IRC log for #asterisk on 20190613

00:16.29*** join/#asterisk infobot (ibot@c-174-52-60-165.hsd1.ut.comcast.net)
00:16.29*** topic/#asterisk is Take the March 2019 Asterisk User Survey! https://goo.gl/forms/xL1VUHRsf95saly13 -- #asterisk The Open Source PBX and Telephony Platform (asterisk.org) -=- LTS: 13.27.0 (2019/5/30) 16.4.0 (2019/5/30), Security Only: 15.7.2 (2019/2/28); DAHDI: 2.11.1 (2016/03/01); libpri 1.6.0 (2017/01/27) -=- Wiki: wiki.asterisk.org -=- Code of Conduct: bit.ly/1hH6P22
00:21.31*** join/#asterisk lbazan (~lbazan@fedora/LoKoMurdoK)
00:28.22*** join/#asterisk clarjon1 (~clarjon1@unaffiliated/clarjon1)
01:14.45*** join/#asterisk troyt (zncsrv@2601:681:4100:8981:44dd:acff:fe85:9c8e)
01:21.15*** join/#asterisk ruben23 (~Opendial@49.151.227.207)
02:15.05*** join/#asterisk techquila (~techquila@2407:7000:9125:e400:a453:6053:e9c0:bace)
02:18.04*** join/#asterisk ghoti (~paul@glphon2233w-grc-09-184-145-52-216.dsl.bell.ca)
03:46.45*** join/#asterisk nohop (~nohup@chef.nohup.nl)
04:07.39*** join/#asterisk gerhard7 (~gerhard7@ip5657ee30.direct-adsl.nl)
06:07.19*** join/#asterisk defsdoor (~Andrew@cpc120600-sutt6-2-0-cust232.19-1.cable.virginm.net)
06:16.13*** join/#asterisk pchero_work (~pchero@87.213.247.82)
06:52.56*** join/#asterisk jkroon (~jkroon@105.12.6.235)
07:15.30*** join/#asterisk jkroon (~jkroon@105.12.6.235)
07:23.34*** join/#asterisk pa (~pa@unaffiliated/pa)
07:41.40*** join/#asterisk jkroon (~jkroon@105.12.6.235)
08:21.45*** join/#asterisk jknotten (~jknotten@82-71-28-175.dsl.in-addr.zen.co.uk)
08:26.29jknottenI am subscribed to the localphone voip service, which provides an incoming landline number. I have two voip devices (a gigabit n300a and a fritzbox router). When there is an incoming call on localphone, only the first registered device rings. I'd like both to ring. Can asterisk help me out here? I'm planning to put the n300a and the fritzbox in two separate houses, so it'd be neat to have one number ring both places.
08:34.38*** join/#asterisk jkroon (~jkroon@105.12.6.235)
08:42.08*** join/#asterisk jkroon (~jkroon@105.12.6.235)
09:22.15ReinhildeWith chan_sip you would need two separate accounts.
09:26.01jknottenReinhilde, right I can do that
10:12.14*** join/#asterisk ganbold (~ganbold@202.21.108.202)
10:28.03*** join/#asterisk Ai9zO5AP (~BQcdf9eiZ@185.246.128.83)
11:00.46*** join/#asterisk lankanmon (~LKNnet@CPE64777d632383-CM64777d632380.cpe.net.cable.rogers.com)
11:01.16*** join/#asterisk emsjessec (~emsjessec@96.56.225.51)
11:43.55*** join/#asterisk jkroon (~jkroon@105.12.6.235)
12:26.32*** join/#asterisk ChkDigit (~u388mw@74.3.144.66)
12:32.15*** join/#asterisk catphish (~charlie@unaffiliated/catphish)
12:32.23catphishdoes anyone have any VoIP manufacturer CA certificates?
12:34.18*** join/#asterisk brad_mssw (~brad@66.129.88.50)
12:44.24Samotcatphish: What?
12:45.00catphishi need the certificates that voip phone manufacturers use to sign the certs they install on all their devices
12:46.26SamotWhat devices are you talking about?
