Ram Dantu. VOIP: Are We Secured?



Similar documents
Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan

Detecting Spam in VoIP networks

How To Implement A Cisco Vip From Scratch

Ingate Firewall/SIParator SIP Security for the Enterprise

An outline of the security threats that face SIP based VoIP and other real-time applications

Chapter 2 PSTN and VoIP Services Context

Voice Over IP and Firewalls

Basic Vulnerability Issues for SIP Security

Best Practices for Securing IP Telephony

Understanding Voice over IP Protocols

Securing SIP Trunks APPLICATION NOTE.

Security & Reliability in VoIP Solution

SIP A Technology Deep Dive

SIP Essentials Training

SIP : Session Initiation Protocol

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

White paper. SIP An introduction

VoIPon Solutions Tel: +44 (0) Ranch Asterisk VoIP Solution

nexvortex Setup Guide

Media Gateway Controller RTP

SIP Security Controllers. Product Overview

SIP Trunking Manual Technical Support Web Site: (registration is required)

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

SIP Trunking Configuration with

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

Configuration Guide for connecting the Eircom Advantage 4800/1500/1200 PBXs to the Eircom SIP Voice platform.

How to make free phone calls and influence people by the grugq

(Refer Slide Time: 6:17)

Migration Quick Reference Guide for Administrators

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

PETER CUTLER SCOTT PAGE. November 15, 2011

Voice Over IP (VoIP) Denial of Service (DoS)

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

How To Protect Your Business From A Voice Firewall

IP PBX using SIP. Voice over Internet Protocol

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

NAT TCP SIP ALG Support

Application Note. Onsight Connect Network Requirements V6.1

Vega 100G and Vega 200G Gamma Config Guide

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

White Paper. avaya.com 1. Table of Contents. Starting Points

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma

SIP Trunking and Voice over IP

TECHNICAL CHALLENGES OF VoIP BYPASS

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Configuring SIP Trunking and Networking for the NetVanta 7000 Series

Enterprise Video Conferencing

SIP Trunking with Microsoft Office Communication Server 2007 R2

Applied Networks & Security

Product Range TELES NGN

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

How To Support An Ip Trunking Service

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

CommuniGate Pro Real-Time Features. CommuniGate Pro Internet Communications VoIP, , Collaboration, IM

nexvortex Setup Template

VIDEOCONFERENCING. Video class

nexvortex Setup Guide

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

INTRODUCTION TO FIREWALL SECURITY

A Comparative Study of Signalling Protocols Used In VoIP

SIP Trunking Quick Reference Document

VOICE OVER IP SECURITY

Security issues in Voice over IP: A Review

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Presenter. Zane Ryan. Director Dot Force

Recommendations for secure deployment of an IP-PBX

Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670

Session Border Controllers in Enterprise

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Recommended IP Telephony Architecture

SIP Trunk Configuration Guide. using

Using DNS SRV to Provide High Availability Scenarios

Creating your own service profile for SJphone

EE4607 Session Initiation Protocol

VoIP Gateway/IP-PBX Interworking with Skype

SIP: Ringing Timer Support for INVITE Client Transaction

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

OpenScape UC Firewall and OpenScape Session Border Controller

SIP, Security and Session Border Controllers

Release the full potential of your Cisco Call Manager with Ingate Systems

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

VoIP and Videoconferencing: are they the same?

UX5000 with CommPartners SIP Trunks

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Com.X IP PBX The complete communications solution in a box

Frequently Asked Questions about Integrated Access

Prepare your IP network for HD video conferencing

SonicWALL Security Quick Start Guide. Version 4.6

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

SIP Trunking The Provider s Perspective

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

VoIP Security. Customer Best Practices Guide. August IntelePeer

Spam goes VoIP. Number Harvesting for Fun and Profit. Hack in The Box 2007 Dubai Hendrik Scholz

Transcription:

Ram Dantu Professor, Computer Science and Engineering Director, Center for Information and Computer Security University of North Texas rdantu@unt.edu www.cse.unt.edu/~rdantu VOIP: Are We Secured? 04/09/2012

Agenda Basic Operation of IP Phone VoIP migration (three steps) Difference between voice and data security Why VoIP security difficult Solutions

VoIP Network Elements I N T E L L I G E N T email LDAP Oracle XML SIP Proxy, Registrar & Redirect Servers SIP CPL 3pcc Application Services S E R V I C E S SIP SIP SIP User Agents (UA) RTP (Media) Legacy PBX PSTN CAS or PRI

Network Architecture 6/30/2008

Basic SIP Call-Flow SIP UA1 SIP UA2 INVITE w/ SDP for Media Negotiation 100 Trying 180/183 Ringing w/ SDP for Media Negotiation MEDIA 200 OK ACK MEDIA BYE 200 OK 6/30/2008

