SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.
|
|
|
- Liliana Brown
- 10 years ago
- Views:
Transcription
1 ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen Andreas Steffen, , ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the Session Management Securing the Media Streams Conclusions Andreas Steffen, , ENUM_SIP.ppt 2
2 Session Initiation Protocol (RFC 3261) atlanta.com biloxi.com User Agent Proxy Proxy UA INVITE F1 INVITE F2 100 Trying F3 INVITE F4 100 Trying F5 180 Ringing F6 180 Ringing F7 180 Ringing F8 200 OK F9 200 OK F OK F11 ACK F12 Media Session BYE F OK F14 Andreas Steffen, , ENUM_SIP.ppt 3 Basic SIP Trapezoid Proxy Proxy Hop 2 Hop 1 atlanta.com biloxi.com Hop 3 UA sip:[email protected] Direct path Media stream UA sip:[email protected] udp/sip or tcp/sip Session Management udp/rtp Media Streams Andreas Steffen, , ENUM_SIP.ppt 4
3 Securing the Session Management Authentication methods: PSK Pre-Shared Keys PKI Public Key Infrastructure Authentication Data Integrity Confidentiality HTTP 1.0 Basic Authentication PSK - - HTTP 1.1 Digest Authentication PSK - - Deprecated by SIPv2 Insecure transmission of password Challenge/response exchange based on MD5 hash of [strong] password Pretty Good Privacy (PGP) PKI Deprecated by SIPv2 Secure MIME (S/MIME) PKI For encryption the public key of the recipient user agent must be known SIPS URI (TLS) PKI SIP application and proxies must tightly integrate TLS IP Security (IPsec) PKI Integration with SIP application not required but proxies must be trusted Andreas Steffen, , ENUM_SIP.ppt 5 Securing the Media Streams Authentication methods: PSK Pre-Shared Keys PKI Public Key Infrastructure Authentication Data Integrity Confidentiality Secure RTP (SRTP) PSK Uses master key which must be distributed by other means IP Security (IPsec) PKI Integration with SIP application not required but peer must be trusted Andreas Steffen, , ENUM_SIP.ppt 6
4 SIP Security Securing the Media Streams Andreas Steffen, , ENUM_SIP.ppt 7 Secure RTP Packet Format (RFC 3711) encrypted V P X CC M PT sequence number timestamp synchronization source (SSRC) identifier contributing source (CSRC) identifiers RTP header extension (optional) RTP payload RTP padding SRTP master key identifier (MKI, optional) authentication tag (recommended) RTP pad count authenticated Andreas Steffen, , ENUM_SIP.ppt 8
5 Secure RTCP Packet Format (RFC 3711) encrypted E V P X RC M PT=RR length SSRC of packet sender sender info report block 1 report block 2 SRTCP index SRTCP master key identifier (MKI, optional) authentication tag authenticated Andreas Steffen, , ENUM_SIP.ppt 9 Default Encryption and Authentication Algorithms Encryption uses AES in Counter Mode (AES-CTR) with 128 bit key 128 bits IV IV = f(salt_key, SSRC, packet index) 112 bits 128 bits encr_key keystream generator AES-CTR XOR RTP/RTCP payload + encrypted payload Authentication uses HMAC-SHA-1 with truncated 80 bit MAC RTP/RTCP payload HMAC 160 bits auth_key SHA-1 auth tag 80/32 bits Andreas Steffen, , ENUM_SIP.ppt 10
6 Session Key Derivation Key Derivation uses AES in Counter Mode (AES-CTR) master_key 128 bits 192 bits 256 bits 128 bits IV SRTP session keys key derivation AES-CTR SRTCP session keys IV = f(master_salt, label, packet index) 112 bits div label key derivation rate 0x00 0x01 0x02 0x03 0x04 0x05 encr_key auth_key salt_key encr_key auth_key salt_key 128 bits 160 bits 112 bits 128 bits 160 bits 112 bits Andreas Steffen, , ENUM_SIP.ppt 11 SIP Security Securing the Session Management Andreas Steffen, , ENUM_SIP.ppt 12
