Security in VoIP Systems
|
|
|
- Edwina Watts
- 10 years ago
- Views:
Transcription
1 Security in VoIP Systems Eric Rescorla RTFM, Inc. Eric Rescorla Security in VoIP Systems 1
2 Background: the PSTN POTS Subscriber Cell Subscriber Cell To wer POTS Subscriber POTS Subscriber Qwest Switch Trunk Line Verizon Switch ISDN Subscriber PBX Handset Handset Eric Rescorla Security in VoIP Systems 2
3 Plain Old Telephone Service(POTS) This is what you probably have Analog transmission A pair of copper wires from you to the CO All signalling is inband Instructions from you to the switch are DTMF tones From the switch to you is tones (e.g., caller ID) Basically no security Wiretapping means a pair of alligator clips and a speaker Hijacking is just as easy Eric Rescorla Security in VoIP Systems 3
4 Digital Telephony Used for Trunk lines between switches Digital service to subscribers (ISDN BRI) PBXs for enterprised (ISDN PRI, typically) Signalling System 7 (SS7) Digital control and signalling protocol Used between the switches Reduced version (Q.931) used for communication with ISDN phones and PBXs Security is based on transitive trust If you re on the SS7 network you re trusted Example: Caller ID forgery Eric Rescorla Security in VoIP Systems 4
5 What about cellular? Currently: closed system with digital transmission Some weak crypto between handset and base station Phones are not trusted Future: IP system running SIP 3GPP Internet Multimedia Subsystem Not really compatible with IETF SIP Not clear if this is going to happen Eric Rescorla Security in VoIP Systems 5
6 Why is VoIP Complicated? Just connect to the callee and start talking, right? Not quite so easy Challenges Naming Name resolution Rendezvous NAT/Firewall traversal Multiple devices/voice mail Retargeting Eric Rescorla Security in VoIP Systems 6
7 SIP [RSC + 02] Topology User Agent [email protected] User Agent [email protected] SIP Proxy atlanta.com SIP Proxy biloxi.com User Agent [email protected] User Agent [email protected] Each user is associated with a given proxy Like and servers To reach alice contact atlanta.com The provider doesn t (necessarily) control the access network Eric Rescorla Security in VoIP Systems 7
8 Basic SIP Interaction atlanta.com SIP biloxi.com Signaling (SIP ) Signaling (SIP ) [email protected] Media (RT P ) [email protected] Signalling goes through proxies Rendezvous NAT/Firewall traversal Support for offline user agents Media goes directly For performance reasons Eric Rescorla Security in VoIP Systems 8
9 Typical SIP Callflow Alice Atlanta Biloxi Bob INV IT E INV IT E INV IT E 200 OK 200 OK 200 OK ACK ACK ACK Media BY E BY E BY E 200 OK 200 OK 200 OK INVITE and OK contain the media parameters Ports, codecs, etc. Eric Rescorla Security in VoIP Systems 9
10 Example SIP INVITE INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bk776asdhds Max-Forwards: 70 To: Bob From: Alice Call-ID: CSeq: INVITE Contact: Content-Type: application/sdp Content-Length: XXX v=0 o=carol IN IP s=t=0 0 c=in IP m=audio 0 RTP/AVP a=rtpmap:0 PCMU/8000 a=rtpmap:1 1016/8000 a=rtpmap:3 GSM/8000 Eric Rescorla Security in VoIP Systems 10
11 Security Requirements 1. Allow system provider to know and control who is using the system 2. Calls meant for me are not delivered to other people 3. Allows users to know who they are talking to 4. Only parties you want to be talking to can participate in/hear the conversation. 5. Allow users to hide who or where they are from people they are talking to. 6. Provide ways to mitigate unwanted communications such as telemarketing. Eric Rescorla Security in VoIP Systems 11
12 Why control access at all? The bits don t cost the provider anything Remember, he doesn t run the access network Note: IMS is different here What does cost money? Running the servers (remember, they need to be reliable) Gatewaying to the PSTN Running media relays Stop other people from posing as you Usual profit motive Eric Rescorla Security in VoIP Systems 12
13 User Authentication Every user has an account with a username and password This happens out of band User agent authenticates to the proxy (server) This uses Digest Authentication (challenge response) The server can challenge any request from the client Alice Atlanta REGIST ER 401 Registration Required (Challenge) REGIST ER (Response) 200 OK Eric Rescorla Security in VoIP Systems 13
