Identity based Authentication in Session Initiation. Session Initiation Protocol
|
|
|
- Andra Cooper
- 10 years ago
- Views:
Transcription
1 Identity based Authentication in Session Initiation by Harsh Kupwade Southern Methodist University Dean Willis Softarmor LLC Thomas M. Chen Swansea University Nhut Nguyen Samsung Telecommunications 1 Session Initiation Protocol Trying Ringing OK 2. INVITE Trying Ringing OK Ringing OK 4. INVITE 12. ACK 13. Media Session 14. Bye OK [RFC 3261] J. Rosenberg et. al, Session Initiation Protocol IETF RFC
2 INVITE message in SIP INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bk776asdhds Max Forwards: 70 To: Bob Spoofed From: Alice Call ID: CSeq: INVITE Contact: Content Type: application/sdp Content Length: 142 (Alice's SDP not shown) [RFC 3261] J. Rosenberg et. al, Session Initiation Protocol June RFC 4474 INVITE sip:[email protected] SIP/2.0 Contact: <sip:[email protected]> Identity: "ZYNBbHC00VMZr2kZt6VmCvPonWJMGvQTBDqghoWeLxJfzB2a1pxAr3VgrB0SsSAa ifsrdiopoqzyoy2wrvghuhcsmbhwusfxi6p6q5toqxhmmz6ueo3svjssh49thygn FVcnyaZ++yRlBYYQTLqWzJ+KVhPKbfU/pryhVn9Yc6U=" Identity Info: < sha1 Content Type: application/sdp Content Length: 147 (Alice s SDP not shown) [IETF RFC 3261] C. Jennings and J. Peterson, Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) August
3 We cannot apply RFC 4474 to SIP responses Response messages cannot be challenged. SIP response messages may not encode the identity of the responder [RFC 3261] J. Rosenberg et. al, Session Initiation Protocol IETF RFC Rogue Proxy sends a falsified 200 OK Atlanta.com Rogue Proxy Trudy Biloxi.com Proxy 4. INVITE 3. Falsified 200 OK Proxy 4. Falsified 200 OK 7. ACK Media Session 6
4 Trudy sends a falsified 200 OK message to Alice SIP/ OK Via: SIP/2.0/UDP server10.biloxi.com;branch=z9hg4bk4b43c2ff8.1 ;received= Via: SIP/2.0/UDP bigbox3.site3.atlanta.com;branch=z9hg4bk77ef4c ;received= Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bknashds8 ;received= To: Bob <sip:[email protected]>;tag=a6c85cf From: Alice <sip:[email protected]>;tag= Call ID: a84b4c76e66710 CSeq: INVITE Contact: <IP address of the Rogue Proxy> Content Type: application/sdp Content Length: 131 v=0 o=bob IN IP4 client.biloxi.example.com s=c=in IP4 < IP Address of the Rogue Proxy > t=0 0 m=audio RTP/AVP 0 a=rtpmap:0 PCMU/ Approach: Transform Response Identity problem into Connected Identity Problem 2. INVITE OK OK 9. INVITE OK 8. INVITE OK 3. INVITE OK 7. INVITE OK Messages 1-3 convey Alice s Identity to Bob Messages 7-9 convey Bob s Identity to Alice J. Elwell, Connected Identity in the Session Initiation Protocol (SIP) IETF draft 8
5 Unanticipated Response Problem 2. INVITE 3. INVITE OK Carol OK? OK SIP/ OK To: Contact: < Bob not available for a week 9 Drawbacks INVITE with the Identity field How do we verify the Identity field? Self signed certificates Dependence on PKI Discovery of a public key certificate [ Linn,Branchaud04] Complex path construction process Di. Berbecaru, A. Lioy and M. Marian On the Complexity of Public-Key Certificate Validation, in Proceedings of the 4th International Conference on Information Security, Lecture Notes in Computer Science, Springer-Verlag, Vol 2200 pages ,
6 Identity based signature algorithms Hess s Algorithm (Digital Signature) Single domain environment Lynn s Algorithm (Signcryption Scheme) Hierarchical domain environment Gentry and Silverberg s algorithm (Digital Signature) Chow s Algorithm (Signcryption Scheme) 11 Signature and Key Size Criteria RFC 4474 IBS Schemes Signature Size 175 bytes(sig) bytes + Hess s algorithm CA certs 511 bytes Lynn s 434 bytes Gentry & Silverberg algorithm 434 bytes Chow et al s algorithm 434 bytes Key size 1024 bits 160 bits H. Kupwade Patil and D. Willis, Identity based authentication in SIP, IETF draft
