Voice-over-IP Risk Analysis. erey@ernw.de



Similar documents
Common Criteria for Information Technology Security Evaluation. Part 2: Security functional components. September Version 3.

Common Criteria for Information Technology Security Evaluation. Part 2: Security functional requirements. August Version 2.

SECURITY TARGET FOR FORTIANALYZER V4.0 MR3 CENTRALIZED REPORTING

COMMON CRITERIA PROTECTION PROFILE. for SECURE COMMUNICATION MODULE FOR WATER TRACKING SYSTEM (SCM-WTS PP)

Certification Report

Common Criteria Evaluation for a Trusted Entrust/PKI

COMMON CRITERIA PROTECTION PROFILE. for NEW GENERATION CASH REGISTER FISCAL APPLICATON SOFTWARE (NGCRFAS PP) TSE-CCCS/PP-002

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

How To Manage Security In A Network Security System (Tsi)

Network Intrusion Prevention System Protection Profile V1.1

Security Requirements for Network Devices

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

CERTIFICATION REPORT

Teradata Database Version 2 Release (V2R6.1.0) Security Target

U.S. Government Protection Profile for Application-level Firewall In Basic Robustness Environments

Criteria Requirements of Mobile Payment Application

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Villains and Voice Over IP

Check Point Endpoint Security Full Disk Encryption Security Target

HP StoreOnce Backup System Generation 3 Version Security Target

collaborative Protection Profile for Network Devices

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

Mobile Billing System Security Target

IronMail Secure Gateway Software Version Security Target April 27, 2006 Document No. CipherTrust E2-IM4.0.0

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

Best Practices for Securing IP Telephony

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

CERTIFICATION REPORT

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

Security Target for Cisco Remote Access VPN

An outline of the security threats that face SIP based VoIP and other real-time applications

Security Target: Symantec Endpoint Protection Version 11.0

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

U.S. Government Protection Profile for Database Management Systems

Voice over IP (VoIP) Vulnerabilities

Protection Profile for Network Devices

Protection Profile for Mobile Device Management

Blue Coat Systems, Inc. ProxySG v running on SG510, SG810, and SG8100. Security Target

Cisco Catalyst Switches (3560-X and 3750-X) Security Target

Cisco 800, 1900, 2900, 3900 Series Integrated Service Routers (ISR) Security Target

PENTEST. Pentest Services. VoIP & Web.

3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification

EMC Corporation Data Domain Operating System Version Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.

LogLogic v4.6.1 Open Log Management Platform Security Target. Release Date: 30 June 2009 Version: 2.0

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Microsoft Windows Common Criteria Evaluation

Firewall Protection Profile V

DataPower XS40 XML Security Gateway and DataPower XI50 Integration Appliance Version 3.6. Security Target Version 0.75

Marimba Client and Server Management from BMC Software Release 6.0.3

Top Layer Networks. Security Target V2.3

Huawei BSC6900 Multimode Base Station Controller Software Security Target

RSA, The Security Division of EMC envision platform v4.0 SP 1. Security Target

VoIP Security regarding the Open Source Software Asterisk

GuardianEdge Data Protection Framework with GuardianEdge Hard Disk Encryption and GuardianEdge Removable Storage Encryption 3.0.

Recommended IP Telephony Architecture

Top Layer Networks IPS 5500 E Security Target

Security Target Microsoft SQL Server Team

Trustwave Secure Web Gateway Security Target

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

Natek Network Access Control (NAC)

Intrusion Detection System System Protection Profile

CyberArk Software, Ltd. Privileged Account Security Solution v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 1.

Protection Profile for Server Virtualization

Who is Watching You? Video Conferencing Security

EMC Documentum. EMC Documentum Content Server TM V5.3. and EMC Documentum Administrator TM V5.3. Security Target V2.0

Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP)

PROTECTION PROFILE DEVELOPMENT

Securing SIP Trunks APPLICATION NOTE.

Check Point Endpoint Security Media Encryption Security Target

VoIP Security: How Secure is Your IP Phone?

Common Criteria NDPP SIP Server EP Assurance Activity Report

OmniPCX Enterprise Common Criteria Security Target

AppGate Security Server, Version Security Target. Document Version: 2.9 Date:

Dell Networking Switches Security Target. Version 1.0 January 22, 2015

Basics of Internet Security

Security Target. NetIQ Access Manager 4.0. Document Version August 7, Security Target: NetIQ Access Manager 4.0

Commercial Database Management System Protection Profile (C.DBMS PP)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Extended Package for Mobile Device Management Agents

hackers 2 hackers conference III voip (in)security luiz eduardo cissp, ceh, cwne, gcih

Transcription:

Voice-over-IP Risk Analysis Enno Rey CISSP/ISSAP CISA Enno Rey, CISSP/ISSAP, CISA erey@ernw.de

Risk ISO/IEC GUIDE 73:2002 Combination of the probability of an event and its consequence where Probability = extent to which an event is likely to occur Event = occurrence of a particular set of circumstances Consequence = outcome of an event Voice-over-IP Risk Analysis 2

Risk Analysis ISO/IEC GUIDE 73:2002 systematic use of information to identify sources and to estimate the risk Source: item or activity having a potential for a consequence Risk analysis provides a basis for risk evaluation, risk treatment and risk acceptance. Information can include historical data, theoretical analysis, informed opinions, and the concerns of stakeholders. Voice-over-IP Risk Analysis 3

Security Objectives VoIP Availability Confidentiality Privacy Integrity (?) - of calls/transported data - of billing data/arrival time of voice mails/state of communication participants/etc. Compliance with regulations (Privacy protection, Lawful interception, 911 calls, other) Prevention/avoidance of identity spoofing - of caller/callee (both may lead to social engineering attacks) => billing fraud => other fraud (telephone banking) covert channels (Skype) Voice-over-IP Risk Analysis 4

VoIP Threats ( Sources ) Threats on protocol level Threats on connection level Threats on gateway level Threats on endpoint level Remote control of hosts / covert channels Voice-over-IP Risk Analysis 5

Threats on protocol level TP1: Poorly designed protocols may lead to breach of conf/int/avail il TP2: Bad implementations suffering from buffer overflows etc. TP3: Protocol complexity may lead to bad firewall configuration Voice-over-IP Risk Analysis 6

Example: Bad implementation with buffer overflow Voice-over-IP Risk Analysis 7

Threats on connection level TC1: Eavesdropping / Call Monitoring (Breach of confidentiality) TC2: Data Corruption / Modification (Breach of integrity) Denial-of-Service (Loss of availability) TC3: - by attack TC4: - by misconfig. (e.g. insufficient resources/prioritization) Voice-over-IP Risk Analysis 8

Threats on gateway level Note: term gateway applies to any central component like gateways, gatekeepers, call managers (CM), session border controllers (SBC), SIP proxies/registrars/redirectors etc. TG1: System compromise => Eavesdropping => Call redirection => Billing fraud Denial-of-Service TG2: - by attack TG3: - by misconfiguration (Loss of availability) Voice-over-IP Risk Analysis 9

Threats on endpoint level TE1: System compromise => Eavesdropping => Call redirection => Billing fraud TE2: Denial-of-Service - by attack (Loss of availability) TE3: VoIP endpoint as attack vector for malware spread (applies particularly to softphones) TE4: Covert channels Voice-over-IP Risk Analysis 10

Vulnerabilities Vulnerabilities on protocol level Vulnerabilities on connection level Vulnerabilities on gateway level Vulnerabilities on endpoint level Voice-over-IP Risk Analysis 11

Vulnerabilities on protocol level Designed without security in mind Protocols work with highly dynamic port assignments Voice-over-IP Risk Analysis 12

Example: Dynamic port assignments Voice-over-IP Risk Analysis 13

Vulnerabilities on connection level Nearly no encryption by default SRTP not used due to inter-vendor keymgmt incompatibilites Voice-over-IP Risk Analysis 14

Vulnerabilities on gateway level Designed/assembled/configured without security in mind Unsecure default configurations Segregation of duties principle may be violated Voice-over-IP Risk Analysis 15

