VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011



Similar documents
Voice over IP: Risks, Threats, and Vulnerabilities. Angelos D. Keromytis Network Security Lab Columbia University

Overview of VoIP Systems

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

VOICE OVER IP SECURITY

Basic Vulnerability Issues for SIP Security

Voice over IP Security

How to make free phone calls and influence people by the grugq

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

Security issues in Voice over IP: A Review

An outline of the security threats that face SIP based VoIP and other real-time applications

TECHNICAL CHALLENGES OF VoIP BYPASS

Securing SIP Trunks APPLICATION NOTE.

VoIP Security regarding the Open Source Software Asterisk

SIP and VoIP 1 / 44. SIP and VoIP

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Kommunikationsdienste im Internet Möglichkeiten und Risiken

Recommended IP Telephony Architecture

SIP Security Controllers. Product Overview

Best Practices for Securing IP Telephony

A Comparative Study of Signalling Protocols Used In VoIP

VOIP SECURITY ISSUES AND RECOMMENDATIONS

CE Advanced Network Security VoIP Security

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

Ram Dantu. VOIP: Are We Secured?

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Voice Over IP and Firewalls

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

SIP Trunking Configuration with

Ingate Firewall/SIParator SIP Security for the Enterprise

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

VoIP Security Methodology and Results. NGS Software Ltd

Threat Mitigation for VoIP

CS5008: Internet Computing

Threats to be considered (1) ERSTE GROUP

SS7 & LTE Stack Attack

VOIP Security Essentials. Jeff Waldron

Transparent weaknesses in VoIP

Application Note. Onsight Connect Network Requirements V6.1

a look at VoIP vulnerabilities

An Overview on Security Analysis of Session Initiation Protocol in VoIP network

TLS and SRTP for Skype Connect. Technical Datasheet

Securing VoIP Networks using graded Protection Levels

nexvortex SIP Trunking Implementation & Planning Guide V1.5

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Voice over IP (VoIP) Vulnerabilities

Chapter 2 PSTN and VoIP Services Context

Intrusion Prevention: The Future of VoIP Security

VOICE OVER IP (VOIP) TO ENTERPRISE USERS GIOTIS KONSTANTINOS

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

White paper. SIP An introduction

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VIDEOCONFERENCING. Video class

Session Border Controllers in Enterprise

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

How To Use A Phone Over Ip (Phyto) For A Phone Call

How To Protect Your Phone From Being Hacked By A Man In The Middle Or Remote Attacker

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Formación en Tecnologías Avanzadas

SIP A Technology Deep Dive

Challenges and opportunities for Open Source solutions

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

SIP SECURITY WILEY. Dorgham Sisalem John Floroiu Jiri Kuthan Ulrich Abend Henning Schulzrinne. A John Wiley and Sons, Ltd.

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Voice over IP Security

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

SIP Essentials Training

ETM System SIP Trunk Support Technical Discussion

Best Practices for SIP Security

Just as the ecommerce companies have

SIP, Session Initiation Protocol used in VoIP

Internet Security. Prof. Anja Feldmann, Ph.D.

802.11: Mobility Within Same Subnet

Unit 23. RTP, VoIP. Shyam Parekh

Overview of Voice Over Internet Protocol

Mitigating the Security Risks of Unified Communications

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

For other titles published in this series, go to

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Vulnerabilities in SOHO VoIP Gateways

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Voice Over IP (VoIP) Denial of Service (DoS)

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Security & Reliability in VoIP Solution

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CHAPTER 1 INTRODUCTION

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Transcription:

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 *Thanks to Prof. Angelos Keromytis for materials for these lecture slides. CSE545 - Advanced Network Security - Professor McDaniel 1

Example of toll fraud attack Break into company PBX use them to route calls of your customers this has actually happened http://www.theregister.co.uk/2006/06/08/voip_fraudsters_nabbed/ http://www.theregister.co.uk/2009/02/11/fugitive_voip_hacker_arrested/ Federal authorities yesterday arrested a Miami man who they said made more than $1 million in a hacking scheme involving the resale of Internet telephone service. In all, more than 15 Internet phone companies, including the one in Newark, were left having to pay as much as $300,000 each in connection fees for routing the phone traffic to other carriers without receiving any revenue for the calls, prosecutors said. 2

