VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors



Similar documents
Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

An outline of the security threats that face SIP based VoIP and other real-time applications

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Voice Over IP (VoIP) Denial of Service (DoS)

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

VoIP Security: How Secure is Your IP Phone?

Best Practices for Securing IP Telephony

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Footprinting. Vendor press releases and case studies Resumes of VoIP personnel Mailing lists and user group postings Web-based VoIP logins

Recommended IP Telephony Architecture

Voice over IP Security

Voice Over IP and Firewalls

Basic Vulnerability Issues for SIP Security

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Securing SIP Trunks APPLICATION NOTE.

Ram Dantu. VOIP: Are We Secured?

Threat Mitigation for VoIP

VOICE OVER IP SECURITY

Conducting an IP Telephony Security Assessment

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Intrusion Prevention: The Future of VoIP Security

Ingate Firewall/SIParator SIP Security for the Enterprise

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Presenter. Zane Ryan. Director Dot Force

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Villains and Voice Over IP

Evaluation of Security and Countermeasures for a SIP-based VoIP Architecture

DEPLOYING VoIP SECURELY

Transparent weaknesses in VoIP

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP

VOIP TELEPHONY: CURRENT SECURITY ISSUES

IPTCOMM 2008 Heidelberg. VoIP Security: Do Claims of Threats Justify Continued Research Efforts? Jonathan Zar. Pingalo VOIPSA

Vulnerabilities in SOHO VoIP Gateways

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

Deployment of Snort IDS in SIP based VoIP environments

SIP Trunking Configuration with

Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Security issues in Voice over IP: A Review

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006

A Lightweight Countermeasure to Cope with Flooding Attacks Against Session Initiation Protocol

SIP Intrusion Detection and Response Architecture for Protecting SIP-based Services

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

SIP SECURITY. Status Quo and Future Issues. 23. Chaos Communication Congress: , Berlin, Germany

Securing Enterprise VoIP. VoIP Vulnerabilities Patrick Young CEO Arlinx Inc.

VOIP SECURITY ISSUES AND RECOMMENDATIONS

MAC Based Routing Table Approach to Detect and Prevent DDoS Attacks and Flash Crowds in VoIP Networks

Just as the ecommerce companies have

Securing VoIP Networks using graded Protection Levels

Chapter 8 Security Pt 2

The #1 Issue on VoIP, Fraud!

How to make free phone calls and influence people by the grugq

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

A Reality Check on Security in VoIP

CS5008: Internet Computing

VoIP Security Methodology and Results. NGS Software Ltd

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

DoS/DDoS Attacks and Protection on VoIP/UC

Is Your Network Ready for VoIP?

Perspective on secure network for control systems in SPring-8

1152 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007

PENTEST. Pentest Services. VoIP & Web.

Data Security in a Converged Network

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

How To Support An Ip Trunking Service

Cisco ASA 5500 Series Unified Communications Deployments

VoIP Security regarding the Open Source Software Asterisk

Session Initiation Protocol Security Considerations

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk

Implementing VoIP monitoring solutions. Deployment note

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011

How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker

Threats to be considered (1) ERSTE GROUP

How To Prevent Hacker Attacks With Network Behavior Analysis

CE Advanced Network Security VoIP Security

Managing Risks at Runtime in VoIP Networks and Services

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

A Model-based Methodology for Developing Secure VoIP Systems

Voice over IP Security

Unregister Attacks in SIP

Models of Secure VoIP Systems. VoIP Security Best Practice. Vol. II. Models of Secure VoIP Systems (Version: 1.2) NEC Corporation

SS7 & LTE Stack Attack

BEng (Hons) Telecommunications. Examinations for / Semester 1

Hacking VoIP Exposed. David Endler, TippingPoint Mark Collier, SecureLogix

/07/$ IEEE

Multi-layered Security Solutions for VoIP Protection

SIP Security in IP Telephony

SIP Security Status Quo and Future Issues Jan Seedorf

IxLoad-Attack: Network Security Testing

IP Phone Security: Packet Filtering Protection Against Attacks. Introduction. Abstract. IP Phone Vulnerabliities

