SIP Security. Andreas Steffen, Daniel Kaufmann, Andreas Stricker
|
|
|
- Melanie Bridges
- 10 years ago
- Views:
Transcription
1 SIP Security Andreas Steffen, Daniel Kaufmann, Andreas Stricker Security Group Zürcher Hochschule Winterthur CH-8401 Winterthur Abstract: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Currently the human-readable Session Initiation Protocol (SIP) which is based on a simple HTTP-like request/response exchange is steadily gaining headway against the considerably more complex ASN.1 encoded H.323 Multimedia ITU-T standard introduced by the telecom industry some years ago. Unfortunately little attention has been given to the security aspects involved in running a phone connection over the public Internet. This paper gives a comparative overview over the security mechanisms recommended by the SIP standard and presents a practical SIP implementation realized at the Zürcher Hochschule Winterthur (ZHW), based on S/MIME authentication and encryption of the session initiation and ensuing protection of the media channels using the Secure Real-time Transport Protocol (SRTP). 1 The Session Inititation Protocol (SIP) Due to its simple and fast session setup mechanism, the Session Initiation Protocol (SIP) [Ro02] has quickly made large inroads into the Voice-over-IP (VoIP) market previously dominated by implementations adhering to the rather complex H.323 ITU-T Internet telephony standard. Whereas H.323 is closely modelling a traditional ISDN Layer 3 call set-up and uses ASN.1-coded binary messages for signalling, SIP is based on an HTTPlike request/response transaction model using human-readable ASCII messages with a syntax nearly identical to HTTP/1.1 [Fi99]. Figure 10 depicts an example of a SIP IN- VITE request which includes all necessary information required to set up an audio connection. 1.1 Example SIP Session Figure 1 shows a typical SIP message exchange scenario between two users Alice and Bob belonging to the domains atlanta.com and biloxi.com, respectively. SIP user identification is based on a special type of Uniform Resource Identifier (URI) called a SIP URI with a form similar to an address. In our example Alice s SIP URI is assumed to be sip:[email protected] and Bob s sip:[email protected]. Published in E-Science und Grid, Ad-hoc-Netze, Medienintegration 18. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Jan von Knop, Wilhelm Haverkamp, Eike Jessen (Editors), GI-Edition - Lecture Notes in Informatics P-55, Bonner Köllen Verlag 2004, pp Copyright 2004 Gesellschaft für Informatik e.v. (GI), Ahrstrasse 45, D Bonn.
2 atlanta.com biloxi.com User Agent Proxy Proxy UA INVITE F1 INVITE F2 100 Trying F3 INVITE F4 100 Trying F5 180 Ringing F6 180 Ringing F7 180 Ringing F8 200 OK F9 200 OK F OK F11 ACK F12 Media Session BYE F OK F14 Figure 1: Session Initiation between two User Agents In order to establish a multimedia connection over the Internet between Alice s and Bob s User Agents (UAs) which can be either hardware SIP phones or PC based softphones, Bob s SIP URI must first be resolved into the IP address of the UA under which Bob is currently registered. SIP address resolution and routing is usually not done by the UA itself but delegated to the proxy server responsible for the domain the UA is attached to. In our example the atlanta.com proxy will make a DNS lookup to determine the proxy server of the biloxi.com domain on behalf of Alice s user agent. The SIP INVITE request originating from Alice s UA is then forwarded via the atlanta.com proxy to the biloxi.com proxy which with the help of a location service determines the current whereabouts of Bob s user agent. Both the informational Ringing message and the OK message which is issued when Bob accepts the call, take the return path via the proxy server hops whereas the ACK message and the payload packets of the ensuing multimedia session will use the direct path between the two user agents. 1.2 The SIP Trapezoid Thus the typical message flow during a SIP session takes on the form of a trapezoid as shown in Figure 2. From the point of view of network security this means that both the individual hops must be secured on a hop-by-hop basis as well as the direct path between the user agents. SIP session management messages are usually embedded into UDP datagrams but can also be transported over a TCP stream if the SIP message size comes within the physical medium s Maximum Transmission Unit (MTU) or if the underlying security mechanism requires a TCP connection. On the other hand the Real-time Transport Protocol (RTP) [Sch03] employed in media sessions exclusively uses non-reliable UDP datagrams to transport real-time audio and video packets over the Internet. 2
