IM: How Instant Messaging Systems Work



Similar documents
Integrated Instant Messaging System

SIP and VoIP 1 / 44. SIP and VoIP

Guidance Regarding Skype and Other P2P VoIP Solutions

How To Use A Phone Over Ip (Phyto) For A Phone Call

White paper. SIP An introduction

Intrusion Detection Systems

Best Practices for Controlling Skype within the Enterprise > White Paper

Formación en Tecnologías Avanzadas

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CS5008: Internet Computing

Chapter 2 PSTN and VoIP Services Context

Lecture 23: Firewalls

1 SIP Carriers Warnings Vendor Contact Vendor Web Site : Versions Verified SIP Carrier status as of 9/11/2011

Session Initiation Protocol and Services

NAT TCP SIP ALG Support

SIP : Session Initiation Protocol

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

ing from The E2 Shop System address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

CE Advanced Network Security VoIP Security

SIP Essentials Training

How to Build an Effective Mail Server Defense

Instant Messaging: Architectures and Concepts

Internet Security. Prof. Anja Feldmann, Ph.D.

A Comparative Study of Signalling Protocols Used In VoIP

1.1.3 Versions Verified SIP Carrier status as of 18 Sep 2014 : validated on CIC 4.0 SU6.

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

Network Security CS 192

Alcatel OmniPCX Enterprise R11 Supported SIP RFCs

Basic Vulnerability Issues for SIP Security

Note: As of Feb 25, 2010 Priority Telecom has not completed FXS verification of fax capabilities. This will be updated as soon as verified.

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

ENUM: Migrating to VoIP. P2P Voice Applications

TLS and SRTP for Skype Connect. Technical Datasheet

INSTANT MESSAGING SECURITY

Session Initiation Protocol (SIP)

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

The user interface of SIPPS is fully skinnable

Module 6. Designing and Deploying External Access. MVA Jump Start

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP, Session Initiation Protocol used in VoIP

Client Server Registration Protocol

EE4607 Session Initiation Protocol

IP Phone Presence Setup

An outline of the security threats that face SIP based VoIP and other real-time applications

Chapter 4 Firewall Protection and Content Filtering

Configuration Information

Computer Networks. Secure Systems

Load Balancer Configuration for Redundancy for SIP Federation

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

SIP A Technology Deep Dive

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Application Note. Onsight Connect Network Requirements v6.3

GoToMyPC Corporate Advanced Firewall Support Features

Kommunikationsdienste im Internet Möglichkeiten und Risiken

Implementing Intercluster Lookup Service

Configuration Notes 0215

High Performance VPN Solutions Over Satellite Networks

RadSec RADIUS improved. Stig Venaas

SIP Trunking Quick Reference Document

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Classification of Firewalls and Proxies

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Distributed Systems. 2. Application Layer

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Bit Chat: A Peer-to-Peer Instant Messenger

Chapter 4 Firewall Protection and Content Filtering

Application Firewalls

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

DNS SRV Usage June 22, 2011

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Internet Privacy Options

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Media Gateway Controller RTP

SIP Trunking Application Notes V1.3

Session Initiation Protocol

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Networking Basics and Network Security

Cisco TelePresence Video Communication Server (Cisco VCS) IP Port Usage for Firewall Traversal. Cisco VCS X8.5 December 2014

CipherMail Gateway Quick Setup Guide

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

1 SIP Carriers. 1.1 Tele Warnings Vendor Contact Versions Verified SIP Carrier status as of Jan 1,

Integrating Avaya Aura Presence Services with Microsoft OCS

NETASQ SSO Agent Installation and deployment

Firewalls & Intrusion Detection

s and anti-spam Page 1

Best Practices for SIP Security

Introduction to Computer Security Benoit Donnet Academic Year

1 Introduction: Network Applications

Transcription:

Peer-to-Peer Networking IM: How Instant Messaging Systems Work Mohammad iqbal Thanks to : Xinran Wu, Clement Yuen

Instant Messaging Systems ICQ (Mirabilis 1996, Bought by AOL in 1998, $300M) AIM (1997), Yahoo (1998), MSN(1999) Basic Functions: Presence (Awareness) Status(offline/online/idle) Location(office/home/mobile) Instant Messaging Text/Voice/Video Any P2P applications

Outline Introduction to IM How ICQ Works Problems and Security Concerns in ICQ IETF Internet-Drafts for Instant Messaging Model and Terminologies Requirements The PRIM protocol Security Considerations Concluding Remarks

ICQ: A Typical Instant Messaging Sys.

