Best Practices for Securing IP Telephony



Similar documents
Recommended IP Telephony Architecture

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Securing SIP Trunks APPLICATION NOTE.

VOICE OVER IP SECURITY

SIP Trunking Configuration with

VoIP Security regarding the Open Source Software Asterisk

Voice over IP Security

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Threat Mitigation for VoIP

Security Guidance for Deploying IP Telephony Systems

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

Voice Over IP (VoIP) Denial of Service (DoS)

VoIP Security: How Secure is Your IP Phone?

Security and the Mitel Teleworker Solution

An outline of the security threats that face SIP based VoIP and other real-time applications

Release the full potential of your Cisco Call Manager with Ingate Systems

Ingate Firewall/SIParator SIP Security for the Enterprise

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Session Border Controllers in Enterprise

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

XpressPath Optimized Media Functionality For VoiceFlow Session Border Controllers

EarthLink Business SIP Trunking. NEC SV8100 IP PBX Customer Configuration Guide

Voice Over IP and Firewalls

Hosted PBX Description General Info about Hosted PBX

VoIP Application Note:

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking The Provider s Perspective

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

EarthLink Business SIP Trunking. Switchvox SMB 5.5 & Adtran SIP Proxy Implementation Guide

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Fonality. Optimum Business Trunking and the Fonality Trixbox Pro IP PBX Standard Edition V p13 Configuration Guide

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

Security & Reliability in VoIP Solution

Presenter. Zane Ryan. Director Dot Force

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Wave SIP Trunk Configuration Guide FOR BROADVOX

VoIP Trunking with Session Border Controllers

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Securing VoIP Networks using graded Protection Levels

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Frequently Asked Questions about Integrated Access

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Chapter 2 PSTN and VoIP Services Context

ETM System SIP Trunk Support Technical Discussion

Security issues in Voice over IP: A Review

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Feature and Technical

VOIP TELEPHONY: CURRENT SECURITY ISSUES

VoIP Resilience and Security Jim Credland

Curso de Telefonía IP para el MTC. Sesión 1 Introducción. Mg. Antonio Ocampo Zúñiga

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

SBC WHITE PAPER. The Critical Component

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

VoIP Survivor s s Guide

Hosted PBX Platform-asa-Service. Offering

nexvortex Setup Template

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

EarthLink Business SIP Trunking. ININ IC3 IP PBX Customer Configuration Guide

Application Notes for Configuring Intelepeer SIP Trunking with Avaya IP Office Issue 1.0

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

ISG50 Application Note Version 1.0 June, 2011

SIP-ing? Pipeline Articles

Ram Dantu. VOIP: Are We Secured?

SIP Trunk Configuration Guide. using

Security and Risk Analysis of VoIP Networks

Threats to be considered (1) ERSTE GROUP

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Securing Unified Communications for Healthcare

DLink-655 Router Configuration Guide for VoIP

SIP Trunking Service Configuration Guide for Time Warner Cable Business Class

TLS and SRTP for Skype Connect. Technical Datasheet

Application Notes for Configuring Broadvox SIP Trunking with Avaya IP Office - Issue 1.0

Optimum Business SIP Trunk Set-up Guide

PETER CUTLER SCOTT PAGE. November 15, 2011

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

ThinkTel ITSP with Registration Setup Quick Start Guide

SIP Trunking Service Configuration Guide for MegaPath

Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0

Multi-layered Security Solutions for VoIP Protection

Transcription:

Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group

Agenda VoIP overview VoIP risks Mitigation strategies Recommendations

VoIP Overview Hosted by

VoIP Functional Diagram Softswitch Gateway PSTN Soft Phone IP Phone IP LAN QoS-enabled Soft Phone WAN IP Phone

Signaling Concepts IP Phone 1 Offhook & Dial 7 Connect RTP Stream 2 Call Setup 5 Ringback 4 Call Setup 5 Ring Call Server 3 E.164 Lookup IP WAN PSTN IP Phone 6 Offhook

What Do These Diagrams Tell Us? Voice & data share a common infrastructure No different from a risk perspective Anything that affects data will affect voice This represents a major change in the way voice services are provided Historically functions were separate

Hypothesis Enterprises implementing VoIP have an even greater need to protect their networks than before There is no fallback mechanism if security is compromised Both data and voice will be effected

Protocols to Know Hosted by Signaling protocols: H.323 - used by most vendors Cisco & Siemens use proprietary alternatives SIP - Session Initiation Protocol Emerging IP based protocol H.323 relies on gateways, SIP allows direct any-to-any communications Though in reality they are implemented the same way

More Protocols to Know Voice Bearer Transport Protocols RTP - Real-Time Protocol RTCP - Real-Time Control Protocol UDP - User Datagram Protocol

