Today s challenges in Lawful Interception. C. Rogialli, October 11, 2005 RIPE MEETING 51 - Amsterdam



Similar documents
Network Services Internet VPN

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Introducing STAR-GATE Enhancements for Packet Cable Networks

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Deploying Media Probes in Evolving VoIP Networks

Brocade Telemetry Solutions

Signaling System 7 (SS7) Gateway Solution for Internet Access

NGN Interconnection Standards & Protocols

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Chapter 5. Data Communication And Internet Technology

How To Set Up A Net Integration Firewall

EAGLE EYE IP TAP. 1. Introduction

Security Technology: Firewalls and VPNs

ZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:

Network Overview. Background Traditional PSTN Equipment CHAPTER

Secured Voice over VPN Tunnel and QoS. Feature Paper

Simple Law Enforcement Monitoring

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

Application Note - Using Tenor behind a Firewall/NAT

GPRS / 3G Services: VPN solutions supported

Technology Brief. Implementing DSL Service for ISPs with the SMS. The DSL Opportunity. DSL is Different from Dial

VPN. Date: 4/15/2004 By: Heena Patel

ETSI & Lawful Interception of IP Traffic

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Wholesale IP Bitstream on a Cable HFC infrastructure

VoIP Bandwidth Considerations - design decisions

Intranet Security Solution

WAN Failover Scenarios Using Digi Wireless WAN Routers

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Technical Glossary from Frontier

com.sat IP Basic ISDN

Lawful Interception in P2Pbased

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

WAN Data Link Protocols

Broadband Phone Gateway BPG510 Technical Users Guide

Wireless DSL in Action The Advantage of WiMAX based wireless DSL for incumbent and competitive operators. White Paper

BT Remote Internet. Internet Teleworker. Customer Service Description. June 04. Issue 1. Internet Teleworker Customer Service Description.

IPv6 Migration Challenges for Large Service Providers

Chapter 2 - The TCP/IP and OSI Networking Models

Mobility and cellular networks

This course has been retired. View the schedule of current <a href=

ICTNPL5071A Develop planning strategies for core network design

Firewalls. Network Security. Firewalls Defined. Firewalls

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

AP200 VoIP Gateway Series Design Features & Concept AddPac R&D Center

Integrate VoIP with your existing network

White paper. Reliable and Scalable TETRA networks

Protocols. Packets. What's in an IP packet

Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks

Load Balance Mechanism

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

VoIP in the Enterprise

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Address Resolution Protocol (ARP)

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Understand Wide Area Networks (WANs)

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

ewon-vpn - User Guide Virtual Private Network by ewons

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Voice over Internet Protocol (VoIP) - An Introduction

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Hosted PBX Description General Info about Hosted PBX

Technical papers Virtual private networks

Lawful Interception of VoIP. Rudolf Winschuh Business Development Transaction Security / Telecommunications

Small Business Server Part 2

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

IVCi s IntelliNet SM Network

7.1. Remote Access Connection

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

No. 1 - The Simple Guide to SIP Trunking. City Lifeline Technology Briefing

6 Vital Questions To Ask Before You Buy A DECT For VoIP Phone System

Local Area Networks (LANs) Blueprint (May 2012 Release)

Session Border Controllers in Enterprise

L2F Case Study Overview

IP-based Delivery Network via OpenVPN Provider Handbook

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

GPRS and 3G Services: Connectivity Options

2- Technical Training (9 weeks) 3- Applied Project (3 weeks) 4- On Job Training (OJT) (4 weeks)

11/22/

Non-intrusive, complete network protocol decoding with plain mnemonics in English

Transcription:

Today s challenges in Lawful Interception C. Rogialli, October 11, 2005 RIPE MEETING 51 - Amsterdam 1

Lawful Interception a Definition Action (based on the law) performed by a network operator / access provider / service provider (NWO/AP/SvP), of making available certain information and providing that information to a law enforcement monitoring facility for investigation purposes. 2

Lawful Interception concept (1) Warrant NWO/AP/SvP Interception Provisioning PSTN Internet PLNM LEMF Assignment 3