SIP Call Flow with Proxy Server Proxy Server Register OK (200) Invite Trying (100) Ringing (180) OK (200) ACK Register OK (200) Invite Ringing (180) OK (200) ACK RTP/RTCP media channels 6/30/2008

VoIP Migration 6/30/2008

Step1: IPPBX deployments in Enterprises PSTN Network Customer Premises Customer Premises IP Core Network - Large enterprises will handle VOIP calls directly - PSTN connectivity provided by Media Gateways - Regulation can not stop spammers outside USA (similar to SMTP spam) DNS Server for URL resolution 6/30/2008

STEP 2: Hosted IP Centrex FW, NAT, VoIP service provided by Carrier Networks Softswitches, MGW VoIP Proxy Server, SGW SGC, VoIP Centrex Server, Internet Carrier Network Customer Premises

Step 3: Carrier VoIP Network VoIP Trunk Softswitches, MGW VoIP Proxy Server, SGW SGC, VoIP Centrix Server, Internet Carrier Network - VoIP FW, NAT and Security provided by Carriers Customer Premises

VoIP creates issues with FW and NAT Reliability QoS must be maintained Separate signaling and media Data NAT traversal Data FW traversal

Wide open ports in voice traffic Signalling port and range of media ports fixed and permanently opened to inbound traffic IP PBX SC

FW and NAT Traversal Trusted Domain Data FW/NAT Un-trusted Domain Internet Traversal Client Traversal Server

Voice Spam Voice Spam is different from E-mail Spam Voice Spam at 2am E-Mail Spam at 2am

Email vs. Voice Mail Indirect (Un-intrusive) Email Internet Local SMTP Server Remote SMTP Server * Email server access is protected through series of mail servers and relays Direct (Intrusive) Voice Mail Network Voice Mail Server Would you allow un-trusted person to save directly on your system? * Voice mail has less barrier than data

Email versus Voice mail It is like postal versus door delivery, similar to voice mail server security versus data email server. Even though it is behind the firewall, he is connected to voice mail server, For example, pin number for your answering machine is only 2-4 digits Postal Delivery Home Delivery

Wide open ports in voice traffic Data Applications Voice over IP Main Gate is Closed Main Gate is Open

911 Emergency Safety Concerns - 911 and emergency service; DOS attack on the phone - There is no 911 application on data. But we need to support 911 application on voice service. - Phone is connected to emergency dispatch whereas PC is not connected to the emergency dispatch

Anonymous Phone Call Want to be called from anywhere Casual calling opens up the door. Anybody can call; bad guy or a grandma

Toll Fraud Calls can be forwarded to international by using end-user phone. When VoIP happens, toll fraud is going to increase Compromised phone Call made to Vulnerable Network Toll Fraud Call to Destination

Parameter Extended to include legacy PBX IP IP PBX VoiceMail Media GW WA N Attack can propagate to PSTN as well Voice Mail PBX PSTN

Points Of Pain

VoIP Security: Points of Pain Attackers can now attack massive numbers of IP Phones in a very short period of time. For example, an attacker with low end PC can put 2000 phones out of service in few minutes. Real-time IDS required for voice and video calls. Little time to deploy an effective fix manually. Unlike PCs, VoIP devices have limited resources to withstand DOS attacks.

Security: Points of Pain Too many security devices in the network and on top of it, they do not communicate to each other: Data Firewalls, Voice Firewalls, IDS, IPS, Virus scanners, SPAM filters, and Honeypots Lot of data; too many alerts, logs, and rules. Manual correlation is a nightmare. Instead automatic methods are required Cost of the devices and management of these devices Tolerance for SPAM is very low (zero tolerance).

Points of Pain VM Server security: Authentication and authorization of all the user access to the the voice mail. For example, tapping or hijacking of the voice mail of CFO Virus and worms can spread through the VPN and data network. In this situation, FW and IDS can not help because the attacker can be behind the FW

Securing Voice and Video over the Internet PI: Ram Dantu Network Security Laboratory (UNT is the lead)

VoIP Security Workshops December 2004, Dallas Chairs Ram Dantu, University of North Texas Sujeet Shenoi, University of Tulsa June, 2005, Washington, DC. Chair Ram Dantu Paul Kurtz, Cyber Security Industry Alliance and former special assistant to President Bush June 2006, West Berlin, Germany Chair Ram Dantu Henning Schulzrinne, Columbia University 6/30/2008

Conclusions Aggressive VoIP deployment by Enterprises By 2009 VoIP phone deployment is going to overtake legacy phone Voice security is different from data security. Not much work done on VoIP threat models. Increased threat level due to WLAN, VoWLAN, and mobility issues Our group is actively doing research on VoIP security, threats, models, attack graphs. In particular, we are working on detecting spam and unwanted calls. This approach can be called as telephone telepathy Please send your questions and comments to Rdantu@unt.edu (www.csci.unt.edu/~rdantu)