Denial of Services on SIP VoIP infrastructures



Similar documents
Voice over IP (SIP) Milan Milinković

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Three-Way Calling using the Conferencing-URI

Media Gateway Controller RTP

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

Request for Comments: August 2006

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

SIP: Protocol Overview

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

Session Initiation Protocol

VoIP. What s Voice over IP?

802.11: Mobility Within Same Subnet

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Denial of Service on SIP VoIP Infrastructures Using DNS Flooding

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

MOHAMED EL-SHAER Teaching Assistant. Room TASK Exercises Thu., Nov. 17, 2014 CONTENT

internet technologies and standards

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

Session Initiation Protocol (SIP)

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

How to make free phone calls and influence people by the grugq

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

IP-Telephony SIP & MEGACO

Hacking Trust Relationships of SIP Gateways

SIP ALG - Session Initiated Protocol Applications- Level Gateway

For internal circulation of BSNL only

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Multimedia & Protocols in the Internet - Introduction to SIP

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.

Adaptation of TURN protocol to SIP protocol

How To Understand How Open Source And Free Software Work Together

EE4607 Session Initiation Protocol

AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

Internet Services & Protocols Multimedia Applications, Voice over IP

IP Office Technical Tip

Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5

Internet Services & Protocols Multimedia Applications, Voice over IP

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1

VoIP Fraud Analysis. Simwood esms Limited Tel:

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

The VoIP Vulnerability Scanner

SIP for Voice, Video and Instant Messaging

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Monitoring SIP Traffic Using Support Vector Machines

Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs

FortiOS Handbook - VoIP Solutions: SIP VERSION 5.2.0

OSSIR, November /45

An outline of the security threats that face SIP based VoIP and other real-time applications

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

SIP Trunking & Peering Operation Guide

Session Initiation Protocol (SIP)

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN:

Advanced Networking Voice over IP & Other Multimedia Protocols

Security Issues of SIP

SIP Session Initiation Protocol

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

NAT and Firewall Traversal. VoIP and MultiMedia /77

Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office Issue 1.0

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

A Comparative Study of Signalling Protocols Used In VoIP

Session Initiation Protocol and Services

FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne)

Basic Vulnerability Issues for SIP Security

Voice over IP (VoIP) using the Session Initiation Protocol (SIP) INF Protokoller og ruting i Internett , UiO Lars Strand

How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or

Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service

Voice over IP (VoIP) Part 2

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

NAT Traversal for VoIP

SIP Introduction. Jan Janak

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Transparent weaknesses in VoIP

Storming SIP Security Captions

Black Hat Briefings 2007 Las Vegas. White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones

Internet Multimedia (thanks to Henry Sinnreich, Alan Johnston, MCI WorldCom, Henning Schulzrinne) IP Communications

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE Version 1

Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise

TSIN02 - Internetworking

SIP Session Initiation Protocol Nicolas Montavont

EDA095 Audio and Video Streaming

SIP Tutorial. VoIP Workshop Terena 2005 Poznan Poland. By Stephen Kingham

Session Initiation Protocol (SIP)

Interoperability between IPv4 and IPv6 SIP User Agents

IPv6/IPv4 Translation for SIP Applications- Socket-Layer Translator and SIPv6 Translator

An Introduction to. Voice over IP Security

SIP Essentials Training

Transcription:

Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University ge.zhang@kau.se 1

Outline Background Denial of Service attack using DNS Conclusion 2

VoIP What is VoIP? What is its advantage? Cost Integration Easy-to-use What is its disadvantage? Reliability (no emergency call with skype (or other VoIP)!) Quality of Service Security 3

Session Initiation Protocol (SIP) SIP: an signalling protocol for creating, modifying and terminating VoIP sessions. SIP network elements: User Agents (UA), Proxy Server, Registrar, Location Server. Modeled on HTTP, user identity is similar to email address (e.g., sip:nick@kau.se) 4

Where s SIP SDP Application SIP RTP DNS(SRV) Transport TCP UDP Network IP Physical/Data Link Ethernet 5

SIP Call flow DNS Invite: Bob@ica.se Location server Invite: Bob@ica.se Proxy 200 OK internet Proxy 200 OK Invite: Bob@ica.se 200 OK Ack Alice@lidl.de RTP Session Bob@ica.se Domain: lidl Domain: ica 6

Background (SIP message) INVITE sip:bob@ica.se SIP/2.0 Via: SIP/2.0/UDP workstation1000.lidl.de From: sip:alice@lidl.de; tag=1b34283 To: sip:bob@ica.se Call-Id: 1-15673@193.11.155.22 Cseq: 1 INVITE Contact: <sip:alice@workstation1000.lidl.de> Date: Sat, 16 Aug 2008 11:50:15 GMT Content-Type: application/sdp Content-Length: 154 V=0 o=alice 2891234526 2891234526 IN IP4 workstation1000.lidl.de s=let us talk for a while c=in IP4 138.85.27.10 t=0 0 m=audio 20002 RTP/AVP 0 7