Transcription:

VoIP Security Threats and Countermeasures Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

Agenda Increasing awareness of VoIP security Top VoIP security threats Best current practices Ongoing research efforts

Industry Activity VoIP Security Alliance (VOIPSA) launched in 2005 Mission: To promote VoIP security research, education and awareness To become a one-stop source of testing tools/methodologies Membership: Over 100 members on the Technical Board Include NTT, Mitel, Avaya, Nortel, Siemens, Alcatel, Extreme Networks, AT&T, Verizon, Columbia University VOIPSEC mailing list for discussion of VoIP security issues Projects: Threat taxonomy, best practices etc

VoIP Security Threat Taxonomy Refer to http://www.voipsa.org for more details

Conference Activity

VoIP Security Books 2004 2006 2007 2008 Source: http://www.amazon.com

Zero Day Auctions Now Include VoIP Source: WabiSabiLabi Home Page 26 June 2008

VoIP Attack Tools Now Available Online http://www.hackingvoip.com/ http://www.voipsa.org/resources/tools.php More than 80 VoIP attack/security tools known (still increasing)

Agenda Increasing awareness of VoIP security Top VoIP security threats Best current practices Ongoing research efforts

Finding Targets using Google Cisco Grandstream Sipura Polycom VoIP phones with built-in web servers to allow easy configuration May be indexed by Google if connected to the Internet without any protection Can easily find these phones using keywords included in the default URLs

SPIT SPam over Internet Telephony Definition: Automated telemarketing calls (excluding human calls) Not yet a problem due to the small number of VoIP users Can be more serious than PSTN marketing calls Can be easily automated Can be performed at low cost Can perform broadcast No country barrier in terms of call charges -> large scale Yahoo!BB Phone incidents in Japan 2004/2 Unsolicited commercial messages for an adult website 2004/8 "Number scanning" for active VoIP phone numbers (050- [provider code]-xxxx) at the rate of 6000 calls/day 2004/11 Unsolicited automatic messages asking for personal information Contracts with these spammers are terminated by the provider

SIP Scanning Send requests (REGISTER OPTIONS etc) with various spoofed originating UID to a SIP server Servers that respond with different replies for valid and invalid UIDs may be exploited

Example: SIPSCAN

Flood-based DoS Attacks VoIP is vulnerable to flood-based DoS attacks at various layers General DoS attacks target at TCP/IP Same threats to any web server on the Internet VoIP-specific DoS attacks target at UDP-based SIP and RTP Flood of bogus signaling packets may overload CPU of any SIP server or UA Flood of bogus RTP packets may degrade audio stream quality Tools available: kphone-ddos, RTP flooder, SIPBomber, SIPsak, Scapy, IAXFlooder, Seagull and SIPsak

Retrieve IP Address Motivation Method Send arbitrary packets to the target Call the target and sniff the incoming packets Contact info in 200 OK Source IP of the incoming RTP IP address of the target included

Fuzzing Attacks Send malformed SIP messages Buffer overflow Via: SIP/2.0/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Integer anomalies Content-Length: -1 Invalid addresses INVITE sip:user@-1.-1.-1.-1 SIP/2.0 Structural anomalies Cseq: 7038 INVITE a1 a2 a3 a4 a5 a6 a7 a8 a9 a10 Can either crash the target or execute arbitrary code

Eavesdropping INVITE SIP Proxy A INVITE OK SIP Proxy B Intercept signaling packets to analyze call patterns INVITE OK OK Alice RTP Bob Intercept conversation

Eavesdropping Scenarios Wireless LAN with weak security Physical access to intermediate network nodes UA vulnerability ARP-Spoofing

Agenda Increasing awareness of VoIP security Top VoIP security threats Best current practices Ongoing research efforts

How to avoid being Googled Follow the product guidelines Disable the web server Apply necessary security measures (FW, NAT etc) Use Google to look for exposed devices in one s company

