Voice over IP (VoIP) using the Session Initiation Protocol (SIP) INF Protokoller og ruting i Internett , UiO Lars Strand
|
|
|
- Ella Hardy
- 10 years ago
- Views:
Transcription
1 Voice over IP (VoIP) using the Session Initiation Protocol (SIP) INF Protokoller og ruting i Internett , UiO Lars Strand
2 Lars Strand Nofas (2012-) Nofas contributes to increased knowledge creation in Norway by assisting our clients in carrying out their research, development and innovation. Redpill Linpro ( ) Linux, network, Internet services, courses, ++ M.Sc. (2004) and PhD (2011) from UiO In close cooperation with FFI and NR Full CV: 2
3 Todays outline 1. What is VoIP? 2. What is SIP? How does it work? 3. What is RTP (and SDP)? 4. SIP and security (authentication) 5. SIP today (SIP Peering) vs. originally innnede ( model ) 3
4 4
5 5
6 Switchboard operators 6
7 7
8 Problem: Scalability the New York Telephone Exchange 1888 Salt Lake City, over 50 women, ca
9 Automatic telephone exchange (Private Branch Exchange - PBX) 9
10 Public Switched Telephony Network (PSTN) Standardization body: International Telecommunication Union Standardization (ITU-T) can be traced back to Historically: Big operators (only one for smaller countries) Peering agreement between them E.164 addresses (telephone numbers) 10
11 Plain Old Telephony Service (POTS) Just works 100+ year old technology PSTN: % uptime, the five nines = 5.26 min/year (D.R. Kuhn, 1997) Can call anyone, anytime, anywhere with a goodquality telephonic conversation This is an elusive, currently-unachievable goal for the VoIP-industry (Minoli, 2006) 11
12 Voice over IP (VoIP) protocols and technology is a merge of data communication and telecom 12
13 VoIP? What is VoIP? Broad definition: Sending and receiving media (voice/video) over IP Why VoIP? 1) Added functionality and flexibility which may be hard to provide over PSTN 2) Reduced cost uses Internet as carrier 3) Less administration no separate telephone and data network 4) (Open standards, no vendor-lock-in) 13
14 VoIP! Industry have high focus on VoIP today (and have for some time!) All major network players onboard: Cisco, Juniper, Huawei, ZTE, ++ VoIP is here to stay Replacing PSTN at a rapid rate Integrated into a lots of different services (Skype, Lync) Buzzword (the last 5+ years): Unified Communication (UC) BUT! VoIP loaded with security issues Inherit (traditional) packet switched network security issues and introduces new ones (because of new technology). Multiple attacks on SIP based VoIP exists 14
15 "It's appalling how much worse VoIP is compare to the PSTN. If these problems aren't fixed, VoIP is going nowhere." --- Philip Zimmerman on VoIP security in SIP Security, Sisalem et. al. (2009) 15
16 16
17 VoIP how does it work? The signaling battle in the mid 1990s Session Initiation Protocol (SIP) is the de facto standard signaling protocol for VoIP H.323 developed by ITU-T gained some industry adoption but lost. H.323 to complex SIP developed by IETF gained more momentum. ( Battle: The telco-world vs. the hackers ) Application layer (TCP, UDP, SCTP) Purpose: Negotiate, establish, change and tear-down the context of a multimedia flow No media transfer (voice/video) Real-time Transport Protocol (RTP) transfer the actual multimedia 17
18 SIP Specified in RFC 3261 published by IETF 2002 First iteration in 1999 (RFC 2543), 15+ years old One of the largest (in terms of page numbers) ever defined by IETF Additional functionality specified in over 120 different RFCs(!) Even more pending drafts... One RFC that list relevant specifications under the SIP umbrella Known to be complex and sometimes vague difficult for software engineers to implement Interoperability conference - SIPit 18
19 19
20 Excerpts from an posted on IEFT RAI mailing list: I'm finally getting into SIP. I've got Speakeasy VoIP service, two sipphone accounts, a Cisco 7960 and a copy of x-ten on my Mac. And I still can't make it work. Voice flows in one direction only. I'm not even behind a NAT or firewall -- both machines have global addresses, with no port translations or firewalls. I've been working with Internet protocols for over 20 years. I've implemented and contributed to them. And if *I* can't figure out how to make this stuff work, how is the average grandmother expected to do so? SIP is unbelievably complex, with extraordinarily confusing terms. There must be half a dozen different "names" -- Display Name, User Name, Authorization User Name, etc -- and a dozen "proxies". Even the word "domain" is overloaded a half dozen different ways. This is ridiculous! Sorry. I just had to get this off my chest. Regards, Reference: 20