Outline Background Denial of Service attack using DNS Conclusion and future works 8

DNS flooding (DNS usage) INVITE sip:bob@ica.se SIP/2.0 Via: SIP/2.0/UDP workstation1000.lidl.de From: sip:alice@lidl.de; tag=1b34283 To: sip:bob@ica.se Call-Id: 1-15673@193.11.155.22 Cseq: 1 INVITE Contact: <sip:alice@workstation1000.lidl.de> Date: Sat, 16 Aug 2008 11:50:15 GMT Content-Type: application/sdp Content-Length: 154 V=0 o=alice 2891234526 2891234526 IN IP4 workstation1000.lidl.de s=let us talk for a while c=in IP4 138.85.27.10 t=0 0 m=audio 20002 RTP/AVP 0 9

DNS usage 1 1 Message Authentication Resolving Domain name 5 2 3 4 Continue DNS Server 10 SIP Proxy

DNS flooding (objective of DoS) 1 1 Message Authentication 2 Resolving Domain name 5 Waiting 3 4 blocked Continue DNS Server 11 SIP Proxy

DNS flooding DNS Root DNS com DNS de DNS net DNS se DNS lidl DNS ica alice tom bob 12

DNS flooding (Malicious request) INVITE sip:bob@ica.se SIP/2.0 Via: SIP/2.0/UDP workstation1000.lidl.de From: sip:alice@lidl.de; tag=1b34283 To: sip:bob@ica.se Call-Id: 1-15673@193.11.155.22 Cseq: 1 INVITE Contact: <sip:alice@workstation1000.lidl.de> Date: Sat, 16 Aug 2008 11:50:15 GMT Content-Type: application/sdp Content-Length: 154 V=0 o=alice 2891234526 2891234526 IN IP4 workstation1000.lidl.de s=let us talk for a while c=in IP4 138.85.27.10 t=0 0 m=audio 20002 RTP/AVP 0 13

Test bed A SIP proxy A DNS server An attacking tool 100 external SIP providers User Agents (SIPp): a SIP traffic generator tool. SIP providers Internet UA (SIPp) DNS server SER (outgoing proxy) unresolvable Attacking tool 14

Solution 1 Increasing Parallel Processes of the proxy Message Scheduler DNS... 15 Process 1 Process 2 Process n Message Forward

Result of Solution1 5000 n = 2 n = 4 n = 8 n = 16 n = 32 n = 64 4000 messages repl i ed 3000 2000 1000 16 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 attacki ng i nterval (s)

Solution2 Asynchronous Scaling through Message Processing Interruption 17

Result of Solution1 18

Solution3 Message Authentication Resolving Domain name DNS cache Continue DNS Server 19 SIP Proxy

blocked - example For example, n = 4. waiting waiting waiting waiting Blocked! 20 Process 4 Process 3 Process 2 Process 1 DNS cache SIP Proxy DNS Server

Cache Solution how to detect the attacking? (n is the parallel processes number) 1, a domain resolve call in process queue q but not S q ( t) = returned at time t, 0, otherwise H = n q= 1 S ( t q ), How to prevent being blocked? 1 emergency process Whenever H n 1, alarm! The next DNS request will not be forwarded to external DNS server, instead, it will only look up in the cache and reply immediately. Hence the proxy will absolutely be blocked at time t when H = n 21

Unblock Solution - example For example, n = 4. Occupied processes H n 1 ( 3 4-1) emergency waiting waiting waiting Process 4 Process 3 Process 2 Process 1 DNS cache SIP Proxy DNS Server 22

Result of cache solution messages replied 450 400 350 300 250 200 150 100 50 n=32 n=16 n=4 n=2 messages replied n=2 with DADP n=256 n=128 n=64 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 23 0 0 20 40 60 80 100 120 140 elapsed time (s) 0 0 20 40 60 80 100 120 140 elapsed time (s)

Cache Replacement Policy Cache replacement policies Motivation: As the number of cache entries (e) can not practically cope with the unlimited number of possible domain names, we have to find a way to optimally use the limited number of cache entries. FIFO LRU LFU 24

Result of Cache Solution 5000 No cache FI FO LRU LFU messages repl i ed 4000 3000 2000 1000 25 0 0. 1 0. 2 0. 3 0. 4 0. 5 0. 6 0. 7 0. 8 0. 9 1 attacki ng i nterval (S)

Cache entries messages repl i ed DADP wi th LFU 5000 4000 3000 2000 1000 wi thout DADP Investigate the relationship between the number of cache entries and the performance of proxy e = number of cache entries Less than 270, growth Greater than 270, stop 26 0 0 100 200 300 400 cache entri es

Conclusions Current VoIP system is far from secure Interface between VoIP system and other ICT-based system (DNS) The solutions are not perfect, open questions 27

Thanks! Questions &Thanks! Email: ge.zhang@kau.se 28