Use VoIP Firewalls VoIP clients use various RTP ports to connect with their peers outside. Statically opening all possible ports using a regular firewall introduces new threats. VoIP firewall Dynamically open/close necessary ports through stateful inspection of VoIP traffic ( pinhole ) Inspecting the SDP payload in an INVITE message, extract the UDP port number to be used and open the port before the session starts Close the port when the BYE message corresponding to the session is detected Hide IP addresses of VoIP clients using NAT to prevent them from being direct targets on the Internet

Segregation of VoIP Network Segregate data and voice networks using VLAN etc Minimize impact on voice network from sudden traffic surge caused by PCs infected by worms on data network Reduce the risks of eavesdropping Prevent broadcast traffic on data network from entering VoIP network To further prevent unauthorized machines from accessing and attacking voice network IEEE802.1x MAC address filtering Allows only dedicated VoIP appliances on voice network (less programmability, less risk to be exploited) What to do with soft phones (e.g. X-Lite)? Don t allow them on mission-critical voice networks Restrict installation of applications Deploy immune networks

Software Updates Check various sources for new vulnerability information Source VOIPSA Blue Box CERT/CC JPCERT/CC IPA Vendor HP Description New VoIP security/attack tools Blog and mailing list discussions VoIP security-related podcast Tutorials Security incident report SIP vulnerability report (Japanese only) New firmware and patches URL http://www.voipsa.org/ http://www.blueboxpodcast. com/ http://www.cert.org http://www.jpcert.or.jp http://www.ipa.go.jp

Penetration Tests Conduct simulated attacks using tools available on http://www.voipsa.org/resources/tools.php PROTOS/Codenomicon (fuzzing) SIPSCAN SiVuS SIPBomber...etc Verification criteria Terminal status Connection status QoS

Encryption Securing the signaling channel IPSec TLS/DTLS Securing the media channel IPSec SRTP (two candidates for SRTP key exchange now at IETF) DTLS-SRTP ZRTP

Vendor Solutions Arbor Networks (http://www.arbornetworks.com) Borderware (http://www.borderware.com) Captus Networks (http://www.captusnetworks.com) Cisco Riverhead (http://www.cisco.com) Ingate (http://www.ingate.com) Mazu Networks (http://www.mazunetworks.com) Mirage Networks (http://www.miragenetworks.com) SecureLogix (http://www.secuirelogix.com) Sipera (http://www.sipera.com) TippingPoint (http://www.tippingpoint.com) TopLayer (http://www.toplayer.com)

Agenda Increasing awareness of VoIP security Top VoIP security threats Best current practices Ongoing research efforts

Research Opportunities in VoIP Security VoIP-specified DDoS attacks SPIT Adaptive detection against fuzzing attacks

NTT s SIP Guard for SIP-specific DoS attacks Eric Y. Chen, "Detecting DoS Attacks on SIP Systems", IEEE workshop on VoIP Management and Security at NOMS 2006, Canada, April 2006

NEC s VOIP SEAL Roman Schlegel, Saverio Niccolini, Sandra Tartarelli, Marcus Brunner SPam over Internet Telephony (SPIT) Prevention Framework, GLOBECOM 2006

Other Research Efforts Gaston Ormazabal, Secure SIP: A scalable prevention mechanism for DoS attacks on SIP based VoIP systems, IPTCOMM 2008 Charles Shen, SIP Server Overload Control: Design and Evaluation, IPTCOMM 2008 Mohamed Nassar, Holistic VoIP Intrusion Detection and Prevention System, IPTCOMM 2007 Jens Fiedler, VoIP Defender: Highly Scalable SIP-based Security Architecture, IPTCOMM 2007 Ge Zhang, Denial of Service Attack and Prevention on SIP VoIP Infrastructures Using DNS Flooding, IPTCOMM 2007

Conclusion VoIP is still an emerging technology, so is its security framework No such thing as perfect security, but risks can be significantly reduced using currently available solutions Challenges for Vendor Increase effort devoted to software engineering practices to minimize implementation flaws Provider User Learn to securely integrate different physical components (SIP servers, SIP clients) and solutions from multiple vendors Be aware of the new threats introduced by VoIP