How To Make A Phone Call From A Cell Phone (Torm) To A Landline (Telnet) (Telcom) (Ipo) (Turbo) Or A Cellphone (Ip) (Phone) (Net) Or



Similar documents
Carrier VoIP Security

Exceed with COLT. NGN Architectures, VoIP Security and Protocols

NGN Next Generation Nightmare? What telco 2.0 really means

Session Border Controllers in Enterprise

SIP Trunking Configuration with

Recommended IP Telephony Architecture

SIP Trunking with Microsoft Office Communication Server 2007 R2

SBC WHITE PAPER. The Critical Component

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma

Voice over IP Security

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

Securing SIP Trunks APPLICATION NOTE.

Best Practices for Securing IP Telephony

Colt VoIP Access Colt Technology Services Group Limited. All rights reserved.

VoIP Security regarding the Open Source Software Asterisk

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

APPLICATION NOTE. SIP Trunking Connectivity, Security and Deployment Scenarios. Introduction

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There

Voice over IP Basics for IT Technicians

VOICE OVER IP SECURITY

How To Support An Ip Trunking Service

VoIP Resilience and Security Jim Credland

VoIP from A to Z. NAEO 2009 Conference Cancun, Mexico

Welltel - Session Border Controller SBC 120

Ingate Firewall/SIParator SIP Security for the Enterprise

Troubleshooting Voice Over IP with WireShark

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Voice over IP (VoIP) Basics for IT Technicians

SIP Trunking The Provider s Perspective

Copyright and Trademark Statement

ABC SBC: Securing the PBX. FRAFOS GmbH

Presented by: John Downing, B.Eng, MBA, P.Eng

Voice over IP (VoIP) Vulnerabilities

Configuration of Applied VoIP Sip Trunks with the Toshiba CIX40, 100, 200 and 670

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Convergence Technologies Professional (CTP) Course 1: Data Networking

NGN Interconnection Standards & Protocols

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

IP Ports and Protocols used by H.323 Devices

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Session Border Controller

Voice Over IP and Firewalls

Acme Packet session border controllers in the enterprise

State of Texas. TEX-AN Next Generation. NNI Plan

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

PETER CUTLER SCOTT PAGE. November 15, 2011

Villains and Voice Over IP

Interactive communications over IP networks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

CompTIA Convergence Examination Objectives

Basic Vulnerability Issues for SIP Security

How to make free phone calls and influence people by the grugq

Ram Dantu. VOIP: Are We Secured?

Dialogic BorderNet Session Border Controller Solutions

VIDEOCONFERENCING. Video class

EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide

Brochure. Dialogic BorderNet Session Border Controller Solutions

Vega 100G and Vega 200G Gamma Config Guide

Technology Training Limited Module Portfolio for Customised Courses

SIP and VoIP 1 / 44. SIP and VoIP

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Mediatrix 3000 with Asterisk June 22, 2011

EarthLink Business SIP Trunking. Toshiba IPedge Customer Configuration Guide

Session Border Controller and IP Multimedia Standards. Mika Lehtinen

CVOICE Exam Topics Cisco Voice over IP Exam # /14/2005

Security Guidance for Deploying IP Telephony Systems

SIP Security Controllers. Product Overview

Sonus Networks engaged Miercom to evaluate the call handling

SIP Trunking and Voice over IP

Voice over IP Fundamentals

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Presenter. Zane Ryan. Director Dot Force

Introduction to DE-CIX NGN. Andreas Sturm

Setup Reference guide for PBX to SBC interconnection

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

Hands on VoIP. Content. Tel +44 (0) Introduction

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

VoIP Survivor s s Guide

VoIP Trunking with Session Border Controllers

Transcription:

Carrier VoIP Security Nicolas FISCHBACH Senior Manager, Network Engineering Security, COLT Telecom nico@securite.org - http://www.securite.org/nico/ v1.1

COLT and VoIP COLT Telecom Voice, Data and Managed Services, Tier 1 ISP in EU 14 countries, 60 cities, 50k business customers 20 000 km of fiber across Europe + DSL VoIP experience 3 major vendors One we're coming from the TDM world One we're coming from the IP world One we're a VoIP company Internet and MPLS VPN-based VoIP services Own network (fiber + DSL) and wdsl Going PacketCore + VoIP NGN + IMS 2

