SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005

Slides:



Advertisements
Similar presentations
Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
Advertisements

RadSec – A better RADIUS protocol
Glenn Johnson John A. Dutton e-Education Institute Project Manager, Penn States e-Portfolio Initiative Glenn Johnson John A. Dutton e-Education Institute.
Save Time, Money, and Energy by Virtualizing Your Environment Mica Lyman and Shawn Harpe Oklahoma State University Copyright Mica Lyman, Shawn Harpe 2007.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
EDUCAUSE Security Professionals Conference 2007 Monkey-in-the-Middle Attacks on Campus Networks Andrew J. KortySean KrulewitchIndiana University April.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
SIP Security Matt Hsu.
JA-SIG CAS Enterprise Single Sign-On Scott Battaglia Application Developer Enterprise Systems & Services Rutgers, the State University of New Jersey Copyright.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
SIP Session Initiation Protocol Short Introduction Artur Hecker, ENST.
1 RFC 3486 Compressing the Session Initiation Protocol (SIP) 曾朝弘 電機系 系統組 碩士班一年級.
Considerations for Patch Management – an RFP Extensive RFP Extensive RFP Pain in the Butt Pain in the Butt 10 Minutes to tell you about it 10 Minutes to.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Taking Cyber Security Awareness to the Street Community Aware.
©Stephen Kingham SIP Peering SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Grids USC Case Study Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Property of Lancope. Proprietary and Confidential. Lancope and Emory University: Illuminating (and Securing) the Network Andy Wilson Senior Systems.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Learning & Teaching = Activities Copyright Steve Ehrmann & Nikki Reynolds, This work is the intellectual property of the author. Permission is granted.
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Authors: Victoria F. Sarkisian, Linguistic Coordinator at the Academic Learning Center Austin C. Schilling, Senior Consultant at IBM In collaboration with:
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Firewalls, Network Address Translators(NATs), and H.323
Windows 10 Common VPN Error Tech Support Number
Printing Reduction with PaperCut
Copyright Joel Rosenblatt 2010
Julian Hooker Assistant Managing Director Educause Southwest
Applications of Virtualization & Automation
Chapter 18 IP Security  IP Security (IPSec)
Copyright Jill Forrester, 2012
Filelocker: Simplifying Secure File Transfers
draft-ietf-simple-message-sessions-00 Ben Campbell
EDUCAUSE 2011 Three Paths, One Goal: Three Institutions’ Journey with Providing and Supporting Mobile Technology Emporia State University The Faculty &
Federating with NIH, NSF, and the National Student Clearinghouse
An introduction to Transactions & Dialogs
Designing a Web-Based Student Portfolio System
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
Ed Barboni, Senior Advisor, Council of Independent Colleges
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
SIP Basics Workshop Dennis Baron July 20, 2005.
By Seferash B Asfa Wossen Strayer University 3rd December 2003
網際網路電話系統 期中考重點整理.
09 | Configuring Lync Online
Protection Mechanisms in Security Management
Terry Coatta VP Development, Silicon Chalk
Presentation transcript:

SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham mailto:Stephen.Kingham@aarnet.edu.au sip:Stephen.Kingham@aarnet.edu.au

Copyright Stephen Kingham 2004 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Outline and Objectives SIP Authentication Who are you? SIP Authorisation What are you allowed to do? SIP Presence and Instant Messaging (the SIMPLE protocol) I am available! Buddy lists.

Authentication in SIP Both ends must know the same secret password (key). The password is used to encrypt certain information such as the user’s password. Originated from HTTP (WWW) and often called HTTP digest, Digest Authentication is described by RFC 2671. RFC 3261 (SIP) describes how Digest Authentication is applied to SIP.

SIP REGISTER with Digest Authentication UA Proxy Server REGISTER bruce@uni.edu.au (with out credentials) 407 Proxy Authentication Required ask user for a password REGISTER bruce@uni.edu.au (password encrypted with key) 200 OK

SIP INVITE with Digest Authentication UA Proxy Server UA INVITE fred@uni.edu.au (with out credentials) 407 Proxy Authentication Required ACK ask user for a password INVITE fred@uni.edu.au (with encrypted password) 100 TRYING INVITE fred@uni.edu.au (password removed)

Secure SIP SIPS, a close cousin of SIP, is a good and low cost means of encryption soon to be widely deployed. It specifies TLS (transport layer security) over TCP and is not subject to bid down attacks. This means a SIPS call will fail rather than complete insecurely.

Protect Gateways from un-authorised use Use a Proxy Server in front of your Gateways, turn on Record Route so ALL SIP control is via Proxy. Configure gateways so that they only respond to SIP from your SIP Proxy. Filter TCP and UDP traffic to port 5060 on the Gateway. Also do the same for H.323, TCP traffic to port 1720 on the gateway.