3 Proxy Proxy Hop 2 Hop 1 atlanta.com biloxi.com Hop 3 UA sip:[email protected] Direct path Media stream UA sip:[email protected] tcp/sip or udp/sip Session Management udp/rtp Media Streams Figure 2: Basic SIP trapezoid This means that any security mechanism employed to encrypt and authenticate multimedia streams must support UDP as a transport protocol. This requirement excludes certain security popular solutions like e.g. TCP based Transport Layer Security (TLS) [DA99]. The following chapter will give an overview on the choice of security mechanisms that can be selected to ensure data integrity and confidentiality for both the SIP based session management and the real-time transmission of multimedia payloads. 2 Security Mechanisms 2.1 Securing the SIP Session Management Since the SIP message structure is a straight derivation from the HTTP request/response model, all security mechanisms available for HTTP [Fr99] can also be applied to SIP sessions. On the other hand the use of MIME containers within SIP messages suggests the potential use of security mechanisms like PGP [El96] or S/MIME [Ra99]. And of course similar to a https: URI, a corresponding sips: URI will try to build up a secure transport layer tunnel using TLS [DA99]. And last but not least IP security (IPsec) [KA98] can be used as a general purpose mechanism to encrypt all IP based communication right on the network layer. The major security mechanisms suited for the protection of a SIP session are shown in Figure 3. They coincide with the list of methods recommended by version 1 of the SIP standard [Ha99]. In the meantime two of the methods, namely HTTP basic authentication and PGP have been deprecated by version 2 of the Session Initiation Protocol [Ro02]. The pros and cons of the individual approaches were examined in detail by [KS03]. In this paper we will just give a concise summary of the findings. 3
4 Authentication methods: PSK Pre-Shared Keys PKI Public Key Infrastructure Authentication Data Integrity Confidentiality HTTP 1.0 Basic Authentication PSK - - HTTP 1.1 Digest Authentication PSK - - Deprecated by SIPv2 Insecure transmission of password Challenge/response exchange based on MD5 hash of [strong] password Pretty Good Privacy (PGP) PKI Deprecated by SIPv2 Secure MIME (S/MIME) PKI For encryption the public key of the recipient user agent must be known SIPS URI (TLS) PKI SIP application and proxies must tightly integrate TLS IP Security (IPsec) PKI Integration with SIP application not required but proxies must be trusted Figure 3: Solutions for securing the SIP session management HTTP Basic Authentication HTTP basic authentication [Fr99] requires the transmission of a username and a matching password embedded in the header of a HTTP request. Included in a SIP request this user information could be used by a SIP proxy server or destination user agent to authenticate a SIP client or the previous SIP hop in a proxy chain. Because the cleartext password can be easily sniffed and therefore poses a serious security risk, the use of HTTP basic authentication has been deprecated by SIPv2. HTTP Digest Authentication HTTP digest authentication [Fr99] improves on the deficiencies of the HTTP basic authentication approach by transmitting an MD5 or SHA-1 digest of both the secret password and a random challenge string in place of the vulnerable password itself. More details on the digest challenge/response protocol plus some example messages can be found in chapter 4. Although HTTP digest authentication has the advantage that the identity of the user can be established without the need to transmit passwords in the clear, the procedure can still become easy prey to off-line dictionary attacks based on intercepted hash values if short or weak passwords are used. Another big disadvantage is the lack of an encryption mechanism to ensure confidentiality. Neither can the integrity of the SIP messages be guaranteed. Pretty Good Privacy (PGP) Pretty Good Privacy [El96] could be potentially used to authenticate and optionally encrypt MIME payloads contained in SIP messages but version 2 of SIP has deprecated the use of PGP in favour of S/MIME. 4