12:47.06catphishideally, all of them, specifically polycom, yealink, snom to begin with
12:48.46SamotNo one issues certs like that
12:49.14catphishall those manufacturers do
12:49.48catphishall new phones have such certs installed, but i'm struggling to find the CAs
12:50.44SamotNot valid certs
12:50.59SamotSelfsigned sure
12:51.35catphishincorrect
12:51.45Samotok
12:51.56SamotThe ones i jist bought lie
12:52.18catphishwhat devices?
12:52.31SamotYealinks and polycoms
12:53.09catphishthe ones i've tested so far (yealink and polycom) are signed singed by a manufacturer CA, the certs would be completely useless otherwise
12:53.39filecertificates for what purpose?
12:53.41SamotWhat do you need them for?
12:54.17catphishthey're used to authenticate requests from the phones (usually for provisioning)
12:54.40*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
12:54.47SamotNo they are not.
12:54.59catphishthey really are
12:55.03SamotNo they are not.
12:55.15SamotIf I have a SSL based provisioning server then it's MY CERT
12:55.21SamotAt the location of the provisioning server.
12:55.35Samothttps://phones.provision.com has nothign to do with the cert on the phone.
12:55.54catphishi don't know how better to explain, phones have certificates, they're absolutely used to authenticate them for provisioning
12:56.03SamotThey absolutely are not.
12:56.28SamotIf you use TFTP, there's no SSL
12:56.37SamotIf you set it to HTTP, no SSL
12:56.41SamotOr FTP
12:56.55SamotSo how will those non-secure methods use the cert to provision?
12:57.06catphishit would only work over HTTPS
12:57.18fileI'd suggest talking to the manufacturer of how they expect the particular certificate to be used
12:57.18SamotRight and when you put in my provsioning URL
12:57.21SamotWith HTTPS
12:57.28SamotWho's cert do you think gets used?
12:58.08catphishfile: they just don't seem to publish the certs for some reason, i can ask for them but it's tedious :)
12:58.09Samotfile: Polycom's make their web admin for the phone HTTPS by default.
12:58.15SamotBut it's an invalid cert.
12:59.39catphishSamot: when you put in an HTTPS provisioning URL, the phone verifies the provisioning server against any of its built in CAs, and the server authenticates the phone using the device certificate, there are 2 certificates involved in such a request
12:59.44fileI doubt they would make their CA public key available, but they may make the public available for verification of the trust chain if the device provides a client certificate
12:59.53SamotNo there is not catphish.
13:00.00SamotYou understand how HTTPS works right?
13:00.05catphishi do
13:00.09Samothttps://google.com doesn't care about what cert YOU HAVE
13:00.12catphishi believe you do not
13:00.15SamotHAHAHA
13:00.23catphishSamot: that's correct, google has no reason to authenticate clients
13:00.35fileSamot: client certificates are optional, but can be done
13:00.38SamotWhat does HTTPS have to do with auth?
13:01.05catphisheverything :)
13:01.10SamotNo.
13:02.04catphishyou're just going to have to believe me that TLS optionally verifies client certificates and this is widely used for phone provisioning
13:02.36SamotI run provisioning servers.
13:02.40fileI wouldn't say widely, it can be used
13:02.44SamotNo one has certs on their phones to provision with me.
13:03.12SamotI have the cert because they are making an HTTPS request to _my server_
13:03.18SamotLike any other HTTPS request
13:03.30scgm11_hello, anyone recording video on asterisk?
13:04.28filebarely anyone
13:04.47catphishSamot: well the only other way to authenticate requests is to manually enter authentication details into the phone, and that's not particularly practical for automation, it's definitely best practice to use TLS auth
13:05.13scgm11_I´ve seen app_mp4 around, but cannot find the deps
13:05.19Samotcatphish: I can set up my HTTP/HTTPS base provisioning to use a user/pass or not.
13:05.31SamotIf they do it via HTTP then the user/pass is plain
13:05.42SamotIf they connect HTTPS then the user/pass is secured.
