VoIP Security regarding the Open Source Software Asterisk



Similar documents
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Voice over IP Security

VOICE OVER IP SECURITY

Best Practices for Securing IP Telephony

SIP and VoIP 1 / 44. SIP and VoIP

Voice Over IP and Firewalls

SIP Trunking Configuration with

Recommended IP Telephony Architecture

Crash Course in Asterisk

Using Asterisk with Odin s OTX Boards

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

VoIP Security: How Secure is Your IP Phone?

Securing SIP Trunks APPLICATION NOTE.

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

Basic Vulnerability Issues for SIP Security

CHAPTER 1 INTRODUCTION

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

VoIP Security Methodology and Results. NGS Software Ltd

An outline of the security threats that face SIP based VoIP and other real-time applications

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Ingate Firewall/SIParator SIP Security for the Enterprise

VoIP Security Threats and Vulnerabilities

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

SIP Trunking with Microsoft Office Communication Server 2007 R2

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

How To Use A Phone Over Ip (Phyto) For A Phone Call

CS5008: Internet Computing

Grandstream Networks, Inc. UCM6100 Security Manual

Chapter 1 - Introduction

CompTIA Convergence Examination Objectives

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Voice over IP Basics for IT Technicians

PENTEST. Pentest Services. VoIP & Web.

Broadvox SIP Trunking. Frequently Asked Questions (FAQs)

Kommunikationsdienste im Internet Möglichkeiten und Risiken

A Comparative Study of Signalling Protocols Used In VoIP

Voice over IP (VoIP) Vulnerabilities

Challenges and opportunities for Open Source solutions

Threats to be considered (1) ERSTE GROUP

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Integrate VoIP with your existing network

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Mediatrix 3000 with Asterisk June 22, 2011

Voice over IP (VoIP) Basics for IT Technicians

How To Support An Ip Trunking Service

VoIP Security regarding the Open Source Software Asterisk

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

TLS and SRTP for Skype Connect. Technical Datasheet

CE Advanced Network Security VoIP Security

SIP Security Controllers. Product Overview

Recommendations for secure deployment of an IP-PBX

VOIP Security Essentials. Jeff Waldron

Internet Security. Prof. Anja Feldmann, Ph.D.

LessWires Advanced IP Soft-PBX System

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Securing VoIP Networks using graded Protection Levels

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Overview of Asterisk (*) Jeff Gunther

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

White paper. SIP An introduction

VOIP TELEPHONY: CURRENT SECURITY ISSUES

1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007

Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.

How to make free phone calls and influence people by the grugq

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Securing Voice over Internet Protocol

Connecting Your Enterprise With Asterisk: IAX to Carriers. Dayton Turner Voxter Communications

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

Indepth Voice over IP and SIP Networking Course

SBC WHITE PAPER. The Critical Component

Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Configuration Notes 0217

SIP Trunking The Provider s Perspective

A Reality Check on Security in VoIP

Application Note. Onsight Connect Network Requirements v6.3

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Asterisk: A Non-Technical Overview

EdgeMarc 4508T4/4508T4W Converged Networking Router

Mitigating the Security Risks of Unified Communications

Building the Lync Security Eco System in the Cloud Fact Sheet.

A Review of Secure Real-Time Transport Protocol

Villains and Voice Over IP

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>>

VOICE OVER IP AND NETWORK CONVERGENCE

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

R&S IP-GATE IP gateway for R&S MKS9680 encryption devices

Transcription:

Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de URL2: http://www.detken.net E-Mail: detken@decoit.de Foliennr.: 1

Table of content State-of-the-art: Scenarios and standards Open Source Software Asterisk Protocol risks Potential threats and attacks Assessment and impacts Conclusions Foliennr.: 2

VoIP security introduction A VoIP system can be deployed in different ways (next slide) There are competing protocols with specific advantages and disadvantages Securing VoIP systems begins with securing connection establishment in order to guarantee authenticity of the subscriber and avoid/prevent redirecting or sniffing data traffic (media stream) The media stream has to be encrypted in order to avoid sniffing and manipulation Authentication and encryption requires a solid key management Interfaces for device configuration should be secured as well, e.g. by means of HTTPS An important issue of VoIP security is the protection of the network against attacks (hacking) and malware (viruses, worms, Trojan horses, etc.) VoIP software implementation has to checked against security holes Foliennr.: 3