5 Secure MIME (S/MIME) SIP messages carry MIME bodies and the MIME standard includes mechanisms for securing MIME contents to ensure both integrity and confidentiality by means of the multipart/signed and application/pkcs7-mime MIME types, see [Ga95, Ho99, Ra99]. X.509 certificates are used to identify the end users on the basis of their addresses which are part of the SIP URI (in our example and respectively). The signing of MIME bodies is the lesser problem since each user is in possession of her private key and the user certificate may be forwarded to the recipient embedded into the pkcs7-mime or pkcs7-signature attachments [Ka98]. On the other hand the encryption of MIME bodies, e.g. the Session Description Protocol (SDP) payload [HJ98] requires the foreknowledge of the recipient s public key. This key, usually certified by X.509 certificate must either be pre-fetched from a public directory or may be requested from the peer via a special SIP message. S/MIME based protection is treated in more depth in chapter 5. Any mechanisms depending on the existence of end-user certificates are seriously limited in that there is virtually no consolidated authority today that provides certificates for end-user applications on a global scale. Because self-signed certificates are prone to man-in-the-middle attacks, either certificates from known public certification authorities (CAs) should be used or private CAs must be mutually recognized. SIPS URI (TLS) The use of a SIPS URI of the form sips:bob.biloxy.com in an INVITE message requires that TLS must be used on the whole path to the destination. Since each hop may add route information to the SIP message header, TLS protection must be realized on a hopby-hop basis on each segment of the path. The use of TLS requires the use of TCP as a transport protocol (tcp/sip) and necessitates a public key infrastructure. IP Security (IPsec) IPsec is a general purpose mechanism that can be used to protect the SIP messages right on the network level. Due to the requirement that each proxy server on the path must have read/write access to the SIP header, IPsec ESP (Encapsulating Security Payload) or AH (Authentication Header) in transport mode [KA98] must be applied on a hop-by-hop basis. The necessary IPsec security associations can either be established on a permanent basis without active involvement of the SIP user agents using the connections or might be set up on the fly by the UAs and proxy servers themselves by tight interaction with the underlying IPsec stack. The Internet Key Exchange (IKE) protocol [HC98] which is used to set up IPsec security associations supports both Pre-Shared Key (PSK) and Public Key (PKI) based authentication. Because the IP addresses of the SIP user agents will be mostly dynamic and taking into account that IKE Main Mode in that case does not work with pre-shared secrets and that IKE Aggressive Mode is fraught with security problems (man-in-the-middle attacks, off-line dictionary attacks on the PSK, etc.), public key based authentication will be the preferred method. This means that the establishment of global trust into X.509 certificates becomes again the major problem. 5
6 2.2 Securing the Real-time Media Streams Multimedia streams are packet-oriented and are transported using the unreliable UDP based Real-time Transport Protocol (RTP) [Sch03]. In order to have some feedback about the quality of the received packet stream, the peer periodically sends back a report using the companion Real-time Transport Control Protocol (RTCP). Since live audio and video connections are very sensitive to both absolute time delay and large delay variations (jitter), any packet encryption and authentication algorithm should not significantly influence these parameters. Due to these real-time restraints and the prerequisite that the transmission must be UDP based, only the two security mechanisms listed in Figure 4 are currently available. Authentication methods: PSK Pre-Shared Keys PKI Public Key Infrastructure Authentication Data Integrity Confidentiality Secure RTP (SRTP) PSK Uses master key which must be distributed by other means IP Security (IPsec) PKI Integration with SIP application not required but peer must be trusted Figure 4: Solutions for securing the real-time media streams Secure RTP (SRTP) The Secure Real-time Transport Protocol (SRTP) [Ba04] is an extension to the RTP Audio/Video profile [SC03] and provides confidentiality, message authentication, and replay protection to the RTP and RTCP traffic. The use of the cryptographically powerful but computationally efficient AES cipher running in stream cipher mode guarantees strong security but does not increase the size of the encrypted payload. The authentication tag required for data integrity adds 10 bytes to each RTP/RTCP packet but could be weakened to 4 bytes if a very narrow-band communications channel is being used. More in-depth information on SRTP will be presented in the next chapter. IP Security (IPsec) As an alternative the real-time payloads can be protected right on the network layer by