What's VoIP? The consumer view Computer with softclient (SIP or Skype) ((( ((( o ))) Hardphone (analog or SIP or Skype) wap (+ SIP) Internet 3

POTS VoIP/ToIP TDM PSTN Voice Switch Hosted IP PBX PRI (ISDN over E1) PBX PBX could be IP-enabled with IP phones on LAN TDM PSTN Voice Switch IP PBX S B C Internet H.323/RTP CPE NAT TDM PSTN Voice Switch IP PBX F W MPLS H.323/RTP CPE No NAT 4

POTS TDM PSTN PBX Trunking over IP Voice Switch PRI (ISDN over E1) PBX VoIP/ToIP DTMF Softswitch H.323(/MGCP) 64kUR (PBX Mgmt) TDM PSTN Voice Switch MGW MGCP RTP F W Internet H.323(/MGCP)/RTP PBX CPE No NAT T.38 (FAX) 5

POTS VoIP/ToIP TDM PSTN Wholesale Voice over IP Voice Switch PRI (ISDN over multiple E1s or STM-1s) Voice Switch TDM PSTN Softswitch SIP TDM PSTN Voice Switch MGCP MGW RTP MGW S B C Internet SIP/RTP H.323/RTP Other Carrier VoIP Core 6

Billing VoIP Core Network Architecture DB FW IP PBX IP PBX SBC WEB F W S F B W C H.323/RTP IP / MPLS CPE PBX VoIP Core OSS/BSS MGW Softswitch MGW F W H.323/MGCP/RTP CPE TDM / PSTN S B C SIP/RTP Internet Carrier MGW H.323/RTP Carrier 7

H.323 VoIP Protocols ITU, ASN.1, CPE/Phone<->Gatekeeper H.225/RAS (1719/UDP) for registration H.225/Q.931 (1720/TCP) for call setup H.245 (>1024/TCP or over call setup channel) for call management MGCP (Media Gateway Control Protocol) IETF, Softswitch (CallAgent)<->MGW CallAgents->MGW (2427/UDP) MGW->CallAgents (2727/UDP) Used to control MGWs AoC (Advise Of Charge) towards CPE 8

SIP IETF, HTTP-like VoIP Protocols You've had enough SIP presentations today :) RTP Media stream (one or one per direction) CODECs (G.711{a,u}, G.726, G.729(a)) RTCP: control protocol for RTP SRTP: Secure RTP (w/ MiKEY) Often 16000+/UDP or default NAT range, but can be any UDP>1024 Can be UA<->UA aka Free Intersite (risk of fraud) or UA<->MGW<->UA 9

Session Border Controller What the role of an SBC? Security Hosted NAT traversal (correct signalling / IP header) Signalling conversion Media Conversion Stateful RTP pin-holing based on signalling Can be located at different interfaces: Customer/Provider, inside customer LAN, Provider/Provider (VoIP peering) What can be done on a FW with ALGs? What can be done on the end-system? Is there a need for a VoIP NIDS (especially with SIP-TLS) 10

VoIP Hardware Mix of software and hardware (mostly DSPs) Softswitch: usually only signalling MGW (Media Gateway): RTP<->TDM, SS7oIP<->SS7 IP-PBX: Softswitch+MGW Operating systems Real-time OSes (QNX/Neutrino, VxWorks, RTLinux) Windows Linux, Solaris Poor OS hardening Patch management: OSes not up-to-date Not allowed to patch them 11

VoIP protocols Security challenges No, VoIP isn't just SIP SIP is a driver for IMS services and cheap CPEs H.323 and MGCP (still) rock the carrier world Security issues VoIP dialects Only a couple of OEM VoIP stacks (think x-vendor vulnerabilities) FWs / SBCs: do they solve issues or introduce complexity? Are we creating backdoors into customer networks? CPS and QoS 12

«Executive floor» WLAN AP s r s One more backdoor? ap External laptop r r s r r «IT floor» Internet access fw fw av as p cpe cpe Corporate Internet access Internet Remote maintenance CPE Vendor Office ar Remote office/ Partners IP VPN Partner VoIP IP PBX Shared TFTPd Customer B Customer C 13

VoIP dialects: result No way to firewall / ACL (especially if non-stateful) based on protocol inspection Vendors who never heard of timeouts and don't send keep-alives Result : Clueful: Permit UDP <port range> <identified systems> Half clueful: Permit UDP <port>1024> any Clueless: Permit UDP any any End-result: 0wn3d via exposed UDP services on COTS systems Who needs RPC services (>1024/UDP)? 14