13:05.49SamotOr I don't have a user/pass....
13:06.08SamotAnd they can just pull their profile over HTTPS because it's just downloading files.
13:06.11catphishi guess in plenty of local environments, auth is not needed
13:06.27SamotBut the phone doesn't need a cert on it for that
13:06.33SamotBecause the provisioning server is the one with the cert.
13:06.49SamotIt's the provisioning server that is doing the HTTPS not the phone.
13:06.53catphishanyway, i can't seem to find the CA certificates, so i guess i'll have to ask the manufacturers directly, just hoped someone else had them
13:08.10catphishyay, managed to  get the certs from our distributor :)
13:08.13SamotThe only thing a CA loaded on the phone will do is be a CA for the certs that are on the phone
13:08.24SamotWhich means they are only used for when you connect _to the phone_
13:08.39catphishi don't think that makes sense
13:08.44SamotOK.
13:08.53SamotWell I've been doing this for a very long time.
13:08.54catphishCAs on the phone are used to verify servers that the phone connects to
13:08.59SamotNO IT IS NOT
13:09.10catphishcan't tell if you're just messing with me now
13:09.28SamotThe only time you would need to put a CA on the phone for that is if the other side had a self-signed cert on it.
13:09.49SamotThat's why there are Public CAs.
13:10.11SamotThat's why browsers and other software have CAs in them already from the public CA's out there.
13:11.22SamotI'm not messing with you at all or in any way.
13:11.29SamotI'm trying to tell you how things actually work.
13:11.37catphishto clarify... 1) phones have public CAs installed on them, they are used to verify servers they connect to 2) you can install your own, there's rarely any need to do this 3) you can't verify a self-signed certificate
13:11.58SamotYou can verify a self-signed cert if you load the details on the device using it.
13:12.14SamotBecause the CA needs to be installed at that point.
13:12.37catphishi guess you can install the self-signed certificate at both ends, i've never done that
13:13.53catphishbut in addition, modern phones have a device certificate signed by the manufacturer's CA, this is used to authenticate the phone during outbound TLS requests, i think polycom uses this as the certificate for its HTTPS server too, but i didn't hceck
13:13.55catphish*check
13:14.25catphishif you do provisioning over the internet, i'd strongly recommend looking into using these certificates
13:14.42catphishif only to avoid having to manually configure credentials
13:14.55SamotThe phones don't need CA's for connecting to an HTTPS location that is using a public TLS cert.
13:15.07catphishyes they do
13:15.12SamotWhy?
13:15.16SamotWhy do you think that?
13:15.32catphishhow would they verify the certificate of the server if they didn't have the CA?
13:15.42SamotPUBLIC CAs
13:15.50catphishthe CA is public, but how would they get it?
13:15.54SamotWhen you get a cert from Commdo, RapidSSL
13:16.08SamotBecause major CA vendors are TRUSTED BY OTHER VENDORS
13:16.37SamotChrome, Firefox, Safari, Opera, etc they all have those CAs trusted by default.
13:16.44SamotSo do other devices.
13:16.53catphishright, including phones
13:16.59SamotRight.
13:17.07catphishso the phones have those CAs!
13:17.17SamotNot the manufacture's.
13:17.35catphishwe're talking about public CAs now
13:17.46catphishthe phones have several pre-installed
13:17.59SamotPolycom is not a CA.
13:18.02SamotThey don't try to be.
13:18.12SamotWhen you go to https://polycom.com they are not the CA.
13:18.25catphishthey are a CA, i am looking at their certificate now
13:18.56catphishit's not trusted by browsers, but that doesn't make it any less of a CA
13:19.06SamotSo when you go to their website..
13:19.14SamotTheir HTTPS cert for their site is Google CA
13:19.26SamotIt was a cert issued by Google's CA.
13:19.33catphishright, they obviously wouldn't use their own CA for their website, because it's not trusted by browsers
13:19.52catphishbut they do use it to sign the certificates they install in their phones
13:20.15SamotSorry, not Google..DigiCert.