VoIP Risks Hosted by

Specific Risks to VoIP External threats Hacks against phones, call control servers, gateways Denial of Service (DoS) attacks Trojans, viruses, worms Illicit phone system usage VoIP spam Compromise of call data Internal Threats Eavesdroppers Illicit phone system usage Compromise of call data

A Few Possible Scenarios DoS attack on inbound calling gateway Worm attack takes down call servers Worm/Virus causes excessive network congestion Unauthorized calls routed through your gateway Calls are secretly recorded Improper long distance usage

Scared Yet? Well you should be! BUT! You ought to be protecting against most of this stuff already A few of these risks are already out there Unauthorized phone use, outside hacking Mitigation strategies are available

IP Telephony Security Mitigation Strategies

Basic Secure IP Telephony Design Network security principles: Logical separation of voice and data via VLANs wherever possible Minimize interconnection points VoIP-aware firewalls at interconnection points Host-based intrusion detection & virus detection on all call management devices Intrusion detection at network exit/entry points

Firewall Concerns Firewalls must be VoIP-aware VoIP relies on dynamic port creation for voice traffic Signaling protocols use well known ports NAT may get in the way Solution: Session Border Controllers Kagoor, Acme Packets, Jasomi, Nextone, etc. SBCs track call establishment and dynamically handle NAT and port filtering May also act as a calling proxy

Security Architecture External Hosted by Data VLAN Subnet A SBC Call Server Call Server VLAN X Subnet B Subnet A Data to Data Voice to Voice Voice to Data Call Server to Voice Call Server to Data Full Full Blocked Full Limited Subnet B Voice VLAN

Logical Separation Issues Requires Ethernet switches to support 802.1Q VLAN Trunking Two implementation methods Ethernet switch in IP phone Ethernet switch in closet performs separation Difficult to implement in softphone environments

Phones at 802.1Q Trunks Phone Subnet Data Subnet L2 Switch IP Phone Desktop PC

Call Security Options End-point security: User authentication for hard/soft phones 802.1x - based Phone authentication to call controller Use of MAC address filters to prevent rogue assignment of IP addresses and transfer of configuration files

Call Security Options (2) Hosted by Call data security SSL/TLS encryption between end-points and call control servers Negative performance impact S/MIME signing & encryption of call data SRTP - Secure RTP Prevent anonymous in-bound calling Inbound calls only accepted from trusted or verifiable sources Use of trusted certificate authority

Call Security Options (3) Protection against Denial of Service Attacks Only an issue when there is direct connectivity of VoIP Islands Use of DoS mitigation techniques or devices E.g. Arbor Networks, Riverhead (Cisco)

Does it Work? Breaking through IP telephony security Network World - May 24, 2004 Mier test of Avaya & Cisco VoIP Security Findings: Both were secure against hacker attacks against call control infrastructure Both were susceptible to passive probes Avaya phones could be disrupted Bottom line: Both systems were reasonably secure IF security architectures were fully implemented

Future Developments Security becoming increasingly important Encryption more widely available (Cisco Call Manager 4.0) Better availability of VoIP-aware security products Increasing use of softphones presents new challenges Remote users also present challenges One solution: Zultys builds IPsec client directly into phones Growing concerns as we evolve past Islands of VoIP

What About Public Services? Public VoIP services are rapidly emerging Network complexity transferred to a service provider

Service Architecture Enterprise Network Class 5 Switch Analog/ISDN SIP Mgmt Backup ATA SIP SIP SIP Network Gateway Feature Servers Service Provider Network

Service Issues Security Risks to corporate data stored on and carried by service providers Risks of denial of service attacks on provider infrastructure Risks to enterprise data network Risks of data carried over the public Internet (for broadband service providers) Eavesdropping Reliance on service provider for security management Are services subject to wiretapping laws?

Recommendations Hosted by

Recommendations Conduct security assessment as part of your VoIP planning Recommended evaluation criteria: Corporate security policies Cost vs. Risk Network capabilities (to support 802.1Q for example) Firewall capabilities

Recommended Security Guidelines Hosted by Best practices: Logical separate of voice and data (use VLANs in the LAN) Firewalls/IDS at interconnection points Host-based IDS for call control servers Authenticate both phone and user Implement QoS mechanisms to prioritize voice Encrypt where necessary For users of public services Work carefully with providers to understand security methodologies & services

What is your primary area of concern with regard to VoIP security? 54% l Hackers disrupting system 33% l Hackers misusing system 10% 3% l l Internal misuse? No concerns? 1 2 3 4

Who is responsible for VoIP security in your organization? Hosted by 50% l Internal network l security team? VoIP management team 23% 8% 20% l l Network management team Nobody 1 2 3 4

Is encryption of voice a requirement? 42% 1. Yes 2. No 3. Not sure 28% 31% 1 2 3

Who manages your VoIP environment? 75% l l l l Outsourced private solution Outsource public solution In-sourced Not sure? 14% 8% 3% 1 2 3 4