Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Secure Internet Solutions Geoff Huston Chief Scientist, Internet Telstra.
Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Johan Garcia Karlstads Universitet Datavetenskap 1 Datakommunikation II Signaling/Voice over IP / SIP Based on material from Henning Schulzrinne, Columbia.
Information-Centric Networks09c-1 Week 9 / Paper 3 VoCCN: Voice Over Content-Centric Networks –V. Jacobson, D. K. Smetters, N. H. Briggs, M. F. Plass,
Microsoft ISA Server H.323 Gateway and Gatekeeper Overview of IP Telephony, H.323, and ISA Server H.323 Support.
VoIPhreaking How to make free phone calls and influence people by the grugq.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
SIP & SS7 (SIP-02) Monday - 09/10/07, 10:00-10:45am.
A Presentation on H.323 Deepak Bote. , IM, blog…
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
IRT Lab IP Telephony Columbia 1 Henning Schulzrinne Wenyu Jiang Sankaran Narayanan Xiaotao Wu Columbia University Department of Computer Science.
Voice over Internet Protocol (VoIP) Training and Development.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Service Oriented VoIP (SOVoIP): True Convergence of Data and Voice Networks Presented By Mohammed Jubaer Arif Supervisors Dr Shanika Karunasekera and Dr.
3. VoIP Concepts.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Towards a Scalable and Secure VoIP Infrastructure Towards a Scalable and Secure VoIP Infrastructure Lab for Advanced Networking Systems Director: David.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
DUE Voice over IP (VoIP) Linksys Ernie Friend- FSCJ.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Introduction to SIP Based ENUM IP Telephony Infrastructure 資策會 網路及通訊實驗室 Conference over IP Team 楊政遠 博士
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
IPCablecom - Network and Service Architecture Dipl.-Ing. Volker Leisse Institute for Communications Technology Braunschweig Technical University
Hemant Sengar, George Mason University
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
VoIP Applications for the Small Business
Remote Connectivity and VoIP Hacking
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
Effective Deployment and Migration Strategies of IP PBX Alfredo Rizzo Adapt
Voice over IP B 林與絜.
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
Introduction to IP Telephony Sunday A. Folayan. VoIP …. A few years ago, everyone struggled to convert data (IP) into sound, and move it over the Public.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
Chapter 6 Remote Connectivity and VoIP Hacking Last modified
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 11 – VoIP Hardware.
Voice over IP. ECE 499VoIP2 Introduction Basics of VoIP Comparisons with current phone systems VoIP Protocols VoIP Issues Telephone Regulation Future.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Firewalls, Network Address Translators(NATs), and H.323
Fortinet VoIP Security June 2007 Carl Windsor.
IP Telephony (VoIP).
Chapter 11: It’s a Network
Remote Connectivity and VoIP Hacking
Lecture 5: Voice Over IP (VoIP): Internet Telephony
OSI Reference Model Kashif Ishaq.
Ingate & Dialogic Technical Presentation
Internet protocol stack
Presentation transcript:

Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP) security PacSec.JP/core04

© 2004 Nicolas FISCHBACH PacSec.JP/core04 2 Introduction » Voice over IP and IP telephony » Network convergence >Telephone and IT >PoE (Power over Ethernet) » Mobility and Roaming » Telco >Switched -> Packet (IP) >Closed world -> Open world » Vendors and Time to Market » Security and privacy >IPhreakers >VoIP vs 3G

© 2004 Nicolas FISCHBACH PacSec.JP/core04 3 Architecture : protocols » Signaling >User location >Session -Setup -Negotiation -Modification -Closing » Transport >Encoding, transport, etc.

© 2004 Nicolas FISCHBACH PacSec.JP/core04 4 Architecture : protocols » SIP >IETF /5061 (TLS) - “HTTP-like, all in one” >Proprietary extensions >Protocol becoming an architecture >“End-to-end” (between IP PBX) -Inter-AS MPLS VPNs -Transitive trust >IM extensions (SIMPLE) » H.323 >Protocol family >H.235 (security), Q.931+H.245 (management), RTP, CODECs, etc. >ASN.1

© 2004 Nicolas FISCHBACH PacSec.JP/core04 5 Architecture : protocols » RTP (Real Time Protocol) >5004/udp >RTCP >No QoS/bandwidth management >Packet reordering >CODECs -old: G.711 (PSTN/POTS - 64Kb/s) -current: G.729 (8Kb/s)

© 2004 Nicolas FISCHBACH PacSec.JP/core04 6 Architecture : network » LAN >Ethernet (routers and switches) >xDSL/cable/WiFi >VLANs (data/voice+signaling) » WAN >Internet >VPN -Leased line -MPLS

