Experiences of using a secure VoIP user agent on PDAs Johan Bilien Erik Eliasson Jon-Olov Vatn

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Chapter 5 standards for multimedia communications
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
NAT/Firewall Traversal April NAT revisited – “port-translating NAT”
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
SIP.edu : OpenSER in an academic environment OpenSER SUMMIT - VON – Berlin 2006.
1 The Critical Role of Sip&H.323 Internetworking in Next- Generation Telephony Dr. Samir Chatterjee Associate Professor School of Information Science ;
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Living the SIMPLE SIP way SIP 2003 Paris, January 2003 Jörgen Björkner VP Concept Development Chairman SIP Forum
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 A Course-End Conclusions and Future Studies Dr. Rocky K. C. Chang 28 November 2005.
Internet Protocol Security (IPSec)
IEEE Emergency Services DCN: Title: call flow for Layer 2 support for unauthenticated requests Date.
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
ITNW 1380 COOPERATIVE EDUCATION – NETWORKING Spring 2010 Seminar # 4 VOIP Network Solutions.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 Integrating 3G and WLAN Services in NTP SIP-based VoIP Platform Dr. Quincy Wu National Telecommunications Program Office
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training September 27, 2004 Austin, Texas Introduction to.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Introduction to SIP Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training March 22, 2004 Indianapolis,
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Countermeasures of Spam over Internet Telephony in SIP.edu Campuses with MySQL and LDAP Support Speaker: Chang-Yu Wu Adviser: Dr. Quincy Wu School: National.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Session Recording (SIPREC) Protocol (draft-ietf-siprec-protocol-09) Leon Portman Henry Lum
1 Secure VoIP: call establishment and media protection Johan Bilien, Erik Eliasson, Joachim Orrblad, Jon-Olov Vatn Telecommunication Systems Laboratory.
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
Chapter 14 Network Encryption
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
The Session Initiation Protocol - SIP
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
1 Personal Mobility Management for SIP-based VoIP Services 王讚彬 國立台中教育大學資訊工程學系
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
How to develop a VoIP softphone in C# that enables SIP Instant Messaging (IM) This presentation describes how to create a softphone in C# that allows you.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Key management issues in PGP
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
IP Telephony (VoIP).
SIX MONTHS INDUSTRIAL TRAINING REPORT
Session Initiation Protocol (SIP)
Presentation transcript:

Experiences of using a secure VoIP user agent on PDAs Johan Bilien Erik Eliasson Jon-Olov Vatn Royal Institute of Technology (KTH) Stockholm, Sweden

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 2 of 20 Secure VoIP on PDAs HP iPAQ h5550 Built-in WLAN and Bluetooth Built-in microphone and speaker can be used Add-on camera SIP User Agent (UA) Minisip ( Security enhancements

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 3 of 20 Securing public (mobile) IP telephony Security scope WLAN link (potentially with WPA) Only first/last hop Enforce access control Mobile VPN solutions Good for communication within an organization Public communication (end-to-end security) Secure telephony between two arbitrary parties AP a.org GW b.org AP GW Internet These are complementary techniques. We focus on public communication.

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 4 of 20 What security does VoIP provide to a user? Is she really talking to Bob? Is charging being done correctly? Can incoming calls be blocked selectively (avoiding spamming)? Can Trudy listen to our call? Can Trudy find out who Alice calls (or who is calling Alice)? Can Trudy detect where Alice is (location privacy)? Can Alice make anonymous calls? Alice (a user) associates the term secure VoIP with properties such as:

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 5 of 20 End-to-end security: which layer? Network layer: IPSEC / IKE NAT/firewall traversal problem Requires strong interaction between the application and the operating system Application layer: SRTP / MIKEY Transparent to the lower layers Very few implementations yet (but we have one!) Optimized for media protection

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 6 of 20 Secure RTP IETF standard (RFC 3711, March 2004) Secures RTP and RTCP streams, by adding: Encryption (AES used in stream cipher mode) Integrity (HMAC-SHA1) Low overhead

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 7 of 20 Multimedia Internet KEYing IETF draft – approved by the IESG Mutual authentication and key exchange for secure multimedia exchange Requires only one round-trip Embedded in session establishment (SIP, RTSP) Three alternative authentication modes: Shared key Public key encryption Signed Diffie-Hellman

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 8 of 20 VoIP architecure: Internet  Internet calls Entities: User agents Alice and Bob SIP servers (proxies) Register current location Forward Invite messages DNS servers SRV Records (SIP) Certificate authorities (CAs) Needed if certificate-based authentication is desired AP a.org AP Internet a.org CADNSSIP a.org b.org CADNSSIP Media

