Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP)



Similar documents
Request for Comments: August 2006

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

Integrating Avaya Aura Presence Services with Microsoft OCS

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

Service Identifier Comparison module Service Rule Comparison module Favourite Application Server Reinvocation Management module

SIP Essentials Training

User authentication in SIP

NAT TCP SIP ALG Support

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP LTM for SIP Traffic Management

Zeenov Agora High Level Architecture

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Application Note. Onsight Connect Network Requirements v6.3

Using OpenSIPS as a PBX

RELOAD Usages for P2P Data Storage and Discovery

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

Authentication, Authorization and Accounting (AAA) Protocols

Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol

Introduction to VoIP Technology

A Comparative Study of Signalling Protocols Used In VoIP

Advanced SIP Series: SIP and 3GPP Operations

MODELLING OF INTELLIGENCE IN INTERNET TELEPHONE SYSTEM

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

SIP: Ringing Timer Support for INVITE Client Transaction

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice Upperside WiFi Voice 2005

For internal circulation of BSNL only

SIP and VoIP 1 / 44. SIP and VoIP

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

A Lightweight Secure SIP Model for End-to-End Communication

SIP: Protocol Overview

End-2-End QoS Provisioning in UMTS networks

TECHNICAL CHALLENGES OF VoIP BYPASS

Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University

How To Use A Phone Over Ip (Phyto) For A Phone Call

Emergency Services Interconnection Forum (ESIF) Emergency Services Messaging Interface Task Force ( Task Force 34 )

Session Initiation Protocol

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

Polycom RealPresence Access Director System

ETSI TS V2.1.1 ( ) Technical Specification

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Grandstream Networks, Inc. UCM6100 Security Manual

Multimedia & Protocols in the Internet - Introduction to SIP

Internet Security. Prof. Anja Feldmann, Ph.D.

VOICE OVER IP SECURITY

SIP, Session Initiation Protocol used in VoIP

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

Detecting Spam in VoIP Networks. Ram Dantu Prakash Kolan

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

Overview of VoIP Systems

Support of Multimedia SIP Applications over Proactive MANETs Extension of OLSR for Service Discovery

Migration of Enterprise VoIP/SIP Solutions towards IMS

Voice over IP (SIP) Milan Milinković

Peer-to-Peer SIP Mode with FXS and FXO Gateways

SIP : Session Initiation Protocol

VIDEOCONFERENCING. Video class

Cisco Unified Presence Server 1.0

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

Media Gateway Controller RTP

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

Network Security Part II: Standards

AT&T IP Flex Reach/ IP Toll Free Configuration Guide IC 3.0 with Interaction SIP Proxy

SIP Trunking Manual Technical Support Web Site: (registration is required)

3GPP TR V6.4.0 ( )

CS 4803 Computer and Network Security

Unit 23. RTP, VoIP. Shyam Parekh

Application Note. Onsight Connect Network Requirements V6.1

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

SIP Introduction. Jan Janak

IP Ports and Protocols used by H.323 Devices

Technical Bulletin 25751

Presence SIMPLE Architecture

White paper. SIP An introduction

VPN Configuration Guide DrayTek Vigor / VigorPro

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

Load Balancing Support for Self-Organizing IMS Networks

How To Understand And Understand The Security Of A Key Infrastructure

Using Entrust certificates with VPN

Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, Eschborn, Germany

Efficient load balancing system in SIP Servers ABSTRACT:

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Interoperability Test Plan for International Voice services (Release 6) May 2014

SIP: Ringing Timer Support for INVITE Client Transaction

The Secure Sockets Layer (SSL)

Configuring SIP Registration Proxy on Cisco UBE

Scenario: IPsec Remote-Access VPN Configuration

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

Sametime Unified Telephony Lite Client:

Session Initiation Protocol Deployment in Ad-Hoc Networks: a Decentralized Approach

How To Configure Aastra Clearspan For Aastro (Turbos) And Bpb (Broadworks) On A Pc Or Macbook (Windows) On An Ipa (Windows Xp) On Pc Or Ipa/

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Transcription:

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) 1 st International Workshop on Critical Information Infrastructures Security August 31 st - September 1 st 2006.

Contents Introduction The SIP Protocol Security Negotiation over SIP Integration with Policy Based Network Management Testbed Conclusions Future Work 2

Introduction The DESEREC Project IST Project: IST-2004-026600 Target: to increase the dependability of critical open and interconnected information systems by a multidisciplinary, coordinated effort. Website (under construction): www.deserec.org 3

Introduction Dynamic Security Overlays Different organizations usually have different: Security policies Security technologies Security overlays allow defining an abstract layer on the top of the actual deployment 4

Introduction Dynamic Security Overlays Such overlays are usually static, requiring static pre-configuration Dynamic security overlays would require an automatic negotiation process between domains Virtual, abstract specification of the security requirements for the negotiation Mapping from virtual requirements to actual security technologies 5

The SIP Protocol SIP (Session Initiation Protocol) is a signalling protocol for establishing data sessions SIP allows peers to negotiate session parameters Other advantages: It is a standard protocol (see RFC 3261) It is extensible through definition of custom headers It allows routing call establishment dialogs through several different domains, by relying on intermediate entities (SIP proxies) Can be easily secured (TLS, S/MIME) It is well suited for performing a multidomain negotiation 6

The SIP Protocol There are two kinds of SIP elements: User agents, which demand the establishment of a session between them Proxies, which route SIP calls across domains Location of SIP elements: One user agent at each end-user: for stating the initial requirements, and accepting or rejecting the other peer s offering One proxy at each domain: for routing the call, and perform domain-to-domain negotiation 7

The SIP Protocol Typical 2-domain SIP scenario: 8

Security Negotiation over SIP Dynamic Security Overlays require a two-level negotiation: The involved domains need to agree a common set of security requirements, expressed in any way which is consistently understood by all of them {confidentiality=1, integrity=5, accesscontrol=3} Security technologies (e.g. IPsec, SSL, etc.) must be agreed for use between each pair of consecutive domains This forms the so called virtual security negotiation process 9

Security Negotiation over SIP 10

Security Negotiation over SIP Custom headers can be defined for SIP messages SIP user agents and proxies use these headers and process them to implement a custom behaviour during the negotiation This is the basis for extending SIP in order to customize the negotiation process Can be used to implement the virtual negotiation 11

Security Negotiation over SIP Three main goals: 1) Ensure that requirements are acceptable. Each node (except the one initiating the call) must check that it can support the requested virtual security. If not, it must cancel the call. It may update these requirements if necessary, but without violating the current max and min limits. 12

Security Negotiation over SIP Three main goals (continued): 2) Consecutive domains must agree on a technology. This will be done via an offer mechanism: one node will state its available technologies, and the next one will choose one that it supports too (and notify about which). If this agreement is not possible, the call must be cancelled. 3) Some domains might be not compliant. These domains must be detected, and bypassed with a tunnel 13

Security Negotiation over SIP Custom headers added: X-MinSecurity, X-MaxSecurity: security requirements which an end user desires X-Via: list of compliant domains traversed X-Tunnel: tunnel endpoints for bypassing noncompliant domains X-TechList: list of security technologies (IPSec, SSL, ) supported for implementing the requirements X-SelectedTech: chosen security technology for using between consecutive domains 14

Integration with Policy Based Network Management Our SIP entities may need domain-specific information at several points: Which maximum and minimum security level a user is allowed to get? Which security technologies are available? All of this information may be retrieved from a Policy Based Network Management system (PBNM) 15

Integration with Policy Based Network Management A PBNM system usually comprises: A policy database One or more policy servers (PDP s) One or more policy clients (PEP s) SIP entities can be policy clients as well (embedding a PEP), so that their behaviour is bound by the domain policies defined by the administrator 16

Testbed A sample testbed was implemented for demonstrating the developments: 17

Testbed INVITE Alice s virtual security requirements are in the X-MinSecurity and X-MaxSecurity headers 18

Testbed INVITE 19

Testbed INVITE 1) Check requirements; 2) Update requirements; 3) Build an X-TechList header with available technologies. 20

Testbed OK 1) Check requirements; 2) Choose one technology from X-TechList header ( techno1 ); 3) Replace X-TechList header with own. 1) Updated requirements in X- MinSecurity and X-MaxSecurity headers; 2) Bob s available technologies in X-TechList header. 21

Testbed OK 1) Check requirements; 2) Choose one technology from X-TechList header ( techno2 ); 3) Replace X-TechList header with own. 22

Testbed OK 1) Choose one technology from X-TechList header ( techno3 ); 3) Build an X-SelectedTech header with the value techno3. 23

Testbed ACK 1) Carries the X- SelectedTech header with the value techno3 ; 2) After sending the ACK, Alice instantiates the techno3 technology. 1) Read techno3 from the X-SelectedTech header; 2) Update that header, replacing techno3 with techno2. 24

Testbed ACK 1) Carries the X-SelectedTech header with the value techno2 ; 2) After sending the ACK, P1 instantiates the techno3 and techno2 technologies. 1) Read techno2 from the X- SelectedTech header; 2) Update that header, replacing techno2 with techno1. 25

Testbed ACK 1) Carries the X-SelectedTech header with the value techno1 ; 2) After sending the ACK, P2 instantiates the techno2 and techno1 technologies. 1) Read techno1 from the X- SelectedTech header; 2) Instantiate the techno1 technology. 26

Testbed techno3 techno2 techno1 27

Conclusions We managed to implement dynamic security overlays, using: An extension of SIP. Additional headers created, but existing ones were not modified (backwards compatible with legacy SIP proxies) Negotiation of abstract, virtual security requirements, which are dynamically mapped to actual technologies at each step Whole process can be policy-driven 28

Future Work Addition of bootstrapping mechanisms Mobile users Integration with real, high level applications Multimedia, peer to peer, Enhance the semantics of the custom headers Automatic detection of end-to-end support of security technologies, reducing the overhead on intermediate nodes 29

Multidomain Virtual Security Negotiation over the Session Initiation Protocol (SIP) Thank you for your attention!