7 SIP INVITE Request INVITE SIP/2.0 SIP/2.0 Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob From: From: Alice Alice Call-ID: Call-ID: CSeq: CSeq: 1 INVITE INVITE Max-Forwards: Max-Forwards: Contact: Contact: <sip:[email protected]:5060> application/sdp application/sdp Content-Length: Content-Length: v=0 v=0 o=alice o=alice IN IN IP4 IP s=da s=da SIP SIP Security Security c=in c=in IP4 IP t=0 t=0 0 k=clear:910bc4defa71eb fca6ae2f1d959e87cdf3c0c5c5076ad38ee8 k=clear:910bc4defa71eb fca6ae2f1d959e87cdf3c0c5c5076ad38ee8 m=audio m=audio RTP/AVP RTP/AVP 0 a=ptime:20 a=ptime: bit SRTP master key a=rtpmap:0 a=rtpmap:0 PCMU/8000 PCMU/8000 Andreas Steffen, , ENUM_SIP.ppt 13 S/MIME based Authentication and Encryption INVITE INVITE sip:[email protected] sip:[email protected] SIP/2.0 SIP/2.0 Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob <sip:[email protected]> <sip:[email protected]> From: From: Alice Alice <sip:[email protected]>;tag=daa21162 <sip:[email protected]>;tag=daa21162 Call-ID: Call-ID: 392c3f2b568e92a8eb37d448886edd1a@ c3f2b568e92a8eb37d448886edd1a@ CSeq: CSeq: 1 1 INVITE INVITE Max-Forwards: Max-Forwards: Contact: Contact: <sip:[email protected]:5060> <sip:[email protected]:5060> multipart/signed;boundary=992d915fef419824; multipart/signed;boundary=992d915fef419824; micalg=sha1;protocol=application/pkcs7-signature micalg=sha1;protocol=application/pkcs7-signature Content-Length: Content-Length: d915fef d915fef application/pkcs7-mime; application/pkcs7-mime; smime-type=envelopeddata; smime-type=envelopeddata; name=smime.p7m name=smime.p7m Content-Disposition: Content-Disposition: attachment;handling=required;filename=smime.p7m attachment;handling=required;filename=smime.p7m Content-Transfer-Encoding: Content-Transfer-Encoding: binary binary <envelopeddata <envelopeddata object object encapsulating encapsulating encrypted encrypted SDP SDP attachment attachment not not shown> shown> --992d915fef d915fef application/pkcs7-signature;name=smime.p7s application/pkcs7-signature;name=smime.p7s Content-Disposition: Content-Disposition: attachment;handling=required;filename=smime.p7s attachment;handling=required;filename=smime.p7s Content-Transfer-Encoding: Content-Transfer-Encoding: binary binary <signeddata <signeddata object object containing containing signature signature not not shown> shown> --992d915fef d915fef Andreas Steffen, , ENUM_SIP.ppt 14
8 Practical Results and Conclusions Practical Results ZHW diploma thesis in 2003 demonstrated feasability of S/MIME protected session management and SRTP secured media streams. resipprocate available from implements a SIPv2 stack and offers basic S/MIME support using OpenSSL. TinyCA available from tinyca.sm-zone.net was used as a graphical interface on top of OpenSSL for X.509 certificate generation. libsrtp library available from srtp.sourceforge.net implements SRTP. Conclusions S/MIME encrypted and/or signed attachments in SIP messages are an attractive alternative to the hop-by-hop security offered by TLS and allow the secure transfer of secret SRTP master keys via end-toend encryption. Similar to S/MIME protected , the verification of peer certificates on a global scale remains one of the open problems yet to be solved. Andreas Steffen, , ENUM_SIP.ppt 15
SIP Security. Andreas Steffen, Daniel Kaufmann, Andreas Stricker
SIP Security Andreas Steffen, Daniel Kaufmann, Andreas Stricker Security Group Zürcher Hochschule Winterthur CH-8401 Winterthur [email protected] Abstract: Ubiquitous worldwide broadband Internet
An Introduction to. Voice over IP Security
An Introduction to Voice over IP Security July 2006 [email protected] 1. April 2006 Holger Zuleger 1/18 > c What is meant by secur ity? Preface Not address or topology hiding Not (D)DoS prevention
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Identity based Authentication in Session Initiation. Session Initiation Protocol
Identity based Authentication in Session Initiation by Harsh Kupwade Southern Methodist University Dean Willis Softarmor LLC Thomas M. Chen Swansea University Nhut Nguyen Samsung Telecommunications 1 Session
VoIP Security. Piero Fontanini
Piero Fontanini Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2008 Avdeling for informatikk og medieteknikk
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
Three-Way Calling using the Conferencing-URI
Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
For internal circulation of BSNL only