Lawful Interception concept (2) NWO/AP/SvP Warrant PSTN PLNM Internet 4

Entities involved in Lawful Intercetion Government Operates in the interests of the nation; Sets the regulatory framework in which Lawful Interception is performed; Defines economical parameters for Lawful Interception activities. Operators Lawfully operate for the sake of their business and profit, almost totally driven by telecommunications; Withstand rules set by the government in terms of lawful interception as an unavoidable; Install proper devices to fulfil the relevant obligations; Law Enforcement Agencies Operate in the name of crime fighting and nation security; Request lawful interception and define the real targets; Receive the communication data extracted by the operators; Need proper devices to playback and decode the intercepted traffic. 5

A triviality TELecom Companies and Government agencies are NOT created equal! They have: Different Purposes Different Structure Different Knowledge Different Liabilities Different Activities Different Constraints So they need: but LI requires cooperation! Different Systems Different Approaches 6

Different Key Values For the government Agencies Overall solution effectiveness Return on investment (in investigative terms!) Adherence to existing operating procedures Low level of the technicalities to be handled Surgical precision For the Telecom operators Reliability Reduced maintenance and management hassles Low installation and running expenses Integration with the existing network Use of proven COTS hardware Possibility to document the obligation fulfilment 7

Lawful Interception Application fields User Government Agencies Voice Recorders, Decoders, Storage, Doc. production Data Recorders, Decoders, Storage, Doc. production Telco Voice Mediation Devices, SS7 probes Voice Mediation Devices, IP probes 8 Circuit Switched Technology Packet Switched

LI in Circuit Switched and Packet Switched Networks 9 (that is, why do we face different issues in the two worlds)

Once upon a time the mass telecommunications were only bound to the fixed PSTN network; no additional functionalities were provided by the handsets; the transport Network was unique in type and technology, it was based upon Circuit Switching, and the only type of payload transported was VOICE. In this fairy tales world, the interception: operated over a single network, with good-to-excellent results; had to deal with a single type of payload (typically ISDN voice over 64 kbps; due to the circuit switching technology, may e operated in any point of the network between the end points. PSTN/ISDN Network 10

then it was the turn of fax, modems and mobiles Fax and Modems still use analog modulation over the CS network in order to transport images, data and internet services. The mass interception was therefore still possible with CS methodologies, with the only complication of demodulation. PSTN/ISDN network Internet Service Provider Internet PLMN GSM cell GSM cell 11

and, suddenly, the security nightmare!!! A lot of mass telecommunication traffic today doesn t traverse ANY part of the well-controlled Circuit Switched network! IP multimedia traffic between GPRS/UMTS mobile phones; the traffic to and from Internet exchanged on high bandwitdh ISPs (ADSL, FTTH, cable ); Telephone traffic between two REAL VoIP connected to different VoIP operators. terminals, maybe PSTN/ISDN network VoIP operator Internet Service Provider 12 GSM/UMTS cell 2.5G / 3G Mobile operator Circuit S. Network IP Network Internet

Lawful interception compulsory services Depending on the local legislation, the Operator may be requested to provide: Interception based upon target identity It is requested to replicate ALL the traffic generated by a single, identifiable target among the multitude of users of the Operator itself. Investigative interception based upon parametric search It is requested massive filtering of the transported traffic in order to spot UNKNOWN users showing suspect behaviours (in example, exchanging mails containing specific keywords). Interception over Telecom operator s services It is requested to replicate IN CLEAR any transaction made by an user towards a Service exercised by the telecom. 13 Free access to the network It is requested to guarantee proper network access to black boxes owned by the law enforcement agencies themselves.

New issues connected with IP interception User Identification Whilst the correspondence between user credentials and user identity is rarely questioned in the Voice world, this is not necessarily true for the IP networks; Traffic dispersion The packet switching world poses new issues in terms of tapping points and capture efficiency; Mass cryptography In the IP world, cryptography is extensively used and at hand of everybody. 14

User Identification Issues Availability of reliable user information No more anonymous access to the network will be provided by world s telecom operators; Trusted identity systems Any mean shall be used to guarantee the correlation between user s credentials and the physical person accessing the network; Availability of the user parameters at the capture point 15 Any network feature hiding user s identity at the capture point (e.g. NAT) shall be taken into account and suitable workarounds for the authority shall be provided.

Traffic dispersion issues Arpanet was originally conceived in order to deploy a military network able to survive huge, nation-level disasters As a result, IP routing follows BY DESIGN several different routes even towards the same target address. 16 As a consequence, the tapping point is not at all indifferent to the Lawful Interception Activities!

