Attacking VoIP. Agenda. Walter Sprenger walter.sprenger@csnc.ch. 1. Introduction VoIP. 2. Sample Installations. 3. SIP / RTP - Protocols



Similar documents
An outline of the security threats that face SIP based VoIP and other real-time applications

Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5

How to make free phone calls and influence people by the grugq

SIP Essentials Training

Formación en Tecnologías Avanzadas

EE4607 Session Initiation Protocol

Voice over IP (SIP) Milan Milinković

TECHNICAL CHALLENGES OF VoIP BYPASS

Basic Vulnerability Issues for SIP Security

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Voice over IP Fundamentals

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Voice over IP Basics for IT Technicians

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

SIP Trunking and Voice over IP

Internet Technology Voice over IP

Voice over IP (VoIP) Basics for IT Technicians

Applied Networks & Security

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

SIP Trunking Configuration with

White paper. SIP An introduction

NTP VoIP Platform: A SIP VoIP Platform and Its Services

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Ingate Firewall/SIParator SIP Security for the Enterprise

TSIN02 - Internetworking

Session Initiation Protocol (SIP)

VOIP Security Essentials. Jeff Waldron

Analysis of a VoIP Attack

Chapter 2 PSTN and VoIP Services Context

NAT TCP SIP ALG Support

Recommended IP Telephony Architecture

Best Practices for Securing IP Telephony

Securing SIP Trunks APPLICATION NOTE.

Media Gateway Controller RTP

SIP: Protocol Overview

The SIP School- 'Mitel Style'

Integrating Voice over IP services in IPv4 and IPv6 networks

The SIP School- 'Mitel Style'

VoIP Security. Seminar: Cryptography and Security Michael Muncan

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

DoS/DDoS Attacks and Protection on VoIP/UC

Skype Connect Requirements Guide

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

VoIP. What s Voice over IP?

NAT Traversal for VoIP

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

VOICE OVER IP AND NETWORK CONVERGENCE

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

Lab Introduction software Voice over IP

Introduction to VoIP Technology

NAT and Firewall Traversal. VoIP and MultiMedia /77

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

A Comparative Study of Signalling Protocols Used In VoIP

Session Initiation Protocol and Services

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Voice over IP (VoIP) using the Session Initiation Protocol (SIP) INF Protokoller og ruting i Internett , UiO Lars Strand

VoIP Security regarding the Open Source Software Asterisk

internet technologies and standards

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

TLS and SRTP for Skype Connect. Technical Datasheet

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX blackbox.com

VOICE OVER IP SECURITY

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Transparent weaknesses in VoIP

BroadCloud PBX Customer Minimum Requirements

Monitoring SIP Traffic Using Support Vector Machines

Application Note. Onsight Connect Network Requirements V6.1

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Security Issues of SIP

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Adaptation of TURN protocol to SIP protocol

SIP (Session Initiation Protocol) Technical Overview. Presentation by: Kevin M. Johnson VP Engineering & Ops

SIP : Session Initiation Protocol

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

Vulnerabilities in SOHO VoIP Gateways

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

A Scalable Multi-Server Cluster VoIP System

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

Application Notes for Configuring Avaya IP Office 9.0 with HIPCOM SIP Trunk Issue 1.0

Multimedia & Protocols in the Internet - Introduction to SIP

SIP: Ringing Timer Support for INVITE Client Transaction

End-2-End QoS Provisioning in UMTS networks

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Transcription:

Attackin VoIP Walter Sprener walter.sprener@csnc.ch GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch Aenda. Introduction VoIP. Sample Installations. SIP / RTP - Protocols. Threats to VoIP. Recommendations. Conclusion/Discussion Compass Pae

Introduction to VoIP GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch Introduction What is VoIP VoIP = Voice over Internet Protocol Or more enerally: "Transportin voice data over a data network" Why use VoIP Use network syneries (data network already present) Use cheaper and worldwide networks New functionality (e follow me, video conferences) Interated services (Computer Telephony Interation) Be your own telephone company Compass Pae

Introduction Protocols Sinalin SIP/SIPS (Session Initiation Protocol) H. (ITU-T standard for multimedia on packet network) Skype (peer to peer network, proprietary) Media Transport RTP & RTCP, SRTP (Realtime Transport Protocol & Control Protocol) SCTP (Stream Control Transmission Protocol) Skype Other Protocols RSVP, 80.q (Resource Reservation Protocol) DNS (Domain Name System) ENUM (Electronic Numberin) STUN (Simple Traversal of UDP over NATs) Compass Pae Introduction Implementations of VoIP-Clients Softphones (X-Lite, etc.) Hardphones (Cisco, Snom, etc.) Proprietary tools (Skype) Instant Messener (NetMeetin/ICQ) VoIP Hype or Success VoIP already known for lon time Problems with quality and functionality prevented breakthrouh Skype brouht VoIP to the end user Mixed VoIP POTS (Plain Old Telephone System) solutions in trend In the near future Plain VoIP VoIP over Wireless Compass Pae