13:20.46SamotRight and when I got the https://phone-ip to hit the phone I get a warning.
13:20.51SamotThat the cert isn't trusted
13:20.57SamotBecause I don't have the CA in by browser.
13:21.00catphishcorrect
13:21.06SamotThat is hitting the phone
13:21.14SamotAccessing the HTTPS server on the phone.
13:21.19catphishbut it's not self-sighed like you might expect, it's signed by the manufacturer's CA
13:21.28SamotRight
13:21.39SamotA non-public or trusted CA.
13:21.44SamotThat they SIGNED THEM SELVES
13:22.11SamotThey didn't use a public/trusted CA.
13:22.38catphishcorrect
13:22.46Samot"self-signed" means a non-public/trusted CA signed the cert.
13:22.52SamotA self-serving CA.
13:22.52catphishno it doesn't
13:22.55SamotOK.
13:23.01catphishit means a certificate that signs itself
13:23.15SamotCerts get generated by the CA.
13:23.31SamotWhen you're your own CA, that is self-signing.
13:24.14catphishi've never known the phrase self-signed to mean that, that's very confusing
13:24.20catphishanyway, when that phone makes a request to your HTTPS server (ie for provisioning) it will send that same certificate, and you can (rather than any other authentication method) verify it with the manufacturer's CA
13:24.36SamotWell as a user you're job is to create a CRS (request) and the private key
13:24.56SamotYou send those to the CA of your choosing. They use those to generate the CRT file. The cert.
13:25.02catphishremember, i know how TLS works :)
13:25.13SamotSo the only difference is instead of sending it to a CA
13:25.18SamotYou create the CA yourself.
13:25.31SamotAnd then gen/sign the cert against your own CA.
13:25.41catphishthat's technically the same though
13:26.01SamotExcept those that wish to use the cert must have the CA details.
13:26.07catphishthe only difference is who controls the CA and whether browsers have accepted it into their default lists
13:26.07SamotSo you need to send them that.
13:26.27SamotNot just the browser. ANY device/software that wants to use the cert.
13:26.34SamotFTP, etc.
13:26.37SamotMail.
13:29.13SamotSo if you want to create your own provisioning server and put your own signed cert on that provisioning server. You will then need to put your CA on all the phones that wish to use it.
13:33.20catphishthat's also true
13:33.52*** join/#asterisk bford (uid283514@gateway/web/irccloud.com/x-ftmwevcidzpykana)
13:33.52*** mode/#asterisk [+o bford] by ChanServ
13:35.01SamotSo again, why do you need the manufacturer's CA?
13:35.28catphishto authenticate the phone when it makes HTTPS requests to my server
13:35.36catphishi thought i explained
13:35.52SamotTheir CA will do nothing for that
13:36.42SamotDid they sign your crs and key against that CA?
13:36.53catphishyes it does, their CA signed the device certificate, to i can use it to verify the device certificate, which it sends when it makes HTTPS requests
13:37.07catphish"Did they sign your crs and key against that CA?" << yes
13:37.16catphishthe certificate and key they embed into each device
13:37.25SamotSo you sent each manufacture your crt and key for your provisioning server..
13:37.33Samotcrs*
13:37.38SamotAnd they sent you back a cert?
13:37.40catphishno, they install it in the device before it's shipped
13:37.51SamotTheir CA will not authorize YOUR generated cert.
13:38.00SamotThat's not how HTTPS works.
13:38.03catphishno, its their certificate
13:38.10catphishthey generate it, and embed it into the device
13:38.21SamotWhat about the provisioning server?
13:38.28catphishi mean, it's mine because i bought the device, but they generate it
13:38.30SamotOr the SIP server?
13:38.40catphishthe provisioning server uses a certificate signed by a public CA
13:38.48SamotThen you don't need their CA.
13:38.54SamotThe HTTPS has a public CA
13:38.59SamotThe phone knows that
13:39.00catphishyes i do, to verify the PHONE
13:39.13SamotHow are you verifying the phone?