7 Computational Time Scheme Generation time in sec Verification time in sec Open SSL (RFC 4474) 0.109s 0.110s PBC library 0.078s 0.051s Hess s algorithm PBC library 0.269s 0.238s Lynn s algorithm PBC library Gentry and Silverberg s algorithm PBC library Chow et. al s algorithm 0.093s 0.063s 0.160s 0.162s H. Kupwade Patil and D. Willis, Identity based authentication in SIP, IETF draft IBS to Response Identity Problem 2. INVITE OK 3. INVITE OK Carol? OK SIP/ OK From:<sip:[email protected]>;tag=13adc987 To: <sip:[email protected]>;tag=2ge46ab5 Identity: <Signcrypted message> Identity Info: alg=chow;ibs;sip:[email protected]+date Content Type: application/sdp Content Length: 131 Contact: < sip:[email protected]> Bob would provide private keys for a week to Carol H. Kupwade Patil and D. Willis, Identity based signcryption scheme to the connected identity problem in the SIP Bob not available for a week 14
8 Key Distribution in IBE [B. Lee et. al. 2004] Request for partial private key X,ID Key Generator Partial private key [B.Lee et.al 2004] B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang and S. Yoo, "Secure Key Issuing in ID based Cryptography," in Conferences in Research and Practice in Information Technology, 2004, vol. 32, pp Revocation issues Expiration 1. Request for partial private key X,[email protected] + June 2, 2008 Key Generator 1 1. Request for private key ID= ([email protected] + UUID(a) 2. Private key ID 2. Partial private key Using Universally Unique User ID (UUID) Key Generator 1 4. Public key = [email protected] + UUID 3. Digital Signature + UUID 16
9 Conclusion Identity based signature/sigcryption schemes Reduces the complex path construction process used by PKI Faster processing speed compared to the RSA based schemes (RFC 4474) Future Work Identity based authentication in a peer to peer SIP environment 17 Thank You 18
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
Three-Way Calling using the Conferencing-URI
Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs
Chapter V SIP Technology For Value Added Services (VAS) in NGNs http://users.encs.concordia.ca/~glitho/ Outline 1. SIP 2. SIP servlets 3. Examples of services that may be implemented with SIP technology
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik [email protected] sip:[email protected] AT&T Dimension PBX, 1980 Lecture Agenda Welcome
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721
Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on
NAT and Firewall Traversal. VoIP and MultiMedia 2011 [email protected] 1/77
and Firewall Traversal VoIP and MultiMedia 2011 [email protected] 1/77 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same
For internal circulation of BSNL only
E1-E2 E2 CFA Session Initiation Protocol AGENDA Introduction to SIP Functions of SIP Components of SIP SIP Protocol Operation Basic SIP Operation Introduction to SIP SIP (Session Initiation Protocol) is
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
AGILE SIP TRUNK IP- PBX Connection Manual (Asterisk, Trixbox)
AGILE SIP TRUNK IP- PBX Connection Manual (Asterisk, Trixbox) 1. SIP TRUNK SETTINGS 1.1. Login to CID (Customer ID): https://manager.agile.ne.jp/login.php USERNAME Password 1.2. On the left most column
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk
Open Source VoIP on Debian FOSDEM 2007 Brussels, Belgium Daniel Pocock B.CompSc(Melbourne) www.readytechnology.co.uk Overview User expectations How it works Survey of available software Overview of resiprocate
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)
AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk) 1. Login to CID (Customer ID) Login https://manager.agile.ne.jp/login.php USERNAME Password 2. Go to SIP List of SIP TRUNK SIP SIP List Buy SIP Trunk
Denial of Services on SIP VoIP infrastructures
Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University [email protected] 1 Outline Background Denial of Service attack using DNS Conclusion 2 VoIP What is VoIP? What is its advantage?