14 Digest Security Properties Client authentication only No server And only for requests Integrity for the request URI And optionally the body Dictionary attacks No confidentiality Eric Rescorla Security in VoIP Systems 14
15 Insecure Transport Digest only provides security for the individual request Any request can be authenticated What about other messages? Alice Attacker Atlanta REGIST ER 401 Registration Required (Challenge) REGIST ER (Response) 200 OK INV IT E 200 OK Eric Rescorla Security in VoIP Systems 15
16 Using TLS [DR08] with SIP (Client side) Server is issued a certificate Identity is the server s domain name (e.g., sip.example.com) Client is configured with the name of the server TLS connects to server Compares server certificate to the expected name Security properties Client is able to authenticate server Server authenticates client with Digest TLS lets you leverage this authentication across requests Eric Rescorla Security in VoIP Systems 16
17 Typical Callflow with TLS Alice Atlanta Biloxi Bob T LS Handshake REGIST ER T LS Handshake INV IT E T LS Handshake INV IT E INV IT E OK OK OK Eric Rescorla Security in VoIP Systems 17
18 Why not TLS mutual auth? TLS offers a mode for certificate client authentication Why bother with passwords, digest, etc.? User-level certificate deployment is prohibitive [Gut03] Conceptually complex Bad UI from CAs CA vendor lockin Eric Rescorla Security in VoIP Systems 18
19 PKI Structural Mismatch Your identity is Who assigned that identity? UC Berkeley did But VeriSign (or any other CA) wants to issue you a cert with your whole identity How do they know who you are? They need to ask Berkeley somehow (not convenient) Berkeley should be a CA CAs don t want this (revenue preservation) CAs are hard to operate This basic constraint impacts the rest of the system (more later) Eric Rescorla Security in VoIP Systems 19
20 Proxy to Proxy Authentication TLS with mutual authentication There s an asymmetry here The client knows who is trying to connect to Check the certificate against expectations The server just knows somebody connected Extract the identity from the certificate Cache to avoid connection in reverse direction This is just hop-by-hop Eric Rescorla Security in VoIP Systems 20
21 Transitive Trust Bob cannot verify that Alice sent him a message He knows that: Biloxi says that Atlanta says that Alice sent this message Malicious proxies can Forge messages Reroute messages Change message contents Why is this bad? Topologies with untrusted proxies VSPs with complext internal structure Lawful intercept (bad from end-user s perspective) Eric Rescorla Security in VoIP Systems 21
22 Failed Approaches These issues were known when SIP was designed SIP includes support for end-to-end security using S/MIME, OpenPGP Digital signatures by the UAs on each message Encryption of messages between UAs This stuff utterly failed S/MIME required end-user certificates Which nobody has Complicated to implement and understand... ASN.1 allergy Eric Rescorla Security in VoIP Systems 22
23 SIP Identity End-users don t have certificates But servers do (for TLS) We can leverage this User s local server signs an assertion of their identity Alice Atlanta Biloxi Bob INV IT E Challenge INV IT E 200 OK INV IT E Signed by Atlanta 200 OK INV IT E Signed by Atlanta 200 OK Eric Rescorla Security in VoIP Systems 23
24 Security Properties of SIP Identity Signed assertion that user sent this message Traceable back to server certificate is signed by example.com Signature covers some of header and all of body (media parameters) Some headers are changed by proxies in transit Some replay prevention Timestamps, unique IDs in messages You need to trust the signing server But it controls the namespace anyway Effectively caller-id for VoIP Doesn t work well for E.164 numbers Eric Rescorla Security in VoIP Systems 24
25 Media Security We ve just secured the signaling But that just sets up the call What about the media? Wiretapping listen to the media traffic Hijacking divert traffic somewhere else We need security for the media as well Leverage secure signaling to get secure media Eric Rescorla Security in VoIP Systems 25