IPsec transport mode, using the same security association already negotiated to protect the SIP message exchange between the user agents. A serious drawback might be the large overhead incurred by the ESP encapsulation which in the worst case amounts to 37 bytes per IPsec packet for 3DES encryption (8 bytes ESP header, 8 bytes IV, 2-9 bytes ESP trailer, and 12 bytes HMAC) and up to 53 bytes for AES encryption (8 bytes ESP header, 16 bytes AES IV, 2-17 bytes ESP trailer, and 12 bytes HMAC). E.g. if an ITU-T G.711 A-law or µ-law audio codec is used which generates an 8 bit speech sample every 125 µs and 10 ms of uncompressed speech is mapped as 80 contiguous samples into a single RTP packet then the IPsec overhead is still between %. 6
7 3 The Secure Real-Time Transport Protocol (SRTP) Both RTP and RTCP packets can be cryptographically secured by the Secure Real-time Transport Protocol (SRTP) and the companion Secure Real-time Transport Control Protocol (SRTCP), respectively [Ba04]. This chapter gives the details on the message formats and sheds some light on session key generation and master key distribution. 3.1 The Secure RTP Packet Format encrypted V P X CC M PT sequence number timestamp synchronization source (SSRC) identifier contributing source (CSRC) identifiers... RTP header extension (optional) RTP payload RTP padding RTP pad count SRTP master key identifier (MKI, optional) authentication tag (recommended)... authenticated Figure 5: Secure RTP packet format The SRTP message format is shown in Figure 5. As can be seen, only the RTP payload body (including any RTP padding if present) is encrypted. Since all currently defined encryption transforms do not add any padding, the size of the RTP payload is not increased by encryption. The Master Key Identifier (MKI) field is optional and identifies the master key from which the session keys were derived. The MKI can be used by the receiver to retrieve the correct master key when the need for a re-keying event comes up. The 16 bit sequence number already present in the RTP packet is used together with a 32 bit rollover counter (ROC) which is part of the cryptographic context for the SRTP session to prevent replay attacks. The authentication tag is a cryptographic checksum computed over both the header and body of the RTP packet. Its use is strongly recommended since it protects the packets from unauthorized modification. The default tag length is 10 bytes but might be reduced if the transmission channel does not allow such a large increase of the RTP packet size. 7
8 3.2 The Secure RTCP Packet Format encrypted V E P X RC M PT=RR length SSRC of packet sender sender info... report block 1... report block SRTCP index SRTCP master key identifier (MKI, optional) authentication tag... authenticated Figure 6: Secure RTCP packet format Figure 6 shows that the RTP control packets are secured in a similar way as the RTP packets themselves, one difference being that the use of the authentication tag is mandatory. Otherwise it would be possible for a malevolent attacker e.g. to terminate an RTP media stream by sending a BYE packet. An additional field is the SRTCP index which used as a sequence counter preventing replay-attacks. The MSB of the index field is used as an Encryption flag (E) which is set if the RTCP body is encrypted. 3.3 Default Encryption Algorithms In principle any encryption scheme can be used with SRTP. As default algorithms the NULL cipher (no confidentiality) and the Advanced Encryption Standard in Counter Mode (AES-CTR) are defined. The AES-CTR encryption setup is shown in Figure bits IV IV = f(salt_key, SSRC, packet index) 112 bits 128 bits encr_key keystream generator AES-CTR XOR RTP/RTCP payload + encrypted payload Figure 7: Encryption using AES in counter mode. 8
9 AES in counter mode acts as a keystream generator producing a pseudo-random keystream of arbitrary length that is applied in a bit-wise fashion to the RTP/RTCP payload by means of a logical XOR function, thus working as a classical stream cipher. AES itself is a block cipher with a block size of 128 bits and a key size of 128, 192, or 256 bits. In order to work as a pseudo-random generator AES is loaded at the start of each RTP/RTCP packet with a distinct initialisation vector (IV) that is derived by hashing a 112 bit salt_key, the synchronisation source identifier (SSRC) of the media stream, and the packet index. Encrypting this IV results in an output of 128 pseudo-random bits. Next the IV is incremented by one and again encrypted, thus generating the next 128 bits of the keystream. By counting the IV up by increments of one as many keystream blocks can be