Vulnerabilities in SOHO VoIP Gateways



Similar documents
Transparent weaknesses in VoIP

An outline of the security threats that face SIP based VoIP and other real-time applications

The VoIP Vulnerability Scanner

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

Securing SIP Trunks APPLICATION NOTE.

Session Initiation Protocol (SIP) Vulnerabilities. Mark D. Collier Chief Technology Officer SecureLogix Corporation

How to make free phone calls and influence people by the grugq

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.

How To Configure. VoIP Survival. with. Broadsoft Remote Survival

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

Security and Risk Analysis of VoIP Networks

SIP Trunking Configuration with

SIP and VoIP 1 / 44. SIP and VoIP

Security issues in Voice over IP: A Review

VOICE OVER IP SECURITY

For internal circulation of BSNL only

SS7 & LTE Stack Attack

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

State of Texas. TEX-AN Next Generation. NNI Plan

Conducting an IP Telephony Security Assessment

Voice over IP (SIP) Milan Milinković

PENTEST. Pentest Services. VoIP & Web.

Voice over IP Security

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

VOIP SECURITY ISSUES AND RECOMMENDATIONS

VoIP. What s Voice over IP?

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Ingate Firewall/SIParator SIP Security for the Enterprise

JJ Technical Specification on Called Party Subaddress Information Interface between Private SIP Networks. First Edition

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Business Phone Security. Threats to VoIP and What to do about Them

Enabling Security Features in Firmware DGW v2.0 June 22, 2011

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

SIP Trunking The Provider s Perspective

Voice Over IP (VoIP) Denial of Service (DoS)

VoIP Security. Threats and Countermeasures. Eric Chen NTT Information Sharing Platform Laboratories & VOIPSA Technical Board of Advisors

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

IBM Managed Security Services Vulnerability Scanning:

End-2-End QoS Provisioning in UMTS networks

Security behind the dial tone. VoIP Security Threats, Vulnerabilities, Countermeasures, and Best Practices

Basic Xten Pro Configuration

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

6 Steps to SIP trunking security. How securing your network secures your phone lines.

Request for Comments: August 2006

Potential Targets - Field Devices

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Owner of the content within this article is Written by Marc Grote

MOHAMED EL-SHAER Teaching Assistant. Room TASK Exercises Thu., Nov. 17, 2014 CONTENT

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

802.11: Mobility Within Same Subnet

SBC 1000/2000 Configuration Guide with Lync 2013 for Windstream/ LPAETEC SIP Trunk Deployments

VOIP Security Essentials. Jeff Waldron

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

VoIP Security regarding the Open Source Software Asterisk

Voice over IP Security

Application Notes. Performance Management & Enterprise IP Telephony. Introduction. Contents. Managing Enterprise IP Telephony. Series.

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

VoIP Security, an overview of the Threat Landscape

VoIP Fraud Analysis. Simwood esms Limited Tel:

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011

The use of IP networks, namely the LAN and WAN, to carry voice. Voice was originally carried over circuit switched networks

CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP

VOIP Attacks On The Rise

Recommended IP Telephony Architecture

OpenSIPS For Asterisk Users

Grandstream Networks, Inc. How to Integrate UCM6100 with Microsoft Lync Server

SIP Essentials Training

How To Understand How Open Source And Free Software Work Together

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Securing the Interconnect Signaling Network Security

The Trivial Cisco IP Phones Compromise

Huawei One Net Campus Network Solution

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Hosted Voice. Best Practice Recommendations for VoIP Deployments

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

HOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play

Formación en Tecnologías Avanzadas

Security & Reliability in VoIP Solution

Cisco Advanced Services for Network Security

Best Practices for Securing IP Telephony

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

Transcription:

Vulnerabilities in SOHO VoIP Gateways Is grandma safe? Peter Thermos pthermos@vopsecurity.org pthermos@palindrometechnologies.com 1

Purpose of the study VoIP subscription is growing and therefore security concerns None of the vendors or providers mentioned security (why? Purposefully left out due to known problems, subscribers not asking for security?) Preliminary evaluation of SOHO VoIP gateways A snapshot in time Help promote future work 2

