Black Box Analysis and Attacks of Nortel VoIP Implementations



Similar documents
The Trivial Cisco IP Phones Compromise

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Conducting an IP Telephony Security Assessment

Recommended IP Telephony Architecture

1. Firewall Configuration

CS5008: Internet Computing

co Characterizing and Tracing Packet Floods Using Cisco R

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

VoIP Security: How Secure is Your IP Phone?

Voice Over IP (VoIP) Denial of Service (DoS)

An outline of the security threats that face SIP based VoIP and other real-time applications

Best Practices for Securing IP Telephony

CSCE 465 Computer & Network Security

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Stateful Firewalls. Hank and Foo

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

VoIP Security regarding the Open Source Software Asterisk

Solution of Exercise Sheet 5

Villains and Voice Over IP

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Threats to be considered (1) ERSTE GROUP

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

VoIP Security Methodology and Results. NGS Software Ltd

Knowledgebase Solution

Load Balance Router R258V

An Introduction to VoIP Protocols

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Challenges and opportunities for Open Source solutions

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Enumerating and Breaking VoIP

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

A S B

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Client Server Registration Protocol

Grandstream Networks, Inc. UCM6100 Security Manual

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Attack Lab: Attacks on TCP/IP Protocols

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

LifeSize Video Communications Systems Administrator Guide

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

A Very Incomplete Diagram of Network Attacks

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Configuration Notes 0217

Intrusion Prevention: The Future of VoIP Security

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Application Note. Onsight Connect Network Requirements V6.1

General Network Security

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

P160S SIP Phone Quick User Guide

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

CIT 380: Securing Computer Systems

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Security Technology White Paper

Securing SIP Trunks APPLICATION NOTE.

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Vanguard Applications Ware IP and LAN Feature Protocols. Firewall

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

CMPT 471 Networking II

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Network Security. Network Packet Analysis

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

RN Rev 02 Release Note Release 1.4.3

Network Traffic Analysis

Cisco 504 IP phone. An Administrator's Guide

Note: these functions are available if service provider supports them.

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewalls. Ahmad Almulhem March 10, 2012

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Application Note - Using Tenor behind a Firewall/NAT

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Welcome. Unleash Your Phone

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

CISCO IOS NETWORK SECURITY (IINS)

DLink-655 Router Configuration Guide for VoIP

NetComm V90 VoIP Phone Quick Start Guide Draft Release 0.1

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

How To Configure Voice Vlan On An Ip Phone

SIP Trunking Configuration with

About Firewall Protection

IPPBX FAQ. For Firmware Version: V2.0/V

Zed One Hosted VoIP Telephony User Guide. A document to provide end user guidance on enterprise-class Hosted VoIP Telephony solution.

Vulnerability Scan. January 6, 2015

Firewall Defaults and Some Basic Rules

Intrusion Detection, Packet Sniffing

Ingate Firewall/SIParator SIP Security for the Enterprise

Broadband Phone Gateway BPG510 Technical Users Guide

CMS Operational Policy for Firewall Administration

Transcription:

Black Box Analysis and Attacks of Nortel VoIP Implementations Richard Gowman, CISSP Eldon Sprickerhoff, CISSP CISA www.esentire.com Copyright 2007 esentire, Inc.

Who we are... esentire, Inc. Based out of Cambridge, ON. Collaborative Threat Management (Ongoing Security Analysis, Penetration Testing) Established in 2001.

Why Are We Speaking? Engaged in VoIP Security Analysis Nortel always seemed to get off easy (most attention paid to Cisco and Avaya?) We have several clients that use Nortel IP Telephony.

Overview Misconceptions about Nortel IP Telephony Physical Traffic Capture Configuration Protocols Attack Tree Implementation Weaknesses Remedies Against Attacks Nortel's Responses Tidbits

Misconceptions Voodoo Implemented by external consultants Not fully understood by Voice group Not fully understood by Network group Security == Chicken Little

Misconceptions Nortel uses a proprietary protocol and it's impossible to eavesdrop or extract the conversation. I did a packet capture and only got VLAN tagged data. We're OK it's segregated from the data network. Haven't seen any tools on the Net. ncircle didn't find anything. We're getting a SIP firewall.

On The Wire Hub/Bridge combo VLAN if necessary We used OpenBSD bridge/vlan combo.

Run Through Possible Traffic reboot_phone offhook_and_hangup offhook_onedigit_hangup call_internal_no_answer call_internal_answer internal_call_us internal_call_no_pickup internal_call_us_answer speakerphone_nocall speakerphone_call speakerphone_call_answer redial redial_answer change_volume disconnect_server_cable disconnect_server_cable_in_conversation disconnect_client_cable_in_conversation nmap_client external_call_in call_external And so on...