E1-E2 E2 CFA Session Initiation Protocol AGENDA Introduction to SIP Functions of SIP Components of SIP SIP Protocol Operation Basic SIP Operation Introduction to SIP SIP (Session Initiation Protocol) is
SIP Trunking & Peering Operation Guide
SIP Trunking & Peering Operation Guide For Samsung OfficeServ May 07, 2008 doc v2.1.0 Sungwoo Lee Senior Engineer [email protected] OfficeServ Network Lab. Telecommunication Systems Division
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
EDA095 Audio and Video Streaming
EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ April 22, 2015 Pierre Nugues EDA095 Audio and Video Streaming April 22, 2015 1 / 35 What is Streaming Streaming
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik [email protected] sip:[email protected] AT&T Dimension PBX, 1980 Lecture Agenda Welcome
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
Session Announcement (SAP, RFC 2974) Session Description (SDP, RFC 2327) (SDP, draft-ietf-mmusic-sdp-new-11)
Session Announcement (SAP, RFC 2974) Session Description (SDP, RFC 2327) (SDP, draft-ietf-mmusic-sdp-new-11) Conference Establishment Session Description Workshop 1. Create Descr.: IP Multimedia Workshop
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk) 1. Login to CID (Customer ID) Login https://manager.agile.ne.jp/login.php USERNAME Password 2. Go to SIP List of SIP TRUNK SIP SIP List Buy SIP Trunk
Denial of Services on SIP VoIP infrastructures
Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University [email protected] 1 Outline Background Denial of Service attack using DNS Conclusion 2 VoIP What is VoIP? What is its advantage?
Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721
Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
Technical Bulletin 25751
25751 Secure Real-Time Transport Protocol on SoundPoint IP Phones This technical bulletin provides detailed information on how the SIP application has been enhanced to support Secure Real-Time Transport
Hacking Trust Relationships of SIP Gateways
Hacking Trust Relationships of SIP Gateways Author : Fatih Özavcı Homepage : gamasec.net/fozavci SIP Project Page : github.com/fozavci/gamasec-sipmodules Version : 0.9 Hacking Trust Relationship Between
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
IP Office Technical Tip
IP Office Technical Tip Tip no: 200 Release Date: January 23, 2008 Region: GLOBAL IP Office Session Initiation Protocol (SIP) Configuration Primer There are many Internet Telephony Service Providers (ITSP)
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
SIP RFC (3261) explained, LIGHT 3.2 (1/2011) - www.sipknowledge.com
/*============================================================================*\ Note: The original contents of the RFC 3261 was left intact. We only added elaborative footnotes (and links in the ms-word
SIP Session Initiation Protocol Nicolas Montavont [email protected]
SIP Session Initiation Protocol Nicolas Montavont [email protected] SIP Session Initiation Protocol Henning Schulzrinne Department of Computer Science Columbia University, New York,
SPAM over Internet Telephony and how to deal with it
SPAM over Internet Telephony and how to deal with it Diploma thesis - Rachid El Khayari Supervisor: Prof. Dr. Claudia Eckert, Dr. Andreas U. Schmidt, Nicolai Kuntze Fraunhofer Institute for Secure Information
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0. Version 1
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0 Version 1 BroadWorks Guide Copyright Notice Trademarks Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation
How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or
About this Tutorial SIP is a signalling protocol designed to create, modify, and terminate a multimedia session over the Internet Protocol. It is an application layer protocol that incorporates many elements
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
SIP Introduction. Jan Janak
SIP Introduction Jan Janak SIP Introduction by Jan Janak Copyright 2003 FhG FOKUS A brief overview of SIP describing all important aspects of the Session Initiation Protocol. Table of Contents 1. SIP Introduction...