26 Why is encrypting Media hard? Very tight performance constraints Custom tuned Real-time Transfer Protocol (RTP) Packets are very small (but very frequent) Per-packet overhead is important What s wrong with generic protocols (TLS, DTLS, IPsec) Must work with any kind of payload Must carry meta-information (sequence numbers, IVs, etc.) Result: lots of overhead (20-40 bytes per packet) We can do a lot better with a custom protocol Eric Rescorla Security in VoIP Systems 26
27 Example: a TLS record (CBC mode) Header (5 bytes) IV (16 bytes) Data (variable) MAC (10-20 bytes) Padding (1-16 bytes) Contents Header: type, version, length IV: per-packet distinguisher MAC: the integrity check Padding: to fill out the cipher block Overhead: bytes The best generic TLS mode (GCM) has 13 bytes of overhead DTLS has an extra 8 bytes for sequence number Eric Rescorla Security in VoIP Systems 27
28 A Split Architecture Media transport security protocol (Secure RTP) [BMN + 04] This is a well understood problem Optimized for minimal overhead Assumes the existence of some key management protocol Key management protocol This is less well understood Several false starts Finally getting traction with DTLS-SRTP This is a typical IETF divide and conquer approach Eric Rescorla Security in VoIP Systems 28
29 An SRTP Packet <+ V=2 P X CC M PT sequence number timestamp synchronization source (SSRC) identifier +=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ contributing source (CSRC) identifiers RTP extension (OPTIONAL) +> payload RTP padding RTP pad count +> <+ ~ SRTP MKI (OPTIONAL) ~ : authentication tag (RECOMMENDED) : Encrypted Portion* Authenticated Portion ---+ Eric Rescorla Security in VoIP Systems 29
30 Why is key management for SRTP hard We can t completely trust the signaling Identity provides authentication But any proxy can read the SIP messages Users won t have their own certificates So classic PKI-based protocols don t work It needs to be fast So key management in the signaling is a problem Plus there are some weird edge cases (forking, retargeting, etc.) Eric Rescorla Security in VoIP Systems 30
31 Early Media Alice Atlanta Biloxi Bob INV IT E INV IT E INV IT E RT P (bef ore SDP Answer) 200 OK 200 OK 200 OK ACK ACK ACK Used to send ringback tone RT P (T wo W ay) Also for IVR prompts Eric Rescorla Security in VoIP Systems 31
32 Unsuccessful Key Management Approaches MIKEY Key exchange in the signalling protocol Performance problems, race conditions, etc. SDES A naked key in the signalling protocol Insecure against attack by any proxy Would have been fine if we had S/MIME encryption Eric Rescorla Security in VoIP Systems 32
33 DTLS-SRTP [FTR08] Use DTLS for key management What s DTLS? TLS with some modifications for UDP But not for encrypting RTP DTLS outputs a key Which we pass to SRTP Encrypt the data with SRTP A bit of a hack But cheaper than inventing a whole new key management protocol Finally pretty much done Approved by IESG (in RFC publication queue) Starting to appear in products Eric Rescorla Security in VoIP Systems 33
34 But how does the authentication part work? (D)TLS depends on certificates And we just said there weren t any Leverage the signalling Which can be authenticated via Identity Each side generates a self-signed certificate Certificate fingerprints (hashes) go in SIP Endpoints compare the fingerprints to the DTLS certificates Eric Rescorla Security in VoIP Systems 34
35 DTLS-SRTP Overview Alice Atlanta Biloxi Bob Offer f ingerprint=xxx Offer f ingerprint=xxx Offer f ingerprint=xxx DT LS Handshake SRT P Early M edia Answer fingerprint=y Y Y Update fingerprint=y Y Y Answer fingerprint=y Y Y Update fingerprint=y Y Y Answer fingerprint=y Y Y Update fingerprint=y Y Y SRT P Fingerprints are protected via Identity Eric Rescorla Security in VoIP Systems 35
36 ZRTP [ZJC08] Designed by Phil Zimmermann Perform a cryptographic handshake Authenticate the handshake over a voice channel By means of a short authentication string Unfortunately this isn t secure in many settings Very susceptible to MITM attacks when calling people you don t know Cut-and-paste attacks on the authentication string This assumes people will read the authenticator anyway [WT99] Doesn t work when gatewaying to the PSTN Probably useful in limited settings Eric Rescorla Security in VoIP Systems 36
