VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan



Similar documents
Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

TLS and SRTP for Skype Connect. Technical Datasheet

Guidance Regarding Skype and Other P2P VoIP Solutions

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Secured Communications using Linphone & Flexisip

Chapter 10. Network Security

Computer System Management: Hosting Servers, Miscellaneous

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems SSL

Chapter 7 Transport-Level Security

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

CS 758: Cryptography / Network Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

IT Networks & Security CERT Luncheon Series: Cryptography

Application Note: Onsight Device VPN Configuration V1.1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Using etoken for SSL Web Authentication. SSL V3.0 Overview

VoIP Security regarding the Open Source Software Asterisk

Overview. SSL Cryptography Overview CHAPTER 1

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Savitribai Phule Pune University

Chapter 8. Network Security

TECHNICAL CHALLENGES OF VoIP BYPASS

Overview of VoIP Systems

Network Security Part II: Standards

Network Security Essentials Chapter 5

Introduction to Security and PIX Firewall

Securing VoIP Networks using graded Protection Levels

NAT and Firewall Traversal with STUN / TURN / ICE

Chapter 17. Transport-Level Security

Client Server Registration Protocol

How To Use A Phone Over Ip (Phyto) For A Phone Call

An Overview of Communication Manager Transport and Storage Encryption Algorithms

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Best Practices for SIP Security

Transport Level Security

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Skype characteristics

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Secure Sockets Layer

Network Authentication X Secure the Edge of the Network - Technical White Paper

IT Security Evaluation of Skype in Corporate Networks

Skype network has three types of machines, all running the same software and treated equally:

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

REVIEW OF WEB-BROWSER COMMUNICATIONS SECURITY

Lecture 9 - Network Security TDTS (ht1)

Cryptography & Network Security

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Security Policy Revision Date: 23 April 2009

Applications that Benefit from IPv6

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bit Chat: A Peer-to-Peer Instant Messenger

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Using BroadSAFE TM Technology 07/18/05

Application Note. Onsight Connect Network Requirements V6.1

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

Chapter 10. Cloud Security Mechanisms

Lecture 10: Communications Security

Lukasz Pater CMMS Administrator and Developer

Voice over IP Security

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

CSE/EE 461 Lecture 23

NAT and Firewall Traversal with STUN / TURN / ICE

Internet Security. Prof. Anja Feldmann, Ph.D.

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

IPsec Details 1 / 43. IPsec Details

OSSIR, November /45

Securing SIP Trunks APPLICATION NOTE.

Netop Remote Control Security Server

ISG50 Application Note Version 1.0 June, 2011

VOICE OVER IP SECURITY

Security. Learning Objectives. This module will help you...

How To Encrypt Data With Encryption

Information Security

Review: Lecture 1 - Internet History

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Internetwork Security

Configuring SIP Support for SRTP

Intrusion Detection Systems

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Skoot Secure File Transfer

Sync Security and Privacy Brief

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Network Security. Lecture 3

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

T Cryptography and Data Security

Network Security Protocols

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Transcription:

VoIP Security Seminar: Cryptography and Security Michael Muncan

Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1

Introduction (1) Internet changed to a mass media in the middle of the 1990s Bandwidth for private Internet Access is increasing Voice over Internet Protocol is getting more and more important Security and Cryptography for VoIP are receiving more attention 2

Introduction (2) Standardization board IETF (Internet Engineering Task Force) plays a central role Focus on three technologies for VoIP in this presentation: Secure SIP/RTP Zfone Skype 3

Secure SIP/RTP Session Initiation Protocol (SIP) RFC 3261 Realtime Transport Protocol (RTP) RFC 3550 Transporting the multimedia datastream Sending packets via UDP Seems to become the standard protocol for VoIP Protocol for Multimediasupport in 3G-Mobilecommunication (UMTS) Standard port-number 5060 4

Setting up a SIP connection Source: Bundesamt für Sicherheit in der Informationstechnik 5

Realtime Transport Protocol (RTP) Usage of dynamic UDP Ports causes problems with firewalls and NAT Solution: STUN (Simple Traversal of UDP over NATs) Uses end-to-end connection No Quality of Service (QoS) 6

Secure RTP (SRTP) Specification in RFC 3711 (2004) Secure VoIP communication, e.g. WLAN, public Hotspot Alternative to IPSec based VPN communication Designed for Real-Time-Transmission Symmetric data encryption with AES all provided features (such as encryption and authentication) are optional and can be separately enabled or disabled 7

Security functionality of SRTP Encryption of VoIP to avoid tapping Authentification of Sender avoids identityspoofing Integrity checks to avoid unauthorized changes Anti-replay functionality to avoid unauthorized access 8

Zfone Link to the project webpage: http://www.philzimmermann.com/en/zfone/index-start.html new protocol called ZRTP achieves security without reliance on a PKI, key certification, trust models, certificate authorities, or key management complexity does not rely on SIP signaling for the key management 9

Zfone not rely on any servers performs key agreements and key management in a purely peer-to-peer manner over the RTP packet stream interoperates with any SIP phone, but only encrypts if calling another ZRTP client new protocol submitted to the IETF uses ephemeral Diffie-Hellman with hash commitment, allows detection of man-in-the-middle (MiTM) attacks by displaying short authentication string for users to read and compare over phone 10

Zfone GUI Source: www.philzimmermann.com 11

Skype Source: www.skype.com 12

Skype Cryptography Skype uses only standard cryptographic primitives: AES block cipher, the RSA public-key cryptosystem, the ISO 9796-2 signature padding scheme, the SHA-1 hash function and the RC4 stream cipher. 13

Skype Security Policy Skype usernames unique Users or applications must present Skype username and authentication credential (e.g., password) before exercise username s identity or privileges Each peer correctly provides the other with proof of username and privileges whenever Skype session is established. Each verifies other s proof before session allowed carry messages (e.g., voice, video, files, or text) Messages transmitted through Skype session are encrypted from Skype-end to Skype-end. No intermediary node has access to meaning of messages 14

Overview of Skype Cryptography central cryptographic secret in Skype is Central Server s private signing key corresponding public verification key, VS, and identifier for key pair installed in every Skype client at build time user s client generates an RSA key pair private signing key, SA, and hash of password, H(PA), are stored as securely as possible on user platform (On Windows platform done using Windows CryptProtectData API) 15

Overview of Skype Cryptography client next establishes 256-bit AES-encrypted session with Central Server key for session selected by client with aid of platform-specific random number generator client can and does verify really talking to server The client sends server, among other things, A, H(PA) and VA 16

Overview of Skype Cryptography Central Server decides whether A is unique, and otherwise acceptable under Skype naming rules server stores (A, H(H(PA))) in database forms and signs an Identity Certificate for A, ICA, which contains, among other things, Central Server s RSA signature binding A and VA, {A, VA }SS and key identifier of SS ICA returned to client 17

Overview of Skype Cryptography Central Server consists of number of machines with different functions, including one machine which does nothing but sign certificates entire Central Server pod replicated several times over for performance and business continuity traffic in session encrypted by XORing plaintext with key stream generated by 256-bit AES 18

Conclusion SRTP Zfone Skype Advantages: - nearly standard for VoIP Disadvantages: - Has to be used by application Advantages: - Open Source - Easy handling - May become standard Disadvantages: - Additional software installation Advantages: - No additional software - Very popular Disadvantages: - Closed source - Only applicable for private users 19

Thank you for your attention.