Download presentation
Presentation is loading. Please wait.
1
Presented by: Shivanagouda Biradar Yousof Pakzad This presentation is submitted to Prof. El Saddik in partial fulfillment of the requirements for the course ELG 5121: Multimedia Communications June 28, 2015 Multimedia Communications : Introduction to SIP and Securing SIP Solutions School of Information Technology and Engineering (SITE), University of Ottawa
2
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Overview Introduction to SIP Components Messages Applications Benefits Secured Solutions Security Requirements Security Threats Security Solutions SIP, Firewall and NAT Conclusion and Future Directions
3
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Telecommunication Network Migration PSTN Network - traditionally centralized voice-centric applications ( $1 trillion industry world wide) IP network is distributed, mostly used for text data and multimedia applications PSTN PBX IP Router PSTN Network PSTN PBX IP Network IP Router PSTN Phones IP Clients IP Clients PSTN Phones
4
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 IP Network and PSTN Network Convergence Seamless Integration of telephony and conferencing with many other internet applications, such as e-mail, text messaging, presence and instant messaging IP Soft Phones PSTN Network PSTN PBX IP Network IP Router IP Enabled PBX IP Router IP-PSTN Gateway IP Soft Phones IP Phones PSTN Phones IP-PSTN Gateway
5
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 IP Call Processing Protocols H.323 - ITU H.248/MEGACO/MGCP (ITU) SIP – Session Initiation Protocol (IETF) H.323 MGCP RTP Physical Layer Link Layer IPv4, IPv6 SIP RTSP Multimedia Applications ( text, audio, video) TCP UDP RTCP RSVP Signaling Quality of Service Media Transport
6
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP – Session Initiation Protocol The SIP is a application layer signaling protocol, used to setup, modify and teardown multimedia sessions Also used for Presence notification and Instant Messaging over the Internet IETF Standard (RFC3261, 2002) for real-time multimedia communication signaling Approved by Third-Generation Partnership Project (3GPP) as the Signaling protocol for Multimedia Applications in 3G Mobile Networks Resources: Sponsors:
7
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Network Components Servers Proxy, Redirect Registration, Location Conference Gateways SIP-PSTN SIP-H.323 SIP-MGCP Clients User Agent Client User Agent Server
8
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Applications End to End Multimedia Call Setup Conference call Setup Instant Messaging User Presence Notification Unified Messaging User Mobility Value Added Services on IP Enabled PBX
9
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Messages INVITE - Invite an user ACK - Response for Invite BYE - Terminate a Call CANCEL - Cancel a Call REGISTER - Register URL OPTIONS - Media Capabilities SUBSCRIBE - Request notification NOTIFY - Event notification MESSAGE - Instant Message Provisional (info only, not reliable) 100 Trying 180 Ringing Final (guaranteed) 200 OK 400 Bad request 401 Unauthorized 407 Proxy authorization required Request Messages Response Messages
10
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 URI Registration User Address user@domain, User@host user@IP_Address im: shiva@yahoo.com sip: shiva@uottawa.cashiva@uottawa.ca sip:shiva@137.122.92.219 sips:yousof@aol.ca pres:shivanna@yahoo.com Telephone Numbers Phone_number@gateway Example: tel:411;phone-context=+1613 tel:5625800;phone-context=+1613 tel:+16135625800 sip:+16135625800@wcom.com;user=phone Location server Registrar Server User Agent User Registration REGISTER sip:shiva@137.122.88.74 REGISTER sip:shiva@137.122.88.74 200 OK Location Server
11
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP - Presence Presence functionality gives the opportunity to know who is online among your contact lists SUBSCRIBE, NOTIFY messages are used to subscribe and notify the presence SUBSCRIBE NOTIFY sip:shiva@yahoo.com sip:yousof@aol.com yahoo.com aol.com Presence Agent Presence Server 202 Accepted 200 OK
12
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP – Instant Messaging Instant messaging enables you to send short messages to another person. Very useful for short requests and responses Has better real-time characteristics than an e-mail Yahoo, AOL, MSN Messengers etc MESSAGE sip:shiva@yahoo.com sip:yousof@aol.com @yahoo.com @aol.com IM Agent IM Agent Proxy Server Proxy Server 200 OK MESSAGE 200 OK
13
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP - End to End Call Setup (Proxy) INVITE M1 INVITE M2 INVITE M1 200 OK M9 200 OK M10 180 Ringing M7 100 Trying M5 100 Trying M3 180 Ringing M8 200 OK M11 Media Session ACK M12 180 Ringing M6 sip:shiva@yahoo.comsip:yousof@aol.com yahoo.com aol.com User Agent User Agent Proxy Server Proxy Server BYE M13 200 OK M14 SIP Proxy Server forwards requests on behalf of SIP agents May update the SIP message before forwarding it called party
14
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP - End to End Call Setup (Redirect) INVITE M1 INVITE M4 INVITE M5 200 OK M9 200 OK M10 100 Trying M6 180 Ringing M8 Media Session ACK M11 180 Ringing M7 sip:shiva@yahoo.com sip:yousof@uottawa.ca yahoo..com uottawa.ca User Agent User Agent Proxy Server Redirect Server BYE M12 200 OK M13 302 Moved Temporarily M2 ACK M3 SIP Redirect Server responds to a UA request with redirection response indicating the current location of the called party
15
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP – Conference Setup Ad hoc Point to point conversation is expanded with a series of INVITE messages. (Good for small group) Meet me Conferencing bridge is used to mix all the media and forward on behalf of each client to other participant as a unicast message Each participant establishes the point to point call to the conferencing bridge Good, if all participants are interactive Interactive Broadcast Conferencing bridge is used but mixed media is sent to a multicast address instead of being unicast to each participant Can have active and passive participants SIP signaling is required for interactive participants only
16
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP - Mobility Terminal Mobility (Mobile IP- SIP) SIP user agent will be able to maintain its connections to the Internet as it moves from network to network and possibly changes its point of connection Personal Mobility (SIP – REGISTER) SIP URI (similar e-mail address) is device independent. User can use any end-device to receive and to make calls Service Mobility SIP user can keep the same services when mobile Services resident in user agent can be accessed over Internet (Ex: Call Forwarding etc).