17 Tappin around the net

E-mail Probing in the access network PSTN users ADSL users Corporate Users Last Mile PSTN PSTN DSLAM 1 Gb overall Traffic; LE ATM / IP WAN 2% is e-mail; = PRA 20 mb of packets to be deeply inspected RAS/NAS ATM/IP switch Mail Server POP Aggregation Router IP Backbone 18

E-mail Probing in the Central Office PSTN users ADSL users Corporate Users Last Mile PSTN PSTN DSLAM 1 Gb overall Traffic; 98% is e-mail; LE ATM / IP WAN = 980 mb of packets to be deeply inspected PRA (!!!) RAS/NAS ATM/IP switch Mail Server POP Aggregation Router IP Backbone 19

Mass Cryptography issues Over the PSTN network, communication encryption was at disposal of few users; moreover, the few devices available offered backdoors for the agencies; Over the internet, encryption is at disposal of EVERYBODY. Not in any case backdoors are available; Whilst the operator may not be held responsible for user-level encryption, it may as well be obliged to provide in-clear interception of the services offered by itself. 20

21 The ISP in front of the authority. Viable options for the IP LI.

In-Band and Out-Band interception In-band interception implies the use of IIF inplemented in the network devices; it can be succesfully used with any kind of interception based upon user identity: Circuit based traffic; Packet traffic over mobile networks (es. GPRS); Packet traffic over carrier-grade modern switches in ISPs. Out-band interception imples the use of network probes; it is the only key when: Parametric (keyword) interception is requested; The authority doesn t trust the operator itself or the operator s personnel in investigative matters. 22

Typical Out-band Interception 10/100 Ethernet IPP (1) Delivery Router Delivery NW IP-V PMS MD (2) PoP IPP Email Server Web Server FTP Server (3) 10/100 Ethernet IPP Core Network RP (2) RADIUS Server Server Farm PoP Interception of assigned IP Address Access NW POI killer Warrant LIID Protocol No. Reference LEA Interception Duration Interception Criteria Transit peer (username killer) 23

Typical Out-band Interception 10/100 Ethernet IPP Delivery Router Delivery NW IP-V PMS MD PoP IPP Email Server Web Server FTP Server 10/100 Ethernet IPP Core Network RP RADIUS Server Server Farm PoP Access NW POI killer Warrant LIID Protocol No. Reference LEA Interception Duration Interception Criteria Transit peer (username = killer) 24

Parametric Out-band Interception 10/100 Ethernet IPP (2) (1) Delivery Router Delivery NW IP-V PMS MD (2) PoP IPP (2) Email Server Web Server FTP Server 10/100 Ethernet IPP (2) Core Network RP RADIUS Server Server Farm PoP Access NW Warrant LIID Protocol No. Reference LEA Interception Duration Interception Criteria Transit peer (keyword = bomb) 25

Parametric Interception (Interception) 10/100 Ethernet IPP Delivery Router PMS MD ISDN/VPN VIP IP: 212.127.0.5 write bomb PoP IPP Email Server Web Server FTP Server 10/100 Ethernet IPP Core Network RP RADIUS Server Server Farm PoP PSTN / ISDN POI..I will place a bomb Warrant LIID Protocol No. Reference LEA Interception Duration Interception Criteria Transit peer 26 Username: tom IP: 212.127.0.5 (keyword = bomb)

Tactical probing vs. strategic interception (1) Tactical probes a definition: devices that are installed at operator s premises on a per need basis. 27 Some common sense assertions about Tactical probing devices: small stealthy easily movable typically operated by agencies personnel dedicated to a few specific interception tasks at a time totally extraneous respect to the hosting network by definition

Tactical probing vs. strategic interception (2) Strategic Interception a definition: An interception network permanently deployed at operator s premises to serve any present or future interception request. Some common sense assertions about Strategic probing devices: solid integrated permanently connected to the network typically maintained by telco personnel dedicated to a huge spread of interception tasks at a time may be integrated with the hosting network 28

A duofold option for the ISP 1. Open the door to Agencies for Tactical Activities as a pro, some responsibilities and costs are charged over the Agency rather than over the operator; as a drawback, the operator will need to support (eventually upon network reconfiguration) the agency s activities, on a per need basis! 2. Make Room for Strategic interception systems The operator will face some not recurring costs, only eventually covered by the governement; However, the impact over the network will be minimized. 29