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk
Open Source VoIP on Debian FOSDEM 2007 Brussels, Belgium Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk Overview User expectations How it works Survey of available software Overview of resiprocate
Black Hat Briefings 2007 Las Vegas. White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones
Black Hat Briefings 2007 Las Vegas White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones Sachin Joglekar Vulnerability Research Lead Sipera VIPER Lab Table of Contents Introduction... 3 Dual-mode/Wi-Fi
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
SIP: Session Initiation Protocol
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Internet Engineering Task Force SIP WG INTERNET-DRAFT J. Rosenberg,H. Schulzrinne,G. Camarillo,A. Johnston,J. Peterson,R. Sparks,M. Handley,E.
SIP Essentials Training
SIP Essentials Training 5 Day Course Lecture & Labs COURSE DESCRIPTION Learn Session Initiation Protocol and important protocols related to SIP implementations. Thoroughly study the SIP protocol through
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
MOHAMED EL-SHAER Teaching Assistant. Room C3 @: [email protected]. TASK Exercises Thu., Nov. 17, 2014 CONTENT
Room C3.221 Tel : +20 275 899 90-8, ext. 1376 Fax : +20 227 581 041 Mail: [email protected]; [email protected] Room C3 @: [email protected] Faculty of Information Engineering and Technology
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
NAT and Firewall Traversal. VoIP and MultiMedia 2011 [email protected] 1/77
and Firewall Traversal VoIP and MultiMedia 2011 [email protected] 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
AGILE SIP TRUNK IP- PBX Connection Manual (Asterisk, Trixbox)
AGILE SIP TRUNK IP- PBX Connection Manual (Asterisk, Trixbox) 1. SIP TRUNK SETTINGS 1.1. Login to CID (Customer ID): https://manager.agile.ne.jp/login.php USERNAME Password 1.2. On the left most column
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
Asterisk with Twilio Elastic SIP Trunking Interconnection Guide using Secure Trunking (SRTP/TLS)
Asterisk with Twilio Elastic SIP Trunking Interconnection Guide using Secure Trunking (SRTP/TLS) With the Introduction of Twilio Elastic SIP trunking this guide provides the configuration steps required
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
The VoIP Vulnerability Scanner
SiVuS (SiP Vulnerability Scanner) The VoIP Vulnerability Scanner User Guide v1.07 www.vopsecurity.org Contents 1 INTRODUCTION... 3 2 SIVUS FEATURES AND FUNCTIONALITY... 4 3 INSTALLATION... 5 4 OPERATION...
How To Write A Sip Message On A Microsoft Ipa (Sip) On A Pcode (Siph) On An Ipa Or Ipa On A Ipa 2 (Sips) On Pcode On A Webmail (
Network Working Group J. Rosenberg/H. Schulzrinne/G. Camarillo/A. Johnston/J. Peterson/R. Sparks/M. Handley/E. Schooler Request for Comments: 3261 dynamicsoft/columbia U./Ericsson/Worldcom/Neustar/dynamicsoft/ICIR/AT&T
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs
Chapter V SIP Technology For Value Added Services (VAS) in NGNs http://users.encs.concordia.ca/~glitho/ Outline 1. SIP 2. SIP servlets 3. Examples of services that may be implemented with SIP technology
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
Multimedia networking Voice/data integration
Multimedia networking Voice/data integration Eric Vyncke Distinguished Engineeer Cisco Systems [email protected] Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 1 Agenda XXth
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Session Initiation Protocol (SIP)
Il protocollo SIP Session Initiation Protocol (SIP) SIP is the IETF s standard for establishing VoIP connections It is an application layer control protocol for creating, modifying and terminating sessions
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Advanced Networking Voice over IP & Other Multimedia Protocols
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
Enabling Security Features in Firmware DGW v2.0 June 22, 2011
Enabling Security Features in Firmware DGW v2.0 June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope... 3 Acronyms and Definitions... 3 Setup Description... 3 Basics of Security Exchanges...
Security in VoIP Systems
Security in VoIP Systems Eric Rescorla RTFM, Inc. [email protected] Eric Rescorla Security in VoIP Systems 1 Background: the PSTN POTS Subscriber Cell Subscriber Cell To wer POTS Subscriber POTS Subscriber