( 1 ) Protocols It sure ain't SIP, baby. ( UNIStim ) Unified Networks IP Stimulus US Patent 7068641 Canadian Patent 2273657

UNIStim Some details can be found in Asterix doc'n But didn't seem to necessarily mesh with (? version what we found (possibly an older

UNIStim UDP protocol Contains a sequence number, a few flags, and commands/parameters

UNIStim Sequence Number Sequence number increments by 1 for each packet. Both client and server appear to ignore packets with incorrect sequence number ( back (although they still send an ACK

UNIStim Flags Flag1: 0x00 Error, 0x01 ACK, 0x02 PUSH Flag2: 0x00 ServerACK/Irrelevant, 0x01 ( server server (to client), 0x02 client (to Tag: (Client only) 4 bytes that the server will instruct the client to use cmd/sub cmd: These fields are combined to give the instruction to the client/server.

Network Capture ( DHCP ) Headset boots up ( UNIStim ) Initial conversation with PBX RTP packets sent directly between two phones

UNIStim Again, not SIP. Nortel will tell you that they support SIP and H.323 IP sets themselves only speak UNIStim. SIP functionality available through UNIStim Terminal Proxy Server Not Open Source UNIStim channel driver exists for Asterix.

Security Considerations Confidentiality Integrity Availability

Confidentiality For Phone Call Easy to sniff and reassemble phone conversations. (Ethereal/Wireshark can do it right out of the box for any RTP (. stream For Control Stream Also easy to sniff UNISTim packets, so you can see exactly who the phone is calling.

Integrity For Phone Call RTP also has a sequence number, so must sniff it before being able to inject. Nothing prevents you from modifying packets as they pass through... For Control Stream Seq number (in theory!) means that you must sniff an RTP packet first, and then can take over the stream. Again, nothing prevents you from modifying the packets in transit...

Availability For Phone Call Determine seq number and spoof some packets. The other end now hears what you want (which could be (. all nothing at For Control Stream Determine seq number and tell the phone to do whatever you want it to do (including (. up hanging

( 2 ) Availability For Phone Start sending it packets (with a valid sequence number.) If you don't do everything properly, you'll confuse the phone and cause it to reboot (which takes a few (. minutes For Call Manager Of course, nothing works if you can take down the Call Manager. (More on (: later... this

Attacks/Recon SYN Floods Network Mapping Fuzzing Brute Force Pass UNISTim seq num brute force Pickup/Hangup Media Card RTP injection ChangeDisplay Dial Terminate Conn Force Conn Open

This is UNIX. I know this! nmap shows: tcp/21 tcp/23 tcp/80 tcp/111 tcp/513 udp/5060 udp/161 icmp

What else? SNMP: OID 1.3.6.1.2.1.1.1 (sysdescr, ( Release sysuptime, Software SNMP community name: public FTP, HTTP: VxWorks ICMP: Timestamp

SYN Floods Server well defended against flood of half open packets. But the protocol appears to be weakly defended against fuzzing attacks.

Atemi Send random crap to ports Create a broadfisted DoS (works well against TCP). Take down the Primary, helps to find Secondary and Tertiary servers.

Pickup/Hangup Send many (100k) Pickup/Hangup packets Servers not well defended against this (fall down, go boom). Some firmware appears to defend against this attack.

RTP Packet Injection ( waveform Inject tone (square Ouch! Works both in band and out of band (caveat about sequence numbers).

UNISTim Seq Num Brute Force Sequence number for UNISTim packets appears to be 32bits. Unless you can sniff a packet, you must guess and 32bits is too large (due to hardware limitations on the (. themselves phones However, from observation, the first 16 bits always seem to be 0. This makes a brute force attack on the sequence number very (. so feasible. (About a minute or

Dial Cause a phone to dial any number you want. Want to get that annoying co worker fired? Just about any 1 900 number will do (unless they're blocked). Keep initiating calls from your boss to the CEO (or their spouse marital discord).

Terminate Connection Causes a connection to be closed. Inject one packet towards server saying client has hung up. Also inject one packet towards client saying other side has hung up.

Force Conn Open Initiate a phone call without recipient knowing. Why wait for a phone call in order to listen in to your victim?

Brute Force Admin Password ADMIN1 Telnet is probably your best bet. Try 1111 as the password first.

Media Card Tidbits Tertiary IP telephony provisioning 32 phones per card Doesn't require a separate PBX (apparently). Only has UDP ports open (not susceptible to TCP SYN attacks). But appears to be particularly susceptible to protocol sensitive fuzzing attacks.

Media Card One Packet DoS Hex Example UDP SRC Port: 5000, DST Port: 5100 HEX DATA DELETED UNTIL ISSUE RESOLVED

Official Nortel Position Securing Multimedia & IP Telephony Instant Secure Multimedia Zone Secure ( SMC ) Multimedia Controller 2450 Virtual moat around servers (. etc Stateful filters (SIP, H.323, Denial of Service defence engine Secure UNIStim encryption proxy 802.1X with EAP SRTP Gratuitous ARP Denial, Switch Lockdown

Security is a PITA Easy to ignore (Just get it working!) Adds overhead Can limit debugging capability Compatibility issues (conference calls, etc.) Major PITA to add after the fact

Configuration Limit administration access. Lock down protocols (some firewall functionality exists in the product itself).

Finally... ChangeDisplay Tell the phone what to display Could use to display caller id name/number Plus, it's a lot of fun...

UNIStimpy: Slides and Code http://www.esentire.com/unistimpy Code coming soon! Shameless Plug: We consult!