17
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Benefits of SIP Features Benefits Lightweight, ASCII based protocol similar to HTTP, SMTP Reuses other IETF protocols, such as SDP, DNS, etc Network Independent Increasing market adoption Can be tightly integrated with Web based services Can be used for any real time applications Including voice, video, text messaging, instance messaging and presence Availability of SIP based Products growing Simplifies development of applications Application/media Independent Can be used with non-IP networks such as ATM, MPLS Protocol Interoperability Can inter-work with H.323, PSTN/ISDN, Mobile Networks Protocol Extensibility Can work with non telephony appl.
18
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security SIP messages are sent in clear text SIP security is independent of media security SIP uses the existing network security mechanism: TLS, S/MIME, PKI, etc Location server Proxy Server SIP UA SIP Text Messages SIP UA Media: RTP
19
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP UA SIP Proxy server SIP UA Location Server DNS Server SIP Proxy server Media: RTP
20
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security Threats SIP Snooping, Eavesdropping Tampering With the Message Bodies Replaying Attack Impersonating a Server Impersonating Users Registration Hijacking Tearing Down a Session Denial of Service and Distributed Dos Attack
21
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Authenticating Users Authenticating Servers (Proxy, Registrar, Redirect) Message Confidentiality and Integrity Privacy SIP Security Requirements Location server Proxy Server SIP UA SIP Text Messages SIP UA Media: RTP
22
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security: Authentication Authenticating Servers: TLS: Transport Layer Security, PKI certificates, RFC 2246 HTTP Digest, RFC2617 Authenticating Users: HTTP Digest, RFC2617 TLS if users have certificates Authentication: Hop-by-Hop End-To-End
23
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security: Confidentiality and Message Integrity End-to-End Encryption: From Caller’s UA to Callee’s UA Message Body and Some parts of the Headers Using S/MIME, Secure Multipurpose Internet Mail Extension, RFC 2633 Hop-by-Hop Encryption: To protect header information that needed by intermediaries Rely on Network Level (IPSec) or Transport level(TLS) protocols
24
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security Mechanisms: HTTP DIGEST A challenge-based Authentication mechanism Based on MD5 hash function Limitations of HTTP Digest It requires a pre-existing shared secret keys Scope of realm Not secure enough, based on secret keys not PKI No Message Integrity Protection No Confidentiality
25
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security Mechanisms: S/MIME S/MIME: Secure Multipurpose Internet Mail Extension Confidentiality and integrity of MIME message bodies SIP headers can also be encapsulated in MIME body for end-to-end Authentication, integrity and confidentiality End-to-End Mutual Authentication S/MIME Authentication Does Not Require a Shared Secret Key Requires a common PKI Certificate Aauthority Limitations of S/MIME Lack of infrastructure for user Public Key Exchange It can result in very large messages
26
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security Mechanisms: TLS Authentication, Integrity, Confidentiality Usually used for server authentication Can authenticate clients, but requires distribution of client certificates Limitations of TLS: Runs on TCP Only, not UDP Offers only hop-by-hop authentication Security in one hop doesn’t mean security in other hops More Tightly Integrated with SIP Application
27
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP Security Mechanisms: IPSec IPSec Confidentiality, Authentication and Integrity Supports TCP and UDP Requires Pre-Shared Keys Does not requires integration with SIP
28
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Secure SIP URI Scheme SIPS URI Scheme New URI Scheme SIPS:user@example.com MUST Implement If You Support TLS If Request-URI Is SIPS, All Hops MUST Be Secure If a hop cannot be secured, the transaction fails
29
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP and Firewall Challenges for SIP Problem for the Media Stream RTP will be blocked by FWs Solutions: FW must understand SIP and open ‘pin-holes’ for the RTP Use Application-Level Gateways(ALG) trusted by FW Some FWs have built-in ALG Auth’n and Security policy controlled by ALG, not FW ALG is B2BUA which proxies both the SIP signalling and Media Stream
30
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 SIP and NAT Network Address Translators: Serious problems for SIP ! Changes IP Addresses and Port Numbers SIP messages not routable ! Solutions: SIP has a mechanism to detect presence of NAT UAs and Proxy Sever can fix the IP addresses This solves SIP signaling problem but NOT the Media Stream problem ! New Protocols and Extensions for NAT traversal under development: STUN, ICE, rport, symmetric RTP, TURN, connection reuse, SDP attribute for RTCP, and others. Best Current Practices for NAT Traversal for SIP draft-ietf- sipping-nat-scenarios-01
31
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Conclusion SIP is a power application layer signalling protocol for multimedia applications SIP inter-work with PSTN, H.323 SIP is widely accepted as Internet signalling protocol for both fixed and mobile 3G networks SIP has many extensions under development STUN: Simple Traversal of UDP Through NATs SIMPLE: SIP for Instant Messaging Leveraging Extensions SIP Compression for wireless networks
32
Shivangouda Biradar and Yousof Pakzad: Introduction to SIP and Securing SIP Solutions, SITE, June 28, 2015 Questions? Thank You !
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.