Example: Components with teething problems Voice-over-IP Risk Analysis 16

Vulnerabilities on endpoint level Unsecure default configurations Poorly implemented (see Shawn Merdinger s research) Softphones may be prone to buffer overflows Isolation of softphones traffic may be difficult Voice-over-IP Risk Analysis 17

Example: Softphones may be prone to buffer overflows Voice-over-IP Risk Analysis 18

Toolbox of Mitigating Controls Mitigating Controls are taken from/named accordingly to Common Criteria i to use exact terminology. Only those relevant to VoIP were chosen. In the course of the risk analysis itself they will be referenced just by their class name. This means some of the controls listed in this document, in that class, can/should be implemented to mitigate the respective risk. Voice-over-IP Risk Analysis 19

Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FAU: SECURITY AUDIT FAU_GEN "Security audit data generation FAU_STG "Security audit event storage FAU_SAR "Security audit review FAU_SAA "Security audit analysis CLASS FCO: COMMUNICATION FCO_NRO "Non-repudiation of origin i FCO_NRR "Non-repudiation of receipt" Voice-over-IP Risk Analysis 20

Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FCS: CRYPTOGRAPHIC SUPPORT FCS_CKM CKM "Cryptographic key management FCS_COP "Cryptographic operation" CLASS FDP: USER DATA PROTECTION FDP_ACC "Access control policy FDP_ACF "Access control functions" FDP_DAU "Data authentication FDP_IFC/FDP_IFF IFF "Information flow control policy / functions FDP_SDI "Stored data integrity FDP_ UCT/FDP_ UIT "Inter-TSF user data confidentiality / integrity transfer protection Voice-over-IP Risk Analysis 21

Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FIA: IDENTIFICATION AND AUTHENTICATION FIA_AFL AFL "Authentication ti ti failures" FIA_UAU "User authentication" FIA_UID "User identification" CLASS FMT: SECURITY MANAGEMENT FMT_MOF "Management of functions in TSF FMT_MSA "Management of security attributes FMT_MTD MTD "Management of TSF data FMT_REV "Revocation FTM_ SMF "Specification of Management Functions FMT_SAE "Security attribute expiration FMT_SMR "Security management roles" Voice-over-IP Risk Analysis 22

Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FPT: PROTECTION OF THE TSF FPT_RPL "Replay detection FPT_STM "Time stamps FPT_TDC "Inter-TSF TSF data consistency CLASS FRU: RESOURCE UTILISATION FRU_FLT "Fault tolerance FRU_PRS "Priority of service FRU_RSA "Resource allocation" Voice-over-IP Risk Analysis 23

Toolbox of Mitigating Controls, based on Common Criteria v3.1, Part 2 Class FTA: TOE ACCESS FTA_MCS "Limitation on multiple concurrent sessions" FTA_TAB "TOE access banners FTA_TAH "TOE access history FTA_TSE "TOE session establishment CLASS FTP: TRUSTED PATH/CHANNELS FTP_ITC "Inter-TSF trusted channel" Voice-over-IP Risk Analysis 24

Risk Analysis Protocol level Connection level Gateway level Endpoint level Voice-over-IP Risk Analysis 25

RA, Methodology used Numbers for likelihood and impact were chosen on a scale from one to five. Rating of impact is based on a mixture of several factors (breach of/loss of confidentiality/integrity/availability, violation of regulations). The impact rating largely depends on individual/environment/objectives/ settings. Your mileage might vary... Nevertheless some notes: - non-compliance nearly always leads to a 5 - loss of availability rarely gets a 5 (5 only used for disaster cases, which are out of scope here) - sometimes rating of impact depends on host count/scale concerned Assignment of numbers to respective threads is based on VoIP security common body of knowledge and author s experience/research. Here the risk is calculated by simple multiplication (see BS 7799-3, 5.7). Voice-over-IP Risk Analysis 26

RA Protocol Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TP1, Poor protocol design TP2, Implementat. t leading to BO 1 5 Breach of con/int, Non-Compliance 1 5 Compromise of components 5 Class FCS, Class FDP 5 Class FAU, Class FDP TP3, 3 3 9 Class FDP, Bad firewall Larger possible Stateful firewalls/algs config attack surface Voice-over-IP Risk Analysis 27

RA Protocol Level, Notes Since Oulu University Secure Programming Group research [1] on SIP and H.323 their common implementations can be considered less vulnerable. Presently most major firewalls are able to cope with SIP, H.323 and RTP without huge problems but still additional proprietary ports (e.g. for connections to CM or SBC) needed d frequently. Voice-over-IP Risk Analysis 28

RA Connection Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TC1, Eavesdrop. / 2 5 Breach of conf., 10 Class FCS, Class FDP, Call Monitor. Non-Compliance NW-Segmentation TC2, Data 2 5 Breach of conf., 10 Class FCS, Class FDP, Modification Non-Compliance NW-Segmentation TC3, 3 4 12 Class FRU, DoS by attack Loss of service NW-Segmentation, SLAs TC4, 2 4 8 Class FRU, DoS due to Loss of service Class FMT, misconfig Operational procedur. Voice-over-IP Risk Analysis 29

RA Connection Level, Notes Most important tools to eavesdrop VoIP connections include: vomit wireshark cain & abel oreka Voice-over-IP Risk Analysis 30

RA Gateway Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TG1, System 3 5 Breach of conf., 15 Class FMT, Class FDP, compromise Non-Compliance Hardening & OpSec TG2, DoS by attack 3 4 Loss of service 12 Class FRU, Class FTA TG3, 2 4 8 Class FRU, DoS due to Loss of service Class FMT, misconfig Operational Procedur. Voice-over-IP Risk Analysis 31

RA Gateway Level, Notes Special attention should be paid to - SNMP - Default passwords (mgmt access, configured users) Apply usual hardening steps before going productive and (pen-) test! Bad protocol implementations may have side effects on devices purportedly not running VoIP at all (see for example [3]). Voice-over-IP Risk Analysis 32

RA Endpoint Level Source Likelihood Rating of & Consequence(s) Risk Mitigating Controls TE1, System 2 4 Breach of conf., 8 Class FMT, Class FDP, compromise Non-Compliance Hardening & OpSec TE2, DoS by attack 1 3 Loss of service 3 Class FRU, Class FRA TE3, 3 5 15 Class FRU, Malwa. spread Loss of service, Class FMT, Backdoors Operational Procedur. TE4, 3 5 15 FAU_SAA (IDS), Covert chann. Breach of con/int Desktop OpSec corporate level Do not use Skype! Voice-over-IP Risk Analysis 33

RA Endpoint Level, Notes Special attention should be paid to - SNMP - Open Ports/running services (e.g. Telnet) See presentations and advisories of Shawn Merdinger. (Strong) Authentication is your friend here. 802.1x in the meantime available for some hardphones, check preferred vendor. Remember trunking/dtp security problems when using Cisco Voice VLANs... Did I already mention? ;-) Do not run Skype! Why? See [2] and [4]. Voice-over-IP Risk Analysis 34

Questions & Answers Voice-over-IP Risk Analysis 35

References [1] Oulu University Secure Programming Group: http://www.ee.oulu.fi/research/ouspg/ [2] Hackers call on Skype to spread Trojan: http://www.theregister.co.uk/2006/12/20/skype_trojan/ [3] Cisco Security Advisory: Vulnerabilities in H.323 Message Processing: http://www.cisco.com/en/us/products/products_security_advisory09186a00801ea156.shtml [4] Biondi/Desclaux: Silver Needle in the Skype: http://www.secdev.org/conf/skype_bheu06.handout.pdf NIST Special Publication "Security Considerations for Voice Over IP Systems : http://csrc.nist.gov/publications/nistpubs/800-58/sp800-58-final.pdf NIST IPTel/VoIP Security Technical Implementation Guide: http://csrc.nist.gov/pcig/stigs/voip-stig-v2r2.pdf NIST IPTel/VoIP Checklist: http://csrc.nist.gov/pcig/checklists/voip-checklist-v2r2-2-20060519.pdf Voice-over-IP Risk Analysis 36