What is VoIP/IMS? Protocol(s) for voice communication over IP-based infrastructures use of the Internet itself is dependent on operator Voice over IP: catch-all term for numerous kinds of media Generally applied to voice and conference oriented products and services, e.g., Skype IP Multimedia Subsystem: industry standard for IP-based multimedia communications Video, Calendaring/scheduling File-sharing Collaborative editing,... 2 3

VoIP in the marketplace Basis for many products/services commercial: Vonage, 3, T-Mobile/UMA, T-Mobile@Home,... free/semi-free: Skype, GTalk, MSN, Yahoo! IM, AIM, Gizmo,... Both enterprise- and consumer-oriented management simplification cost reduction Various architectural models centralized vs. P2P open vs. closed 4

Useful Terms codec - coder/decoder Program (not format) used to process media-specific data SDP - session description protocol Standard for describing media session parameters 5

VoIP Protocols Signaling Responsible for call setup and management Architectural and operational components Principal/endpoint naming, IP mapping, proxying, billing, access control, device configuration/management, customer support, QoS Data transport Codecs, transport protocols (typically RTP), QoS, content security signaling Dominant mechanisms Session Initiation Protocol (SIP) Unlicensed Mobile Access (UMA) Others: Skype, Asterisk, GTalk/ AIM... Useful terms codec - coder/decoder program (not format) used to process media-specific data SDP - session description protocol is a standard for describing media session parameters 6

Session Initiation Protocol (SIP) IETF Standardized signaling for IMS (among others) Similar to HTTP Text-based Request/response structure Stateful - highly complex state machine TCP or UDP (port 5060) Devices End-points (soft phones or hardware devices) Proxy servers (local services acting on behalf of phone) Registrars (local point to register with network) Redirect servers (redirects calls) Location server (VoIP HLR) 7

SIP Flow 8

SIP/RTP Call progress 1. Locate endpoint* [SIP] 2. Establish call [SIP] 3. Data Transfer [RTP] 4. Hangup [SIP] *not shown 9

Call forwarding 10

SIP Call Flow 11

Real-time Transport Protocol (RTP) RTP is a pair of protocols designed to support applications with latency and jitter constraints Supports the tightly controlled delivery of stream data, E.g., require some hard or soft QoS (quality of service) Protocols using ephemeral ports (1025-65535) RTCP (Real-Time Control Protocol) provides signaling between peers that measures and adjusts session to compensate for changing conditions RTP - the data channel that delivers the data SDP sometimes used to describe the session requirements, as negotiated through SIP Standards support a range of codecs, e.g., RFC 3016.., 12

In reality... Much hidden shared infrastructure DNS, web, NAT, TFTP, DHCP/PPPoE, Int/DiffServ, firewalls,... Emergent properties example: web-based UI poisoning through SIP-field manipulation Live aspect makes problems harder e.g., how can we filter voice spam based on content? 2 13

SIP Security Largely the ad hoc application of existing general-purpose security mechanisms Authentication uses HTTP-style digest authentication TLS - when TCP is used S/MIME - used to encode/secure payloads IPsec - can be used to secure any protocols run over IP Secure Real-time Transport Protocol (SRTP) - crypto extensions to protect real-time sessions, e.g., encrypt the voice channel Implication: security largely pushed on infrastructure 14

SIP authentication 2 15

Unlicensed Mobile Access (UMA) Route GSM calls over the Internet (or a public network) (usually) transparent handover between GSM and UMA Popular with cellphone providers T-Mobile USA, Orange France,... Benefits reduce need to install expensive cell towers / upgrade capacity reduce spectrum needs / utilization improve reception in difficult locations depending on billing, avoid roaming charges (think international!) Not to be confused with pico-/micro-/femto-cells 2 16

UMA deployment Source: http://www.umatechnology.org/ 2 17

UMA details Encapsulation of GSM/3G inside IP complete frame, minus the on-the-air crypto can transfer voice, IM and (in the future) video Typically, devices are WiFi-supporting cellphones not strictly necessary, e.g., T-Mobile@Home in USA GSM frames are not natively protected A5/2 is anyway weak (i.e., broken) 2 18

UMA Security Handset-to-provider IPsec Strong crypto and integrity protection Key management (IKE, IKEv2) is a different story altogether Authentication done via EAP-SIM (based on shared secret) The key management protocol (IKE/IKEv2) is complex Perhaps too big to be trusted More importantly, easy to misconfigure not as big a problem in a tightly managed environments (cellphones) but, UMA+smartphones spells trouble Provider must interface internal network with Internet higher risk of compromise by external attackers large numbers of potentially malicious insiders 19