21 SIP (2) Modeled after HTTP (and SMTP): Text-based (easy to debug!), Response codes borrowed from HTTP Based on a request/response transaction model (HTTP) Each transaction consist of a request that invokes a particular method on the server and at least one response. Transactions that are related is called a SIP dialog (1-6): 21
22 SIP request methods (RFC3261) SIP method: Description: ACK Acknowledge a request/session BYE Terminate a sesion (call) CANCEL Cancel any pending requests INVITE Initiate a session (call) OPTIONS Query servers about their capabilities REGISTER Register contact information for a UA to a location service. Additional SIP request methods have been defined later. For a starting point, see: 22
23 SIP example Direct call UA to UA Caller must know callee's IP or hostname No need for intermediate SIP nodes Problems: Traversing firewalls / NAT Must know IP/hostname of user Mobility change IP/hostname 23
24 SIP communication network (call setup) 24
25 SIP REGISTER (registration and authentication) 25
26 SIP REGISTER message flow (using Digest Access Authentication) 26
27 SIP message structure - REGISTER Start line (method) REGISTER sip: :5060 SIP/2.0 Message header Via: SIP/2.0/UDP ;branch=z9hG4bKd9828eb03D78A219 From: Bob <sip:bob@ >;tag=2a69c69e-e6a7587 To: Bob <sip:bob@ > CSeq: 2 REGISTER Call-ID: f7ce9763-f9c8678c-7f5df1f5@ Contact: <sip:bob@ >;methods="invite, ACK, BYE, CANCEL, OPTIONS, INFO, MESSAGE, SUBSCRIBE, NOTIFY, PRACK, UPDATE, REFER" User-Agent: PolycomSoundPointIP-SPIP_550-UA/ Authorization: Digest username="bob", realm="nrtestlab", nonce="39d307ea", uri="sip: :5060", response="e47f2b8946a6b0312c0b99160e8849f4", algorithm=md5 Max-Forwards: 70 Expires: 3600 Content-Length: 0 Message body 27
28 SIP INVITE (session setup) 28
29 SIP INVITE message flow 29
30 SIP message structure - INVITE Start line (method) Message headers Message body (SDP content) INVITE sip:[email protected] SIP/2.0 Via: SIP/2.0/UDP sip.companya.com:5060;rport;branch=z9hg From: Alice <sip:[email protected]>;tag= To: Bob <sip:[email protected]> Contact: <sip:[email protected]:5060> Call-ID: 361D2F83-14D0-ABC A23F90C67E@ CSeq: INVITE Max-Forwards: 70 Content-Type: application/sdp User-Agent: X-Lite release 1105d Content-Length: 312 v=0 o=alice IN IP s=sip call c=in IP t=0 0 m=audio 8000 RTP/AVP
31 Session Description Protocol (SDP) Developed by IETF, first RFC 1998 Goal: Describe the context and content of multimedia session Does NOT deliver media but is used for negotiation of parameters Session description: <character>=<value> SDP content is transported using SIP INVITE message (payload) 31
32 Real-time Transport Protocol (RTP) Transport voice over packet networks Not new: First RFC on the subject from 1977 (NVP) RTP developed Originally developed for multicast, but proven popular for unicast Used by applications that are more sensitive to latency than to packet loss (for instance speech / video) used over UDP A RTP session is usually initiated using SIP (or H.323) RTP carries the media stream Container protocol for multimedia streams Identifies the content (multimedia) type End-to-end (phone to phone), real-time, timing recovery, loss detection, media synchronization One stream for video and voice (different ports) SIP negotiate the context of RTP using SDP Does not support congestion control, but when used in together with RTCP (RTP Control Protocol) the application can get enough information to adjust flow parameters. 32
33 NAT SIP designers: IPv6 right around the corner (mid 1990s) NAT would not be an issue IETF have guidelines for protocol designs Problem: NAT operates transparently of application layer Different types of NAT mechanisms (port translation, IP, ++) SIP INVITE may contain internal local IP-adresses in: One major recommendation is that application layer protocol SHOULD NOT transport IP adresses and port numbers SIP violates this Header: Via Header: Contact SDP (for RTP) Solutions: Use additional extensions (protocols) or specialized gateways that handles SIP/RTP: IETF standardized three protocols to assist in NAT traversal: STUN, TURN and ICE OR use a Application Layer Gateway (ALG), also called Session Border Gateways 33