generated as are required to encrypt the whole RTP/RTPC payload. Any remaining bits from the last keystream block are simply discarded. AES used in counter mode instead of the more common cipher block chaining mode (CBC) has the big advantage that the keystream can be precomputed before the payload becomes available thus minimizing the delay introduced by encryption. And of course by using a stream cipher instead of block cipher there is no need to pad the payload up to a multiple of the block size which would add 15 overhead bytes to the RTP/RTCP packet in the worst case. 3.4 Default Authentication Algorithm RTP/RTCP payload HMAC 160 bits auth_key SHA-1 auth tag 80/32 bits Figure 8: Authentication using HMAC-SHA-1 The default SRTP message authentication algorithm is HMAC-SHA-1 [KBC97], based on the popular 160 bit SHA-1 hash function. Cryptographical security is achieved by hashing a 160 bit secret auth_key into the checksum which is then truncated to 80 bits in order to reduce the packet overhead and which has the further advantage that it hides the complete internal state of the hash function. In applications where transmission bandwidth is a problem the authentication tag might be weakened to 32 bits. 3.5 Session Key Derivation The encryption and authentication algorithms described in sections 3.3 and 3.4 both require secret symmetric session keys that must be known to all user agents participating in a SIP session. This raises the logistical problem of session key generation and distribution. The SRTP standard offers a partial solution by deriving all needed session keys from a common master key but leaves open the distribution of the master key itself. 9
10 Figure 9 shows how the session keys are computed starting out from a single master key. Again the AES block cipher is used in counter mode to generate the necessary keying material. The master key which can have a size of 128, 192, or 256 bits plays the role of the AES encryption key. The pseudo-random generator is loaded with an IV that is itself a function of a 112 bit master_salt value, a one byte label and a session key number. By applying the labels 0x00 up to 0x05, encryption, authentication and salting keys for both SRTP and SRTCP are derived from the same master key. If a key derivation rate has been defined then every time a number of packets equivalent to the key derivation rate have been sent, a new set of either SRTP or SRTCP session keys are computed. If the key derivation rate is set to zero then the same set of keys is used for the whole duration of the session. master_key 128 bits 192 bits 256 bits 128 bits IV IV = f(master_salt, label, packet index) 112 bits div label key derivation rate 0x00 encr_key 128 bits SRTP session 0x01 auth_key 160 bits keys 0x02 salt_key 112 bits key derivation AES-CTR 0x03 encr_key 128 bits SRTCP session 0x04 auth_key 160 bits keys 0x05 salt_key 112 bits Figure 9: Session key derivation 3.6 Master Key Distribution We turn now to the crucial issue of distributing the master key to the user agents as part of the session initiation. An approach proposed by [Ba04] is to use Multimedia Internet KEYing (MIKEY) [Ar03] to establish the cryptographic SRTP context. MIKEY is a new general key exchange protocol similar to IPsec s Internet Key Exchange (IKE) [HC98] but tailored to the specific demands of a multimedia environment. Unfortunately, since no reference implementation is readily available, the use of MIKEY is not an option yet. As a workaround the k key parameter defined by the Session Description Protocol (SDP) [HJ98] could be used to transfer the master key. Figure 10 shows a typical SIP INVITE message that carries all parameters needed to set up a multimedia session embedded in an application/sdp MIME body. 10
11 INVITE INVITE SIP/2.0 SIP/2.0 Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob From: From: Alice Alice Call-ID: Call-ID: CSeq: CSeq: 1 INVITE INVITE Max-Forwards: Max-Forwards: Contact: Contact: <sip:[email protected]:5060> Content-Type: Content-Type: application/sdp application/sdp Content-Length: Content-Length: v=0 v=0 o=alice o=alice IN IN IP4 IP s=da s=da SIP SIP Security Security c=in c=in IP4 IP t=0 t=0 0 k=clear:910bc4defa71eb fca6ae2f1d959e87cdf3c0c5c5076ad38ee8 k=clear:910bc4defa71eb fca6ae2f1d959e87cdf3c0c5c5076ad38ee8 m=audio m=audio RTP/AVP RTP/AVP 0 a=ptime:20 a=ptime:20 a=rtpmap:0 a=rtpmap:0 PCMU/8000 PCMU/8000 Figure 10: SIP INVITE request carrying an SDP MIME body In the example shown above the k parameter defines an 128 bit SRTP master key in hexadecimal notation. Of course a cleartext transmission of the master key would pose a severe security risk. Under the assumption that the proxy servers can be trusted the complete SIP INVITE could be encrypted on a hop-by-hop basis using either TLS or IPsec. If end-to-end confidentiality of the SDP MIME body is desired then S/MIME protection as described in chapter 5 should be used as an alternative. 