13:39.30catphishit's a 2-way process, the server proves its identity with a public-ca-signed cert
13:39.41catphishand the phone proves its identity with a cert signed by the manufacturer
13:39.49SamotNo, it's an HTTPS request.
13:39.55catphishright
13:40.00SamotIt is literally a standard HTTPS request.
13:40.03catphishlets back up a step
13:40.13catphishyou know HTTPS supports 2-way auth?
13:40.23catphish(ie client as well as server)
13:41.04SamotSure so you're doing this in a manner pretty much no provisioning servers are setup for.
13:41.10SamotGot it.
13:41.24SamotThat is how you should have led this conversation.
13:41.37SamotThat you are trying to achieve 2-way auth over HTTPS.
13:41.52SamotA non-standard way to setup provisioning servers for devices.
13:43.10catphishexcept it's not non-standard, it's very much best practice, and mandated by some certifications
13:43.18*** join/#asterisk ruben23 (~Opendial@49.151.227.207)
13:43.36SamotNon-standard where?
13:43.38SamotIn what sense?
13:43.48SamotWildcard certs are standard.
13:43.52catphishthat was your claim, not mine
13:43.52SamotSIP doesn't like them.
13:44.02catphishwait what?
13:44.22SamotThe SIP RFC expressly said wildcard certs using *.domain.com are not acceptable.
13:44.35SamotYou must specify the full FQDN
13:44.36catphishwow, didn't know that
13:44.39SamotRight
13:44.51SamotSo when I'm talking about a phone provisioning server...
13:45.16SamotThere are ways to do that and that might not be the same as a regular HTTPS server that does 2-way auth.
13:45.41SamotDo not conflate web hosting setups with SIP setups.
13:45.50catphishthis isn't SIP, it's HTTPS
13:46.07SamotOK VoIP, the industry..
13:46.21catphishand i can tell you for certain that TLS auth is a very standard approach to authenticate for provisioning, because from the factory, it's essentially the only method available
13:46.43catphishunless you manually enter credentials, which isn't useful for drop-shipping
13:46.45SamotExcept for FTP, HTTP, TFTP that they all offer.
13:47.32catphishhow would any of those offer authentication?
13:47.47catphishof course, on a LAN, authentication may not be necessary
13:47.53SamotWell HTTP/HTTPS do the same method of auth
13:48.04SamotFTP has a user/pass if you want..
13:48.10SamotBecause, FTP.
13:48.13catphishyou'd have to enter those manually though
13:48.17SamotIn the phone?
13:48.20catphishright
13:48.22SamotNo.
13:48.26SamotI put those in the profile.
13:48.43catphishand how does that profile reach the phone?
13:48.55SamotWell depends on how I deploy it.
13:49.02SamotOption 66 is helpful.
13:49.46SamotI touch all the phones I send to customers.
13:49.54SamotTo ensure they are on the firmware *I* use
13:50.03SamotAnd that they get the proper provisioning rule.
13:50.13catphishif you handle the phones and provision them on a secure LAN, that's fine
13:50.26SamotThen I ship them.
13:50.35catphishbut a lot of people want to run provisioing over the internet (as i want to)
13:50.42SamotSO DO I
13:50.55catphishso stronger auth is needed, without first touching the phone
13:51.02SamotYOU CAN'T.
13:51.05SamotWow.
13:51.12catphishyes you can
13:51.14SamotYou're just sending them out without even looking at them?
13:51.18catphishthat's the whole point of this
13:51.20catphishyes
13:51.25SamotOK.
13:51.28Samotgood play.
13:51.35SamotNo one is actually touching these things?
13:51.37SamotThat's the point?
13:51.41catphishcorrect
13:51.49SamotSo you could be sending your customers bad phones?
13:51.49catphishdropshipped from a distributor to customer
13:51.52catphishcorrect
13:51.57SamotOK.
13:52.00SamotI don't do that.