IP Office Technical Tip
IP Office Technical Tip Tip no: 200 Release Date: January 23, 2008 Region: GLOBAL IP Office Session Initiation Protocol (SIP) Configuration Primer There are many Internet Telephony Service Providers (ITSP)
MOHAMED EL-SHAER Teaching Assistant. Room C3 @: [email protected]. TASK Exercises Thu., Nov. 17, 2014 CONTENT
Room C3.221 Tel : +20 275 899 90-8, ext. 1376 Fax : +20 227 581 041 Mail: [email protected]; [email protected] Room C3 @: [email protected] Faculty of Information Engineering and Technology
VoIP Security. Piero Fontanini
Piero Fontanini Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2008 Avdeling for informatikk og medieteknikk
Black Hat Briefings 2007 Las Vegas. White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones
Black Hat Briefings 2007 Las Vegas White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones Sachin Joglekar Vulnerability Research Lead Sipera VIPER Lab Table of Contents Introduction... 3 Dual-mode/Wi-Fi
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
SIP Tutorial. VoIP Workshop Terena 2005 Poznan Poland. By Stephen Kingham mailto:[email protected] sip:[email protected].
SIP Tutorial VoIP Workshop Terena 2005 Poznan Poland By Stephen Kingham mailto:[email protected] sip:[email protected] Stephen Kingham Copyright Stephen Kingham 2004 This work is
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
SIP Trunking & Peering Operation Guide
SIP Trunking & Peering Operation Guide For Samsung OfficeServ May 07, 2008 doc v2.1.0 Sungwoo Lee Senior Engineer [email protected] OfficeServ Network Lab. Telecommunication Systems Division
SIP Trunk 2 IP-PBX User Guide Asterisk. Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.
SIP Trunk 2 IP-PBX User Guide Asterisk Ver1.0.0 2015/08/01 Ver1.0.3 2015/09/17 Ver1.0.4 2015/10/07 Ver1.0.5 2015/10/15 Ver1.0.6 2015/10/23 Index 1. SIP Trunk 2 Overview 3 2. Purchase/Settings in Web Portal
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
The VoIP Vulnerability Scanner
SiVuS (SiP Vulnerability Scanner) The VoIP Vulnerability Scanner User Guide v1.07 www.vopsecurity.org Contents 1 INTRODUCTION... 3 2 SIVUS FEATURES AND FUNCTIONALITY... 4 3 INSTALLATION... 5 4 OPERATION...
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
Transparent weaknesses in VoIP
Transparent weaknesses in VoIP Peter Thermos [email protected] 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,
EDA095 Audio and Video Streaming
EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ April 22, 2015 Pierre Nugues EDA095 Audio and Video Streaming April 22, 2015 1 / 35 What is Streaming Streaming
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret
SIP: Session Initiation Protocol
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Internet Engineering Task Force SIP WG INTERNET-DRAFT J. Rosenberg,H. Schulzrinne,G. Camarillo,A. Johnston,J. Peterson,R. Sparks,M. Handley,E.
Session Initiation Protocol (SIP)
Il protocollo SIP Session Initiation Protocol (SIP) SIP is the IETF s standard for establishing VoIP connections It is an application layer control protocol for creating, modifying and terminating sessions
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0. Version 1
BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE 13.0 Version 1 BroadWorks Guide Copyright Notice Trademarks Copyright 2005 BroadSoft, Inc. All rights reserved. Any technical documentation
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
SIP Security. Andreas Steffen, Daniel Kaufmann, Andreas Stricker
SIP Security Andreas Steffen, Daniel Kaufmann, Andreas Stricker Security Group Zürcher Hochschule Winterthur CH-8401 Winterthur [email protected] Abstract: Ubiquitous worldwide broadband Internet
SIP Session Initiation Protocol Nicolas Montavont [email protected]
SIP Session Initiation Protocol Nicolas Montavont [email protected] SIP Session Initiation Protocol Henning Schulzrinne Department of Computer Science Columbia University, New York,
JJ-22.04. Technical Specification on Called Party Subaddress Information Interface between Private SIP Networks. First Edition
JJ-22.04 Technical Specification on Called Party Subaddress Information Interface between Private SIP Networks First Edition Established on August 27, 2007 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE Introduction
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
TLS handshake method based on SIP
Proceedings of the International Multiconference on ISSN 1896-7094 Computer Science and Information Technology, pp. 467 475 2006 PIPS TLS handshake method based on SIP Tadashi Kaji 1, Kazuyoshi Hoshino
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or
About this Tutorial SIP is a signalling protocol designed to create, modify, and terminate a multimedia session over the Internet Protocol. It is an application layer protocol that incorporates many elements
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
VoIP Fraud Analysis. Simwood esms Limited https://www.simwood.com/ @simwoodesms Tel: 029 2120 2120
VoIP Fraud Analysis Simwood esms Limited https:/// @simwoodesms Tel: 029 2120 2120 Simon Woodhead Managing Director [email protected] INTRODUCTION Wholesale Voice (and fax!)! UK Numbering Termination
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
Hacking Trust Relationships of SIP Gateways
Hacking Trust Relationships of SIP Gateways Author : Fatih Özavcı Homepage : gamasec.net/fozavci SIP Project Page : github.com/fozavci/gamasec-sipmodules Version : 0.9 Hacking Trust Relationship Between
Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.
Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa 7. [N b ] PKb B Here,
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138
Mobicents 2.0 The Open Source Communication Platform DERUELLE Jean JBoss, by Red Hat 138 AGENDA > VoIP Introduction > VoIP Basics > Mobicents 2.0 Overview SIP Servlets Server JAIN SLEE Server Media Server
Technical Bulletin 25751
25751 Secure Real-Time Transport Protocol on SoundPoint IP Phones This technical bulletin provides detailed information on how the SIP application has been enhanced to support Secure Real-Time Transport
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification
TS 124 238 V8.2.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Session Initiation Protocol (SIP) based user configuration; Stage 3 (3GPP TS 24.238 version 8.2.0
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Security in VoIP Systems
Security in VoIP Systems Eric Rescorla RTFM, Inc. [email protected] Eric Rescorla Security in VoIP Systems 1 Background: the PSTN POTS Subscriber Cell Subscriber Cell To wer POTS Subscriber POTS Subscriber
SIP Introduction. Jan Janak
SIP Introduction Jan Janak SIP Introduction by Jan Janak Copyright 2003 FhG FOKUS A brief overview of SIP describing all important aspects of the Session Initiation Protocol. Table of Contents 1. SIP Introduction...
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
How To Write A Sip Message On A Microsoft Ipa (Sip) On A Pcode (Siph) On An Ipa Or Ipa On A Ipa 2 (Sips) On Pcode On A Webmail (
Network Working Group J. Rosenberg/H. Schulzrinne/G. Camarillo/A. Johnston/J. Peterson/R. Sparks/M. Handley/E. Schooler Request for Comments: 3261 dynamicsoft/columbia U./Ericsson/Worldcom/Neustar/dynamicsoft/ICIR/AT&T
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
SIPping from the Open Source Well. Matthew Bynum UC Architect
SIPping from the Open Source Well Matthew Bynum UC Architect A little about me Matthew Bynum Dabbler in Unified Communications for 12 years CCIE Voice #21753 Installed my first Linux distro at age 17 (RedHat
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
The Authentication and Processing Performance of Session Initiation Protocol (SIP) Based Multi-party Secure Closed Conference System
The Authentication and Processing Performance of Session Initiation Protocol () Based Multi-party Secure Closed Conference System Jongkyung Kim 1, Hyuncheol Kim 1, Seongjin Ahn 2, and Jinwook Chung 1 1
ETSI TS 124 390 V11.0.0 (2012-10)
TS 124 390 V11.0.0 (2012-10) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Unstructured Supplementary Service Data (USSD) using IP Multimedia (IM) Core Network (CN) subsystem
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers
Optimizing SIP Application Layer Mobility over IPv6 Using Layer 2 Triggers Emil Ivov Network Research Team Louis Pasteur University / LSIIT Illkirch, Strasbourg [email protected] Thomas Noël
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling
Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling Jethro Beekman Christopher Thompson Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2013-18
Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist [email protected]. David Schwartz Director, Telephony Research davids@deltathree.
Baruch Sterman, Ph.D. Chief Scientist [email protected] David Schwartz Director, Telephony Research [email protected] Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted
Introduction to VOIP Security OWASP. The OWASP Foundation. Angad Singh and Rohit Shah [email protected] [email protected].
Introduction to VOIP Security Angad Singh and Rohit Shah [email protected] [email protected] 30-October-2010 Copyright The Foundation Permission is granted to copy, distribute and/or modify this
