I noticed today that FreePBX has a DDNS entry in the System Admin functions. Visiting it for the first time I discovered that our FreePBX host public IP was registered on an external server and that dig could be used to expose that IP address through pbxact.com. I am not at all comfortable with this situation but I have no data to act on.
I have some questions:
What is the purpose of this setup?
Is it turned on by default or did we enable it in some fashion?
Everything that @deanot26508 has said is correct. So if you’d like us to disable this feature or let you disable it then I encourage you to open a feature request. There’s nothing sneaky we are trying to do (and quite simply it’s really for everything that @deanot26508 listed)
I don’t see how running dig against simply pbxact.com reveals YOUR ip address
I do not recall writing that it did.
However, one can get the IP information by doing a dns query using the deployment registration number together with the domain deployments.pbxact.com. As the deployment number appears to be an eight digit number an exhaustive search of the DNS space using a slow botnet at only 30 lookups per second would take what; 35 days or so? And that would provide the IP address of every Asterisk deployment registered with you. While this setup might not be a critical security failure I do not think that it will win any awards either.
I am not suggesting malevolence here. I am just observing that the circumstance exists and stating that I believe it may be leaking more information than I feel comfortable with.
Its a DDNS feature that most SMBs were asking for. You can go into the module and define a fake IP address which will report to us instead of the real IP address it detects.