13:52.03*** join/#asterisk fblackburn (~fblackbur@modemcable094.94-70-69.static.videotron.ca)
13:52.39SamotI create the profile, I plug the phones into my lab. Option 66 does the rest.
13:52.49catphishthat seems like a good approach
13:52.59SamotPhone provisions, updates to my firmware and I've verified it works.
13:53.09SamotI then ship verified/tested phones to my end users.
13:53.29catphishthat seems sensible, but understand that people do like dropshipping
13:53.44SamotI like not having to deal with broken things remotely
13:53.49catphishand it *can* all be automated
13:53.56catphishwell sure
13:53.57SamotOr having my customers mad because they have to wait longer because I sent them broken stuff.
13:54.06SamotDude this is automated.
13:54.06catphishi'm not questioning your approach at all
13:55.52SamotThe phones are what make the request. So "zero-touch" means the phone comes with knowing where to make the request.
13:56.18catphishright, this is achieved by a redirect server that the manufacturer provides
13:56.39SamotTo my customers, I offer zero touch.
13:56.59SamotIn order to do that, *I* have to touch the phone.
13:57.03SamotSo they don't have to.
13:57.11catphishi understand your process
13:57.32catphishbut it's not technically necessary unless you want to do your own QA
13:57.47catphishwhich again is perfectly admirable
13:57.52SamotYeah, I'm weird like that.
13:58.05SamotI like to know the services/products I offer actually work as intended.
13:59.15SamotI do things like take an extra 5 minutes to do a step to avoid having a shit show in the future that could have been avoided.
14:00.03*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
14:00.32SamotHell, the last two shipments for routers I got from my distributor. Two bad devices in each shipment.
14:03.22SamotI've gotten bad Polycoms, Yealinks. I just like to avoid the customer seeing a new phone be a brick.
14:08.22catphishwell that does seem like it could be an annoyance
14:09.50*** join/#asterisk kharwell (uid358942@gateway/web/irccloud.com/x-lorvfjwvvlrekdis)
14:09.50*** mode/#asterisk [+o kharwell] by ChanServ
14:14.27SamotIt is. Along with time extra time it sucks up.
14:14.35SamotWhich is just extra costs.
14:23.40*** join/#asterisk mazaarinqi (~mazaarinq@ip565b5ee5.direct-adsl.nl)
14:31.07catphishthis process works nicely by the way now that i have the certs :)
14:31.44catphishthe phone sends its cert, i verify it, and can see the MAC from the certificate
14:53.40*** join/#asterisk beachdog (~beachdog@mobile-166-170-47-174.mycingular.net)
14:58.11*** join/#asterisk Kaian (~kaian@212.81.221.228)
15:04.40*** join/#asterisk ChkDigit (~u388mw@74.3.144.66)
15:15.39*** join/#asterisk hfb (~hfb@47.139.20.234)
15:22.30*** join/#asterisk guerby (~guerby@april/board/guerby)
15:22.44*** join/#asterisk pabe (~pabe@81.24.66.208)
15:35.14Samotcatphish: Just remember, if part of the logic for this is extra layer of security, the whole Google Voice thing that happened last year involved people ripping certs/CAs out of valid devices and using them to spoof their PBXes.
15:35.45catphishthis is 100% for security, and in fact i'll be trusting it completely
15:36.16*** join/#asterisk pabe (~pabe@81.24.66.208)
15:36.23*** join/#asterisk scgm11__ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
15:36.29catphishi have to trust that each device has a unique key
15:36.41SamotWell Google/Polycom were on it in about 3 weeks.
15:36.42catphishso ripping the key from one device would be useless on another one
15:36.58SamotI'm not sure you have the same level of security measures they do though.
15:37.09SamotWell that's how people were doing it last year with Google Voice.
15:37.21*** join/#asterisk hehol (~hehol@gatekeeper.loca.net)
15:37.31SamotThey were ripping the certs out of the Obi devices and putting them on their PBX systems to get around things for Google Voice.
15:37.38catphishif they were shipping private keys to consumers in devices that could be used to spoof other devices, my security is better than theirs ;)
15:38.03SamotIt took Google Voice a couple weeks before they caught on.