Objectives Tested 3 as deployed services/devices using traditional vulnerability assessment methodology What vulnerabilities may exist (i.e. DoS, buffer overflow)? What class of vulnerabilities/attacks can be exploited remotely (i.e. configuration, buffer overflows, SPIT)? Can a VoIP user s registration or the user s identity be hijacked? Would they know? 3

Methodology Traditional Vulnerability Assessment Methods (i.e. discovery, evaluation and analysis, test, verify, document) Areas of focus Manageability Node Security Signaling Media 4

Targets of Evaluation SP-1: Maintains a VoIP infrastructure and has ubiquitous presence through existing ISP s (Internet Service Providers, including DSL/Cable) in North America. Furthermore, this service provider plans to establish global presence. SP-2: This service provider has been an incumbent telecommunications carrier (including PSTN and wireless), therefore taking advantage of their existing switched infrastructure to route calls. Their VoIP presence, at the moment, is limited to the US. SP-3: This service provider maintains a VoIP infrastructure that offers VoIP service to residents within a local region (i.e. State not National). They are low cost producers of VoIP services. 5

ToE and device mapping Service Provider Voice Gateway Protocols Used SP-1 VG-1 SIP/RTP SP-2 VG-2 MGCP/RTP SP-3 VG-3 SIP/RTP 6

Network Topology 7

Management Findings (1 of 4) Administrative sessions are protected with userid/password only. No SSL capability thus credentials and configuration commands can be intercepted and in some cases replayed. Role based controls is limited (one role for all administration/management) Logs are not maintained by the device 8

Node Security Findings (2 of 4) Open Ports on external interface allow various attacks including DoS and unauthorized access and management. Default credentials allow attackers to remotely compromise poorly configured devices. 9

Signaling Findings (3 of 4) Registration and call/presence/identity hijacking; Denial of Service Implementation issues (e.g. buffer overflows) discovered through robustness testing. 10

Example of a SIP call 11

Presence Hijacking 12

Presence Hijacking Register Request REGISTER sip:216.115.25.57 SIP/2.0 Via: SIP/2.0/UDP 192.168.1.6;branch=xajB6FLTEHIcd0 From: 732-835-0102 <sip:12125550102@voip-serviceprovider.net:5061>;tag=5e374a8bad1f7c5x1 To: 732-835-0102 <sip:12125550102@voip-service-provider.net:5061> Call-ID: QTEv5G5dOHYc@192.168.1.2 CSeq: 123456 REGISTER Contact: 2125550102 <sip:12125550102@192.168.1.3:5061>; Digest username="12125550102",realm="216.1.2.5",nonce="716917624", uri="sip:voip-service-provider.net:5061",algorithm=md5, response="43e001d2ef807f1e2c96e78adfd50bf7" Max_forwards: 70 User Agent: 001217E57E31 VoIP-Router/RT31P2-2.0.13(LIVd) Content-Type: application/sdp Subject: SiVuS Test Expires: 7200 Content-Length: 0 13

Provider Response Dear Peter Thermos, Thank you for contacting customer care. In response to your email, no this is not possible. We are more secure than a regular phone line. While I see that you have a log of SIP messages from your own account, this is not the same as re-routing and listening to someone else's calls. I hope that I have resolved your problem. Do not hesitate to contact us if you need further assistance. Sincerely, Dave S. Tier 2 Tech Support 14

Caller-ID Demo SiVuS toolkit 15

16

Media Findings (4 of 4) Eavesdropping (sensitive information captured including credit card numbers and pins) Voice quality degradation and media manipulation 17

General observations Security through obscurity - Use of port 5061 for SIP/UDP Firewalling capability to restrict connections from specific nodes (i.e. VG-2 provides a firewall capability). 18

Conclusions - Is grandma Safe? No, and worse she's likely to get very annoyed at the poor availablity and annoying VoIP SPAM from marketers and VoIP Joyriders Current security posture of SOHO gateways is not adequate As attacks against VoIP subscribers increase in the next 3 years what do we do to protect against them? What carriers, service providers and users should do? 19

Recommendations Architecture Routing Controls/Network Segmentation to provide a level of protection for VoIP subscribers (i.e. SBC/DPI) Robust implementations Security Requirements IETF, ATIS, ITU Initiatives such as VoPSecurity Forum and VoIPSA may help. 20