EB2E0AF1; Fri, 26 Dec 2014 08:59:36 +0000 (UTC) Received: from mail-wg0-f45.google.com (mail-wg0-f45.google.com [74.125.82.45]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 5DDE2E0AE9 for ; Fri, 26 Dec 2014 08:59:35 +0000 (UTC) Received: by mail-wg0-f45.google.com with SMTP id b13so14273318wgh.18 for ; Fri, 26 Dec 2014 00:59:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:reply-to:to:subject:date:user-agent:references:in-reply-to :mime-version:content-type:content-transfer-encoding:message-id; bh=mJ5XcC7E0rPvp/4jIiPa+1igsIG0/AW54JCibFP0WuA=; b=SHjafuZkmbufAdZa1z/iux224cKhTSuFbbYjOiA27+mik24JBAOfFmGOcoSFKAOiOO UlLUh/5peCkeHDRl7iDQphviLrlr+TEFR1mS3p59CCRW6UfhePNlqHi7Fm3NFcgfvYsS VAKJbTo3w2b9JmN4V8CVuGLbl0/DCrV+IJ8mKI7Z7N0wyh2IS6jXDafwW0xN92PoZWAC 8UcZ5h4iydGUL07agCbViVJPrfWlEzd+G1dHoZBC78MVfl74vNTbxn2uD6C8P3ZFtTxD s36fYm7ON6O+JyVD5vrF3YYplfRAETB62Wn7t61hqkxvO0BfA24gPyNiajEPxa/BVdQK h/0A== X-Received: by 10.180.187.239 with SMTP id fv15mr46460519wic.38.1419584374119; Fri, 26 Dec 2014 00:59:34 -0800 (PST) Received: from dell_xps.localnet (230.3.169.217.in-addr.arpa. [217.169.3.230]) by mx.google.com with ESMTPSA id e7sm37923038wjx.31.2014.12.26.00.59.32 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 26 Dec 2014 00:59:33 -0800 (PST) From: Mick To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] public wifi blocking ports Date: Fri, 26 Dec 2014 08:58:32 +0000 User-Agent: KMail/1.13.7 (Linux/3.17.7-gentoo; KDE/4.14.3; x86_64; ; ) References: <20141225074332.GG4205@syscon7> <20141225174245.GH4205@syscon7> <549CCCC1.7060007@iinet.net.au> In-Reply-To: <549CCCC1.7060007@iinet.net.au> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart1439255.1VxnCHHXmp"; protocol="application/pgp-signature"; micalg=pgp-sha256 Content-Transfer-Encoding: 7bit Message-Id: <201412260858.42940.michaelkintzios@gmail.com> X-Archives-Salt: a856c1d1-3bcd-4100-b9f1-0bde5121ce03 X-Archives-Hash: 261a52c19cb95249dab03f572d3b4658 --nextPart1439255.1VxnCHHXmp Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable On Friday 26 Dec 2014 02:49:37 Bill Kenworthy wrote: > On 26/12/14 01:42, Joseph wrote: > > On 12/25/14 16:43, Bill Kenworthy wrote: > >> On 25/12/14 15:43, Joseph wrote: > >>> I've installed "zoiper" (this is an softphone app to connect to my > >>> Asterisk server) on my old phone and it works on my private network > >>> over wifi. > >>> I'm using standard IAX port 4569 to register, so this port is open on > >>> my firewall. > >>>=20 > >>> But when I catch an open public wifi network in a Mall or a Tim Horton > >>> "zoiper" failed to register. > >>>=20 > >>> Do they block outgoing ports of public WiFi networks? What are my > >>> alternatives? > >>>=20 > >>> I can open any port on my DD-Wrt and redirect it to my Asterisk serve= r. > >>=20 > >> Quite often happens in this part of the world. I run an openvpn ssl v= pn > >> on port 443 with an ssl multiplexor on the server end - route all the > >> voip traffic through the vpn. Doesnt work well if bandwidth is really > >> constrained but its the difference between having at least something or > >> nothing at all. > >>=20 > >> BillK > >=20 > > I do run VoIP over vpn but that is between two points on cable > > connection and it works very well. But running vpn over wifi plus VoIP > > will not work very well if at all. Voice will be very choppy. >=20 > Not necessarily - it depends on bandwidth at both ends (my server is on > adsl.) The important point is port 443 and ssl for the VPN which gets > past all blocking I have encountered so far though I have not noticed > deep packet inspection using MITM yet. I am using self signed certs so > it should show up if its attempted. >=20 > What I have encountered is excessive latency on some open WIFI networks > that makes voice conversation unpleasant. Do you use QoS at both ends? It could make a difference with ADSL. =2D-=20 Regards, Mick --nextPart1439255.1VxnCHHXmp Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAABCAAGBQJUnSNCAAoJELAdA+zwE4YeB3AH/jE85qaZHKN1FJfCgkAHBjjD wFcO7sAxnaRe2WOrZYZDqLEMB0h0T+Mr8stJ/LpzzRrFW7FLXlhn5AZDnAqO3u7/ qX5698RyqVo0bKk1Sz7ze8g5BW00lEqRPVvwch7CCdcDzHFLiC0ErJYaypzswcGB dHjG9Ro6tNj0djaK+d2fIw8r5vBPckWYeoCkfVQNkRzCTuCMDmtqe5B6y0xksAyi C6pvAX+L1OYt/2Qr+lCUZjl/YxaSRIdF6VwswArYnhMOvPlvpqh69GEHck+9bnVS NhK5XdLmcQqcWdMlnN+UtyjIsBwR76uIOVO9vyLWwiOsnPOWtG2cOAWOL1fO7HQ= =exz8 -----END PGP SIGNATURE----- --nextPart1439255.1VxnCHHXmp--