Introduction Softphones Hardphones Compass Pae 7 Sample Installations GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch

Sample Installations SIP Phone @ Home Compass Pae 9 Sample Installations SIP Phone with ITSP Provider BluewinPhone, Sunrise Webphone, Cablecom diitalphone Compass Pae 0

Sample Installations Internal VoIP Gateway to POTS Small to bi companies Compass Pae Sample Installations Gateway to Gateway VoIP Worldwide companies Compass Pae

SIP & RTP - Protocols GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch SIP & RTP - Protocols SIP REGISTER messae REGISTER sip:9.8.00.8 SIP/.0 Via: SIP/.0/UDP 9.8.00.:0;branch=z9hGbK- rvmeapz7u;rport From: "Walter ()" <sip:wsprene@9.8.00.8>;ta=erpmtjw To: "Walter ()" <sip:wsprene@9.8.00.8> Call-ID: c700bcc-uqrufrnxw9@snom0 CSeq: REGISTER... Authorization: Diest username="wsprene",realm="asterisk",nonce="89ce7d", uri="sip:9.8.00.8",response="0ae0dbdda087 efeccdac",alorithm=md Expires: 00... Compass Pae

SIP & RTP - Protocols SIP INVITE. Lookup SIP Proxy of taret.com. Forward INVITE. Lookup destination address of bob@taret.com. INVITE to bob@taret.com. Send INVITE to phone. Open RTP Stream Compass Pae SIP & RTP - Protocols SIP INVITE messae INVITE sip:bob@taret.com SIP/.0 Via: SIP/.0/UDP pc_a.source.com;branch=z9hgbkadfvy0 Max-Forwards: 70 To: Bob <sip:bob@taret.com> From: Alice <sip:alice@source.com>;ta=0 Call-ID: abcdadf@pc_a.source.com CSeq: INVITE Contact: <sip:alice@pc_a.source.com> Content-Type: application/sdp Content-Lenth: (session description would follow) Compass Pae

SIP & RTP - Protocols SIP Methods (RFC) INVITE Initiate Sessions Chane a Session state via re-invites ACK Confirms session establishment BYE Terminates Sessions CANCEL Cancels an INVITE request sent by a client not already sent a final response for OPTIONS Query another UA or a proxy server as to its capabilities REGISTER Binds permanent address to the current location Compass Pae 7 SIP & RTP - Protocols SIP Response Codes xy Information or Provisional - request in proress but not yet completed 00 Tryin 80 Rinin 8 Call is Bein Forwarded 8 Queued 8 Session Proress xy Success - the request has completed successfully 00 OK xy Redirection - another location should be tried for the request xy Client Error xy Server Failure Compass Pae 8

SIP & RTP - Protocols Functionality Problems NAT, Tunnelin In traditional SIP/RTP, the phones must have a routable Internet Address. The two phones will connect to each other directly for the Voice Traffic (RTP) With Network Address Translation (NAT,PAT) and firewalls in between, the connection will not succeed. Therefore, workarounds have been invented: tunnellin of traffic, for example STUN or X-Tunnel. Interoperability There were many problems with the interoperability of clients (SIP / H.) and partial implementations of these protocols. It seems that SIP will be the most used standard. Compass Pae 9 SIP & RTP - Protocols Quality Problems In POTS, the quality of the phone conversation is mostly excellent, it does not matter if you phone your neihbour or to another continent. The maximum delay of the spoken word to arrive at the other end is defined to 0ms for a ood quality voice transmission. Jitter In IP networks, not all the packets take the same path. Some packets are dropped or retained for a while. Jitter is the effect when we have variations in packet assemblin. Delay In order to prevent Jitter, the packet assemblin loic will buffer data packets. If the packets have too much Jitter, we have to wait too lon to be able to assemble the voice information correctly. Compass Pae 0

Threats to VoIP GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch Threats to VoIP VoIP differences to POTS Decentralized infrastructure Client is part of the network. Loical functions are built into the phone. In POTS, the loic is in the branch exchane. Network is manaed by many different parties, not only by the Telco provider IP protocol and networkin are well known. In POTS, very special know-how is required. VoIP is built on top of Internet Protocol, and inherits its weaknesses. VoIP Protocol (SIP, RTP) was not desined for security. Security has to be added. Data and Voice networks are shared. Data-network problems affect Voice traffic. New technoloy with functional problems. In POTS, hih availability and excellent quality is state of the art. Compass Pae

Threats to VoIP Threat Locations VoIP Infrastructure Network VoIP Client Compass Pae Threats to VoIP Attackin the Network VoIP Traffic (SIP/RTP) is transmitted in clear-text. Eavesdropper can capture traffic information (who phones who) and listen to conversations. VoIP traffic can be redirected or manipulated. E invalid information/voice messaes could be inserted. VoIP traffic could be disturbed. Tearin down connections, delayin packets or deny phone service completely. Makin the service unreliable. SIP/RTP is based on UDP, which can easily be spoofed. BruteForce SIP Password (Challene-Response) Compass Pae

Threats to VoIP Attackin the VoIP Infrastructure (Proxies, PBX, Reistrar) VoIP components are often based on well known operatin systems. If the systems are not adequately protected and hardened an intruder could break into the system. IP based attacks can be tareted aainst the VoIP infrastructure. VoIP components are a ateway from the POTS to the data network. Weaknesses in the ateway would allow an attacker to access the data network. If an attacker compromises VoIP Infrastructure, he could: Eavesdrop on conversations/connection statistics Deny service Redirect traffic to expensive numbers Listen to voice mails Capture SIP credentials Phone for free Modify dial plans Compass Pae Threats to VoIP Attackin the VoIP Client Weak confiuration of hardphone allows an attacker to manipulate the phone. Security of computer runnin the softphone is crucial. Read traffic information Listen to conversations Chane phone behaviour Dial numbers, establish expensive connections (dialer) Deny service Capture loin credentials Trojan/Virus could collect SIP credentials stored in reistry The SIP credentials (username/password) are the key to VoIP. But who wants to enter username and password before he is placin a phone call? Credentials are always stored in softclient or in hardphone memory! Compass Pae

Threats to VoIP Other threats Availability Service is based on the data network. No phone calls can be placed when there is: No electricity Network outaes Network problems (DNS, Firewall, VoIP Infrastructure) When the computer network is down, how do you hold your business up? With phone conversations? How do you call emerency numbers? Annoyances As real VoIP services do not cost, there will be much more SPAM phone calls (called SPIT) as before. How about lettin your phone rin at niht? Think about a worm that calls VoIP phones at random! Compass Pae 7 Recommendations GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch

Recommendations General Recommendations No direct access to phones in company network from Internet Be careful with softphones: Check password storae Phone conversation is on same network as computers if only one network card is used! Write and save los Use encrypted protocols (SIPS, SRTP) Use VLANs to separate phones from data network VoIP phones are computers -> patch manaement Use Checklists to secure Installation E NIST: Security Considerations for Voice Over IP Systems Compass Pae 9 Recommendations Securin VoIP Infrastructure Harden all VoIP operatin systems Disable all unused services Disable unused phone interfaces (web, telnet) Use stron passwords to access components Use stron SIP credentials Use separate DHCP servers Use separate Windows domains Protect components in firewall zones Use SBC (Session Boarder Controller, VoIP Firewall) Use encrypted VPNs for Homeworkers Compass Pae 0

Conclusion GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch Conclusion Securin a VoIP based solution is not an easy task. It is essential to understand the functionality of VoIP and to know the products and features to be used. Security requirements have to be defined before implementin the solution. This may have remarkable impacts on the desin and the cost of the project. VoIP is still in development. The same quality and security like in POTS solutions has not been reached yet. Compass Pae

Discussion GLÄRNISCHSTRASSE 7 POSTFACH 7 CH-80 RAPPERSWIL Tel.+ - 0 Fax+ - team@csnc.ch www.csnc.ch References References VoIP Security, Ransome/Rittinhouse ISBN: -8--, Elsevier Diital Press Switchin to VoIP, Wallinford ISBN: 0-9-0088-, O'Reilly "E.T. Can't Phone Home - VoIP Security" Presentation from Ofir Arkin at Black Hat 00 Maazins: Hakin9, September/October 00 ix, October 00, heise Kes, Nr. Mai 00, SecuMedia NIST: Security Considerations for Voice Over IP Systems http://csrc.nist.ov/publications/nistpubs/800-8/sp800-8-final.pdf An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol http://www.cs.columbia.edu/~salman/skype/ Compass Pae

Abbreviations POTS: Plain Old Telephone System PSTN: Public Switched Telephone Network ITSP: Internet Telephony Service Providers NAT: Network Address Translation PAT: Port Address Translation VLAN: Virtual Local Area Network VPN: Virtual Private Network DHCP: Dynamic Host Confiuration Protocol Compass Pae