Threat in VoIP systems Everyone thinks of the traditional C/I/A threats Loss of communication confidentiality and privacy (C) traffic analysis, content privacy Loss of communication integrity (I) impersonation (inbound, outgoing calls), modification of content, falsification of call records Loss of communication availability (A) accidental or intentional denial of service (DoS) 20

Unique VoIP characteristics Elaborate billing infrastructure in place Users are used to paying for telephony services Most charges are for relatively small amounts Large number of charges per billing cycle unlikely that small unauthorized charge will be noticed or challenged Phone infrastructure is trusted by average user perception carried over from PSTN not grounded on facts or experience 21

VoIP-Specific Threats and Risks Theft of service, e.g., toll fraud, billing fraud Social engineering, e.g., phishing/spear-phishing Direct charge-back, e.g., immediate monetization Risks Some in common with other types of systems (software vulnerabilities) Some are very specific to IMS (protocol vulnerabilities) Some are common, but are amplified by some IMS feature, e.g., large-scale phishing through impersonation or call hijacking Q: are these substantially different than in cell networks? 22

VoIP/IMS risk vectors Variety of risk vectors some in common with other types of systems software vulnerabilities some are very specific to IMS protocol vulnerabilities some are common, but are amplified by some IMS feature large-scale phishing through impersonation or call hijacking 2 23

VoIP Security Alliance SPIT/SPAM 6 Interruption of services 1 Social threats ID misrepresentation 5 Physical access VoIPSA Threat Taxonomy 2 Eavesdropping, interception, modification 4 Service abuse 3 Denial of Service 24

VoIP vis. risks Confidentiality in some protocols, attackers can easily eavesdrop variety of available attack tools, e.g., VoMIT particularly a problem with SIP/RTP S-RTP defined, but largely unused key management problem still unsolved (where s my PKI?) Integrity software vulnerabilities for example, as vulnerable to buffer overflows as any other piece of software silver lining: even simple devices are generally designed for updateability mixed blessing, update mechanism can be hijacked (usually based on TFTP!) 2 25

VoIP vis. risks Availability susceptibility of equipment to denial of service general network-borne DoS attacks, powerline,... how do you call someone to fix your problem?! 26

IMS-specific problems Architectural and protocol vulnerabilities SIP device interactions (see following slides) silent snooping via multipresence fraud bill bypassing hijacking of someone else s account/pbx protocol-specific denial of service attacks malformed messages call routing games separation between signaling/data transport can be leveraged induce someone s phone device to act as a DoS zombie 2 27

Trivial protocol-specific Single packet phone kill 28

Privacy attack Call someone, then report call in progress before ring turns phone into eavesdropping device! 2 29

Billing avoidance and XSS SQL injection that targets the PBX s billing records SQL-enabled XSS attack that targets administrator or user viewing call logs with browser! 30

Reminder: call forwarding 31

Protocol games: toll fraud SIP proxy/pstn bridge Domain D1 Attacker INVITE Alice@D1 OK ACK Alice@D1 (call setup) Media (RTP) (rewrite INVITE from Alice) INVITE +1 900 PREMIUM INVITE Attacker (Attacker on hold) +1 900 PREMIUM PSTN call 407 Authentication needed ACK (rewrite INVITE from Alice) INVITE +1 900 PREMIUM (auth) Media (RTP) (reverse rewrite, relay authentication request) 407 Authentication needed ACK INVITE Attacker (auth) draft-state-sip-relay-attack 32

Hybrid threats Generic threats made easy/enabled by IMS architecture more realistic phishing/spear-phishing common attack: call by bank officer asking for personal information remember: CallerID easy (trivial) to spoof (somewhat) more complicated attack: compromise SIP signaling to catch the callback from customer to the bank! compromise of company SIP-PBX or end-device router- and routing-based attacks DNS poisoning SPIT - SPAM for voice Configuration problems many options, many devices: easy to misconfigure 2 33

Wrapup The ubiquity and quality of IP-based networks is going to lead to increasing growth of VoIP/IMS services However, like much of the systems themselves, security has been patched together from a loose collection of other general purpose mechanisms This is likely to lead to more opportunities for adversaries to exploit security failures and vulnerabilities Standards process like the IETF may help, but it is unclear if the market will embrace any new broad techniques Bottom line: this is not likely to get better soon. 34