4 HTTP Digest Authentication This chapter shows how a SIP INVITE request originating from the alleged user Alice is authenticated by the first hop proxy server using HTTP Digest Authentication [Fr99]. SIP/2.0 SIP/ Proxy Proxy Authentication Required Required Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob <sip:[email protected]>;tag=3b6c2a3f From: From: Alice Alice <sip:[email protected]>;tag=daa21162 Call-ID: Call-ID: 392c3f2b568e92a8eb37d448886edd1a@ CSeq: CSeq: 1 INVITE INVITE Proxy-Authenticate: Proxy-Authenticate: Digest Digest algorithm=md5, algorithm=md5, nonce=" ", nonce=" ", realm="zhwin.ch" realm="zhwin.ch" Content-Length: Content-Length: 0 Figure 11: HTTP digest authentication challenge 11
12 The proxy server receiving the SIP INVITE message from Alice immediately replies with the challenge shown in Figure 11. The challenge contains a random nonce and defines the digest algorithm to be used (usually MD5 or SHA-1) as well as the realm for which the user must provide an authentication. Upon reception of the challenge Alice resends the original INVITE request but inserts the response to the challenge into the SIP message header as shown in Figure 12. The response value consists of the MD5 digest of the username, the secret password, the nonce value, the SIP method and the requested URI. Thus the password is not transmitted in the clear but must be known by the proxy server in order to be able to verify the authentication response. INVITE INVITE sip:[email protected] SIP/2.0 SIP/2.0 Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob <sip:[email protected]> From: From: Alice Alice <sip:[email protected]>;tag=daa21162 Call-ID: Call-ID: 392c3f2b568e92a8eb37d448886edd1a@ CSeq: CSeq: 2 INVITE INVITE Proxy-Authorization: Proxy-Authorization: Digest Digest algorithm=md5, algorithm=md5, nonce=" ", nonce=" ", realm="zhwin.ch", realm="zhwin.ch", response="142311a910a4d57ba49afdbe c", uri="sip:[email protected]", username="alice" Max-Forwards: Max-Forwards: Contact: Contact: <sip:[email protected]:5060> Content-Type: Content-Type: application/sdp Content-Length: <Session <Session Description Description Protocol Protocol not not shown> shown> Figure 12: HTTP digest authentication authenticated INVITE request 5 Secure MIME (S/MIME) S/MIME [Ra99] can be used to secure MIME bodies either on a hop-by-hop basis or end-to-end from user agent to user agent. Figure 13 shows how the SDP MIME attachment embedded in the SIP INVITE request of Figure 10 can be encrypted and signed using S/MIME. The application/pkcs7-mime binary envelopeddata structure encapsulates the symmetrically encrypted SDP payload and also contains the symmetric key which is encrypted with the public key of the recipient. In our example the encrypted payload is additionally signed using the multipart/signed method [Ga95]. The signature plus optionally the X.509 certificate of the signer is contained in the binary application/ pkcs7-signature structure which is attached after the MIME object to be signed. As an alternative a binary PKCS#7 signeddata structure [Ka98] could be used which transports both the data to be signed and the signature within a single attachment. 12
13 INVITE INVITE SIP/2.0 SIP/2.0 Via: Via: SIP/2.0/UDP SIP/2.0/UDP :5060;branch=z9hG4bK4129d28b :5060;branch=z9hG4bK4129d28b8904 To: To: Bob Bob From: From: Alice Alice Call-ID: Call-ID: CSeq: CSeq: 1 1 INVITE INVITE Max-Forwards: Max-Forwards: Contact: Contact: <sip:[email protected]:5060> <sip:[email protected]:5060> Content-Type: Content-Type: multipart/signed;boundary=992d915fef419824; multipart/signed;boundary=992d915fef419824; micalg=sha1;protocol=application/pkcs7-signature micalg=sha1;protocol=application/pkcs7-signature Content-Length: Content-Length: d915fef d915fef Content-Type: Content-Type: application/pkcs7-mime; application/pkcs7-mime; smime-type=envelopeddata; smime-type=envelopeddata; name=smime.p7m name=smime.p7m Content-Disposition: Content-Disposition: attachment;handling=required;filename=smime.p7m attachment;handling=required;filename=smime.p7m Content-Transfer-Encoding: Content-Transfer-Encoding: binary binary <envelopeddata <envelopeddata object object encapsulating encapsulating encrypted encrypted SDP SDP attachment attachment not not shown> shown> --992d915fef d915fef Content-Type: Content-Type: application/pkcs7-signature;name=smime.p7s