37 Impersonation Attacks Alice Attacker F idelity Offer Offer ZRT P Handshake ZRT P Handshake Answer Oh hi my SAS is XXX OK My account number is Answer Oh hi my SAS is Y Y Y OK My account number is No way to distinguish an attacker from a legitimate answerer How do you know what Fidelity s CSR sounds like The voice sounds the same throughout the call Even easier to clone an IVR system This is a variant of the classic mafia attack [DGB87] Eric Rescorla Security in VoIP Systems 37
38 Cut-and-Paste Attacks SAS has a limited coding space (32 symbols) People will happily read their SAS to you You get 4 symbols per call 15 calls 85% of symbols 85% of symbols 52% forgery probability Base-256 works better But attack still possible Especially on IVR Eric Rescorla Security in VoIP Systems 38
39 Privacy Motivations Domestic violence shelters Call home without giving out location Whistleblowers Enable anonymous tips National security During 9/11 Cheney needed to call from a secure location Eric Rescorla Security in VoIP Systems 39
40 Types of privacy Identity privacy PSTN: Caller-ID VoIP: From field (and others) contain your AOR We want the equivalent of Caller-ID blocking for VoIP Location privacy PSTN: your phone number is your location (or at least your phone) VoIP: your VoIP packets contain your IP address Otherwise you couldn t talk to anyone This is harder to hide Eric Rescorla Security in VoIP Systems 40
41 Anonymous From Field The SIP From field contains your identity e.g., But it isn t used for anything You can use an anonymous From sip:[email protected] This hids your name But your proxy still appears in Via headers More useful if you have an account from a big provider Anonymizing services could do a better job Eric Rescorla Security in VoIP Systems 41
42 Anonymizing Services Essentially a phone call forwarder You call them They call the callee Forward signaling and media This provides good security against casual attackers But records can be subpoenad And an attacker who can see traffic coming and out of the service can trace you Multiple hops (onion routing) introduces serious latency issues Especially if packets are intentionally retimed Eric Rescorla Security in VoIP Systems 42
43 Voice hammer During call setup, Alice tells Bob where to send media and vice versa This is never checked Alice can make Bob flood anyone she chooses Victim can send ICMP errors But often ignored You need a positive acknowledgement Alice Send media to :2222 Use G.711 RTP(64 kbps) Bob Eric Rescorla Security in VoIP Systems 43
44 NATs and Media Setup NAT > Bob > Alice Alice thinks her address is But it s being translated to Packets to go nowhere Eric Rescorla Security in VoIP Systems 44
45 STUN [RMMW08] From: Get Address From: Get Address STUN Server NAT Alice To: Addr= To: Addr= STUN servers allow NAT discovery Simple server returns public address Problems What if the server lies (voice hammer again)? Multiple layers of NAT NATs with aggressive filtering Media relaying Bottom line: only sort of works Eric Rescorla Security in VoIP Systems 45
46 Interactive Connectivity Establishment (ICE) [Ros07] Collect all possible addresses Local From STUN servers From media relays, VPNs, etc. Send all addresses to the peer Each peer tries all possible combinations Send a request/response on the address pair Pick the best one that works (you get a response) This is fiendishly complicated But it does work Stops voice hammer Eric Rescorla Security in VoIP Systems 46
47 Skype Closed system Single vendor Proprietary protocols Clients are hardened against reverse engineering Nevertheless some stuff is known Commissioned analysis by Berson [Ber05] Baset and Schulzrinne analyzed network traffic [BSer] Biondi and Desclaux reverse engineered the client [BD06] Eric Rescorla Security in VoIP Systems 47
48 General Architecture Central enrollment server Acts as CA Guarantees unique identity Hands out certificates signed by Skype Advertised as peer-to-peer Supernodes used for NAT traversal Unclear what fraction of supernodes are independent Diagram from Baset and Schulzrinne [BSer]. Eric Rescorla Security in VoIP Systems 48
49 Per-Call Security Session establishment establishes session keys Proprietary handshake Authenticated with user certificates Traffic encrypted with counter mode (Berson) Berson reports a weak integrity check (CRC) This was in 05, maybe it s fixed Traffic encrypted with RC4 (Biondi and Desclaux) Reuse of RC4 blocks? Details are fuzzy here Eric Rescorla Security in VoIP Systems 49
