Internet Telephony Oct 17 2002 WHAT is our desired outcome for IP telephony standardization? Two angles –Specific standards.

Slides:



Advertisements
Similar presentations
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Advertisements

International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
SBC in NGN Architectures Jonathan Cumming. Copyright © 2006 Data Connection Limited All Rights Reserved.2 SBC in NGN Architectures NGN Standardisation.
International Telecommunication Union ITU Perspective on ENUM Robert Shaw ITU Internet Strategy and Policy Advisor ICANN Rio de Janeiro, Brazil March 25,
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
SIP 逄愛君 SIP&SDP2 Industrial Technology Research Institute Computer & Communication Research Laboratories Elgin Pang Outline.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
SIP-IMS CONFORMANCE TESTING STANDARDIZATION WORK PLAN VICE-CHAIRMAN OF ITU-T SG11 MARTIN BRAND.
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Introduction to IPv6 NSS Wing,BSNL Mobile Services, Ernakulam 1.
What is internet telephony?  IP telephony uses the Internet to send audio, video, fax etc between two or more users in real time, so the users can converse.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
Common Devices Used In Computer Networks
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
D1 - 04/10/2015 Present document contains informations proprietary to France Telecom. Accepting this document means for its recipient he or she recognizes.
International Telecommunication Union Global ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union.
Industry Canada 1 Bob Leafloor Colman Ho Peter Chau Industry Canada January 2003 (ENUM) T E lephone NU mber M apping.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
SIP & SS7 James Rafferty, Cantata Technology September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 Agenda Overview.
ENUM Services and their Provisioning Submitted by VeriSign, Inc and Telcordia Technologies, Inc Available at
TTC’s Activities on NGN TTC/NGN Advisory Group GSC9, Seoul SOURCE:TTC TITLE:TTC’s Activities on NGN AGENDA ITEM:5 CONTACT:Kazunori MATSUO,
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Advanced IPv6 Residential Security draft-vyncke-advanced-ipv6- security-03 Eric Vyncke Mark Townsley
Appendix A UM in Microsoft® Exchange Server 2010.
DIME WG IETF 82 Dime WG Agenda & Status THURSDAY, November 17, 2011 Jouni Korhonen & Lionel Morand.
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
T-MPLS Update (abridged) IETF70 December 2007 Stewart Bryant
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Survey on Privacy-Related Technologies Presented by Richard Lin Zhou.
September 15, 2003FG3 Report FOCUS GROUP 3 Interoperability Report to NRIC VI Council September 15, 2003 Cliff Naughton (Boeing)
Ieprep User Objectives Draft-ietf-ieprep-requirements-01.txt OBJECTIVES to be considered in provision of telecommunication services to support emergency.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Multimedia Access Platforms Glen Freundlich Avaya, Inc.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
International Telecommunication Union ENUM Organizational Perspectives Richard Hill, for Houlin Zhao Director Telecommunication Standardization Bureau.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Mobile IP Security Konidala M. Divyan International Research Center for Information Security Network Security (ICE 615) Term Project – 2002 Autumn.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Draft-bryan-sipping-p2p-usecases-00 David A. Bryan Eunsoo Shim Bruce B. Lowekamp.
Paul E. Jones Cisco Systems, Inc.
Timeline – Standards & Requirements
IP Telephony (VoIP).
SIP for Grid networks Franco Callegati, Aldo Campi, Walter Cerroni
Security Outline Encryption Algorithms Authentication Protocols
VOICE AND VIDEO OVER IP VOIP, RTP, RSVP.
Wireless Technology.
Session Initiation Protocol (SIP)
draft-ietf-geopriv-lbyr-requirements-02 status update
SAML assisted Diffie-Hellman MIKEY
Design Unit 26 Design a small or home office network
Henning Schulzrinne Columbia University
Application Layer Mobility Management Scheme for Wireless Internet
Session 5: Securing Home Networks Conclusions & Recommendations
Security Activities in IETF in support of Mobile IP
Computer Networks Protocols
Introduction to Course
TDR authentication requirements
LM 7. Cellular Network Security
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Presentation transcript:

Internet Telephony Oct WHAT is our desired outcome for IP telephony standardization? Two angles –Specific standards development intra-IETF (lead: Allison) –Organizations (lead: Jim) –Each part has a few slides, discussion –Conclusions together

Overview IP telephony is largely IETF technology Telephants’ participation natural, but participants not ready (many young Internet folk too) Security and privacy case study of how to move forward

IP Telephony Non-IETF IETF ISUP H.323 MGCP Y.??? vomp RTP/RTCP SDP SIP SIP-ISUP ENUM CPL, TRIIP Seamoby, mobile IP Megaco Security protocols! IPPM metrics Diameter, LDAP etc. (so many)

Accept That This Happened Firmly standardize our protocols’ telephony uses (simply) like any other use –If not, it’s like two coders having the same function checked out at once –cf. draft-tsvarea-sipchange, IESG extensions policy in progress –Have discovered there are national variants of SDP by ITU and ANSI groups Understand people, specs that come with this

Security and Privacy Case Network Asserted Identity in PSTN –(draft-sipping-nai-reqs-02.txt) Trust Domains are constructed by human beings who know the properties of the equipment they are using/deploying. In the simplest case, a Trust Domain is a set of devices with a single owner/operator who can accurately know the behaviour of those devices. Such simple Trust Domains may be joined into larger Trust Domains by bi-lateral agreements between the owners/operators of the devices. We say a node is 'trusted' (with respect to a given Trust Domain) if and only if it is a member of that domain. We say that a node, A, in the domain is 'trusted by' a node, B, (or ‘B trusts A') if and only if: 1. there is a secure connection between the nodes, AND 2. B has configuration information indicating that A is member of the Trust Domain.

Understandings Authentication never meant cryptography in these specs; authors surprised that this surprised us, given that they wrote: The authentication process used, or at least it's reliability/strength, is a known feature of the Trust Domain Trust of end-user, equivalence of any node in net, with cryptographic security, is not valid to telephony folks –Perhaps our most serious problem in this space

Moving Forward: Goals on Security Stds ITU-T Study Groups adopt goals for their protocols compatible with Internet security goals and help us dissipate some of the tensions 3GPP adopt requirements matching (ending conflicts with IETF security/privacy –This is starting to happen Discussion: the end-system trust problem/privacy

Process Forward Spend time with PSTN (ITU-T) folks showing need for threat models, as a start –Help obtain pressures, decrease in special-casing of industry (e.g. “ss7 firewalls would be anti- cooperative”) –IP telephony they want makes them more at risk In IETF, engage over conflicting material as we did to understand NAI below its original surface

Other Cases Intercept –Privacy of end-users – view on much end-to- end security of our protocols by PSTN folks – unusable –They argue users will take protection related to unlawful wiretap ITU (and others, preface to Jim) –A standards reason why line getting a little hard to draw (pun not intended):