Best Practices for Controlling Skype within the Enterprise > White Paper



Similar documents
Best Practices for Controlling Skype within the Enterprise. Whitepaper

ProxySG TechBrief Implementing a Reverse Proxy

Guidance Regarding Skype and Other P2P VoIP Solutions

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

Application Visibility and Monitoring >

Security and the Mitel Teleworker Solution

Reverse Proxy with SSL - ProxySG Technical Brief

INSTANT MESSAGING SECURITY

How to Gain Visibility and Control of Encrypted SSL Web Sessions >

ProxySG TechBrief Downloading & Configuring Web Filter

Downloading and Configuring WebFilter

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

ProxySG TechBrief Enabling Transparent Authentication

The Application Usage and Threat Report

Skype network has three types of machines, all running the same software and treated equally:

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

PEER-TO-PEER NETWORK

REPORT & ENFORCE POLICY

Skype characteristics

Masters Project Proxy SG

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

BlackShield ID Agent for Remote Web Workplace

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Network Configuration Settings

Lucent VPN Firewall Security in x Wireless Networks

Application Note. Onsight Connect Network Requirements v6.3

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Firewall Testing Methodology W H I T E P A P E R

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Firewall Firewall August, 2003

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Is Your Network Ready for VoIP? > White Paper

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

LDAP Authentication and Authorization

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

emerge 50P emerge 5000P

Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper

SIP Security Controllers. Product Overview

Blue Coat Systems. Client Manager Redundancy for ProxyClient Deployments

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Voice over IP Communications

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

Video Conferencing and Firewalls

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

CA Unified Infrastructure Management Server

Implementing Exception Pages

ProxySG TechBrief LDAP Authentication with the ProxySG

DMZ Network Visibility with Wireshark June 15, 2010

Running a Successful Proof of Concept

Cisco ASA 5500 Series Business Edition

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Implementing SSL Offload with JAGUAR Ver.1.0

IT Security Evaluation of Skype in Corporate Networks

UTM Quick Installation Guide

WAN Optimization for Microsoft SharePoint BPOS >

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

How To Block Skype

Direct or Transparent Proxy?

MS Skype for Business and Lync. Integration Guide

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

The Cisco ASA 5500 as a Superior Firewall Solution

Networking for Caribbean Development

Integrated Citrix Servers

Assuring Your Business Continuity

The Benefits of SSL Content Inspection ABSTRACT

OVERVIEW OF ALL VOIP SOLUTIONS

Protecting the Infrastructure: Symantec Web Gateway

White Paper Instant Messaging (IM) HIPAA Compliance

Controlling Web 2.0 Applications in the Enterprise SOLUTION GUIDE

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

INSIDE. Malicious Threats of Peer-to-Peer Networking

Lab Testing Summary Report

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

BeamYourScreen Security

Strategies to Keep Your VoIP Network Secure

Chapter 8 Router and Network Management

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

PrintFleet Enterprise Security Overview

Xerox SMart esolutions. Security White Paper


Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Network Agent Quick Start

BroadCloud PBX Customer Minimum Requirements

Deploying Firewalls Throughout Your Organization

Deployment Guide. Microsoft Lync 2013 and Citrix NetScaler Deployment Guide. citrix.com

Transcription:

> White Paper

Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it and its benefits or attempt to stop its progress? Skype (rhymes with ripe ) is a proprietary peer-to-peer (P2P) voice over Internet protocol (VoIP) network, founded by the creators of KazAa, the popular peer-to-peer technology. The network is defined by all users of the free desktop software application. Skype is a public voice over IP (VoIP) application that allows its users to call each other from PC to PC for no charge and set up conference calls between multiple users. It also offers very low cost calls to standard telephones via its technology called Skype-out, calling in to the service (Skype-in), voicemail, instant messaging, file transfer and video calling. Its web site shows that there have been over 250 million downloads worldwide. > Skype usage is continuing to gain ground in enterprises with over 250 million downloads worldwide. Management therefore needs to decide whether the benefits overcome the drawbacks and set appropriate policies within the organization. It is a very clever piece of technology; the phone service requires very small amounts of bandwidth, all data is encrypted and it can get around attempts to block it from packet-based devices such as firewalls, it even uses other PCs running Skype as the next hop in its communications. Its benefits are clear to the cost-conscious organization or anyone making calls worldwide. Currently, it is very widely deployed in Asia, a little less in Europe and least in North America quite possibly a reflection of the relavtive costs of making traditional telephone calls. Skype also shows presence, so you know when your buddies are at their PC, just like Instant Messager applications from AOL, Yahoo! and MSN. The drawbacks though, are also similar to IM technologies. Firstly, there s no central log of calls from an organization. The file transfer is peer-to-peer, so doesn t go through the organization s email service for virus-scanning, logging and content control, this means that viruses and spyware can enter while confidential information can leave an organization. The voice and video calls cannot be recorded because the encryption is proprietary, making it impossible to use Skype in an organization that needs to follow financial regulations on communication logging. 1 < >