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 9 of 20 VoIP architecure: Internet  PSTN calls SIP/PSTN provider PSTN-GW Security No security support  no confidentiality at all Security support  confidentiality over Internet Routing Does not route IP-IP for free  need two SIP servers/identities AP Internet a.org c.com GWDNSSIPCA PSTN SIP/PSTN provider a.org CADNSSIP Possibly secure

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 10 of 20 VoIP architecure: Intermediate solution No security at SIP/PSTN provider Add B2B UA at Alice’s organization (a.org) a.org can add security support to B2B UA  Partial security of PSTN-calls End-to-end security for Internet  Internet calls AP Internet a.org c.com GWDNSSIP PSTN SIP/PSTN a.org CADNSSIP B2B provider AP Secure

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 11 of 20 Minisip SIP User Agent Open Source (GPL) Security implementation open for review! Released April ~350 downloads (as of May ) Distributed as: Source code RedHat RPM-package Debian.deb-package Microsoft Windows version to come Source modules MIKEY First published implementation SIP SDP SRTP/RTP STUN (NAT traversal) Sound I/O

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 12 of 20 Platforms Minisip runs on: HP iPAQ h5550 (or similar) and PC hardware Linux operating system (Familiar Linux recommended on iPAQs, Microsoft Windows (CE) support required for large scale PDA tests

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 13 of 20 Implementation Developed in C++ Written in separate modules that can be used by other applications Portability GUI and Sound IO is not (yet) ported to Microsoft Windows and Windows CE Dependencies OpenSSL (various security functions) GUI: Qt or GTK on Linux

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 14 of 20 Campus environment IEEE b coverage, no link-layer security SIP soft-phones (minisip) Laptops with USB headsets, GNU/Linux HP iPAQ h5550, Familiar Linux SIP servers SIP Express Router ( Asterisk for outgoing PSTN calls ( SIP/PSTN provider – Digisip ( DNS (BIND), PKI (OpenSSL)

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 15 of 20 Public Key Trust Models Current model SIP phones store root CA certificates Root CAs certify SIP providers (no name subordination) SIP providers certify their users (Common Name = SIP URI) Future models Top-down Similar to the current model, but with name subordination Could utilize DNSSEC Up-Cross-Down Less dependent on external CAs Who should certify the users? a.org CA Root Certificate Authorities b.org CA Root certificates

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 16 of 20 Secure VoIP first experiences: Delays No significant delays: At call establishment: in the worst case roughly 100 ms (Diffie-Hellman) on an average PC* 1 No additional round-trip Pre-computation of some parameters For the media processing: throughput of 20 Mbit/s on an average PC* 2 Fast encryption scheme  Can be used on small devices * 1 : see J. Bilien et al. ”Call establishment delay for secure VoIP”, WiOpt’04, Cambridge UK, March 2004 * 2 : see I. Caballero ”Secure Mobile VoIP”, Master Thesis, KTH, Stockholm Sweden, June 2003

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 17 of 20 Secure VoIP first experiences: User interaction Secure call policies: Opportunistic or required? Very few secure UAs No secure PSTN gateway The UA should be able to fall back on non-secure calls Certificate management is not user-friendly Hard certificates (e.g. SIM card) Will users ignore security alerts? Accept unsecure calls? (Opportunistic – policy matter) Accept/install non-verified certificates? (Potentially scary!)

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 18 of 20 Secure VoIP first experiences: User interaction [2] Incoming call management: Authentication allows incoming call management policies Unsolicited calls can be blocked (white-lists) How to establish the first contact? What user interface should be used to enter these policies? CPL? User interface representation of “security” Messages, symbols, color indicators in the GUI Hands-free (e.g. USB headset) to enable screen interaction Sound signals, vibration

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 19 of 20 Experiences not related to security HP iPAQ h5550 Battery time concerns Hibernation state not possible (can not receive calls) We are currently not using WLAN power-save mode Possible to utilize iPAQ buttons and buzzer Good audio quality (better than GSM phone) Campus WLAN environment Web-login mechanism to block unauthorized users Cumbersome interaction using PDAs Losing connectivity when moving  have to login

Wi-Fi Voice, Paris, May 2004 Experiences of using a secure VoIP user agent on PDAs Bilien, Eliasson, Vatn Page 20 of 20 Future work Security Secure PSTN gateway MIKEY/SRTP may require dedicated hardware support MIKEY re-keying effects on media stream Secure Session Mobility PKI trust models Push-To-Talk Video media stream Large scale tests on students using iPAQs with Microsoft Windows CE supported by HP donation UPnP support for NAT traversal complementing STUN