application/pkcs7-signature;name=smime.p7s Content-Disposition: Content-Disposition: attachment;handling=required;filename=smime.p7s attachment;handling=required;filename=smime.p7s Content-Transfer-Encoding: Content-Transfer-Encoding: binary binary <signeddata <signeddata object object containing containing signature signature not not shown> shown> --992d915fef d915fef Figure 13: S/MIME encrypted and authenticated SDP MIME attachment 6. Practical Results Three students of the Zurich University of Applied Sciences in Winterthur, Switzerland wrote a simple SIPsec user agent for the Linux operating system as part of their diploma thesis [GLS03]. They based their client on the resiprocate SIPv2 stack available from which already integrates some basic S/MIME support by making use of the popular OpenSSL cryptographic library. They added C++ code of their own which automatically generates a random SRTP master key and transmits it embedded in an encrypted SDP MIME body. The X.509 certificates required for the S/MIME encryption and authentication operations were created with TinyCA from tinyca.sm-zone.net. This Public Key Infrastructure (PKI) tool presents itself with a comfortable GUI that hides the rather scary OpenSSL command line interface. For the secure transport of RTP media streams and the corresponding RTCP control streams the libsrtp library from srtp.sourceforge.net was used. The current release of the library supports 128 bit AES counter mode encryption and HMAC-SHA-1 authentication but does not yet implement re-keying by defining a key derivation rate different from zero, nor does it support the inclusion of the Master Key Index (MKI) field in SRTP or SRCTP messages. 13
14 7. Conclusions The diploma thesis [GLS03] showed as a proof-of-concept that S/MIME encryption and authentication of SDP MIME attachment works and can be used to securely transfer a SRTP master key which can then be used to protect the RTP media streams. Therefore because of the possibility of end-to-end encryption the use of S/MIME in SIP messages is an attractive alternative to the hop-by-hop security offered by TLS. At the current time, similar to S/MIME protected , the establishment of trust into peer certificates on a global scale remains one of the open problems yet to be solved. Bibliography [Ar03] Arkko, J. et.al.: MIKEY: Multimedia Internet KEYing. IETF Internet Draft <draft-ietfmsec-mikey-08.txt>, [Ba04] Baugher, M. et.al.: The Secure Real-Time Transport Protocol (SRTP). IETF RFC 3711, [DA99] Dierks, T.; Allen, C.: The TLS Protocol Version 1.0, IETF RFC 2246, [El96] Elkins, M.: MIME Security with Pretty Good Privacy (PGP), IETF RFC 2015, 1996 [Fi99] Fielding, R. et al.: Hypertext Transfer Protocol - HTTP/1.1, IETF RFC 2616, [Fr99] Franks, J. et. al.: HTTP authentication: Basic and Digest Access Authentication", IETF RFC 2617, [Ga95] Galvin, J. et al.: Security Multiparts for MIME: Multipart/Signed and Multipart/ Encrypted, IETF RFC 1847, [GLS03] Gisler, A.; Loretz. M.; Stricker, A.: SIP Security, Diplomarbeit, Zürcher Hochschule Winterthur, [Ha99] Handley, M. et. al.: SIP : Session Initiation Protocol Version 1, IETF RFC 2543, [HC98] Harkins, D.; Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409, 1998 [HJ98] Handley, M.; Jacobson, V.: SDP: Session Description Protocol, IETF RFC 2327, [Ho99] Housley, R.: Cryptographic Message Syntax, IETF RFC 2630, [KA98] Kent, S.; Atkinson, R.: Security Architecture for the Internet Protocol, IETF RFC 2401, [Ka98] Kaliski, B.: PKCS #7: Cryptographic Message Syntax Version 1.5, IETF RFC 2315, [KBC97] Krawczyk, H.; Bellare, M,; Canetti, R.; HMAC: Key-Hashing for Message Authentication, IETF RFC 2104, [KS03] Kaufmann, D.; Stricker, A.: SIP Security, Projektarbeit, Zürcher Hochschule Winterthur, [Ra99] Ramsdell B.: S/MIME Version 3 Message Specification, IETF RFC 2633, [Ro02] Rosenberg, J. et.al.: SIP: Session Initiation Protocol Version 2. IETF RFC 3261, [Sch03] Schulzrinne, H. et.al.: RTP: A Transport Protocol for Real-Time Applications. IETF RFC 3550, [SC03] Schulzrinne, H.; Casner, S.: RTP Profile for Audio and Video Conferences with Minimal Control. IETF RFC 3551,
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
An Introduction to. Voice over IP Security
An Introduction to Voice over IP Security July 2006 [email protected] 1. April 2006 Holger Zuleger 1/18 > c What is meant by secur ity? Preface Not address or topology hiding Not (D)DoS prevention
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
IP-Telephony Real-Time & Multimedia Protocols
IP-Telephony Real-Time & Multimedia Protocols Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Media Transport RTP Stream Control RTCP RTSP Stream Description SDP 2 Real-Time Protocol
