NGN Next Generation Nightmare? What telco 2.0 really means



Similar documents
Carrier VoIP Security

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

How To Make A Phone Call From A Cell Phone (Torm) To A Landline (Telnet) (Telcom) (Ipo) (Turbo) Or A Cellphone (Ip) (Phone) (Net) Or

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Session Border Controllers in Enterprise

Cisco Network Foundation Protection Overview

Broadband Networks Virgil Dobrota Technical University of Cluj-Napoca, Romania

Session Border Controllers: Addressing Tomorrow s Requirements

Recommended IP Telephony Architecture

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

SIP Trunking with Microsoft Office Communication Server 2007 R2

PETER CUTLER SCOTT PAGE. November 15, 2011

SIP Trunking and the Role of the Enterprise SBC

Brochure. Dialogic BorderNet Session Border Controller Solutions

Converged TDM and IP- Based Broadband Solutions White Paper. OnSite OS-10 Multi-Service over SDH Provisioning

UC and SIP Trunking Luncheon. Sponsored by:

Addressing Inter Provider Connections With MPLS-ICI

White paper. Reliable and Scalable TETRA networks

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Best Practices for deploying unified communications together with SIP trunking connectivity

Session Border Controllers in the Cloud

NGN Network Architecture

Acme Packet session border controllers in the enterprise

Convergence Technologies Professional (CTP) Course 1: Data Networking

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Use Cases for the NPS the Revolutionary C-Programmable 7-Layer Network Processor. Sandeep Shah Director, Systems Architecture EZchip

Convergence: The Foundation for Unified Communications

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

Voice over IP Basics for IT Technicians

IP Converged Services

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

ICTTEN4215A Install and configure internet protocol TV in a service provider network

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Next generation enterprise communications

ethernet services for multi-site connectivity security, performance, ip transparency

SSVVP SIP School VVoIP Professional Certification

SEC , Cisco Systems, Inc. All rights reserved.

IP Telephony Management

Securing SIP Trunks APPLICATION NOTE.

VoIP Conformance Labs

What s New in Converged Access and Unified Business Solutions

Campus LAN at NKN Member Institutions

Dialogic BorderNet Session Border Controller Solutions

Business Case for a DDoS Consolidated Solution

CompTIA Convergence Examination Objectives

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

Solving the Access Conundrum for the All-IP Network:

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

NET ACCESS VOICE PRIVATE CLOUD

Virtualization, SDN and NFV

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

Voice over IP (VoIP) Basics for IT Technicians

Network Performance Monitoring at Minimal Capex

Welltel - Session Border Controller SBC 120

Management & Orchestration of Metaswitch s Perimeta Virtual SBC

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Allstream Converged IP Telephony

VoIP Survivor s s Guide

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

"Charting the Course...

Customer white paper. Carrier Ethernet for Business Delivering L2/L3 Converged Services. Smart Enterprise Access Solutions for Service Providers

Technology Training Limited Module Portfolio for Customised Courses

Simwood Carrier Ethernet

Introduction to DE-CIX NGN. Andreas Sturm

State of Texas. TEX-AN Next Generation. NNI Plan

IPv6 Opportunity and challenge

DDoS attacks in CESNET2

VoIP / SIP Planning and Disclosure

How To Make A Cell Phone Converged Into A Cell Network

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

NGN Interconnection Standards & Protocols

PREPARED FOR ABC CORPORATION

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Firewalls. Chapter 3

Networking 4 Voice and Video over IP (VVoIP)

How To Learn Cisco Cisco Ios And Cisco Vlan

Cisco Integrators Cisco Partners installing and implementing the Cisco Catalyst 6500 Series Switches

SIP Trunking The Provider s Perspective

The BorderNet Session Border Controller and Network Function Virtualization

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma

MPLS VPN Security BRKSEC-2145

SIP, Security and Session Border Controllers

MPLS VPN Security Best Practice Guidelines

Best Practices for Securing IP Telephony

Presented by: John Downing, B.Eng, MBA, P.Eng

U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Colt VoIP Access Colt Technology Services Group Limited. All rights reserved.

SIP Trunking DEEP DIVE: The Service Provider

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There

Hunting down a DDOS attack

Transcription:

NGN Next Generation Nightmare? What telco 2.0 really means Nicolas FISCHBACH Senior Manager, Network Engineering Security, COLT Telecom nico@securite.org - http://www.securite.org/nico/

Internet-wide Security Issues So, what kept us up at night? SNMP SQL Slammer (and friends) Cisco wedge bug <- 2003. Remember? State of upgrades today? State of transit ACLs today? BGP TCP window [not really actually] Botnets and DDoS 2

Internet-wide Security Issues What have we done about it? A lot. Too much maybe? Route/prefix filtering DDoS detection: Netflow DDoS mitigation: BGP (+ MPLS (+ Cleaning)) xacls and MPLS Core hiding QoS and Control Plane Policing (CoPP) BGP TTL trick (GTSM) and BGP TCP md5 Unicast RPF (urpf) Router security 101 UPGRADES. A LOT OF UPGRADES 3