34 SIP Security 34
35 Three SIP authentication scenarios 35
36 SIP authentication 1) Digest Access Authentication (DAA) (RFC 3261) Mandatory but weak Widespread adoption - everyone use this Used to authenticate locally within a domain/realm (during REGISTER or INVITE) 2) S/MIME (RFC 3261) Goal: Security service end to end Uses certificates, needs PKI = complex and expensive Not supported, not used. 3) Other user identity handling methods Secure SIP (SIPS): SIP + TLS (but must be terminated for each hop! Uses TCP) P-Asserted identity (RFC 3325) in a trusted environment Strong Identity (RFC 4474) using a authentication service Other academic approaches. 36
37 SIP DAA authentication MitM attack 37
38 Execution of the attack Attack: We use NetSED to modify the network stream live. Can use search and replace based on regexp SIP server (Asterisk): The location of Alice is registered with the attackers IP/hostname WITHOUT the server/client knowledge Result: All calls are forwarded to the attacker 38
39 To counter the attack: Modify DAA To fix the vulnerability and counter the attack, add the Contact header value as part of the digest hash: HA0 = MD5(A0) = MD5(ContactURIs) HA1 = MD5(A1) = MD5(username:realm:password) HA2 = MD5(method:digestURI) response = MD5(HA0:HA1:nonce:HA2) 39
40 SIP Authentication: Problem and goal SIP is flexible Problem: Different usage scenarios have different security requirements Handheld devices vs. high-end SIP servers Goal: Modification to the SIP standard should be minimum Goal 2: A strong and flexible authentication methods wanted Solution: Add support for GSS-API 40
41 GSS-API Generic Security Services Application Program Interface = Interface for an application to access security services Mature and well-proven standard (RFC2743) NOT a communication protocol Does NOT provide any security in itself Relies on underlying security mechanisms GSS-API implementations (may) support different authentication methods Relies on the application (SIP) to pass data tokens between client and server Digest Kerberos TLS All methods are transparent to the application 41
42 GSS-API stack (with SIP) 42
43 43
44 44
45 SIP REGISTER message DAA GSS-API token
46 SIP today Peering vs. the model 46
47 Global reachability? SIP has won the signaling battle (over H.323) Design goal: Global reachability like SMTP (like SMTP won over X.400) SIP incorporates many elements from HTTP and SMTP We call this the model SIP has reached deployment worldwide VoIP has reached high penetration both in companies and for ISP customers But very few open SIP servers like originally planned Why? 47
48 SIP follows an alike model 1) and SIP addresses are structured alike address-of-record (AoR): 2) Both SIP and rely on DNS Map domain name to a set of ingress points that handle the particular connection 3) The ingress points need to accept incoming request from the Internet 4) No distinction between end-users and providers Any end-user can do a DNS lookup and contact the SIP server directly 5) No need for a business relationship between providers Since anyone can connect 6) Clients (usually) do not talk directly to each other often one or more intermediate SIP/SMTP nodes (Read more: RFC 3261 and RFC 3263) 48
49 Why has the model failed? 1) Business sender keeps all breaks tradition The traditional economic model is based on termination fee (PSTN) Since anybody can connect to anybody, no business relationship is needed No (economical) incentives for providers to deploy open SIP servers 2) Legal requirements written for PSTN Operators must comply to a wide range of regulatory requirements Example: Wiretapping, caller-id, hidden number, emergency calls, etc 3) Security considerations A) Unwanted calls (SPAM over Internet Telephony - SPIT) B) Identity C) Attack on availability (DoS) 49
50 A) Unwanted calls (SPIT) Hard unknown attack vector When there are enough open SIP servers, attackers will start to exploit them Low amount of SPIT today (because few open SIP servers) Worse than SPAM Content only available after the user picks up the phone = harder to filter and detect than Users tend to pick up the phone when it rings = disruptive (users can choose when to check their ) A number of SPIT mitigation strategies has been proposed (active research) The research project SPIDER looked at SPIT Good informative deliverables Project finished We're afraid of SPIT, so we don't have open SIP Servers 50