VoIP deployment scenarios Campus VoIP: Campus VoIP uses an IP PBX (Private Branch exchange), which is most common, or IP-enabled PBX. IP phones and/or softphones are connected to the IP PBX. Calls initiated from these phones are routed through a gateway to the PSTN. IP Centrex/Hosted IP: This type requires the involvement of a VoIP service provider hosting the IP PBX and providing VoIP services from this network. The enterprise only needs IP phones, no other VoIP customer premises equipment is necessary. VoIP Trunks: VoIP trunks increasingly replace circuit-switched connections, e.g. T1 and PRI. Foliennr.: 4

Protocols and standards of VoIP Foliennr.: 5

Open Source Software Asterisk (1) Asterisk is an open source software product, which provides all functions of a conventional PBX It runs on Linux, BSD, Windows (emulated) and OS X It supports different VoIP protocols and can be interconnected with PSTN, ISDN (BRI, PRI, E1 or T1) by means of relatively low priced hardware Asterisk has been developed by Mark Spencer from Digium. However, important extensions and applications originate also from other developers. The Asterisk software has been published under the GNU General Public License, which pushes its rapid worldwide development and deployment Many manufacturer of VoIP software PBX systems use Asterisk today and do not invest more time into own development Foliennr.: 6

Open Source Software Asterisk (2) Some of the basic functions of Asterisk are: Dial plan, which can be individually configured and extended by additional applications. Herewith, it is possible to decide how an incoming call is handled. Interactive Voice Response (IVR) menu guiding the caller. Time, accounting, and billing for each subscriber / number. Voicemail with a complete caller response system by password access and forwarding of the call records via e-mail. Conferencing for support caller groups, to establish a telephone call between more than one participant. Call forwarding if unreachable or busy. Blacklists to block undesired callers (provided that the subscriber number is transmitted). Foliennr.: 7

Open Source Sofware Asterisk (3) Supported protocols & codecs Protocols Codecs: SIP G.723.1 H.323 G.711 (μ-law, A-Law), MGCP GSM SCCP/Skinny ADPCM IAX/IAX2 optional G.729 Foliennr.: 8

Inter-Asterisk exchange (IAX) IAX now most commonly refers to IAX2, because of no available security mechanisms IAX2 is able to carries signaling and data on the same path The commands and parameters are sent binary and any extension has to have a new numeric code allocated IAX2 uses a single UDP data stream (usually on port 4569 for IAX2, 5036 for IAX) to communicate between endpoints, both for signaling and data The voice traffic is transmitted in-band. That makes it for IAX2 easier to get through firewalls and other security equipments by using a single port. Additionally the work behind Network Address Translation (NAT) will be better supported IAX2 supports trunking, which means multiplexing channels over a single link on a very efficient way (overhead and quality) As a positive result, the IP overhead is smaller than by other signaling protocols and no additional latency will produce Foliennr.: 9

Protocol risks (1) SIP SIP messages are mostly not authenticated and most of the devices do not check the source of the message Attackers can infiltrate messages to manipulate or disturb SIP services Typical threats are SIP-Spam (identity forgery), manipulation, redirecting and sniffing of connections, flooding of mailboxes with Spam and modification of messages H.323 Wrong identities and Man-in-the-Middle (MitM) attacks make the H.323 protocol suite assailable The identification of a caller is managed by an authentication password, which is communicated unencrypted via the network Foliennr.: 10

Protocol risks (2) RTP With information of particular sequence number, time stamp, media type etc., a high number of data packets of a connection can be decoded in correct order and can be played at the output device This easy decoding mechanism enables an attacker to eavesdrop and manipulate speech data stream as soon as he has gained access to the data IAX Attackers can carry out Denial of Service (DoS) attacks against Asterisk servers and are able to spy on accounts for which no or only weak passwords exist Foliennr.: 11

Potential threats and attacks (1) Network Layer Denial-of-Service (DoS) ARP, MAC, IP, UDP, IRDP spoofing SYN-, PING- oder MAC- Flooding TCP-Session-Hijacking RST-Attack Data Injection through ISN-Guessing Sniffing Replay Foliennr.: 12

Potential threats and attacks (2) Application Layer Toll interception: malware such as Trojans are sufficient to sniff and copy speech packets and to even send them to someone else Manipulation of calls: By means of a MitM attack speech packets of a call can be selectively modified Unauthorised usage/phreaking/toll fraud: If an attacker is able to compromise user credentials (VoIP provider access credentials) he can set up calls at the expense of the user (toll fraud) Dialer: Softphones are exposed to a particular risk, since Trojans or worms are able to autonomously establish calls without any user notice Violation of Privacy: Credentials and other user (subscriber) information can be collected with the aim to monitor and analyse communication profiles SPIT (Spam over IP Telephony): Comparable to Spam-Mails, SPIT massively sends VoIP messages Foliennr.: 13

Potential threats and attacks (3) Further security risks can be named as dynamic port usage, configuration of network devices etc.: Dynamic port usage Configuration of network devices Default Ports Passwords Administration Faulty implementation of VoIP protocols Attacks against IP PBX Attacks against operating systems in VoIP systems Foliennr.: 14

Assessment and impacts: SRTP SRTP encrypts the media stream For this purpose, key exchange has to take place Because of the encryption method AES it is guaranteed that the content (speech data) of a conversation can not be recorded Communication partners are authenticated by means of SHA-1 hashing However, the key used for data encryption is transmitted via SIP (using signaling path keying), which is exposed to sniffing attacks in case that SIP is not sufficiently secured Foliennr.: 15

Assessment and impacts: SIP SIP has been extended with TLS, HTTP Digest, IPsec with IKE, and S/MIME Also end-to-end-security and hop-by-hop-communications are optional available However, as Asterisk deploys SIP signaling over UDP, TLS protection is not possible since it requires TCP Although, there have been efforts to implement other security mechanisms for SIP, Asterisk only provides SIP digest authentication with MD5 Missing security features for SIP shall be implemented in the next generation of the SIP channels (Version 3), which have been under development in the Pineapple project. Because of the stronger impact on the Asterisk architecture, there will be no backwards compatibility Foliennr.: 16

Assessment and impacts: IAX2 IAX2 supports authentication via Public Key Infrastructure (PKI), e.g. between two Asterisk servers using RSA key pairs. IAX2 allows user authentication via RSA or MD5 With MD5 the peers have plaintext access to the secret key RSA restricts the access in one direction via the public/private key pairs It is recommended to secure the private key using 3DES encryption IAX2 offers mutual peer registration with address and credentials, so that caller can reach the peer. The respective registration protocol can be deployed in parts Using a single well-known port alleviates Denial-of-Service (DoS) attacks, which have significant impacts of real-time applications IAX2 URI scheme (iax2:) does not provide any security mechanism such as the SIPS URI scheme within the SIP protocol Foliennr.: 17

Segmentation and VLANs A separation of data and VoIP segments is mandatory in order to avoid collisions and bottlenecks The VoIP segment should be isolated by a firewall which provides additional protection Also IP phones should be positioned in different subnets or network segments. This enables a better network partitioning and efficient deployment of prioritization (Q-Tag, DiffServ) A separation of networks at layer 2 has to be realized with VLANs, so that data and speech can be separated logically while the same physical network is used. Foliennr.: 18

Conclusions At present, secure VoIP should be operated using the campus scenario which establishes calls via PSTN. VoIP should be regarded as a further IP service which is separated from the remaining networks. In the future an interconnection to public VoIP providers or operators can be realized if signaling standards have reached a sufficient and comprehensive security level. Authentication and encryption have to be implemented by the providers. This is an essential prerequisite. Foliennr.: 19

Thank you! for your attention. DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen Tel.: 0421-596064-0 Fax: 0421-596064-09 Foliennr.: 20