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic
TraceSim 3.0: Advanced Measurement Functionality for Secure VoIP Networks and Simulation of Video over IP No part of this brochure may be copied or published by means of printing, photocopying, microfilm
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Internet Services & Protocols Multimedia Applications, Voice over IP
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Multimedia Applications, Voice over IP Dipl.-Inform. Stephan Groß Room: GRU314
VoIP Security. Piero Fontanini
Piero Fontanini Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College, 2008 Avdeling for informatikk og medieteknikk
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
TSIN02 - Internetworking
TSIN02 - Internetworking Lecture 9: SIP and H323 Literature: Understand the basics of SIP and it's architecture Understand H.323 and how it compares to SIP Understand MGCP (MEGACO/H.248) SIP: Protocol
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Voice over IP (VoIP) Part 2
Kommunikationssysteme (KSy) - Block 5 Voice over IP (VoIP) Part 2 Dr. Andreas Steffen 1999-2001 A. Steffen, 10.12.2001, KSy_VoIP_2.ppt 1 H.323 Network Components Terminals, gatekeepers, gateways, multipoint
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
A Review of Secure Real-Time Transport Protocol
SECURING REAL-TIME MULTIMEDIA: A BRIEF SURVEY Bradley Clayton, Barry Irwin, Alfredo Terzoli Computer Science Department Rhodes University Grahamstown [email protected], [email protected] [email protected]
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
159.334 Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)
Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Basic IP phone set up The SIP protocol Computer Networks - 1/2 Learning Objectives
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
Identity based Authentication in Session Initiation. Session Initiation Protocol
Identity based Authentication in Session Initiation by Harsh Kupwade Southern Methodist University Dean Willis Softarmor LLC Thomas M. Chen Swansea University Nhut Nguyen Samsung Telecommunications 1 Session
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
EDA095 Audio and Video Streaming
EDA095 Audio and Video Streaming Pierre Nugues Lund University http://cs.lth.se/pierre_nugues/ April 22, 2015 Pierre Nugues EDA095 Audio and Video Streaming April 22, 2015 1 / 35 What is Streaming Streaming
VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS
VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS Master of Science in Networking and Data Communications THESIS Thesis Title Voice over IP (VoIP) to Enterprise Users Dissertation submitted
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Enabling Security Features in Firmware DGW v2.0 June 22, 2011
Enabling Security Features in Firmware DGW v2.0 June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope... 3 Acronyms and Definitions... 3 Setup Description... 3 Basics of Security Exchanges...
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks
Voice over IP Introduction VoIP Voice over IP The use of IP networks, namely the LAN and WAN, to carry voice Voice was originally carried over circuit switched networks PSTN (Public Switch Telephone Network)
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
AV@ANZA Formación en Tecnologías Avanzadas
SISTEMAS DE SEÑALIZACION SIP I & II (@-SIP1&2) Contenido 1. Why SIP? Gain an understanding of why SIP is a valuable protocol despite competing technologies like ISDN, SS7, H.323, MEGACO, SGCP, MGCP, and
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Multimedia Conferencing with SIP
Multimedia Conferencing with SIP Signalling Demands in Real-Time Systems Multimedia Networking: Protocol Suite Conferencing: VoIP & VCoIP SIP SDP/SAP/IMG Signalling Demands Media Types can be signalled
A Peer-to-peer Secure VoIP Architecture
A Peer-to-peer Secure VoIP Architecture Simone Cirani, Riccardo Pecori, and Luca Veltri Abstract Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
SIP Introduction. Jan Janak
SIP Introduction Jan Janak SIP Introduction by Jan Janak Copyright 2003 FhG FOKUS A brief overview of SIP describing all important aspects of the Session Initiation Protocol. Table of Contents 1. SIP Introduction...
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
SIP for Voice, Video and Instant Messaging
James Polk 20050503 SIP for Voice, Video and Instant Messaging James Polk 20050503 Faisal Chaudhry [email protected] Technical Leader Cisco Advanced Services Cisco Systems, Inc. All rights reserved. 1
