VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009



Similar documents
How To Understand How Open Source And Free Software Work Together

Voice over IP (VoIP) using the Session Initiation Protocol (SIP) INF Protokoller og ruting i Internett , UiO Lars Strand

How to make free phone calls and influence people by the grugq

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

An outline of the security threats that face SIP based VoIP and other real-time applications

Voice over IP Security

Voice over IP (SIP) Milan Milinković

Basic Vulnerability Issues for SIP Security

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

Transparent weaknesses in VoIP

Vulnerabilities in SOHO VoIP Gateways

Denial of Services on SIP VoIP infrastructures

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Ingate Firewall/SIParator SIP Security for the Enterprise

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

VOICE OVER IP SECURITY

Analysis of a VoIP Attack

TLS and SRTP for Skype Connect. Technical Datasheet

Formación en Tecnologías Avanzadas

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Multimedia Communication in the Internet. SIP Security Threads. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS 1

SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.

Session Initiation Protocol Security Considerations

Finding VoIP vulnerabilities while you sleep

Media Gateway Controller RTP

VoIP Security. Piero Fontanini

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

SIP Security in IP Telephony

VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

VoIP Security regarding the Open Source Software Asterisk

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

EE4607 Session Initiation Protocol

SIP ALG - Session Initiated Protocol Applications- Level Gateway

Service Provider implementation of SIP regarding security

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

REVIEW OF WEB-BROWSER COMMUNICATIONS SECURITY

SIP: Protocol Overview

Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Technical Bulletin 25751

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

SIP and VoIP 1 / 44. SIP and VoIP

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

802.11: Mobility Within Same Subnet

Security of VoIP. Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks

CE Advanced Network Security VoIP Security

SIP Security Controllers. Product Overview

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

Voice over IP Security

CS5008: Internet Computing

SIP Essentials Training

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

SS7 & LTE Stack Attack

Security Issues of SIP

VoIP. What s Voice over IP?

Hacking Trust Relationships of SIP Gateways

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Multimedia Communication in the Internet. SIP Security Threats. Sven Ehlert Next Generation Network Infrastructure Fraunhofer FOKUS 1

internet technologies and standards

Securing SIP Trunks APPLICATION NOTE.

Session Initiation Protocol

The VoIP Vulnerability Scanner

Voice over IP (VoIP) Vulnerabilities

Introduction to VOIP Security OWASP. The OWASP Foundation. Angad Singh and Rohit Shah

Configuring SIP Support for SRTP

Session Initiation Protocol (SIP)

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011

This specification this document to get an official version of this User Network Interface Specification

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

IP Office Technical Tip

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

VoIP Fraud Analysis. Simwood esms Limited Tel:

Voice Over IP and Firewalls

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

VoIP Security Threats and Vulnerabilities

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

Implementing VoIP monitoring solutions. Deployment note

VoIP Security: How Secure is Your IP Phone?

SIP Trunking Configuration with

Multimedia & Protocols in the Internet - Introduction to SIP

Knut Omang Ifi/Oracle 16 Nov, 2015

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

Three-Way Calling using the Conferencing-URI

NAT TCP SIP ALG Support

Unregister Attacks in SIP

SIP, Session Initiation Protocol used in VoIP

AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

Security issues in Voice over IP: A Review

Première conférence publique à Paris le 21 mars VOIP Security Sjur Usken and Ben Reardon

Recommended IP Telephony Architecture

Storming SIP Security

VOIP SECURITY ISSUES AND RECOMMENDATIONS

End-2-End QoS Provisioning in UMTS networks

Transcription:

VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

"It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed, VoIP is going nowhere." --- Philip Zimmerman on VoIP security in SIP Security, Sisalem et. al. (2009) 2

3

VoIP? Voice over IP (VoIP) protocols and technology is a merge of telecom and data communication What is VoIP? Broad definition: Sending and receiving media (voice/video) over IP Why VoIP? Added functionality and flexibility which may be hard to provide over PSTN Reduced cost uses Internet as carrier Less administration no separate telephone and data network Industry have high focus on VoIP today But, VoIP is known to be insecure Inherits problems from traditional IP networks Multiple attack on SIP based VoIP exists 4

SIP Session Initiation Protocol (SIP) is the de facto standard signaling protocol for VoIP Application layer (TCP, UDP, SCTP) Setting up, modifying and tearing down multimedia sessions Not media transfer (voice/video) Establishing and negotiating the context of a call RTP transfer the actual multimedia SIP specified in RFC 3261 published by IETF 2002 First iteration in 1999 (RFC2543) ten years old Additional functionality specified in over 120 different RFCs(!) Even more pending drafts... Known to be complex and sometimes vague difficult for software engineers to implement Interoperability conference - SIPit 5

SIP specification huge, complex and sometimes vague 6

Excerpts from an email posted on IEFT RAI mailing list: I'm finally getting into SIP. I've got Speakeasy VoIP service, two sipphone accounts, a Cisco 7960 and a copy of x-ten on my Mac. And I still can't make it work. Voice flows in one direction only. I'm not even behind a NAT or firewall -- both machines have global addresses, with no port translations or firewalls. I've been working with Internet protocols for over 20 years. I've implemented and contributed to them. And if *I* can't figure out how to make this stuff work, how is the average grandmother expected to do so? SIP is unbelievably complex, with extraordinarily confusing terms. There must be half a dozen different "names" -- Display Name, User Name, Authorization User Name, etc -- and a dozen "proxies". Even the word "domain" is overloaded a half dozen different ways. This is ridiculous! Sorry. I just had to get this off my chest. Regards, Reference: http://www.ietf.org/mail-archive/web/rai/current/msg00082.html 7