(Not so) Lawful Intercept Lawful Intercept Re-use existing solutions: TDM break-out Install a sniffer (signalling+media stream) Re-route calls (but hide it in the signalling) Eavesdropping Not a real threat (own network) Entreprise network : Needs to be a part of a global security strategy Clear text e-mail Clear text protocols (HTTP, Telnet, etc) VoIP Etc vomit, YLTI, VOIPONG, scapy (VoIPoWLAN) : easy way to show how insecure it is 15

Crashing IP Phones This is no news :) Phones Quite easy (weak TCP/IP stacks and buggy software implementation) Mostly an insider threat DHCP server TFTP server (phone configuration) Credentials (login + PIN) VoIP doesn't mean that you need to move to IP Phones PBX with E1 (PRI/BRI) to router and then VoIP PBX with IP interface towards the outside world (but do you really want to put your PBX on the Internet)? Means that you have to maintain two separate networks, but solves the QoS issues on a LAN What about soft clients? 16

Generic DDoS Denial of Service Threat Not a real issue, you can't talk to our VoIP Core ACLs are complex to maintain use edge-only BGP blackholing We are used to deal with large DDoS attacks :) DoS that are more of an issue Generated by customers: not too difficult to trace Protocol layer DoS : H.323 / MGCP / SIP signalling Replace CPE / use soft-client Inject crap in the in-band signalling (MGCP commands, weird H.323 TPKTs, etc) Get the state machine of the inspection engine either confused or in a block-state, if lucky for the server addresses and not the clients 17

Online services Security Challenges Call Management (operator console) IN routing Reporting / CDRs Security issues Multi-tenant capabilities Have the vendors ever heard of web application security? Who needs security or lawful intercept if a kid can route your voice traffic via SQL injection WebApp FWs are really required... 18

Security Challenges TDM / VoIP : two worlds, two realms, becoming one? Security by obscurity / complexity vs the IP world Fraud detection Security issues New attack surface for legacy TDM/PSTN networks No security features in old Class4/Class5 equipment No forensics capabilities, no mapping to physical line Spoofing and forging People: Voice Engineers vs Data Engineers vs Security engineers. Engineering vs Operations. Marketing vs Engineering. Conflicts and Time-to-Market 19

Abusing NMS/Operations VoIP is damn complex Only way to debug most of the issues: VoiceEng + IP/DataEng + SecurityEng on a bridge/online chat Requirement: be able to sniff all traffic Tool: Ethereal/Wireshark Attacker: Just use any of the protocol decoder flaw in the sniffer Make sure your sniffers are on R/O SPAN ports, in a DMZ which only allows in-bound VNC/SSH If the guy is really good and can upload a rootkit over RTP: let him take care of the system, he's probably better than your average sysadmin ;-)) 20

Carrier/Carrier VoIP Security Aka VoIP peering / Carrier interconnect Already in place (TDM connectivity for VoIP carriers/skype{in, Out}) Connectivity: over the Internet, IX (public/private), MPLS VPN or VPLS (Ethernet) No end-to-end MPLS VPN, break the VPN and use an IP- IP interface Hide your infrastructure (topology hiding), use {white, black}listing and make sure only the other carrier can talk to you Signalling/Media conversion (SBC) 21

Encryption / Authentication Do we want to introduce it? Vendor X: We are compliant. Sure. Vendor Y: It's on our roadmap. Q1Y31337? Vendor Z: Why do you need this?. Hmmmm... IPsec from CPE to VoIP core Doable (recent HW with CPU or crypto card) What about CPE<->CPE RTP? Still within RTT / echo-cancellation window May actually do mobile device<- IPsec ->VoIP core Bad guys can only attack the VPN concentrators No impact on directly connected customers 22

Future : IMS services IMS = IP Multimedia Subsystem Remember when the mobile operators built their WAP and 3G networks? Mostly open (aka terminal is trusted) Even connected with their internal /IT network IMS services with MVNOs, 3G/4G: overly complex architecture with tons of interfaces Large attack surface: registration/tracking servers, application servers, etc Firewalling: complex if not impossible Next thing to try: Attack Fixed<->Mobile handover (GSM<->WiFi) 23

Conclusion Q&A Carrier VoIP Security 24