51 B) Identity PSTN SIP's model breaks this Anyone can send SIP (INVITE) easily spoofed The SIP authentication is terrible Provide (reasonable) good caller-id Providers trust each others signaling Modeled (copied) after HTTP Digest authentication SIP also support TLS (and certificate authentication) but very limited deployment SIP Identity tries to fix this (RFC4474) Computes a hash over selected INVITE headers and then signed. Rely on certificates Not based on transitive trust between providers (signed part can be removed without implications) No one uses this Since SIP has so poor identity handling, we don't want to expose our SIP servers to the Internet 51
52 C) Attack on availability (DoS) Denial of Service (DoS) attacks are HARD! Simple and effective: Send more bogus traffic than the recipient can handle No simple solution to prevent DoS Example: DDoS for sale - The ad scrolls through several messages, including "Will eliminate competition: high-quality, reliable, anonymous." "Flooding of stationary and mobile phones." "Pleasant prices: 24-hours start at $80. Regular clients receive significant discounts." "Complete paralysis of your competitor/foe." Reference: We're terrified to become a victim of a DDoS attack 52
53 So, what is the result? Providers do NOT have open SIP servers All non-local calls are sent to the PSTN Why is that a bad thing? 53
54 Disadvantages 1) Administrative overhead more systems to keep track of IP-to-PSTN gateway 2) More expensive than SIP only Must pay a termination fee to the PSTN provider Must maintain the IP-to-PSTN gateway 3) Poor(er) voice quality Voice must be transcoded from G.711 to the PSTN (and back again) Can not use wide-band codecs, like G.722 that provides superior sound quality ( HD sound ) 4) Only applies to voice miss out other functionality that SIP supports IM, presence, mobility, etc. 54
55 SIP Peering Peering overcome these disadvantages Do not need an open SIP server on the Internet Industry has started to do this ad-hoc But not standardized in any way 55
56 Closing remarks VoIP = SIP + RTP SIP is flexible and easily extended SIP have wide industry adoption SIP does not play well with NAT SIP have security flaws SIP peering used extensively today SIP is pretty hard to implement in a native web browser environment The future is web WebRTC - API defined by W3C Check out: 56
57 Try for yourself! SIP Server: Install Asterisk on Linux..or download AsteriskNOW SIP Client: X-Lite, Bria (ios, Android) 57
58 Thank you 58
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
How To Understand How Open Source And Free Software Work Together
Free and Open Source Software in relation to Asterisk* Lars Strand [email protected] Ibidium's Asterisk course Oslo, NR, 8.-11. September 2009 What is this? What is free software? What is
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik [email protected] sip:[email protected] AT&T Dimension PBX, 1980 Lecture Agenda Welcome
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Introduction to VoIP Technology
Lesson 1 Abstract Introduction to VoIP Technology 2012. 01. 06. This first lesson of contains the basic knowledge about the terms and processes concerning the Voice over IP technology. The main goal of
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Ingate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks
Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
Denial of Services on SIP VoIP infrastructures
Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University [email protected] 1 Outline Background Denial of Service attack using DNS Conclusion 2 VoIP What is VoIP? What is its advantage?
Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation
Session Initiation Protocol (SIP) Vulnerabilities Mark D. Collier Chief Technology Officer SecureLogix Corporation What Will Be Covered Introduction to SIP General SIP security SIP vulnerabilities and
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
SIP Introduction. Jan Janak
SIP Introduction Jan Janak SIP Introduction by Jan Janak Copyright 2003 FhG FOKUS A brief overview of SIP describing all important aspects of the Session Initiation Protocol. Table of Contents 1. SIP Introduction...