An only thing is important JUST PUT THE RIGHT PROBE IN THE RIGHT ENVIRONMENT! 30

31 A Mixed Approach to LI

Classic approach general principles PSTN users ADSL users Corporate users Last Mile PSTN PSTN DSLAM IP over xxx SGU ATM / IP WAN Radius POP boundary PRA POP boundary Mediation Device (1x) C.O. boundary Radius Pb IP Probe IP Backbone POP Aggregation Router (32x) 32

Classic Approach PROs Extensive capture allows many forms of parametric interception (e.g. Keyword search or e-mail addresses); The solution is totally unobtrusive and is completely impactless on the network architecture; The solution functionalities may be extended to effective network traffic monitoring as an added value. 33

Classic Approach CONs many probes to be placed; large investment needed; a lot of space (with access control requirements) to be reserved in the POP; tapping may be a NIGHTMARE, but the use of span ports may impact network performance; distributed and secure network connectivity between system elements to be provided; Some peering traffic is lost (i.e., the peering traffic closing on the same BRAS). 34

Hijack approach general principles PSTN users ADSL users Corporate Users Last mile PSTN PSTN DSLAM IP over xxx POP boundary ATM / IP WAN C.O. boundary Mediation Device (1x) RAS/NAS ATM/IP switch LI POP Radius TT Radius Pb LI Config POP Aggregation Router IP Backbone IP Probe PPP tunnel 35 L2TP tunnel

Hijack Approach PROs few probes to be placed; low investment needed; Few space with access control requirements may be reserved anywhere in the network; tapping is quite simple; Reduced need of secure network connectivity between system elements; No peering traffic is lost. 36

Hijack Approach CONs The possibility of parametric interception are limited; The solution needs a slight network redesign; Not suitable for extensive traffic monitoring. 37

38 A Service Approach to LI

Service interception approach Any time the telco operator offers some services on its own, it may be obliged to intercept them. Examples are: VoIP services; FTP/mail/webmail services; Videocall over PSTN line; In ALL those cases, the operator will be asked to get rid of any interception aspect, including traffic encription! So the solution may lay in Service interception rather than transport interception. 39

Service interception an example Access Network Internet RAS Service Network Firewall E-mail MMS FTP Autentication 40

41 LI A flexible approach

A flexible LI architecture is the key The answer to operators interception needs cannot be a spot solution for a specific interception issue or a specific service but rather an extensive approach covering at least in perspective - all interception needs at a time. 42

IP Network Probing Different probing devices are at disposal of the Network Engineer, granting overall coverage of any IP LI needs: General-purpose IP Probes: IP probes performing parametric interception may be placed in front of a network server (e.g. e-mail); The interception is triggered basing upon service access, regardless the location of the network site accessing the batch service. IP probes performing typical interception may be used to capture generic IP transactions basing upon IP address, CLI, or keyword; A specific access probe may be needed to trigger the interception; Access (RADIUS) Probes: access probes are able to detect a known user accessing the network; they provide trigger to IP probes as well as access logging capabilities. 43

Mediation Device It is the central server performing LI information handover from the provider s domain to the LEA s domain. It allows for a simpler and centralised LI network management, whilst optimising network resources usage. It grants a superior level of control in IP LI activities. It may be extended to support further capture methodologies, both out-band and in-band. 44

Mediation Device flexible architecture GSM PSTN Voice IIFs VoIP IIFs GPRS/IP Switching IIFs IP Probes Switching Telephony Probes Ingress Interface Ix Ingress Interface Iy Ingress Interface Iz Ingress Interface In Ingress Interface Ik Ingress Adaptation Layer IRI (HI2) MEDIATION FUNCTION LIID / LEMF and Config. Database CC (HI3) MEDIATION Egress Normalization and Synchrinization Layer Egress Interface Ex Egress Interface Ey Egress Interface Ez Egress Interface En Egress Interface Ek Long Term Storage BroadBand IP LEMF IP over ISDN/PSTN LEMF Leased ISDN LEMF Leased PSTN LEMF 45

Provisioning and Maintenance System It is the central configuration device for the entire LI network. It allows the operation of the LI system using minimum personnel. By supporting different privilege levels, it is the natural Man-Machine Interface for: Maintenance Operators (alarms and devices mgmt); LEA Operators (Warrants mgmt); Billing Opertors (where applicable). 46

THANK YOU For any further info: Carlo Rogialli carlo.rogialli@rcslab.it 47