VoIP Security Sip.EDU workshop February 2007 Walt Magnussen, Ph.D. Director TAMU ITEC.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

The leader in session border control
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
IMS and Security Sri Ramachandran NexTone. 2 CONFIDENTIAL © 2006, NexTone Communications. All rights Traditional approaches to Security - The CIA principle.
Figure 7-1 Softswitch Components Signaling Gateway Feature Server Softswitch Universal Media Gateway SGCP SIP MGCP MGCP (Media Gateway Control Protocol)
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
SESSION BORDER CONTROLLER
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Session border control applications
CounterPath Corporation William Khris Kendrick: – Director of Business Development and Channel Marketing – –
IMS – The future of Fixed Mobile Convergence EduCause Walt Magnussen Ph.D. 12 October, 2010.
Testing SIP Services Over IP. Agenda  SIP testing – advanced scenarios  SIP testing - Real Life Examples.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.

5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
Enterprise Infrastructure Solutions for SIP Trunking
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Sunturn Presentation for Rocky Mountain Avaya User Group May 13, 2009.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
1 Leveraging SS7 to Deliver IP Services Carl Bergstrom Director – IN & IP Services VeriSign Telecommunication Services Internet Telephony Conference, February.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
Service Oriented VoIP (SOVoIP): True Convergence of Data and Voice Networks Presented By Mohammed Jubaer Arif Supervisors Dr Shanika Karunasekera and Dr.
Towards a Scalable and Secure VoIP Infrastructure Towards a Scalable and Secure VoIP Infrastructure Lab for Advanced Networking Systems Director: David.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
1 VoIP Fundamentals Tech Agenda Tech 160  Voice Communication  Voice over PSTN  Voice over IP  Quality of Service  VoIP Security  References.
VoIP in Disaster & Emergency Response Voice over IP in Disaster and Emergency Response Team Members: Muhammad Ali Mansoor A. Siddiqui Carlos Loarca de.
Application-Layer Mobility Using SIP Henning Schulzrinne, Elin Wedlund Mobile Computing and Communications Review, Volume 4, Number 3 Presenter: 許啟裕 Date:
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
Evolution towards the Next Generation Network
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Changing the Dynamics of Network Analysis J. Scott Haugdahl CTO, WildPackets, Inc.
Deep Packet Inspection-- The Future of Next Generation Service Delivery Vin Costello—Vice President and General Manager—Americas Allot Communications.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Voice over IP B 林與絜.
TSMN 6350: IP Telephony (Spring 2013) Project By: Sara Basheer Anish Dubey Ruta Gor
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Dave Martin Vice President, Product Management
CSE5803 Advanced Internet Protocols and Applications (14) Introduction Developed in recent years, for low cost phone calls (long distance in particular).
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
Richard Gurdak International Development Blue Ridge Networks Service Providers and Lawful Intercept.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public © 2003, Cisco Systems, Inc. All rights reserved. Cisco Unified Communications Model RFP.
© 2007 Level 3 Communications, LLC. All Rights Reserved. 1 Beyond SIP Trunking What’s Next ? September 11, 2007 Michael Remacle.
Intelligent Interconnects in the VoIP Peering Environment John Longo VP Product Marketing & Management, NextPoint.
Peering and the Session Border Controller Impact of Applications in Peering Technology.
3/10/2016 Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das Department: Computer Science & Engineering Date :
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
1 Personal Mobility Management for SIP-based VoIP Services 王讚彬 國立台中教育大學資訊工程學系
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
CALEA TAMU ITEC Walt Magnussen, Ph.D. Director TAMU ITEC Joint Techs, February 2007.
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
Telematics Protocols and Technologies
“Giving Voice to 4G” Gartner Dataquest Akshay Sharma Research Director
“Giving Voice to 4G” Gartner Dataquest Akshay Sharma Research Director
Presentation transcript:

VoIP Security Sip.EDU workshop February 2007 Walt Magnussen, Ph.D. Director TAMU ITEC

VoIP security Major issues –Span of control is often under separate entities on campus –What is included – RTC VoIP H.323 and SIP video IM IPTV –Separate network (virtual or physical) or converged. –Is VoIP just another application or a service with specific requirements –Is security a good or bad thing (layer 8, 9 and 10 issue)

Crux of problem RTC traffic has specific requirements ITU-T G.1050

What to include: VoIP currently propritory versions of H.323 and SIP Video Conf. Mostly H.323 migrating to SIP IM - also supports SIP IPTV

Network solutions Separate IP network – if so why change from TDM in the first place Separate Virtual Network (VLANs) –Not really complete seperation but good enough? All on one network –Best effort – not recommended –QoS – costly to manage

Security Approaches Three ways to architect security –Open –Use campus firewall –Use Session Border Controller for Voice

Open approach Feel that: –security breaks more things than it fixes (adds latency, jitter etc. –Security is the responsibilty of the end device, not the network Any security device tends to break the true peer-to-peer relationship of SIP

Use campus firewall Firewalls can be either state-free or statefull –Because of separation signaling and media, must be statefull –Firewalls can do deep packet inspection but may still miss many VoIP specific vulnerabilites (fuzzing, SPIT and sequential dialing)

Session Border Controller Acts as back-to-back user agent. Can add other voice specific features –Peering redirects –MOS based call redirect –NAT transversal assistance –Transcoding with some –Error concelement (i.e. echo) –Access point for Lawful Intercept (CALEA)

SBC demonstration A view of the TAMU ITEC Acme Packet SBC.

SBC manufactures Acme Packet Nextone Ditech

Future directions VoIP authentication and encryption –Proposals include: TLS – used to encrypt signaling stream SRTP – used to encrypt media stream VPN clients not easy to implement on hardphones (wireline and wireless)

Questions ? Contact info: –Walt Magnussen, Ph.D. –ITEC Director –