Management therefore needs to decide whether the benefits overcome the drawbacks and set appropriate policies within the organization. If it is decided to block Skype, firewalls need to work in conjunction with proxies to provide a block as firewalls on their own are unable to provide a complete block. It may be decided that specific regions or groups of users are allowed access and this can be achieved by using Blue Coat SG in coordination with firewalls. Why Block Skype? Skype is a P2P protocol that intentionally evades network policies and may expose enterprises to security and liability risks. It is difficult to control via traditional means, such as firewalls. The unauthorized use of Skype in the workplace can cause a number of problems, including the following: 1 Skype file transfers may expose the enterprise network to viruses, spyware or other malicious code. 2 Skype file transfers may also expose enterprises to the risk of confidential information being leaked to outside parties. 3 As video data is bandwidth-intensive, Skype users can consume a sizeable amount of bandwidth on an enterprise network. 4 Use of Skype PCs as part of a Botnet of PCs to launch denial-of-service and other attacks. 5 Skype users may use its Instant Messaging (IM) functionality to evade enterprise IM controls and send out confidential data 6 All Skype traffic is encrypted using proprietary encryption, so none of the communications can be logged. As mentioned above, Skype is designed to be hard to block. To date, all the traditional means of blocking unauthorized Skype network use have been unsuccessful. A Tech Brief is available on Blue Coat s web pages that define the full steps to effectively block Skype and give further details on exactly how the technology works. 2 < >

How Skype Works When users install and execute a Skype client, Skype tries multiple methods to access a Skype Supernode on the Internet or any of the main Skype login servers. Any PC running Skype that is directly connected to the Internet may be used by the Skype system to become a Supernode. Skype first tries UDP packets directly, then STUN, then TURN if these fail it uses TCP via previously used Skype port numbers, if this fails it uses TCP over port 80 or port 443, the ports usually used by HTTP and HTTPS traffic. 3 < >

HOW TO BLOCK SKYPE To block Skype, IT management needs to use firewalls and Blue Coat SG together. This is a quick overview, full details are in the Blocking Skype with Blue Coat SG TechBrief. STEP 1: BLOCK ALL UNNECESSARY OPEN PORTS ON THE FIREWALL The first step to control Skype is to ensure that the enterprise firewall is doing its job in blocking all unnecessary ports. Ideally, an administrator should first begin the firewall configuration by blocking every port on the firewall and then going back and opening only those ports necessary for operation of corporate approved applications. In addition to allowing only specific ports to be opened (as business dictates), Blue Coat recommends that administrators prohibit high ports from being opened on the firewall. STEP 2: CREATE WHITE LISTS AT THE FIREWALL OF DEVICES ALLOWED TO COMMUNICATE THROUGH THE FIREWALL. Organizations should selectively allow access to corporate applications to outside ports through the firewall. The firewall should be configured to allow only appropriate devices to use the open ports; for example allowing just email servers to use port 25 and just the Blue Coat SG to use ports 80 (HTTP) and 443 (HTTPS). STEP 3: BLOCK DOWNLOADS OF SKYPE EXECUTABLES Organizations should block access to both the Skype.com domain, as well as downloads of executable content using the Blue Coat SG. It is also recommended that enterprises block downloads of URLs ending with skype.exe. This will prevent new Skype software from being downloaded to enterprise machines. STEP 4: INSTALL SSL CONTROLS ON THE BLUE COAT SG The Blue Coat SG appliances managing application service ports for HTTP (80), RTSP (554), MMS (1755), etc. will drop client connections if the packets sent do not conform to the appropriate protocol. When Skype uses port 80, the protocol used is still Skype s proprietary protocol and does not conform to HTTP and so will be blocked. The Skype application finally attempts to use port 443, if the SSL controls are installed (part of SGOS v4.2) these packets will also be dropped as there is no SSL certificate exchanged between 4 < >

Skype nodes. Therefore, any attempt to establish a Super-node connection through these service ports will be unsuccessful, as the connection is nonconforming to standards. If Skype cannot contact a Supernode, the system has blocked Skype from working. OPTIONAL: ALLOW SKYPE IN SPECIFIC CIRCUMSTANCES If the organization requires some access to Skype (perhaps certain users or groups or Skype being allowed in certain offices), the checking of SSL certificates by the Blue Coat SG can be ignored. This allows users to access Skype services in specific scenarios. CONCLUSION Using Blue Coat Blue Coat SG, enterprises can effectively block the use of Skype. To do so, security administrators must properly configure their firewalls to block open ports that are not needed by the general population of enterprise network users. Blue Coat SG policies can be configured to block downloads of the Skype client onto network machines in the first place. And, with the firewall properly configured, searching attempts are automatically blocked by the Blue Coat SG because the Skype protocol is not recognized as a valid (HTTP conforming) protocol by the appliance. 5 < >

Blue Coat Systems, Inc. 1.866.30.BCOAT 408.220.2200 Direct 408.220.2250 Fax www.bluecoat.com Copyright 2007 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of Blue Coat Systems, Inc. Specifications are subject to change without notice. Information contained in this document is believed to be accurate and reliable, however, Blue Coat Systems, Inc. assumes no responsibility for its use, Blue Coat is a registered trademark of Blue Coat Systems, Inc. in the U.S. and worldwide. All other trademarks mentioned in this document are the property of their respective owners.