SIP example Direct call UA to UA Caller must know callee's IP or hostname No need for intermediate SIP hosts Problems: Traversing firewalls Seldom know IP/hostname of user Mobility change IP/hostname 8

SIP example proxied call 9

SIP message syntax - INVITE Start line (method) Message headers Message body (SDP content) INVITE sip:bob@nr SIP/2.0 Via: SIP/2.0/UDP 156.116.8.106:5060;rport;branch=z9hG4bK From: Alice <sip:alice@nr>;tag=2093912507 To: <sip:bob@nr> Contact: <sip:alice@156.116.8.106:5060> Call-ID: 361D2F83-14D0-ABC6-0844-57A23F90C67E@156.116.8. CSeq: 41961 INVITE Max-Forwards: 70 Content-Type: application/sdp User-Agent: X-Lite release 1105d Content-Length: 312 v=0 o=alice 2060633878 2060633920 IN IP4 156.116.8.106 s=sip call c=in IP4 156.116.8.106 t=0 0 m=audio 8000 RTP/AVP 0 8 3 98 97 101... 10

VoIP threat taxonomy* Social threats Eavesdropping A method by which an attacker is able to see the entire signaling and/or data stream, and can also modify the traffic Service abuse A method by which an attacker is able to monitor the entire signaling and/or data stream Interception and modification Balancing security and privacy. Unsolicited calls, intrusion of users privacy, fraud, identity theft and misrepresentation of identity or content A large category of improper use including fraud, improper bypass, billing fraud, bypassing authentication, call conference abuse,... Interruption of service Can be classified into general and VoIP specific Denial of Service (DoS), physical intrusion, resource exhaustion, loss of external power, performance latency. *) VoIP Security and Privacy Threat Taxonomy, VOIPSA (2005) http://www.voipsa.org/ 11

Example VoIP scenario 12

Social threats Eavesdropping the environment (Mis)Configure phone to accept SIP header Alert-Info: Ring Answer Example: Asterisk and Polycom SoundPoint IP550: exten => XXXXXXXX,n,SIPAddHeader(Alert-Info: Ring Answer) exten => XXXXXXXX,n,Dial(SIP/XXXXXXXX,1) The phone silently answer the incoming call. Audio from the environment is transmitted to the caller. 13

Eavesdropping Traffic capture (release of message contents) i.e. wiretapping/record the call Call pattern tracking (traffic analysis) i.e. I know a call took place 14

Eavesdropping - tools Any tool that can sniff (and analyze) network traffic tcpdump, wireshark, Problem: Must control one intermediate host/network link. 15

Interception and modification Call hijacking - Take over a SIP INVITE session: 16

Interception and modification - tools SiVuS SIP generator (and more) 17

Service abuse Registration attack Weak/no password Example: Company X used the last three digits in the phone number as password SIP REGISTER with digest authentication example Misconfiguration Services not used Web-GUI default password Moore said what made the hacking job so easy was that 70% of all the companies he scanned were insecure, and 45% to 50% of VoIP providers were insecure. The biggest insecurity? Default passwords. http://www.informationweek.com/news/internet/showarticle.jhtml?articleid=202101781 18

DoS attack is HARD! Why: KISS (and brutally effective) 19

Interruption of Service (aka. DoS attack) VoIP DoS attack Flooding with SIP INVITE or REGISTER SIP messages are (often) not authenticated Most hard-phones have limited hardware Results: Crash, halt or degrade performance of device Normal DoS attack Below application layer in the network stack UDP/TCP or just IP/ICMP An Distributed DoS (DDoS) with spoofed sender IP effective and hard to protect against 20

DDoS for sale Russian ad for launching DDoS VoIP attack against an competitor: The ad scrolls through several messages, including "Will eliminate competition: high-quality, reliable, anonymous." "Flooding of stationary and mobile phones." "Pleasant prices: 24-hours start at $80. Regular clients receive significant discounts." "Complete paralysis of your competitor/foe." Flooding of victims phones can be devastating SPIT can also turn out to be a major problem Reference: http://isc.sans.org/diary.html?storyid=5380 21

Part 2: Security mechanisms 22

Secure communication To secure the communication between two parties: 1) Mutual authentication 2) Key exchange enables the participant to obtain a shared secret 3) Symmetric cryptographic algorithms enables the communication to be integrity protected and confidential 23

Secure SIP Basically: SIP + TLS = SIPS The same security mechanism as https Solves a lot of security threats and provides integrity protection confidentiality (encryption) stronger authentication (certificates) Problem: Intermediate SIP proxies need to read/edit SIP headers. Solution: TLS only provide single hop of confidentiality and authentication (between SIP proxies) If a proxy don't support SIPS, it must decline the request. What if one proxy cheats? 24

Media security: SRTP Basically: RTP + TLS = SRTP Again: The same security mechanism as https Solves a lot of security threats and provides integrity protection confidentiality (encryption) stronger authentication (certificates) 25

Why so hard? Cryptography provides reasonable solutions to all known security problems Why then is security an issue at all? Security mechanisms are deployed partially or not at all VoIP uses multiple components in an already complex architecture 26

27

Highly relevant issue: Monitoring What do you use to monitor your infrastructure? Do you know what is going on? How much CPU load? Network utilization? Number of SIP calls at this moment? Do you know or do think you know? What tools do you use? Munin? Nagios? MRTG? 28

Thank you Project homepage: http://eux2010sec.nr.no 29