Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology



Similar documents
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VegaStream Information Note Considerations for a VoIP installation

Voice Over IP and Firewalls

Recommended IP Telephony Architecture

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date Issue: v1.

Encapsulating Voice in IP Packets

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Performance Analysis of Transmitting Voice over Communication Links Implementing IPsec

An Introduction to VoIP Protocols

VOICE OVER IP SECURITY

Best Practices for Securing IP Telephony

TECHNICAL CHALLENGES OF VoIP BYPASS

Voice over IP Basics for IT Technicians

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

VoIP Time to Make the Call? Abstract

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Secure VoIP Transmission through VPN Utilization

Voice over IP. Presentation Outline. Objectives

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Packetized Telephony Networks

Voice over IP (VoIP) Basics for IT Technicians

Securing SIP Trunks APPLICATION NOTE.

Securing Voice over Internet Protocol

Security issues in Voice over IP: A Review

Securing VoIP Networks using graded Protection Levels

VoIP Trunking with Session Border Controllers

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

DLink-655 Router Configuration Guide for VoIP

Voice over IP Networks: Ensuring quality through proactive link management

Security and Risk Analysis of VoIP Networks

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

An outline of the security threats that face SIP based VoIP and other real-time applications

CHAPTER 1 INTRODUCTION

VOIP SECURITY ISSUES AND RECOMMENDATIONS

NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University

An Examination of the Firewall/NAT Problem, Traversal Methods, and Their Pros and Cons

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

VIDEOCONFERENCING. Video class

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Ingate Firewall/SIParator SIP Security for the Enterprise

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Online course syllabus. MAB: Voice over IP

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Basic Vulnerability Issues for SIP Security

Gateways and Their Roles

Transparent weaknesses in VoIP

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

SIP Trunking Configuration with

Multi-layered Security Solutions for VoIP Protection

Session Border Controller

SS7 & LTE Stack Attack

Indepth Voice over IP and SIP Networking Course

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Voice over IP Security

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Secured Voice over VPN Tunnel and QoS. Feature Paper

Is Your Network Ready for VoIP? > White Paper

VoIP QoS. Version 1.0. September 4, AdvancedVoIP.com. Phone:

Voice over IP (VoIP) Vulnerabilities

Cisco ASA 5500 Series Unified Communications Deployments

Voice over IP Communications

Comparison of Voice over IP with circuit switching techniques

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga

QoS issues in Voice over IP

IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Secure Voice over IP (VoIP) Networks

Firewalls P+S Linux Router & Firewall 2013

Network Considerations for IP Video

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

TDM services over IP networks

Requirements of Voice in an IP Internetwork

Voice over IP (VoIP) Overview. Introduction. David Feiner ACN Introduction VoIP & QoS H.323 SIP Comparison of H.323 and SIP Examples

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Network Simulation Traffic, Paths and Impairment

Solution Brief. Secure and Assured Networking for Financial Services

ABC SBC: Securing the PBX. FRAFOS GmbH

WHITE PAPER. Testing Voice over IP (VolP) Networks

VoIP Application Note:

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

FIREWALLS & CBAC. philip.heimer@hh.se

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Transcription:

Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology

What is VOIP? Voice Over Internet Protocol Voice Communications over data-style networks Analog-digital converter Data Compression Alice s voice terminal (telephone or computer) Bob s voice terminal (telephone or computer) RTP packet TCP packet INTERNET

Why use VOIP? Simpler Network Design More Multimedia Features Full support for video-conferencing and videophones Cost Long distance phone call costs virtually eliminated No need to support a legacy PSTN system

Who is using VOIP? Telecommunications companies Enterprises with multiple site offices. Home workers Individuals through software Net2Phone Microsoft s NetMeeting

Twice the Danger A security breach in either the data sector or voice segment compromises the whole network, especially since PC-based phones straddle both services. DATA VOICE

Possible Attacks Man in the Middle (eavesdropping and altering) Denial of Service (DoS) Compromise of Gateways Compromise of Endpoints Impersonation

QoS and Security Quality of Service (QoS) refers to the speed and clarity expected of a VOIP conversation. QoS makes attacks easier No longer necessary to take down a network, merely slow down the traffic. and defense harder. Implementing proper security measures such as firewalls and encryption introduces latency and jitter.

Latency The time from when words are spoken until they are heard at the other end Latency greater than 150 milliseconds is unacceptable in most cases

Jitter Non-uniform delays Requires buffering at the endpoints and application level reordering (more latency) Increased jitter makes it harder to tell when a packet is missing or just late.

Packet Loss VOIP is highly sensitive to packet loss Loss Rates as low as 1% can garble communications Latency and Jitter can contribute to virtual packet loss as packets arriving after their deadline are as good as lost

Firewalls, NAT Routers, and Encryption The Old Stand-By s Cannot be Implemented in a VOIP network without special considerations Standard components not built for VOIP s high rate / small packet traffic pattern. Degrade Quality of Service (QoS) Latency, Jitter, and Packet Loss Obstruct the call setup process Block incoming calls and interfere with the call setup process

Firewalls. Firewalls filter out malicious traffic based on a set of rules. Firewalls are needed to protect networks from outside attacks. Also secure the internal barrier between voice and data networks. DATA VOICE

Firewalls and QoS Problem: Firewall traffic investigation adds latency to the system and heavy data traffic can introduce jitter. Solutions: Implement firewalls with fast CPU s to handle the high rate of packet delivery. Use QoS aware firewalls

IPSec Encryption can be used to secure voice data and avoid the firewall problems. IPSec is the standard encryption suite for the Internet Protocol and will be fully supported in IPv6. In ESP Tunnel Mode, IPSec protects both the data and the identities of the endpoints.

IPSec and QoS Problem: Encryption also introduces latency / jitter Encryption/decryption process takes time Crypto-engine schedulers do not implement QoS Solutions: Packet compression schemes have experimentally aided performance QoS-aware scheduling before and after encryption heuristically improves performance.

NAT Network Address Translation (NAT) is used to allow multiple terminals to share a single IP address allows security measures to be consolidated at the NAT router hides information about the structure of the internal network

Blocking Incoming Calls Problem: NAT and Firewalls can both block incoming calls Solutions: Application Level Gateway Firewall Control Proxy

VOIP Call Setup Two competing protocols for VOIP call setup: H.323 and SIP. H.323 is a suite of several more specific protocols. Uses dynamic ports and binary encoding. SIP is a simpler protocol running over 1 port using a three way handshake. Uses a single port and text encoding.

Disrupting Call Setup Problem: Firewalls can block the call setup ports and NAT can change the IP address/ports being used internally. Solutions: Incorporate an ALG or FCP into the architecture that can manipulate the setup packets data.

NAT Traversing Example Packet Destination : 68.23.145.15 To: bob@work Packet Destination: 142.56.78.3 Alice@home 142.56.78.3 Source: 68.23.145.15 To: Alice@home Parse SIP data, reconfigure packet header ALG NAT 68.23.145.15 Packet Destination : 192.168.10.2 To: bob@work Packet Destination : 142.56.78.3 Source: 192.168.10.2 To: Alice@home Bob@work 192.168.10.2

What Should You Do Now? Network tools Separate voice and data traffic using separate address space, virtual LANs (don't need physically separate networks) Reduce risk of data sniffers Can tune IDSs for voice and data separately Use firewalls designed for VOIP traffic At the voice gateway, which interfaces with the PSTN, disallow H.323, SIP, or MGCP connections from the data network

What Should You Do Now? Protecting voice data Avoid PC-based softphones if practical Keeps voice and data separate Use access control, encryption, where possible Use IPSec or SSH for all remote management and auditing access Do encryption at the router or other gateway, not the individual endpoints

Summary VOIP security requires adapting traditional network security measures for a high speed, dynamic environment. For More Info see: Security Considerations for Voice Over IP Systems - NIST http://csrc.nist.gov - see Drafts Five tips for securing a converged net - Computerworld http://www.computerworld.com/securitytopics/security/story/0,10801,85844,00.html?skc=s ecurity-85844 Security in SIP Based Networks - Cisco: http://www.cisco.com/warp/public/cc/techno/tyvdve/sip/prodlit/sipsc_wp.pdf IP Telephony Security in Depth - Cisco: http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safip_wp.htm