Lawful Interception in German VoIP Networks



Similar documents
VoIP Phreaking Introduction to SIP Hacking. Hendrik Scholz 22C3, Berlin, Germany

An Introduction to VoIP Protocols

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Attacking VoIP Networks

TECHNICAL CHALLENGES OF VoIP BYPASS

Switchvox. Technical Application Notes

Need for Signaling and Call Control

This specification this document to get an official version of this User Network Interface Specification

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

SIP Trunking and Voice over IP

NTP VoIP Platform: A SIP VoIP Platform and Its Services

nexvortex Setup Guide

Voice over IP Basics for IT Technicians

Application Note Configuring the Synapse SB67070 SIP Gateway for Broadvox GO! SIP Trunking

ABC SBC: Securing and Flexible Trunking. FRAFOS GmbH

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

VoIP Bandwidth Considerations - design decisions

Avaya IP Office 8.1 Configuration Guide

SS7 & LTE Stack Attack

3CX IP PBX Phone System Technical Training Deerfield.com

Voice over IP (VoIP) Basics for IT Technicians

How to make free phone calls and influence people by the grugq

Connect your Control Desk to the SIP world

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 4.1 for use with SKYPE SIP Trunking. SIP CoE

LessWires Advanced IP Soft-PBX System

Application Notes for Configuring Avaya IP Office 9.0 with HIPCOM SIP Trunk Issue 1.0

Alcatel OmniPCX Enterprise R11 Supported SIP RFCs

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

ABC SBC: Charging and Accounting. FRAFOS GmbH

Comparison of Voice over IP with circuit switching techniques

2N VoiceBlue Next. 2N VoiceBlue Next & Siemens HiPath (series 3000) connected via SIP trunk. Quick guide. Version 1.00

Understanding Voice over IP Protocols

Dialogic 4000 Media Gateway Series

Cisco CME Features and Functionality

The IP-Private Branch Exchange (PBX)

2N OfficeRoute. 2N OfficeRoute & Siemens HiPath (series 3000) connected via SIP trunk. Quick guide. Version 1.00

Internet Technology Voice over IP

Manual. ABTO Software

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

VoIP-PSTN Interoperability by Asterisk and SS7 Signalling

ABC SBC: Securing the PBX. FRAFOS GmbH

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

Understanding Session Initiation Protocol (SIP)

Encapsulating Voice in IP Packets

White paper. SIP An introduction

Voice over IP Probe! for Network Operators and! Internet Service Providers

Dialogic Diva SIPcontrol Software

Attacking VoIP Networks

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

SIP : Session Initiation Protocol

Simple Law Enforcement Monitoring

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

SIP Security Controllers. Product Overview

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC

Master Kurs Rechnernetze Computer Networks IN2097

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Basic configuration of the GXW410x with Asterisk

Overview of Voice Over Internet Protocol

TSIN02 - Internetworking

MITEL SIP CoE. Technical. Configuration Notes. Configure MCD 6.X for use with babytel SIP trunks. SIP CoE

Guideline for SIP Trunk Setup

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Skype Connect Requirements Guide

IP Voice Reseller. Deliver the VoIP services your customers demand without costly infrastructure investment or increased management complexity.

IOCOM Whitepaper: Connecting to Third Party Organizations

VegaStream Information Note T.38 protocol interactions

Lab Introduction software Voice over IP

Link Gate SIP. (Firmware version 1.20)

SIP Trunking Quick Reference Document

Software Engineering 4C03 VoIP: The Next Telecommunication Frontier

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office Issue 1.0

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Transcoding (Voice coding G.711 A-law/u-law, G.722 G.729AB) licenses included

VoIP Security regarding the Open Source Software Asterisk

MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)

Best Practices for Securing IP Telephony

MITEL SIP CoE Technical. Configuration Note. Configure MCD for use with Thinktel SIP Trunking Service. SIP CoE

ABC SBC: Mobile Subscriber Support. FRAFOS GmbH

Technical Configuration Notes

Dialogic Vision VG Media Gateway

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

Formación en Tecnologías Avanzadas

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Online course syllabus. MAB: Voice over IP

Configuring Interoperability between Avaya IP Office and Avaya Communication Manager

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

TELEPHONE MAN OF AMERICA. Earning Your Business Every Step of the Way!

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

The user interface of SIPPS is fully skinnable

VOIP NETWORK CONFIGURATION GUIDE RELEASE 6.10

Transcription:

Lawful Interception in German VoIP Networks 22C3, Berlin Hendrik Scholz hscholz@raisdorf.net http://www.wormulon.net/

Agenda What is Lawful Interception (LI)? Terms, Laws Lawful Interception in PSTN networks Lawful Interception in VoIP networks Countermeasures Interim Solution Upcoming Nightmares

What is Lawful Interception? spying on users justified by the government goal: gain information about subject information: relationship rather than content target: 'account' email, DSL, Usenet, phone number, SIP address IRI: intercept related information

Terms Bedarfstraeger, berechtigte Stelle demand bearer, entitled agency LEA: Law Enforcement Agency Massnahme interception process Ausweisung expulsion order copying data active vs. passive expulsion

The Law Telekommunikationsüberwachungsverordnung telecommunication surveillance ordinance TKUeV Technische Richtlinie zur Telekommunikationsüberwachungsverordnung technical guidelines TR TKUeV Durchfuehrungsverordnung zur Telekommunikationsüberwachungsverordnung rules of conduct DV TKUeV

PSTN network

LI in the Old World signalling and voice parallel (ISDN) D channel, multiple B channels in band singalling (analogue) LI on the upstream gateway (i.e. Siemens EWSD) in service since 20 years redirections not visible to user no ping to measure round trip times no traceroute to record route

VoIP Paradigm VoIP should have all PSTN LI features undetectable to user management (handover) interface security

The VoIP Universe signalling: SIP H.323 SCCP (Skinny) voice/media: G.711 ulaw, alaw G.723, G.726, G.729 GSM, ilbc, speex proprietary

simplified VoIP Setup

standard VoIP Setup

Solution: Conference Call each call becomes a conference call with a government official listening implemented in client becomes visible in SIP: Hi, I'm Eve and I'd like to get a copy of your voice stream

Solution: Media Gateway divert voice through a proxy that allows sniffing snignalling has to be modified This is your SIP server speaking. You are being intercepted. Please send your data to the police. They'll forward it on for you. easy to implement easy to detect in most cases

Solution: PSTN Diversion divert outgoing call into the PSTN sniff data using well known intercept access point (IAP) divert traffic back into the VoIP network requires transition SIP to {SS7 DSS1 MGCP} not all SIP messages can be translated how about voice quality?

Solution: passive Ausweisung add interception points (IAP) everywhere in every POP > expensive the right thing could sure be found in the mess eases abuse as everything is in place and waits to be used who controls what's intercepted? hackers gaining access management overhead, updates

Solution: active Ausweisung drive to the POP when needed and install temporary hardware problems: delay of up to 48h until device is in place visible physically what happens in long term surveillance? how about roaming users?

ideas? don't do LI at all make the underlying 'access' ISP sniff the data Bedarfstraeger/government writes readable laws/instructions ain't gonna happen VoIP is kinda new to the government define use cases that can be intercepted accept the fact of untraceable calls outlaw VoIP?

bad ideas If you divert traffic from SIP to PSTN Do not show diverted calls in records Do not add cost announcement Do not bill user for intercepted calls make it easy to use abuse make it permanent (in place) security

Countermeasures make fake calls and save round trip times Record Route IP addresses SDP header information alert user if things change

Countermeasures cont'd. use random unsupported codec PSTN gateway will drop call if used for interception add challenge authentication, checksums DTLS TLS, SRTP 'access' ISP has to provide data

Poor man's LI record all data using libpcap tcpdump s 1500 w foobar.cap udp use ethereal to reassemble RTP stream save as audio file nice statistics for debugging

RegTP interim solution interim solution from July 2005 signalling only solution based on ETSI TS 101 671 use SINA box (VPN tunnel) to send SIP signalling totally bogus on first attempt needed lots of discussion Meeting in Mainz early in June to be implemented by ISPs this year

BNetzA Interim Issues sniffing based on account how about in band authentication? delay authenticated using DTMF tones on mailbox delay between call and data reception at LEA has to be very low (500ms) undetectable doable in most cases

Media solution RTP has to be interceptable by 2007 BNetzA likes to have RTP media for intercepted calls some media is hard to capture call scenarios yet to be specified lots of hardware needed in distributed systems LEA need to have bandwidth and equipment

Upcoming Nightmares World of Warcraft 'Voice Chat' this is VoIP?! 'Vorratsdatenspeicherung' data warehouse containing user information, call logs parameters: European 'solution' 12 36 months depending on government ISPs have to store and provide data

Resources RFC 3924, Cisco Architecture for Lawful Intercept in IP Networks http://bnetza.de/ http://www.wormulon.net/ > slides

Q&A Questions? hscholz@raisdorf.net