Security which future? No big nation-wide critical infrastructure issue recently (OK, root DNS servers get some packet love sometimes) IP/Data network infrastructure has become a commodity (until it's down) No focus on infrastructure security anymore (but the wake up call will be funny ) So where do people put security research and resources into? 4

NGN (Next Generation Networks) 5

What are NGNs? NGN = Next Generation Networks Everything seems to be NGN at the moment Ethernet IP DSLAMs 3G/4G - WiMax VoIP Virtualization IPv6 (just kidding, too bad today isn't April 1st) Mostly a marketing driven term But impact on industry: Legacy technology being phased out End-of-sale, end-of-support, etc. Forced to look into NGN CAPEX vs OPEX 6

Not really NGNs because of web 2.0? Web 2.0 doesn't have a real impact on the telco/sp industry Most visible impact: Bandwidth usage Features on clients (software, hardware, etc) Always on(line) More flash crowd effects: how do you deal with this? DDoS / Impact on service One interesting impact on the security border: the CPE/end device is TRUSTED 7

What's changing with NGN Everything is IP and Ethernet now More interfaces and protocols exposed to customers Local craft terminals moving from proprietary consoles to Ethernet/IP/DHCP/HTTP Lots of security features still/back in software (not in hardware) How to get those features across product ranges and vendors? Shift of features towards edge, access, last/first mile But these features are not (often) security features 8

What's changing with NGN Lots of devices that never saw the bad Internet Hardware limitations (FPGA, ASIC, NP) Features vs power vs cooling We're moving up and down the protocol stack at the same time More and more large layer 2 networks Growing complexity at layer 7 (and above :) Unclear Service Access Points (demarcation) Pen-testing/auditing is so '97 LAN technologies in the WAN Carrier and entreprise products now IP enabled 9

Good/bad things with NGN security Some people have learned the lesson: you need security involved and looked at from day one Reality kicks in quickly: First you need to make the solution work It takes more time than expected Non-key testing shifts in the calendar You only end-up doing a high level assessment: Paper based Launch nmap/nessus/impact/etc Sometimes you may run specific tools Risk of DoS during other tests Fuzzers Network layer attacks Etc. 10

Voice over IP What's the path to full-voip? VoIP in the entreprise VoIP on the Internet VoIP in the access layer IMS core What will really replace TDM? And when? New attack surface for legacy TDM networks Reach SS7 over IP 11

IMS IMS = IP Multimedia Subsystem SIP only VoIP architecture (logical/physical) Try to converge 3G/4G, VoIP and Unified Messaging Edge-only security SBC (Session Border Controllers) WebApp Fws Core is open Poor OS hardening COTS OSes WebApps usually easier to take over than to try to get around the SBCs Back-to-Back User Agent (real TCP/UDP proxy) 12

IMS WebApps usually easier to take over than to try to get around the SBCs Back-to-Back User Agent (real TCP/UDP proxy) Expect more people to look into SBC security real soon Key to the kingdom All traffic (signaling and media) crossing them May even handle CDRs (Call Detail Records) 13

IPv6 IPv6 part of NGN? Not really. Source of nightmare for sure (today and to come) A global research lab Is there a real commercial driver yet? Expect 6PE (IPv6 in IPv4 MPLS VPNs) to be more common (and Teredo of course ;-) Nice firewall piercing ahead From a Service Provider security point of view you can't, today, enforce the same security in v6 as in v4 14

Legacy DSLAMs DSL termination ATM backhaul IP/Ethernet DSLAMS Today IP and Ethernet enabled DSLAMs Considered an IP access router But Less security features ACLs, urpf, etc Plane separation Limited TCAM size Supports VLANs and trunks Not 15

MSPP MSPP = Ethernet Multi-Service Provisioning Platform Goal is to replace legacy SDH networks and crossconnects End-to-end multi-point Ethernet, with point&click end-toend provisioning Some people even think it could replace the Internet ;-) Just think of all layer 2 attacks you know. One will fit. We really need dugsong to finish dsniff-ng(n) :) Vendors are still focusing on making it work (think 50ms wrap time and co) 16

We use VMware Virtualization Entreprises start to virtualize their Data Center Service Providers virtualize networks, systems and firewalls MPLS VPNs MSPP (Ethernet) Shared PBX hosting Shared firewalls Multi-tenant web front-ends for new services Managed services portals Main issue: traffic and domain separation Especially in WebApps today In Ethernet-based networks tomorrow 17

Change Management What is really having an impact on your overall security with NGN? CHANGE MANAGEMENT Decision makers are scared of allowing changes (upgrades/downgrades/workaround deployment) Today most of the deployed NGN-type solutions are never patched Workarounds are sometimes deployed Most of the vulnerable systems hidden behind first line of defense at the edge of the network 18

Summary / Conclusion Next Generations Networks are the future. There's no way back. Full stop. Governments seem more interested in NGN security as part of critical infrastructure protection efforts than vendors and some SPs NGN will keep security people busy for quite some time Q&A 19