An Overview of SIP Security Dr. Samir Chatterjee Network Convergence Lab Claremont Graduate University

Slides:



Advertisements
Similar presentations
Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
Advertisements

SURA/ViDe 4th Annual Workshop SIP, Security & Threat Models Dr. Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 The Critical Role of Sip&H.323 Internetworking in Next- Generation Telephony Dr. Samir Chatterjee Associate Professor School of Information Science ;
SIP Security Issues: The SIP Authentication Procedure and its Processing Load Stefano Salsano, DIE — Universit à di Roma “ Tor Vergata ” Luca Veltri, and.
SIP Chapter 5. SIP History 1980s – first packet multimedia experiments 1992 – first IETF audio-cast 1996 – first SIP related IETF drafts Session Invitation.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
CGU SIP VC Client: Design, Architecture & Demo Dr. Samir Chatterjee Network Convergence Laboratory School of Information Science Claremont Graduate University.
Session Initiation Protocol Winelfred G. Pasamba.
Lecture 22 Internet Security Protocols and Standards
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
1 Pertemuan 12 Security Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Session Initiation Protocol (SIP) By: Zhixin Chen.
SIP Security Matt Hsu.
SIP, Session Initiation Protocol Internet Draft, IETF, RFC 2543.
Presented by: Shivanagouda Biradar Yousof Pakzad This presentation is submitted to Prof. El Saddik in partial fulfillment of the requirements for the course.
SIP 逄愛君 SIP&SDP2 Industrial Technology Research Institute Computer & Communication Research Laboratories Elgin Pang Outline.
Lecture 22 Internet Security Protocols and Standards modified from slides of Lawrie Brown.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
SIP Greg Nelson Duc Pham. SIP Introduction Application-layer (signaling) control protocol for initiating a session among users Application-layer (signaling)
SIP Session Initiation Protocol Short Introduction Artur Hecker, ENST.
Electronic Mail Security
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
S/MIME and CMS Presentation for CSE712 By Yi Wen Instructor: Dr. Aidong Zhang.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
Secure Socket Layer (SSL)
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Presented By Team Netgeeks SIP Session Initiation Protocol.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Chapter 22 Internet Security Protocols and Standards.
Elin Sundby Boysen Lars Strand Norwegian Defence Research Establishment (FFI) Norwegian Computing Center (NR) University Graduate Center (UNIK) November.
Department of Computer Science & Engineering San Jose State University
SIP:Session Initiation Protocol Che-Yu Kuo Computer & Information Science Department University of Delaware May 11, 2010 CISC 856: TCP/IP and Upper Layer.
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
ECE-8813 / CS Prof. John A. Copeland fax Office:
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
S/MIME (Secure/Multipurpose Internet Mail Extensions) security enhancement to MIME – original Internet RFC822 was text only – MIME provided.
SIP Security Issues : The SIP Authentication Procedure and its Processing Load Speaker: Lin-Yi Wu Advisor : Prof. Yi-Bing Lin Date : 2003/04/09.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security SMIME IT352 | Network Security |Najwa AlGhamdi 1.
The Session Initiation Protocol - SIP
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Security is one of the most widely used and regarded network services
Session Initiation Protocol (SIP)
S/MIME T ANANDHAN.
Security at the Application Layer: PGP and S/MIME
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Advanced Computer Networks
Presentation transcript:

An Overview of SIP Security Dr. Samir Chatterjee Network Convergence Lab Claremont Graduate University

Agenda SIP for Video conferencing Security Problems Authentication in SIP End-to-End Security (S/MIME) Hop-by-Hop Security (SIPS, TLS) Traversing NATs/Firewalls

SIP (The IETF Standard) Session Initiation Protocol is a signaling standard from IETF for real-time multimedia session establishment. Sessions can be voice, video or instant messaging and is described by SDP. Basic components: User Agent (UA): works on behalf of users to set up calls Proxy Servers (PS): keeps track of location of end-points Registrar: Each UA registers to inform current location and preferred reachability information SIP messages are ASCII text messages that are human readable.

SIP Operation Cgu.edu Proxy/registrar Unc.edu Proxy/registrar LS REGISTER sip:registrar.cgu.edu SIP/2.0 Via: SIP/2.0/UDP samirspc.cgu.edu:5060;branch=z9hG4bKnashds7 Max-Forwards: 70 To: Samir From: Samir ;tag= Call-ID: CSeq: 1826 REGISTER Contact: Expires: 7200 Content-Length: 0 INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hG4bKnashds8 Max-Forwards: 70 To: Samir From: Alice ;tag= Call-ID: a84b4c76e66710 CSeq: INVITE Contact: Content-Type: application/sdp Content-Length: 142

Security on the Internet Internet is open Anyone with Internet access may attack anyone else Increasing complexity and programmability leads to lots of bugs that can be exploited Packets can be dumped (or snooped) anywhere in the middle of the packet path What are you trying to secure? Authenticate – make sure you are connected to the correct person Privacy – no one else should hear/see media Integrity – No one should be able to change or manipulate packets that are legitimate Availability – subject to Denial of Service attacks

SIP Security Mechanisms End-to-end mechanisms Basic authentication Digest authentication (similar to HTTP digest) Message body encryption using S/MIME Hop-by-hop mechanisms Transport Layer Security (TLS) IP Security (IPSec) The SIPS URI schema

SIP Authentication SIP Client SIP Server REQUEST CHALLENGE Generate the Nonce value Nonce, realm Compute response = F(nonce, Username, password, realm) REQUEST Nonce, realm, Username, response Authenticate: compute F(nonce, username, password, realm) And compare with response F= MD5

SIP uses what is available today Privacy prevents unauthorized people from inspecting both signaling and media Can be solved using encryption Problems: encryption computationally expensive, need key exchange mechanisms, no PKI in place Protocol security is only a piece of the big picture; security of a system can be compromised by naïve implementation or poor administration Security of a single protocol does not help; all participating protocols have to be made secured

Hop-by-Hop Mechanisms Requires belief in transitive trust Immense computational stress on servers if public key is used Can deal with firewalls/NATs May cover entire signaling Mechanisms: Ipsec, TLS SIPS URI invokes hop-by-hop security

S/MIME Secure Multipurpose Internet Mail Extension is a security enhancement to the MIME Internet format standard, based on technology from RSA Data security. RFC 822 defined mail formats: header and body. Header uses From, To, Subject, Date followed by text (body). MIME provides new header field that provide information about the body of the message: content formats and transfer encoding Five header field are defined in MIME: MIME version, Content-type, Content-Transfer-Encoding, Content-ID, Content Description

S/MIME Capability Enveloped data: This consists of encrypted content of any type and encrypted-content encryption keys for one or more recipients Signed data: A digital signature is formed by taking the message digest of the content to be signed and then encrypting that with the private key of the signer. The content plus signature are then encoded with base64 encoding. Clear signed data: similar to above except that only the signed digest is encoded in base64. Content is sent in the clear. Signed and enveloped data: signed-only and encrypted-only data may be nested. Cryptographic algorithms: supports SHA-1, Digital Signature Standard (DSS), Diffie-Hellman key exchange, RSA encryption. Collectively it is a package pkcs7-mime.

Using S/MIME in SIP SIP messages carry MIME bodies. So one can encrypt them using S/MIME. However certain SIP intermediaries need to view and process certain headers in between. S/MIME certificates These certs are used to identify end-users rather than servers. Certificates asserts that the holder is identified by an end-user address user’s address of These certificates can be stored within UA on a virtual keyring. S/MIME key exchange Whenever the CMS SignedData message is used in S/MIME for SIP, it must contain the certificate bearing the public key necessary to verify the signature. UAC initiating S/MIME should structure the body as ‘multipart/signed’.

Traversing Firewalls/NATs Voice and Video over IP provides dynamic ports and addresses. Most firewalls use a static port-based rules to admit/deny traffic. FW solutions Use FW ALGs Use Firewall Control Protocol (FCP) developed by Midcom NATs – conserve IP address space by allowing transparent private/public addressing and reuse Problems:session-address indicated in signaling(SDP, addres-of- record) do not match NATed address. Solutions – get rid of NAT (IPV6), run ALGs, or use STUN.