50 Insider attacks Skype is the CA And they control the software This gives them several insider attack opportunities Issue fake certificates and allow a MITM Detectable by key caching? Biondi and Desclaux imply new key per connection Backdoor the client to leak keying material Automatic checking for newer versions helps here Direct consequence of this being a closed system Eric Rescorla Security in VoIP Systems 50
51 Skype Lock-In Skype wants you to use their client Branding, control, avoid free-riding Enforced via protocol secrecy Extensive reverse engineering countermeasures Code obfuscation Binary encryption Binary packing Checksums to prevent code modification None of this is required in an open system This looks a lot like malware! Eric Rescorla Security in VoIP Systems 51
52 Should we expect VoIP spam? Yes There is already spam on the PSTN We call it telemarketing Spam is a big problem in systems Because it s so cheap to send Why should VoIP be any different? Eric Rescorla Security in VoIP Systems 52
53 Why is VoIP spam hard? Decisions need to be made in real-time Can t take two minutes to decide if something is spam No material for content analysis Most filters look at the body of the message But with VoIP all the content is in the audio Unwanted phone calls are more annoying than Eric Rescorla Security in VoIP Systems 53
54 Candidate Approaches White listing Reputation systems Reverse Turing Tests & CAPTCHAs Payments at risk Traffic analysis Legal action Almost no VoIP spam to speak of Hard to know what will work Eric Rescorla Security in VoIP Systems 54
55 Summary VoIP is a very complicated system SIP is by far the most complicated open system people have tried to secure Skype much easier because it s closed Not one security system A lot of interlocking pieces Everything is based on securing the end-proxies This uses well-understood technologies (certs, TLS) The traditional COMSEC stuff is mostly well understood After some false starts Spam, spit, etc. are a real challenge Eric Rescorla Security in VoIP Systems 55
56 References [BD06] Philippe Biondi and Fabrice Desclaux. Silver Needle in the Skype. Black Hat Europe, March [Ber05] Tom Berson. Skype Security Evaluation, October [BMN + 04] M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman. The Secure Realtime Transport Protocol (SRTP). RFC 3711, Internet Engineering Task Force, March [BSer] Salman A. Baset and Henning Schulzrinne. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, 2004 September. [DGB87] Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the fiat-shamir passport protocol, [DR08] T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, Internet Engineering Task Force, August [FTR08] [Gut03] J. Fischl, H. Tschofenig, and E. Rescorla. Framework for Establishing an SRTP Security Context using DTLS. Internet-Draft draft-ietf-sip-dtls-srtp-framework-03, Internet Engineering Task Force, August Work in progress. Peter Gutmann. Plug-and-Play PKI: A PKI your Mother can Use. In Proceedings of the 12th USENIX Security Symposium, Eric Rescorla Security in VoIP Systems 55
57 [RMMW08] J. Rosenberg, R. Mahy, P. Matthews, and D. Wing. Session Traversal Utilities for (NAT) (STUN). Internet-Draft draft-ietf-behave-rfc3489bis-18, Internet Engineering Task Force, July Work in progress. [Ros07] J. Rosenberg. Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols. Internet-Draft draftietf-mmusic-ice-19, Internet Engineering Task Force, October Work in progress. [RSC + 02] [WT99] [ZJC08] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, Internet Engineering Task Force, June A. Whitten and J.D. Tygar. Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, August P. Zimmermann, A. Johnston, and J. Callas. ZRTP: Media Path Key Agreement for Secure RTP. Internet-Draft draft-zimmermann-avt-zrtp-09, Internet Engineering Task Force, September Work in progress. Eric Rescorla Security in VoIP Systems 55
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
How To Use A Phone Over Ip (Phyto) For A Phone Call
SIP and VoIP Skype an example VoIP client 1 SIP / VoIP: what are these? Voice over IP (VoIP) Session Initiation Protocol (SIP) Control channel Known in telephone world as signaling channel Does call setup:
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Transparent weaknesses in VoIP
Transparent weaknesses in VoIP Peter Thermos [email protected] 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Internet Security. Prof. Anja Feldmann, Ph.D. [email protected] http://www.net.t-labs.tu-berlin.de/
Internet Security Prof. Anja Feldmann, Ph.D. [email protected] http://www.net.t-labs.tu-berlin.de/ Prof. Dr. Jean-Pierre Seifert [email protected] http://www.sec.t-labs.tu-berlin.de/
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker
An Empirical Investigation into the Security of Phone Features in SIP-based VoIP Systems Ruishan Zhang 1, Xinyuan Wang 1, Xiaohui Yang 1, Ryan Farley 1, and Xuxian Jiang 2 1 George Mason University, Fairfax,
Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik [email protected] sip:[email protected] AT&T Dimension PBX, 1980 Lecture Agenda Welcome
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721
Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk
Open Source VoIP on Debian FOSDEM 2007 Brussels, Belgium Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk Overview User expectations How it works Survey of available software Overview of resiprocate
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
NAT and Firewall Traversal. VoIP and MultiMedia 2011 [email protected] 1/77
and Firewall Traversal VoIP and MultiMedia 2011 [email protected] 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Jethro Beekman Christopher Thompson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2013-18
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
SIP Trunking Application Notes V1.3
SIP Trunking Application Notes V1.3 Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist [email protected]. David Schwartz Director, Telephony Research davids@deltathree.
Baruch Sterman, Ph.D. Chief Scientist [email protected] David Schwartz Director, Telephony Research [email protected] Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
Kommunikationsdienste im Internet Möglichkeiten und Risiken
Die Zukunft der Kommunikationsdienste im Internet Möglichkeiten und Risiken Erwin P. Rathgeb Technik der Rechnernetze, Universität Duisburg-Essen Jochen Kögel, Marc Barisch IKR, Universität Stuttgart Steffen
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
SIP Security. Andreas Steffen, Daniel Kaufmann, Andreas Stricker
SIP Security Andreas Steffen, Daniel Kaufmann, Andreas Stricker Security Group Zürcher Hochschule Winterthur CH-8401 Winterthur [email protected] Abstract: Ubiquitous worldwide broadband Internet
SIP and PSTN Connectivity. Jiri Kuthan, iptel.org sip:[email protected] September 2003
SIP and PSTN Connectivity Jiri Kuthan, iptel.org sip:[email protected] September 2003 Outline PSTN Gateways. PSTN2IP Demo Integration challenges: CLID Interdomain Trust Gateway Location Outlook: Reuse of
Analysis of a VoIP Attack
IPCom Gesellschaft für internetbasierte Kommunikationsdienste mbh Analysis of a VoIP Attack Klaus Darilion, IPCom GmbH, [email protected] Abstract: Recently, several IT news websites reported VoIP
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
SIP Trunking Quick Reference Document
SIP Trunking Quick Reference Document Publication Information SAMSUNG TELECOMMUNICATIONS AMERICA reserves the right without prior notice to revise information in this publication for any reason. SAMSUNG
Unregister Attacks in SIP
Unregister Attacks in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Interdisciplinary Center Herzliya Email: {bremler,halachmi.ronit}@idc.ac.il Jussi Kangasharju Darmstadt University of Technology [email protected]
Enabling Security Features in Firmware DGW v2.0 June 22, 2011
Enabling Security Features in Firmware DGW v2.0 June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope... 3 Acronyms and Definitions... 3 Setup Description... 3 Basics of Security Exchanges...
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
OVERVIEW OF ALL VOIP SOLUTIONS
OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype
An Investigation into the Effect of Security on Performance in a VoIP Network
Abstract An Investigation into the Effect of Security on Performance in a VoIP Network Muhammad Tayyab Ashraf, John N. Davies and Vic Grout Centre for Applied Internet Research (CAIR) Glyndŵr University,
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