ICQ Protocol No official publications Info Available is from reverseengineering the ICQ Protocol ICQ Protocols: V1,V2: Simplest Ones V3: Simple Checksum as Security V4: Encryption to Improve the Security V5: Not yet Fully Studied

How Does ICQ Work? UDP Presence Service TCP Instant Messaging

Presence Service (1) Create Connection Ack UIN,Password, SessionID, IP, Port keep active message All UDP packets must be acknowledged by the receiver Same UDP packet format [SessionID, UIN, FunctionID, Parameters]

Presence Service (2) Subscribe to Presence Service User Status Contact List User will be notified for the Status Change Contact List is not stored on server permanently

Instant Messaging Receiver is offline: Message in UDP to Server Receiver is online: Build a TCP Connection, open till one side is off. SessionID, UIN, Message IP address & Port Number

Security on ICQ "The ICQ protocol is ridiculously simplistic and is riddled with security holes. So is the ICQ software. So ICQ users can be spoofed, have their machine crashed, or have evil haxxors run arbitrary code on their boxes. Geez, these poor users might as well run Internet Explorer!" (Source: http://www.insecure.org/sploits/icq.spoof.overflow.seq.html ) Personal Information Unprotected IP Information Exposed Client-side operations make ICQ more vulnerable Flooding Spoofing

Standardization IETF Instant Messaging and Presence Protocol (IMPP) WG Terminologies, model and data formats Specify design goals and requirements Produced RFC 2778/2779 and other I-Ds IETF Presence and Instant Messaging Protocol (PRIM) WG Proposes a protocol that minimally satisfies the RFC s

Model and Terminologies A presence and instant messaging system Provides presence service and instant message service Presence service accepts, stores and distributes presence information Instant message service accepts and delivers instant messages to instant inboxes Can be regarded and implemented as two independent systems

Model and Terminologies (cont) Presence Service Serves presentities and watchers Presentities provide presence information Watchers receive presence information May involve multiple servers/proxies across multiple domains (other presence services) Watchers Can be classified into fetchers and subscribers Subscribers request future notifications of changes in presence information Watcher information can also be distributed

Model and Terminologies (cont) Instant Message Service Serves senders and instant inboxes Senders send instant messages to service Messages are then delivered to the inboxes May involve multiple servers/proxies across multiple domains (other IM services) Principals The real world users of the system Interact via user agents User agents control access and delivery rules

Presence Service Presence Service (presence information) publish Presentity notify Watcher Presence UA Watcher UA

Instant Message Service send Instant Message Service (instant messages) Sender Instant Inbox listen Sender UA Inbox UA

Presence Information Consists of multiple presence tuples Presence tuple Status online/offline,open/close,busy,away Communication Address Communication Means instant message service Contact Address instant inbox address

Protocol Requirements Independence of presence service and instant message service Entities in one domain interoperable with those in other domains Scalable many entities and domains; many subscriptions per subscriber or presentity etc. Access control: who can do what Must allow operations through proxies and firewalls Message encryption and authentication

The PRIM protocol Designed to allow IM services to be provided by servers distributed across administrative domains Client-server (intra-domain) and server-server protocols (inter-domain) Assumes TCP as basic transport Uses long-lived C-S connections; reduces auth. overhead and firewall friendly Polite blocking selective publication of presence information (watcher class)

The PRIM protocol (cont) Each principal through agents communicates with its own service (home) domain presence/im servers using client-server protocols Presence service Subscription for a presentity in a different domain is forwarded using server-server protocols Likewise for notifications A duration is associated with each subscription A renewal by the user agent or its home presence server is required for continuous subscription

The PRIM protocol (cont) Instant Message service IM server provides the instant inbox User agent listens to inbox from which it wants to receive instant messages Inbox is open when at least one principal is listening to it Presence/IM identifiers used to identify presentities and inboxes In the form of URI, e.g. pres:joe@utoronto.ca, im:%22jane%20smith%22@domain.com

The PRIM protocol (cont) Name Resolution uses DNS Perform SRV RR lookup Authentication Performed at connection end-points When succeeds, the other end-point safely accepts requests from presentities/inboxes pertaining to the domain of first end-point Done using the Transport Layer Security (TLS) protocol (out-of-band) (RFC 2246) or Simple Authentication and Security Layer (SASL) (in-band login) (RFC 2222)

The PRIM protocol (cont) Authentication Strength What servers communicate to next hop during a relay strong, medium, weak, none Compare with strength of current connection Can be a criterion to reject a command

Security Considerations Spoofing Authentication of presentities/watchers, senders/inboxes Stalking (Privacy) Access rules, visibility rules, polite blocking Spam Delivery rules

Conclusion IM has become popular in the corporate world Current applications: SMS-type chat, real-time collaboration, CRM Future applications: Integrate with mobile technologies, PDA, e-commerce, targeted advertisements Biggest challenges: different non-standard, noninteroperable implementations, privacy and security issues IMUnified Microsoft, Yahoo, Excite, AT&T etc. to support IETF standards

References IETF RFC 2778/2779 Presence and Instant Messaging Protocol (PRIM) Server-Server Protocol Specification <draft-ietf-primserver-00.txt> Common Presence and Instant Messaging (CPIM) <draft-ietf-impp-cpim-02> Common Presence and Instant Messaging: Message Format <draft-ietf-impp-cpim-msgfmt-04.txt> CPIM Presence Information Data Format <draft-ietfimpp-cpim-pidf-01.txt> http://www.business2.com/webguide/0,1660,40034, FF.html