An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol



Similar documents
Skype characteristics

Skype network has three types of machines, all running the same software and treated equally:

VoIP over P2P networks

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Skype VoIP service- architecture and comparison

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Best Practices for Controlling Skype within the Enterprise. Whitepaper

IT Security Evaluation of Skype in Corporate Networks

How To Use A Phone Over Ip (Phyto) For A Phone Call

OVERVIEW OF ALL VOIP SOLUTIONS

Overview. Tor Circuit Setup (1) Tor Anonymity Network

Internet Security. Prof. Anja Feldmann, Ph.D.

Best Practices for Controlling Skype within the Enterprise > White Paper

TECHNICAL CHALLENGES OF VoIP BYPASS

Guidance Regarding Skype and Other P2P VoIP Solutions

How To Block Skype

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

VoIP telephony over internet

A Performance Study of VoIP Applications: MSN vs. Skype

}w!"#$%&'()+,-./012345<ya

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Internet Technology Voice over IP

Service Quality Assurance Mechanisms for P2P SIP VoIP

Voice Over IP. Priscilla Oppenheimer

APTA TransiTech Conference Communications: Vendor Perspective (TT) Phoenix, Arizona, Tuesday, VoIP Solution (101)

Professor Yashar Ganjali Department of Computer Science University of Toronto.

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Voice-Over-IP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Internet Telephony - Security Issues in Skype TM

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Application Note. Onsight Connect Network Requirements V6.1

Voice over IP Communications

Managing (VoIP) Applications DYSWIS

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Three short case studies

A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia

NEFSIS DEDICATED SERVER

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Bit Chat: A Peer-to-Peer Instant Messenger

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

ETM System SIP Trunk Support Technical Discussion

Classifying Service Flows in the Encrypted Skype Traffic

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Manual. ABTO Software

UNIVERSITI TEKNOLOGI MARA FACULTY OF INFORMATION TECHNOLOGY AND QUANTITATIVE SCIENCE

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Application Note. Onsight Connect Network Requirements v6.3

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

ABC SBC: Mobile Subscriber Support. FRAFOS GmbH

Transactions. Georgian Technical University. AUTOMATED CONTROL SYSTEMS - No 1(8), 2010

VOICE OVER IP AND NETWORK CONVERGENCE

Active Monitoring of Voice over IP Services with Malden

Network Simulation Traffic, Paths and Impairment

VoIP Security regarding the Open Source Software Asterisk

ENUM: Migrating to VoIP. P2P Voice Applications

Contents. Specialty Answering Service. All rights reserved.

Rev Technology Document

Network Administrator s Guide

Marratech Technology Whitepaper

Implementing SIP and H.323 Signalling as Web Services

Looking closer at the Privacy Aspect in IP-Telephony

EE4607 Session Initiation Protocol

CSCI-1680 CDN & P2P Chen Avin

A Comparative Study of Signalling Protocols Used In VoIP

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce

VOIP Security Essentials. Jeff Waldron

How To Set Up Foglight Nms For A Proof Of Concept

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

LifeSize Transit Deployment Guide June 2011

MiaRec. Cisco Built-in-Bridge Recording Interface Configuration Guide. Revision 1.1 ( )

Distributed Systems. 2. Application Layer

Secure VoIP for optimal business communication

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

Cloud Video. Data Sheet

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Application Note. Onsight TeamLink And Firewall Detect v6.3

Crossing firewalls. Liane Tarouco Leandro Bertholdo RNP POP/RS. Firewalls block H.323 ports

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

LifeSize UVC Multipoint Deployment Guide

How To Create A Network Communication System With A Peer To Peer (P2P) And Network Communication (Networking)

Common VoIP problems, How to detect, correct and avoid them. Penny Tone LLC 1

Load Balance Router R258V

Connecting Your Enterprise With Asterisk: IAX to Carriers. Dayton Turner Voxter Communications

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone

Nokia E65 Internet calls

ReadyNAS Remote White Paper. NETGEAR May 2010

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

JXTA TM : Beyond P2P File Sharing the Emergence of Knowledge Addressable Networks

13!Signaling Protocols for Multimedia! Communication

P2P: centralized directory (Napster s Approach)

Kodak Remote Support System - RSS VPN

SECURE P2P VOICE OVER IP USING DEEP PACKET INSPECTION

VoipSwitch softphones

Transcription:

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca School of Computer Science University of Guelph Guelph, Ontario, Canada

Agenda Introduction Key Components Communication Conferencing Comparison of Similar Clients Conclusion 2

Introduction Skype Peer-to-peer (p2p) Voice-over-IP (VoIP) client Created by makers of Kazaa Overlay p2p Network Supports: voice, video, chat, and even text messaging 3

Introduction Overlay Network consists of two nodes Ordinary Nodes Super Nodes Their connections are arranged in according to Neighbor Relationships There is also a Skype login server and SkypeIn/SkypeOut servers for PC-to-PSTN and PSTN-to-PC communications 4

Introduction Figure 1: Skype Network Configuration [1] 5

Introduction Ordinary Node (SC) The Skype Client Keeps a table of reachable nodes Holds IP and port number of super nodes Referred to as host cache (HC) in Skype Stored in an XML file 6

Introduction Super Node (SN) End-point for client Has public IP Requirements: Sufficient CPU, Memory, and Network bandwidth Authentication is done separately with the login server This helps Skype ensure a global credential database, ensuring SkypeID uniqueness 7

Key Components Ports Host Cache Codecs Buddy List Encryption NAT and Firewall 8

Key Components - Ports Skype opens two ports for listening to TCP and UDP protocols Port number is randomly selected when client is installed Ports 80 and 443 are also opened to accommodate HTTP and HTTP-over-TLS traffic 9

Key Components Host Cache List of super node IP and port pairings shared.xml Holds maximum of 200 entries If no entries in file Skype uses one of 7 hardcoded IPs 10

Key Components - Codecs Uses ilbc, isac, and ipcm Allows frequencies 50 to 8000 Hz 11

Key Components Buddy List Stored as config.xml Unencrypted Stores Skype central login server Note: file is also replicated on the login server for better mobile service access Buddys are identified by their IDs 12

Key Components Buddy list <CentralStorage> <LastBackoff>0</LastBackoff> <LastFailure>0</LastFailure> <LastSync>1135714076</LastSync> <NeedSync>0</NeedSync> <SyncSet> <u> <skypebuddy1>2f1b8360:2</skypebuddy1> <skypebuddy2>d0450f12:2</skypebuddy2 Figure 2: config.xml [1] 13

Key Components - Encryption Skype uses AES 256-bit encryption 1.1 x 10 77 possible keys Key Exchange facilitated through 1024-bit RSA RSA Certificates 1536 or 2048-bit 14

Key Components NAT and Firewall Only hypotheses about technology behind Thought to use the STUN and TURN protocols Information stored in shared.xml A Skype client cannot prevent itself from becoming a super node (contrary to Kazaa) 15

Communication Figure 3: Skype Login process (with no entries in HC file) [1] 16

Communication HTTP is used because version information is shared through GET requests Calling and Tear down Average of 3 Messages a Second Voice Packet 70 to 100 bytes Teardown is simply accomplished through a message with signaling information 17

Communication Figure 4: Skype Call (caller to callee) [1] 18

Communication Figure 5: Skype call through NAT and Firewall [1] 19

Conferencing Skype uses a Mixer approach to message passing A central client sends out its and the remaining messages to their respected recipients It is assumed that at some point in the size of a conference Skype would use full mesh conferencing 20

Conferencing Figure 5: Example of conference between 3 clients (A,B,C) [1] 21

Comparison of Similar Clients Yahoo MSN Google Talk Benchmarks were conducted on three laptops over a period of three days Data on these tests is limited 22

Comparison of Similar Clients Over the other 3 applications, Skype had the lowest mouth-to-ear latency time of the services. It is believed that this is the case due to a decentralized network with minimal centralized needs Skype makes arrangements with OS to give it highest priority on CPU and Network bandwidth 23

Figure 6: World Map of Super Nodes [1] 24

Figure 7: Host Cache File (shared.xml) [1] 25

Conclusion Skype is a highly distributed VoIP client Communication is performed with quality security practice Skype reduces messages when conferencing Skype has the lowest call latency time of the four largest free VoIP services 26

Conclusion Interesting Symptom described in papers conclusion If every clients bandwidth was capped, Skype would starve for Super Nodes and the network would effectively be broken I felt that this was a well written technical paper that utilized images and diagrams well 27

references [1] S. Baset, H. Schulzrinne, An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, Colombia University, New York, NY. 28

Thank You! 29