Messinet Secure Services

Messinet Secure Services is an ever-changing virtual classroom in which I learn about the GNU/Linux platform and all the services it can deliver. These services are the technological incarnation of an idea centered around keeping my family in touch with each other and technology.

Comcast static IPv6 trial ending

Comcast’s Business Class internet service static IPv6 trial ended as of yesterday. Comcast anticipates the nationwide launch of static IPv6 to begin in early July 2016.

With the unfortunate gap in reliable IPv6 business class service from Comcast, Messinet Secure Services is preparing alternate IPv6 service arrangements. There will likely be intermittent service and network interruptions along the way as DNS and routing changes propagate throughout the internet.

When Comcast does finally roll out static IPv6, we hope that they have addressed the significant hardware issues detailed in this summary of Comcast’s support of IPv6 on their CPE for their copper cable network.

Removal of Enterprise Linux RPM Repository

Wow, it’s been quite a while!

I have a new job that takes up much more of my time and as Messinet Secure Services has moved to Fedora 23, I’ve had to drop packaging support for Enterprise Linux. I don’t operate Enterprise Linux systems here so as the packaging differences between Fedora and Enterprise Linux became more complex, it became harder for me to produce and properly test packages.

So I’m sorry to say that I’m no longer building Enterprise Linux packages. Perhaps someone with more time can take up the task. The spec files, patches and tools are always available in the now renamed Fedora Linux RPM Repository.

Fedora 22 Coming Soon!

Fedora 22 is set to be released on 2015-05-26 and Messinet Secure Services has been preparing our own RPMs for the upgrade. Most of the work is complete and available in our Fedora & Enterprise Linux RPM Repository.

In order to work toward the Fedora 22 release, I have had to drop support for Fedora 20 and Enterprise Linux 6 RPMs. After Messinet Secure Services completes the migration to Fedora 22, support for Fedora 21 will also be dropped.

Asterisk 13.0.0-beta1, DAHDI 2.10.0, Kamailio 4.2.0-dev, & PJSIP 2.2 RPMs

Today was a big day for Telephony & VoIP related RPM builds!

Fedora 20 & 21 RPMs for Asterisk 13.0.0-beta1 as well as Fedora 20, 21, & EL 7 RPMs for Kamailio 4.2.0-dev are availabile in the mss-testing channel of the Fedora & Enterprise Linux RPM Repository.

In preparation for building Asterisk for Fedora 21 & EL 7, there are also PJSIP 2.2 (pjproject) RPMs in the mss-testing channel.

Fedora 20, 21 & EL 6, 7 RPMs for DAHDI-Linux & DAHDI-Tools 2.10.0 are also available in the main mss channel.

Moving forward, I hope to be able to provide near-development RPMs for the following:

  • Fedora 20
    • Asterisk
    • DAHDI-Linux & DAHDI-Tools
    • Kamailio
    • PJSIP
  • Fedora 21
    • Asterisk
    • DAHDI-Linux & DAHDI-Tools
    • Kamailio
    • PJSIP
  • Enterprise Linux 6
    • DAHDI-Linux & DAHDI-Tools
  • Enterprise Linux 7
    • Asterisk (coming soon)
    • DAHDI-Linux & DAHDI-Tools
    • Kamailio
    • PJSIP

Kamailio 4.1.4 RPMs for Fedora 20, 21 & Enterprise Linux 7

I have started building Kamailio RPMs for Fedora 20 & 21 and Enterprise Linux 7. Currently, the RPMs are based on the 4.1.4 release, with updates applied to keep it in line with upstream’s development branch.

You can browse the spec file and patches here. Feel free to contact me if you see any issues with the packaging.

Right now, the RPMs are available in the mss-testing channel of the Fedora & Enterprise Linux RPM Repository, though I plan to move them out of mss-testing and into the default mss channel in the future.

I have also begun integrating Kamailio with Asterisk at Messinet Secure Services to enhance the capabilities of the communications services we provide. I’d love to hear from you if you have any pointers!

Heartbleed & Us

As you probably know by now, Heartbleed is the name for a bug in the OpenSSL cryptography software that, in short, could enable an attacker to steal the private key that was meant to encrypt TLS secured connections. With access to the private key, the attacker could access user names, passwords, and other sensitive data that internet users thought was being transmitted securely.

Messinet Secure Services was one in the estimated 66% of all internet sites using a compromised version of OpenSSL on our public website and email servers. Fortunately, we upgraded our OpenSSL libraries immediately on 2014-04-07 when the announcement was made and the updated packages were available. In order to protect future SSL/TLS internet transmissions, we also revoked the potentially compromised StartSSL certificates, re-keyed, and implemented new certificates on 2014-04-10.

The real problem is that an attacker could access sensitive information from past connections which may have been captured.

While Messinet Secure Services is now properly re-secured, it is critical that users with accounts and passwords at Messinet Secure Services change their passwords. This is the difficult, but final step in the process to overcome the breach created by Heartbleed. If you are one of the affected users, you will receive an email with instructions on how to change your password.

Goodbye EGroupware, Hello Jekyll & Horde!

Behind the scenes, Messinet Secure Services has been working diligently to complete the migration from EGroupware to Horde Groupware to enhance the user experience with web-based services such as calendars, contacts, email, etc. And while it’s been eerily quiet on front end, there has been a lot of activity on the back end.

Since that migration was completed a few weeks ago, we have been investigating various website management systems in an effort to replace EGroupware’s Site Manager module with something that would allow us to focus on simplicity, standards compliance, and sustainability in terms of our public-facing websites. We have decided to use Jekyll as a formidable replacement which suits our needs and will allow us to simplify our processes. This announcement signifies that the final piece of the puzzle is in place, and we have completed the content migration from EGroupware to Jekyll.

So long, EGroupware, and Thanks for All the Fish!