© 2004 Nicolas FISCHBACH PacSec.JP/core04 7 Architecture : network » QoS (Quality of service) >Bandwidth >Latency ( ms) and Jitter (<<150ms) >Packet loss (1-3%)

© 2004 Nicolas FISCHBACH PacSec.JP/core04 8 Architecture : systems » Systems >SIP Proxy >Call Manager/IP PBX -User management and reporting (HTTP, etc) -Off-path with IP >H.323: GK (GateKeeper) >Authentication server (Radius) >Billing servers (CDR/billing) >DNS, TFTP, DHCP servers

© 2004 Nicolas FISCHBACH PacSec.JP/core04 9 Architecture : systems » Voice Gateway (IP-PSTN) >Gateway Control Protocols >Signaling: SS7 interface -Media Gateway Controller.Controls the MG (Megaco/H.248).SIP interface -Signaling Gateway.Interface between MGC and SS7.MxUA, SCTP - ISUP, Q.931 >Transport -Media Gateway: audio conversion

© 2004 Nicolas FISCHBACH PacSec.JP/core04 10 Architecture : firewall/VPN » Firewall >“Non-stateful” filtering >“Stateful” filtering >Application layer filtering (ALGs) >NAT / “firewall piercing” -(H.323 : 2xTCP, 4x dynamic UDP ,1720) -(SIP : 5060/udp) » Encrypted VPN >SSL/TLS >IPsec >Where to encrypt (LAN-LAN, phone-phone, etc) ? » Impact on QoS » What is IPv6 going to change ?

© 2004 Nicolas FISCHBACH PacSec.JP/core04 11 Architecture : phones » IP phones >Softphone or Hardphone ? >“Toaster” -Updates/patches -Intelligence >Intelligence removed from the network and put on the end device >Flows between the phone and other systems -SIP -RTP -(T)FTP -CRL -etc.

© 2004 Nicolas FISCHBACH PacSec.JP/core04 12 Architecture : example internet LAN IP VPN (MPLS) PSTN SIP POTS SIP IP PBX VGW GSM IP PBX SIP voice signaling

© 2004 Nicolas FISCHBACH PacSec.JP/core04 13 Other phone networks » POTS/PSTN [TDM] » “Wireless”/DECT phone » GSM » Satellite » Signaling (SS7)

© 2004 Nicolas FISCHBACH PacSec.JP/core04 14 Attacks » IPhreakers >IP knowledge >Known weaknesses >Evolution 2600Hz -> voic /int’l GWs -> IP telephony >Internal or external threat ? >Targets: home user, enterprise, government, etc ? » Protocol implementations >PROTOS » The human element

© 2004 Nicolas FISCHBACH PacSec.JP/core04 15 Attacks : denial of service » Denial of service >Network >Protocol (SIP INVITE) >Systems / Applications >Phone » Availability (BC/DR) >Requires: power >Alternatives (Business Continuity/Disaster Recovery) ? >E911 (laws and technical aspect) >GSM >PSTN-to-GSM

© 2004 Nicolas FISCHBACH PacSec.JP/core04 16 Attacks : fraud » Call-ID spoofing » User rights takeover >Fake authentication server » Effects >Access to voic >Value added numbers >Social engineering >Replay

© 2004 Nicolas FISCHBACH PacSec.JP/core04 17 Attacks: interception » Interception >Discussion >“Who talks with who” -Network sniffing -Servers (SIP, CDR, etc) » LAN >Physical access to the LAN >ARP attacks >Unauthenticated devices (phones and servers) >Different layers (MAC address, user, physical port, etc)

© 2004 Nicolas FISCHBACH PacSec.JP/core04 18 Attack: interception » Where to intercept ? >Where is the user located ? >Networks crossed ? » Lawful Intercept >CALEA >ETSI standard >Architecture and risks

© 2004 Nicolas FISCHBACH PacSec.JP/core04 19 Attacks : systems » Systems >Mostly none is hardened by default >Worms, exploits, Trojan horses

© 2004 Nicolas FISCHBACH PacSec.JP/core04 20 Attacks : phone » (S)IP phone >Startup -DHCP, TFTP, etc. >Physical access -Hidden configuration tabs >TCP/IP stacks >Firmware/configuration >Trojan horse/rootkit

© 2004 Nicolas FISCHBACH PacSec.JP/core04 21 Defense » Signaling: SIP >Secure SIP vs SS7 (physical security) » Transport: Secure RTP (with MiKEY) » Network: QoS [LLQ] (and rate-limit) » Firewall: application level filtering » Phone: signed firmware » Identification: TLS >Clients by the server >Servers by the client » 3P: project, security processes and policies

© 2004 Nicolas FISCHBACH PacSec.JP/core04 22 Conclusion » Conclusion » Other presentations >Backbone and Infrastructure Security - >(Distributed) Denial of Service - » Q&A Image: