IP Telephony Traversal Across Decomposed Firewalls/NATs Jiri Kuthan GMD-Fokus.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
IPv6 Privacy Hannes Tschofenig, Tara Whalen. Agenda Privacy Threats Layering Addressing Policy Questionnaire.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
SIP Traversal over NAT Problems and Solutions Mr. Ting-Yun Chi May 2,2006 (Taiwan,NICI IPv6 R&D Division)
An Overview of SIP Security Dr. Samir Chatterjee Network Convergence Lab Claremont Graduate University
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
NAT (Network Address Translator) Atif Karamat In the name of God the most merciful and the most compassionate.
Session Initiation Protocol (SIP) By: Zhixin Chen.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 2. SIP.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
SIP, Session Initiation Protocol Internet Draft, IETF, RFC 2543.
Internet Protocol Security (IPSec)
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Membership and Media Management in Centralized Multimedia Conferences based on Internet Engineering Task Force Protocol Building Blocks Author: Ritu Mittal.
Via contains the address at which the originator is expecting to receive responses to this request. Mandatory To contains a display name and a SIP URI.
SIP Session Initiation Protocol Short Introduction Artur Hecker, ENST.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
SIP and NAT Dr. Jonathan Rosenberg Cisco Fellow. What is NAT? Network Address Translation (NAT) –Creates address binding between internal private and.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
IPv6 Home Networking Architecture - update IETF homenet WG Interim meeting Philadelphia, 6 th Oct 2011 draft-chown-homenet-arch-00.
Introduction to Network Address Translation
CS 540 Computer Networks II Sandy Wang
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
Middlebox Communication Framework and Requirements Jiri Kuthan GMD-Fokus Jonathan Rosenberg dynamicsoft December.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
SIP Security Issues : The SIP Authentication Procedure and its Processing Load Speaker: Lin-Yi Wu Advisor : Prof. Yi-Bing Lin Date : 2003/04/09.
The Session Initiation Protocol - SIP
Draft-carpenter-v6ops-label-balance-02 Brian Carpenter Sheng Jiang (Speaker) Willy Tarreau March 2012 IPv6 Flow Label for Server Load Balancing - update.
1 Personal Mobility Management for SIP-based VoIP Services 王讚彬 國立台中教育大學資訊工程學系
Securing Access to Data Using IPsec Josh Jones Cosc352.
jitsi. org advanced real-time communication.
The SIP-Based System Used in Connection with a Firewall Peter Koski, Jorma Ylinen, Pekka Loula Tampere University of Technology, Pori Pohjoisranta 11 A,
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Firewalls, Network Address Translators(NATs), and H.323
Securing the Network Perimeter with ISA 2004
Instructor Materials Chapter 9: NAT for IPv4
Routing and Switching Essentials v6.0
Introduction to Networking
Instructor Materials Chapter 9: NAT for IPv4
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG
Chapter 11: Network Address Translation for IPv4
Ingate & Dialogic Technical Presentation
Presentation transcript:

IP Telephony Traversal Across Decomposed Firewalls/NATs Jiri Kuthan GMD-Fokus

2 Outline zWhere firewalls cause problems to Internet telephony zWhere NATs cause problems to Internet telephony zMapping solution space zOur proposal: link SIP proxies to firewalls/NATS zReport on IETF efforts zConclusions

3 Firewall Traversal zFirewalls static yprotect networks by enforcing a restrictive packet filtering policy yfrequently deployed in corporate networks ypolicy permits flows from and to trusted addresses zInternet telephony dynamic ysignaling conveys dynamic addresses and port numbers y3-rd party call control yuser mobility zProblem ysignaling static and easy ystatic firewalls do not know and permit dynamic media packet flows ychanging policy to default-permit-explicit deny seriously changes security model -- not a valid solution ytrade-off between sufficiently restrictive policy and accommodating applications needs sought

4 Ultimately Secure Firewall Installation Instructions: For best effect install the firewall between the CPU unit and the wall outlet. Place the jaws of the firewall across the power cord, and bear down firmly. Be sure to wear rubber gloves while installing the firewall or assign the task to a junior system manager. If the firewall is installed properly, all the lights on the CPU will turn dark and the fans will grow quiet. This indicates that the system has entered a secure state. For Internet use install the firewall between the demarc of the T1 to the Internet. Place the jaws of the firewall across the T1 line lead, and bear down firmly. When your Internet service provider's network operations center calls to inform you that they have lost connectivity to your site, the firewall is correctly installed. (© Marcus Ranum)

5 NAT Traversal zNATs yconserve IP space by transparent IP address sharing yNAT-PT can be deployed on boundaries between IPv4 and IPv6 yvarious flavors (NAPT) and applications (load balancing, renumbering avoidance) yproblems: session addresses indicated in signaling (SDP, Contact:, Route:, Record-Route:) do not match NAT-ed addresses; sessions fail to get established zSolution: yEliminating the need for NATs by mass introduction of IPv6 unlikely to happen in near future yRSIP experimental yUse application patchwork, Application Level Gateways, to resynchronize applications with IP/transport

6 Where FWs/NATs affect SIP INVITE SIP/2.0 Via: SIP/2.0/UDP :5060 From: BigGuy To: LittleGuy Call-ID: CSeq: 1 INVITE Subject: Happy Christmas Contact: BigGuy Content-Type: application/sdp Content-Length: 147 v=0 o=UserA IN IP4 here.com s=Session SDP c=IN IP t=0 0 m=audio RTP/AVP 0 a=rtpmap:0 PCMU/8000 z Contact, From, To address header fields z Via header fields (received tag) z Route and Record- route z SDP payload

7 The FW/NAT Problem Summary zImplications: No users behind firewalls/NAT can interoperate with other Internet users zProblem Size: Unknown, probably huge ynobody knows how many users are behind FWs/NATs yIP addresses shared by hosts, hosts shared by users yhugely deployed by enterprises, some ISPs deploy NATs as well yBrian Carpenter (January 2001): “My hand waving estimate is that 40% (160M) of users are behind a firewall and/or NAT, 50% (200M) on dial-up, and 10% (40M) have direct always-on access. But there is no way I can justify these numbers.” zSolution Status: very few products have VoIP ALGs zALGs are no “Wunderwaffe” (all-disease-cure) yFirewall ALGs fail to operate if data encrypted yNAT ALGs fail to operate if data encrypted or authenticated yembedded ALGs suffer from dependency on vendor, lower performance, higher development costs yproblems with multiple FW/NATs

8 Solution Space zJunk FW/NATs... Unlikely to happen in near future. zSubvert FW policy... Not sure your admin will like it. zBuild ALGs into your FWs/NATs. zUse external application-awareness yin end-devices (SOCKS/RSIP)... Protocol stack in your appliances needs to be changed yin proxies

9 Make VoIP ALGs Easier to Live With zIdea: split ALGs from NATs/FWs and reuse application awareness residing in SIP proxies zBenefits: yintermediate network devices need to speak a single control protocol; ALG may be supplied by third parties easily; no more vendor dependency yexisting application-awareness (e.g., SIP proxies) may be reused (as opposed to duplicating it in network devices) yhop-by-hop security works zWanted: Protocol for Reconnection of the split pieces: Firewall Control Protocol yaddressed by MidCom WG

10 FCP Controlled Firewall/NAT example.com Legend SIP FCP media streams Protocol functionality z Open and close firewall pinholes z Allocate and release NAT translations SIP proxy

11 FCP Benefits zReduction of development costs zRelieves from vendor dependency zHop-by-hop signaling security supported zLikely to improve performance zEasy to deploy

FCP Design Concepts zObjective: easy-to-deploy zScope: pinhole opener versus management tool your recommendation: Keep It Simple and Stupid ydo not add additional complexity unless a need for it is clearly documented yretain extensibility so that new applications will be able to use it: notion of attributes zControl Model: end-devices versus proxies yend-devices: huge deployment overhead and security concerns zLayering yFCP application-independent ythe cutting line splits application from transport yparticular wrong ideas include but are not limited to: xmaking FCP controllers maintain NAT pools xbringing “application clues” back again to controlled devices zApplication-aware soft-state

13 FCP Security zWho may act as controller? yAnyone with valid permissions yProtocol specification does not dictate if it is end-devices, SIP proxy, human being, whatever yFrom deployment perspective, the scenario most likely with long-lasting relation between a few of controllers such as SIP proxies and network devices all of them trusted and belonging to the same administrative domain. zApplication-layer security applies as well: a proxy never opens pinholes until both parties agree to set up a call, proxy approves it; proxy’s approval may require at least one party to authenticate zMutual authentication and message integrity desparately needed; can be accomplished at transport/IP layer zPermissions defined by ACLs

14 FCP Status zThree proprietary solutions reported yoperational experience: support for route recording and session timers rare zIETF: MidCom in a beginning phase since one year zDiscovery ruled out as an orthogonal issue zFurther issues to be dealt with: yextensibility (e.g., ability to add new pinhole attributes such as throughput constraints) ynightmare: multiple boxes yperformance yfailure recovery ymapping FCP to a real protocol ySIP issues: FCP timing wrt to session state, rule timers, “funnel rules” yetc.

15 Conclusion zMidCom is a horrible, horrible hack. zHowever, it is horribly needed. zMidCom Firewalls are a NextGen technology; MidCom WG is in a very early stage. zIn the meantime, embedded ALGs likely to dominate. yMany customers have no SIP support in their firewalls. zOther solutions unlikely to fly -- too tricky from deployment point of view yend-device driven middleboxes yjunking firewalls/NATs zNATs could be dealt by making end-devices and SIP proxies “little bit” NAT aware

16 Information Resources zRepository of related I-Ds available at zdraft-rosenberg-sip-firewalls zdraft-biggs-sip-nat zdraft-kuthan-fcp zdraft-shore-h323-firewalls zdraft-rosenberg-sip-entfw-01.txt zFCP Site: