Simple Law Enforcement Monitoring



Similar documents
Introducing STAR-GATE Enhancements for Packet Cable Networks

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Lawful Interception in P2Pbased

Society, Law Enforcement and the Internet

Advanced Computer Networks IN Dec 2015

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Brocade Telemetry Solutions

Overview of Voice Over Internet Protocol

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

Intranet Security Solution

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

VoIP Signaling and Call Control

Voice over IP Security

VOICE OVER IP SECURITY

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Strategies to Protect Against Distributed Denial of Service (DD

Security Technology: Firewalls and VPNs

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Deploying Media Probes in Evolving VoIP Networks

A Model-based Methodology for Developing Secure VoIP Systems

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Application Note. Onsight Connect Network Requirements v6.3

Troubleshooting Voice Over IP with WireShark

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

TECHNICAL CHALLENGES OF VoIP BYPASS

Provisioning of VoIP Phones

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Lawful Interception in German VoIP Networks

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Securing SIP Trunks APPLICATION NOTE.

Operation Manual Voice Overview (Voice Volume) Table of Contents

Lawful Interception of VoIP. Rudolf Winschuh Business Development Transaction Security / Telecommunications

SIPSTATION User Guide. Schmooze Com Inc.

T.38 fax transmission over Internet Security FAQ

VoIP Services. Maurice Duault 2001, Cisco Systems, Inc. All rights reserved.

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

TLS and SRTP for Skype Connect. Technical Datasheet

Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Encapsulating Voice in IP Packets

L2F Case Study Overview

Interactive communications over IP networks

Voice Peering: Interworking SIP and BGP

Voice over IP Basics for IT Technicians

SIP Trunking and Voice over IP

Avaya Aura SIP Trunking Training

Authentication, Authorization and Accounting (AAA) Protocols

Configuring Voice Quality Monitoring in AOS

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Computer System Management: Hosting Servers, Miscellaneous

Review: Lecture 1 - Internet History

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

Firewalls and Virtual Private Networks

NGN Interconnection Standards & Protocols

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

IP-based Delivery Network via OpenVPN Provider Handbook

SIP Trunking Configuration with

Hands on VoIP. Content. Tel +44 (0) Introduction

An Introduction to VoIP Protocols

PacketCable Electronic Surveillance Delivery Function to Collection Function Interface Specification

SERIES A : GUIDANCE DOCUMENTS. Document Nr 3

VPN. Date: 4/15/2004 By: Heena Patel

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

AdvOSS Session Border Controller

information security and its Describe what drives the need for information security.

Best Practices for Securing IP Telephony

POTTAWATOMIE TELEPHONE COMPANY BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 19, 2011

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

IP Telephony Management

Recommended IP Telephony Architecture

Connecting with Vonage

CISCO IOS NETWORK SECURITY (IINS)

Outline. VoIP Research Workshop February, Canberra. VoIP Workshop. VoIP in AARNet (+) Group discussion. Summary, what s next?

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Application Note. Onsight TeamLink And Firewall Detect v6.3

EAGLE EYE IP TAP. 1. Introduction

ADTRAN SBC and Avaya IP Office PBX SIP Trunk Interoperability

Cisco Virtual Office Express

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Avaya Aura SIP Trunking Training

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

OpenSER the open SIP Server. Bogdan-Andrei Iancu CEO Voice System Co-Founder OpenSER Project

Network Overview. Background Traditional PSTN Equipment CHAPTER

High Performance VPN Solutions Over Satellite Networks

FIREWALLS & CBAC. philip.heimer@hh.se

Applications that Benefit from IPv6

Voice over IP (VoIP) Basics for IT Technicians

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Applied Networks & Security

Introduction of Intrusion Detection Systems

Unit 23. RTP, VoIP. Shyam Parekh

LAKE REGION ELECTRIC COOPERATIVE, INC. BROADBAND INTERNET SERVICE DISCLOSURES. Updated September, 2013

COSC 472 Network Security

Vega 100G and Vega 200G Gamma Config Guide

State of Texas. TEX-AN Next Generation. NNI Plan

SHIDLER TELEPHONE INTERNET BROADBAND INTERNET SERVICE DISCLOSURES. Updated November 20, 2011

VoIP Security regarding the Open Source Software Asterisk

Transcription:

Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf

The message I wish had been found in many Raven messages I am not a lawyer I do not play one on TV

Lawfully Authorized Electronic Interception (LAES) Forensic investigation of specific persons or organizations Focuses on the crime/criminal being investigated Involves disclosure of a person's communications In most countries, the difference between voice and data communication is irrelevant

LAES in an Internet environment Who did they speak with? What did they say? Control Device: Call Manager, SIP Proxy, Authentication Server, etc Log Stream IP Control Traffic IP Data Control Mediation Warrant Intercept Configuration Data ACL Intercepted Information Intercepted Data Data Mediation

The legal mandate for Lawfully Authorized Electronic Interception

Current state of law Laws being worked on in western countries US CALEA and related laws European legislation resulting from legal normalization process Japan, Australia, and others 11 September attack used to push US legislation Cryptography limitations and export controls discussed during debate

EU Efforts Council of Europe-Convention on Cyber-crime Left to each country to implement requirements. Provides for mutual assistance among signing states Applies to public and private ISPs Requires ISPs to preserve communications data (e.g., origin, route, type of service) for up to 90 days and provide it to LEA. ISP must also provide for real-time collection or recording of traffic data and content for LEA. Open to EU members and drafters, including Canada and Japan

Overview of Electronic Surveillance Four fundamental types of requests: Past billing/statistical records of communications In telephone system, billing records Contents of computer long term storage Eg, search and seizure of computers and disk drives Current billing/statistical records of communications, desirable in real time In telephone system, pen register or trap and trace Delivery of content Content Intercept

Cybercrime Treaty, Article 20 Real-time collection of traffic data Each Party shall compel a service provider, within its existing technical capability, to: i. collect or record traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system. http://conventions.coe.int/treaty/en/treaties/html/185.htm

Cybercrime treaty, Article 21 Interception of content data Each Party shall a. b. i. ii. collect or record compel a service provider collect or record co-operate in the collection or recording of, content data, in real-time, of specified communications in its territory transmitted by means of a computer system. http://conventions.coe.int/treaty/en/treaties/html/185.htm

CALEA wrinkles Communications Assistance for Law Enforcement Act Voice intercept mandated Features installed only for CALEA compliance subject to FBI funding Lack of capability cause for $10K/day fines Data intercept allowed for, especially Title III and FISA If an ISP has the capability, its use can be subpoenaed If it does not, an ISP must provide reasonable assistance to law enforcement (i.e., do what it can, or provide access to install LEA-owned equipment) to permit LAES

IETF Comments on the thrust of law

IETF Issues in Internet Privacy and Security IETF primary concern: Security of the infrastructure Two statements: RFC 2804 - IETF Policy on Wiretapping RFC 1984 - IAB and IESG Statement on Cryptographic Technology and the Internet

RFC 2804 on LAES Wiretapping... releases information that the information sender did not expect to be released. The system is less secure than it could be had this function not been present. The system is more complex than it could be had this function not been present. Being more complex, the risk of unintended security flaws in the system is larger. Wiretapping, even when it is not being exercised, therefore lowers the security of the system. RFC 2804

RFC 2804 major findings Six major considerations: IETF is wrong forum National definitions call for national standards IETF wants to maximize security LAES can already be accomplished Adding LAES to protocols adds complexity that reduces security Encryption is your friend LAES technology should be openly described

RFC 2804 will not statements IETF will not Take a moral position on LAES No consensus The IETF has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards. Implications At minimum, the question that triggered Raven, IETF will not add LAES capabilities to unrelated protocols Complexity and security issues Perhaps, IETF will not standardize LAES technology

Approaches to LAES

Fundamental Requirements Need to identify traffic related to a surveillance subject and (somehow) report it Need to maintain secrecy of the intercept from subject and uncleared staff Need to audit the use of intercept technology

Mediation Device/Delivery Function Request (a1) IRI (d2) Request (c1) Authorization (a/c) Mediation Device Content (d1) IRI (HI2) CC (HI3) Authorization Mediation Device: Formats to countryspecific handover interface Delivers to LEA(s) Replicates for multiple taps on same target Filtering of CC and IRI, and may do Request for IRI & CC

Three fundamental approaches Fiber splitting All traffic sent to a service center for reporting Port Mirroring All identified traffic sent to a mediation device for reporting without protection Router/Switch data intercept All identified traffic sent to a mediation device for reporting with protection

Trade-offs in approaches Cost/Scalability of solution Integrity of data intercepted Security perimeter Ability to handle special cases Hairpin calls, Dial access, tunnels Definition of Call Identifying Information (IRI) IPFix records? Every IP header? IP+TCP?

PacketCable Architecture CMS = Proxy + Gate Controller for SIP = Call Agent + Gate Controller for Call Agent-Based (NCS) Authorization Interface Demarcation Point LEA LEA ICE CMS CDC Mediation Device LEA LEA COPS IP Network CCC CDC CCC LEA Intercept Subject INE MTA Cable RF Network MGC ICE MGCP MG INE PSTN CDC Channels use Radius COPS Common Open Policy Service Protocol (RFC 2748) CDC Call Data Channels (IRI) CCC Call Content Channels (CC)

PacketCable Architecture Configuration Commands Service Provider Voice: CMS/Call Agent, MGC and ER ICE Request (a2) Request (a1) IRI (d2) LI Administration Function (a/c) Mediation Device IRI (HI2) CC (HI3) LEA Collection Function Content (d1) Request (c2) INE COPS or MGCP RADIUS Event Messages Edge router Trunk Gateway

Cisco Service-Independent Intercept (SII) Data Intercept Service Provider AAA Server, CMS ICE RADIUS messages SNMPv3 Request (a1) IRI (d2) Request (c1) LI Administration Function (a/c) Mediation Device Content (d1) INE IRI (HI2) CC (HI3) LEA Collection Function UDP or RTP Nack Oriented Retransmission (RTP-NOR) Access Router, NAS Aggregation Router, MGW

Cisco SII - Voice Intercept Service Provider Call Agent, H.323 GK, SIP Proxy ICE PacketCable Event Message Request (a1) IRI (d2) Request (c1) LI Administration Function (a/c) Mediation Device Content (d1) INE IRI (HI2) CC (HI3) LEA Collection Function PacketCable UDP or RTP-NOR SNMPV3 CISCO-TAP-MIB

Cisco SII - Data Intercept ICE (e.g., AAA server) IRI Config Cmd 3 rd Party MD Court Order LEA Authenticate SNMPv3 Intercepted Data RTP-NOR Target Subscriber Edge Router (INE) Data Stream

PC Voice Intercept Edge/Aggregation Router Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI CC Law Enforcement Agency Voice Packets SIP, H.323 or MGCPbased GW Call Control COPS Request Call Control Target Subscriber RTP Stream Aggregation Router Aggregation Router Customer Premise IAD

SII Voice Intercept Edge/Aggregation Router Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI CC Law Enforcement Agency Voice Packets SIP, H.323 or MGCPbased GW Call Control SNMPv3 SET Call Control Target Subscriber RTP Stream Aggregation Router Aggregation Router Customer Premise IAD

PC Voice Intercept Trunk Gateway Hairpin Case Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI IRI CC Law Enforcement Agency Call Forward to PSTN SIP, H.323 or MGCP-based GW Call Control MGCP Hair-pin case Voice Packets Call to Target PSTN Target Subscriber Gateway Forwarded Call

SII Voice Intercept Trunk Gateway Hairpin Case Gatekeeper, SIP Proxy, Call Agent Admin IRI 3 rd Party Mediation Device Admin IRI IRI CC Law Enforcement Agency Call Forward to PSTN SIP, H.323 or MGCP-based GW Call Control Hair-pin case SNMPv3 Voice Packets Call to Target PSTN Target Subscriber Gateway Forwarded Call

Simple Law Enforcement Monitoring Fred Baker draft-baker-slem-architecture-01.txt ftp://ftpeng.cisco.com/fred/ietf/slem.ppt ftp://ftpeng.cisco.com/fred/ietf/slem.pdf