VoIP Security: How Secure is Your IP Phone?



Similar documents
White Paper. Mitel 3300 IP Communications Platform (ICP) Secure Voice Communications. White Paper

Best Practices for Securing IP Telephony

An outline of the security threats that face SIP based VoIP and other real-time applications

Recommended IP Telephony Architecture

Ingate Firewall/SIParator SIP Security for the Enterprise

VoIP Security regarding the Open Source Software Asterisk

Threats to be considered (1) ERSTE GROUP

Security Guidance for Deploying IP Telephony Systems

Voice over IP Security

VoIP Survivor s s Guide

Securing SIP Trunks APPLICATION NOTE.

Voice Over IP and Firewalls

Villains and Voice Over IP

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Presenter. Zane Ryan. Director Dot Force

Models of Secure VoIP Systems. VoIP Security Best Practice. Vol. II. Models of Secure VoIP Systems (Version: 1.2) NEC Corporation

VOICE OVER IP SECURITY

SIP Trunking Configuration with

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

VOIP SECURITY ISSUES AND RECOMMENDATIONS

Recommendations for secure deployment of an IP-PBX

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

SIP Security Controllers. Product Overview

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Challenges and opportunities for Open Source solutions

VoIP Resilience and Security Jim Credland

Voice over IP (VoIP) Vulnerabilities

PETER CUTLER SCOTT PAGE. November 15, 2011

VoIP Security. Customer Best Practices Guide. August IntelePeer

Developing Network Security Strategies

ICANWK406A Install, configure and test network security

Voice Over IP (VoIP) Denial of Service (DoS)

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

(d-5273) CCIE Security v3.0 Written Exam Topics

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Network Access Security. Lesson 10

A Reality Check on Security in VoIP

VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

Session Border Controllers in Enterprise

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

CTS2134 Introduction to Networking. Module Network Security

Security issues in Voice over IP: A Review

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Basic Vulnerability Issues for SIP Security

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Extend the Life of Your Legacy PBX while Benefiting from SIP Trunks. December 5, 2013

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

How To Support An Ip Trunking Service

White Paper. avaya.com 1. Table of Contents. Starting Points

Threat Mitigation for VoIP

Black Box Analysis and Attacks of Nortel VoIP Implementations

SIP Trunking with Microsoft Office Communication Server 2007 R2

Strategies to Keep Your VoIP Network Secure

DEPLOYING VoIP SECURELY

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Gigabit SSL VPN Security Router

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

OmniPCX Enterprise Common Criteria Security Target

Hosted PBX Description General Info about Hosted PBX

Voice over IP Basics for IT Technicians

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

CCIE Security Written Exam ( ) version 4.0

Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014

Fundamentals of Network Security - Theory and Practice-

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma

Release the full potential of your Cisco Call Manager with Ingate Systems

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

Building A Secure Microsoft Exchange Continuity Appliance

Best Practices for Outdoor Wireless Security

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Application Note Secure Enterprise Guest Access August 2004

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Dialogic BorderNet 500 Gateways

Transcription:

VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT Standards Advisory Council of Canada 35 th Plenary, March 21 2006

Security concerns in telephony are not new 5/12/2009 slide 2

Nor are our attempts to protect against threats 5/12/2009 slide 3

First objective is to employ best practices and plug the obvious holes 5/12/2009 slide 4

A Few Security Terms Denial of Service (DoS) Repetitive attacks that limit normal access to services Virus Attached to a program and propagates when that program is executed Worm Move through a network quickly from device to device, both intranet and Internet Trojan horse Viruses and worms hide in other programs hence the name Spoofing Changing your MAC or IP address to impersonate another device Spam for Internet Telephony (SPIT) Telemarketing in the age of VoIP Phishing 5/12/2009 slide 5

The Challenge of Security

The Implications are Clear Ensure privacy and appropriate access to information Maximize service availability Cost avoidance Confidence to extend services to broadest group of users: Local, remote, mobile Legal ramifications in some regions Security is strategic 5/12/2009 slide 7

The Noise is Deafening VoIP Security makes the headlines in countless articles Everyone is issuing security advisories Manufacturers of software and hardware Security research firms Vendors of security products / training / services Government (or quasi-government) entities Computer Emergency Response Team (CERT) CERT Coordination Center http://www.cert.org/ U.S. Computer Emergency Readiness Team http://www.us-cert.gov/ U.K. s National Infrastructure Security Coordination Center (NISCC) http://www.niscc.gov.uk AUS-CERT http://www.auscert.org.au/ Each day brings more to your inbox and news 5/12/2009 slide 8

The Problem is Complex Multiple vendors and applications Competing vendor and internal priorities Responsibilities spread among internal groups Comprehensive defense involves many layers Operating Systems Desktop PCs Network Switches Web Servers E-mail Systems PDAs Standards Firewalls Instant Messaging Voice over IP Internet Wireless Devices PSTN Gateways 5/12/2009 slide 9

What is the Industry Doing to Help? VOIPSA s mission is to promote the current state of VoIP security research, VoIP security education and awareness, and free VoIP testing methodologies and tools. Membership includes: Mitel, Avaya, Nortel, Siemens, Alcatel, Extreme Networks, etc. Now over 100 members on the Technical Board of Advisors Committees: Security Requirements, Security Research, Best Practices, Testing Public VOIPSEC mailing list for discussion of VoIP security issues http://www.voipsa.org/voipsec/ (and yes, it s all CAPS) VoIP Security Threat Taxonomy released in late 2005 Next project - industry-wide Best Practices http://www.voipsa.org/ So what are the actual threats to IP Telephony? 5/12/2009 slide 10

Understanding IP Telephony Security Threats

Confidentiality Integrity Availability 5/12/2009 slide 12

Security Threats Confidentiality Confidentiality Integrity Availability Voice Threat Eavesdropping, man-in-the-middle attacks Consequences confidentiality breach between called and calling parties which can be used for personal or company gain Call Control Threat exposure of information about users, systems, patterns Consequences privacy breach and / or malicious usage Defense Strategies Physical protection (wiring closets, equipment rooms) Use of Ethernet switching instead of shared media Use VLANs, VPNs where applicable (just like your data network!) Encrypt conversations and call control, secure the media stream SRTP Ensure routing tables, instructions, account codes are well maintained and password protected 5/12/2009 slide 13

Security Threats Integrity Confidentiality Integrity Availability Ensure that packets get from one point to another without modification Voice Threat impersonation of user, injection of other audio Consequences ranging from unlimited to annoyance Call Control Threat fraudulent use of telephony resources toll fraud, impersonation Consequences increased costs and / or malicious usage Passwords Threat discovery of a user, system or application password Consequences unlimited, depending on the role and function of the discovered password Defense Strategies: Use encryption for secure communications Change default password, minimum length, enforce periodic change Never exchange passwords in clear text Password maintenance, delete ex-employees, security codes 5/12/2009 slide 14

Security Threats Availability Confidentiality Integrity Availability Ensure that communication services are available to users Avoid any adverse effects resulting from a denial of service (DoS) attack or computer worm Denial of Service: Threat Teardrop, SMURF or Ping of Death Consequences partial or total loss of telephony or related services Defense Strategies: Rigorous virus updates and OS patches Intrusion detection systems Protect access from external sources (firewall) Limit access from internal sources (firewall) Use of 802.1 p/q (VLAN) to isolate and protect voice domain bandwidth from data domain Denial of Service (DoS) floods 5/12/2009 slide 15

Security Aspects of IP Telephony Media / Voice Manage ment TCP/IP Network Call Control PSTN Policy 5/12/2009 slide 16

Media / Voice The Media Path Manage ment TCP/IP Network Call Control Real-Time Protocol (RTP) Packets PSTN Policy Threats: Eavesdropping particularly if over wireless or open Internet (sniffing) IP phones Application Servers Degraded voice quality through Denial of Service (DoS) attack PSTN SOHO Defense Strategies: Encryption of voice path WPA, WPA2 for wireless Call Controller TDM IP Private Enterprise IP Network Internet VLANs Packet filtering 802.11 wireless IP phones Softphone 5/12/2009 slide 17

Media / Voice The Signalling Path Manage ment TCP/IP Network Call Control SIP, H.323, others PSTN Policy Threats: Denial of Service Impersonation IP phones Application Servers Snooping account codes Toll fraud PSTN SOHO Defense Strategies: Signalling path encryption Encrypted set firmware loads Call Controller Private Enterprise IP Network Internet Proper system programming 802.11 wireless IP phones Softphone 5/12/2009 slide 18

Media / Voice The Management Path Examples Telnet, HTTP, FTP, SNMP, XML, TAPI Manage ment TCP/IP Network PSTN Policy Call Control Threats: Snooping passwords Denial of service Application Impersonation Remote Service Remote Service Monitoring call patterns Malicious system modifications PSTN Internet Defense Strategies: DoS defenses in network infrastructure Changing default passwords Call Controller Enterprise IP Network Ensure physical security Authentication secure port access! NMS System Secure Socket Layer (SSL) Application Server System Admin 5/12/2009 slide 19

Media / Voice PSTN and Legacy Devices Manage ment TCP/IP Network Call Control Analog LS, ISDN, Q.SIG, DPNSS PSTN Policy Threats: Toll fraud via public network attack IP phones Application Servers Impersonation Feature access PSTN SOHO Defense Strategies: Class of Restriction (COR) Call Controller Private Enterprise IP Network Internet Class of Service (COS) Account Codes Analog Gateway Trunk Restrictions Interconnect Restrictions Existing PBX 802.11 wireless Analog to IP media and signaling conversion Softphone 5/12/2009 slide 20

Media / Voice What about SPIT? ( SPam over Internet Telephony ) Manage ment TCP/IP Network Call Control PSTN Policy Makes for great headlines, but not a real threat today Fear is script/tool that: 1. Iterates through calling SIP addresses: 111@sip.company.com, 112@sip.company.com, 113@sip.company.com, etc. 2. Opens an audio stream if call is answered (by person or voicemail) Reality is that today such direct connections are generally not allowed This will change as companies make greater use of SIP trunking and/or directly connect IP-PBX systems to the Internet (and allow incoming calls from any other IP endpoint) Until that time, PSTN provides a de facto firewall Telemarketers have to initiate unsolicited calls through the PSTN Note that VoIP just might give you more control 5/12/2009 slide 21

Media / Voice IEEE 802.1X Manage ment TCP/IP Network Call Control PSTN Policy How do you know who is plugging into your network jacks? Network device must be authenticated before switch port is opened IEEE 802.1X Authentication for Desktops Support for Extensible Authentication Protocol (EAP) EAP-MD5 Protected EAP (PEAP) EAP-TTLS (Tunneled TLS) EAP-TLS EAP-FAST Lightweight EAP (LEAP) Support for authentication via EAP to a RADIUS (or other similar) server Username and password entered through the phone interface or included certificate 5/12/2009 slide 22

A Word on Standards

VoIP Standards Most VoIP deployments today are still with proprietary protocols However, industry future focused around: SIP Session Initiation Protocol SRTP Secure RTP Most VoIP Standards are under the IETF: Working Groups: SIP, SIPPING, SIMPLE, MMUSIC, BEHAVE, ECRIT, SPEER Some of the major VoIP security issues before the IETF: How do you securely exchange the keys to enable SRTP between vendors? How do you know the identity of the caller? (i.e. to combat SPIT) How do you address emergency calling? (i.e. E-911) How do you find another number over the Internet without using the PSTN? (ENUM) How do we improve NAT/firewall traversal? How do connections between peers authenticate? (i.e. SIP trunking for PSTN bypass) New Real-time Applications and Infrastructure (RAI) area within IETF to add focus Much of this is being debated in Dallas at the 65 th IETF meeting right now Additional standards in IEEE (802.1x, 802.11), ECMA (CSTA), ISO and TIA (LLDP-MED). 5/12/2009 slide 24

Summary

Security Aspects of IP Telephony Media / Voice Manage ment TCP/IP Network Call Control PSTN Policy 5/12/2009 slide 26

Addressing Security Threats IP-PBX 2 1 Admin 1,3, 4 LAN 1,5 3, 4,6 WAN/ Internet Teleworker Server /SBC Apps Attack Points Server 1) Denial Of Service 2) Password Sniffing 3) Eavesdropping 4) Spoofing, Assuming Identity 5) Spoofing, APIs 6) Firewall Traversal Security Implementations 1) Hardening of Call Control and OS 2) Implement Secure Socket Layer 3) Employ Encryption of Media Streams 4) Implement SSL on Signaling Streams 5) Authentication with Policy Based Access 6) Secure Proxy on network edge 5/12/2009 slide 27

Security Links VoIP Security Alliance http://www.voipsa.org Threat Taxonomy - http://www.voipsa.org/activities/taxonomy.php VOIPSEC mailing list - http://www.voipsa.org/voipsec/ Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com/ Computer Emergency Response Team (CERT) http://www.cert.org/ U.S. Computer Emergency Readiness Team http://www.us-cert.gov/ U.K. s National Infrastructure Security Coordination Center (NISCC) http://www.niscc.gov.uk AUS-CERT http://www.auscert.org.au/ Internet Storm Center http://isc.sans.org/ 5/12/2009 slide 28

The Paradox of VoIP: One could argue that VoIP is already far more secure than the PSTN ever was 5/12/2009 slide 29

And Remember. I m safe..a 12 foot wall..13 foot ladders It s a question of vigilance 5/12/2009 slide 30

Thank you Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance dan_york@mitel.com Report security issues to security@mitel.com 5/12/2009 slide 31

Backup Slides

IEEE 802.1X handshake Set, PC, endpoint LAN Switch (or access point) RADIUS Server Exact format unique to each Extensible Autentication Protoal (EAP) method EAP-MD5, EAP-TLS, EAP-TTLS, PEAP, EAP-FAST, others 5/12/2009 slide 33

How Can VLANs Solve My Security Problems? Switch Switch Green VLAN data VLAN Black VLAN aka Voice VLAN Virus permeates network * 5/12/2009 slide 34