15:38.16catphishwell that's fine, as long as google were only spoofing devices they owned
15:38.33catphishnot a huge security issue
15:38.50SamotNo, guy A ripped the stuff from a device.
15:39.00SamotThen Guy A gave it to B, C, D, etc.
15:39.07SamotThey used them on their Asterisk PBX's.
15:39.30fileamusingly GVSIP played out as I said it would
15:39.40SamotOh a few of us called that.
15:39.59SamotBut yeah it was amusing to watch.
15:44.02Samotfile: If you thought GVSIP was amusing, just wait for the final removal of Chan_SIP!
15:44.16SamotThat's going to be 🍿
15:48.09catphishlol
15:50.49Samotcatphish: Just look at how many 3rd part Asterisk staples from over the years pretty much died at v11.
15:51.10SamotThe updates and introduction of PJSIP in v12 threw them all for a loop.
15:51.26catphishi hung onto 1.8 much longer than i should have, but migrating to 13 was fantastic when the same came
15:51.44catphishskipped straight to 13/pjsip all at once
15:52.11catphishhuge improvement, apart from the sudden memory hog :D
15:52.58SamotPJSIP has improved vastly from its introduction in v12.
16:09.32*** join/#asterisk bank (~bank@acrossthemoat.com)
16:12.26*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
16:17.01*** join/#asterisk jkroon (~jkroon@165.16.203.105)
16:30.22catphishworks very well for me at the moment :)
16:42.01*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
17:07.06*** join/#asterisk lbazan (~lbazan@fedora/LoKoMurdoK)
17:23.20*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
17:34.36*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
18:36.54*** join/#asterisk scgm11_ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
18:38.41*** join/#asterisk yokel (~yokel@unaffiliated/contempt)
18:43.10*** join/#asterisk tuxian (~tuxian@igilmour.plus.com)
18:48.42*** join/#asterisk scgm11__ (~scgm11@r186-50-173-42.dialup.adsl.anteldata.net.uy)
19:21.11*** join/#asterisk gerhard7 (~gerhard7@ip5657ee30.direct-adsl.nl)
19:27.29*** join/#asterisk scgm11_ (~scgm11@r186-52-147-237.dialup.adsl.anteldata.net.uy)
19:32.37*** join/#asterisk lbazan (~lbazan@fedora/LoKoMurdoK)
19:34.45*** join/#asterisk infernix (nix@unaffiliated/infernix)
20:05.55*** join/#asterisk K0HAX (~michael@gateway/tor-sasl/k0hax)
20:12.10*** join/#asterisk scgm11__ (~scgm11@147.204.224.35.bc.googleusercontent.com)
20:21.20*** join/#asterisk scgm11_ (~scgm11@147.204.224.35.bc.googleusercontent.com)
20:21.31*** join/#asterisk tuxian (~tuxian@igilmour.plus.com)
20:51.55*** join/#asterisk scgm11_ (~scgm11@147.204.224.35.bc.googleusercontent.com)
21:14.30*** join/#asterisk scgm11_ (~scgm11@147.204.224.35.bc.googleusercontent.com)
21:34.05*** join/#asterisk fstd (~fstd@unaffiliated/fisted)
21:58.24*** join/#asterisk [TK]D-Fender (~joe@64.235.216.2)
22:04.00*** join/#asterisk dakudos (~dakudos@c-73-217-33-206.hsd1.co.comcast.net)
22:08.29*** join/#asterisk tomaluca95 (~quassel@kde/developer/tomaluca)
22:32.07*** join/#asterisk bank (~bank@acrossthemoat.com)
22:41.38*** join/#asterisk infernix (nix@unaffiliated/infernix)
23:01.12*** join/#asterisk beachdog (~beachdog@mobile-166-170-47-174.mycingular.net)
23:36.54*** join/#asterisk scampbell (~scampbell@mail.scampbell.net)

Generated by irclog2html.pl Modified by Tim Riker to work with infobot.