A Scalable Multi-Server Cluster VoIP System
A Scalable Multi-Server Cluster VoIP System Ming-Cheng Liang Li-Tsung Huang Chun-Zer Lee Min Chen Chia-Hung Hsu [email protected] {kpa.huang, chunzer.lee}@gmail.com {minchen, chhsu}@nchc.org.tw Department
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
Analysis of a VoIP Attack
IPCom Gesellschaft für internetbasierte Kommunikationsdienste mbh Analysis of a VoIP Attack Klaus Darilion, IPCom GmbH, [email protected] Abstract: Recently, several IT news websites reported VoIP
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
VoIP. Overview. Jakob Aleksander Libak [email protected]. Introduction Pros and cons Protocols Services Conclusion
VoIP Jakob Aleksander Libak [email protected] 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Transparent weaknesses in VoIP
Transparent weaknesses in VoIP Peter Thermos [email protected] 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Voice over IP Fundamentals
Voice over IP Fundamentals Duration: 5 Days Course Code: GK3277 Overview: The aim of this course is for delegates to gain essential data networking and Voice over IP (VoIP) knowledge in a single, week-long
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
Understanding Session Border Controllers. FRAFOS GmbH
Understanding Session Border Controllers FRAFOS GmbH Table of Contents 1 Introduction... 3 2 A Short Introduction to SIP... 4 3 What Do SBCs Do?... 9 3.1 SIP Design Shortcomings and Emergence of SBCs...
NAT Traversal for VoIP
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: [email protected] 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download
Integrating Voice over IP services in IPv4 and IPv6 networks
ARTICLE Integrating Voice over IP services in IPv4 and IPv6 networks Lambros Lambrinos Dept.of Communication and Internet studies Cyprus University of Technology Limassol 3603, Cyprus [email protected]
CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, Email, Collaboration, IM www.communigate.com
CommuniGate Pro Real-Time Features CommuniGate Pro for VoIP Administrators Audience: Server Administrators and Developers Focus: CommuniGate Pro as the Signaling platform Method: Understanding CommuniGate
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. [email protected]
VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 [email protected] 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy
SIP and Mobility: IP Multimedia Subsystem in 3G Release 5
and Mobility: IP Multimedia Subsystem in 3G Release 5 Jörg Ott {sip,mailto}:[email protected] VDE / ITG Fachgruppe 5.2.4 Bremen 11 November 2002 2002JörgOtt TZI Digitale Medien und Netze 1 Overview IETF Conferencing
FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk
Open Source VoIP on Debian FOSDEM 2007 Brussels, Belgium Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk Overview User expectations How it works Survey of available software Overview of resiprocate
SIP Trunking & Peering Operation Guide
SIP Trunking & Peering Operation Guide For Samsung OfficeServ May 07, 2008 doc v2.1.0 Sungwoo Lee Senior Engineer [email protected] OfficeServ Network Lab. Telecommunication Systems Division
Voice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks
Security of VoIP Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks A thesis submitted in partial fulfilment of the requirements for the Degree of Master of Science in Computer
Chapter 2 PSTN and VoIP Services Context
Chapter 2 PSTN and VoIP Services Context 2.1 SS7 and PSTN Services Context 2.1.1 PSTN Architecture During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using
SIP PBX TRUNKING WITH SIP-DDI 1.0
Documentation on SIP PBX trunking with SIP-DDI 1.0 and the related QSC product IPfonie extended Version 1.1, date: september 15th, 2011 page 1/22 List of references Author Document Roland Hänel "Technical
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
Monitoring SIP Traffic Using Support Vector Machines
Monitoring SIP Traffic Using Support Vector Machines Mohamed Nassar, Radu State, Olivier Festor (nassar, state, festor)@loria.fr MADYNES Team INRIA, Nancy Grand Est 17 September 2008 Outline Introduction
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
Vulnerabilities in SOHO VoIP Gateways
Vulnerabilities in SOHO VoIP Gateways Is grandma safe? Peter Thermos [email protected] [email protected] 1 Purpose of the study VoIP subscription is growing and therefore security
VoIP Security regarding the Open Source Software Asterisk
Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
Internet Technology Voice over IP
Internet Technology Voice over IP Peter Gradwell BT Advert from 1980s Page 2 http://www.youtube.com/v/o0h65_pag04 Welcome to Gradwell Gradwell provides technology for every line on your business card Every
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
