1 / 31

Introduction to Sercurity of VOIP

Introduction to Sercurity of VOIP. Chien-Chih Wang. Outline. Introduction. Sercurity Issues. Countermeasures. Conclusion. Reference. Outline. Introduction. Sercurity Issues. Countermeasures. Conclusion. Reference. Introduction. V oice O ver I nternet P rotocol 是一種透過網際網路,

august
Télécharger la présentation

Introduction to Sercurity of VOIP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction toSercurity of VOIP Chien-Chih Wang

  2. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  3. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  4. Introduction • Voice Over Internet Protocol • 是一種透過網際網路, 來實現的新型電話通訊。 • 擁有低通話成本、低建 設成本、易擴充性及日 漸優良的通話品質等主 要特點,被目前國際電 信企業看成是傳統電信 業務的有力競爭者。

  5. Introduction • VOIP vs PSTN

  6. Introduction • VOIP

  7. Introduction 目前常用的協定有H.323和SIP。 • H.323 • 由ITU-T在1996年所提出.2006年推出第6版. • 協定架構的初衷是針對區域網路(LAN)中多媒體視訊會議所設計的. • H.323 定義了一個綜合性的規範,使網路上的終端設備遵循這些規範,得以順利進行溝通,包括 • 語音壓縮格式 ( G.711、 G.729 、G.723.1 )、 • 影像壓縮格式( H.261、H.263 )、呼叫信令( H.225 )、 • 控制信令( H.245 )、註冊與認證 ( Registeration,Admission,Status;RAS )。 • H.323 架構由5個元件所組成,包括Endpoint、Gateway、Gatekeeper、Multipoint Control Unit(MCU)、Back End Service (BES) 。

  8. Introduction H.323 Architecture 處理multipoint conferencing或是多於兩點的對話 Ttelephone Video phone 作為H.323連接到其他網路的一個 interface • Address translation, • Network access control, • Bandwidth management • accounting 用來maintain endpoit的permissions, services,and configuration

  9. Introduction • SIP • 由IETF MMUSIC 工作組開發的協議,作為標準被提議用於建立,修改和終止包括視頻,語音,即時通信,在線遊戲和虛擬現實等多種多媒體元素在內的互動式用戶會話。 • 屬Session Layer Protocol • 可選擇採用 TCP or UDP • SIP的架構包括有User Agent、Proxy server,Location server,and Register server。

  10. Introduction SIP Architecture

  11. Outbound Proxy Inbound Proxy Introduction BYE INVITE BYE BYE 100 Trying INVITE 200 OK INVITE 180 Ringing 200 OK 180 Ringing 100 Trying 180 Ringing 200 OK ACK Alice Bob RTP Voice Alice Calls Bob Hello. Is Bob there? No. I need Bob. Thanks. Bye. Steve answers Bob’s phone Sorry, no, can I help you

  12. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  13. Sercurity Issues • DoS Attack • Eavesdropping • Call Hijacking • Flood target phone • Spoof registration • Toll Fraund • Alteration of Voice Stream • Unwanted Calls and Messages (SPIT)

  14. Outbound Proxy Inbound Proxy Sercurity Issues • Eavesdropping SIP Attacker Alice Bob RTP Yak Yak • DTMF intercept • IM snooping • Call pattern analysis • Number harvesting • Network discovery • Voice reconstruction • Fax reconstruction • Video reconstruction

  15. Outbound Proxy Inbound Proxy Sercurity Issues • Spoofing SIP BYE BYE RTP Alice Bob Attacker Hello? Yak Hello? Yak Kevin forges a BYE from Alice

  16. Outbound Proxy Inbound Proxy Sercurity Issues • Interception SIP 202 Accepted BYE 202 Accepted INVITE BYE BYE 202 Accepted 200 OK REFER INVITE REFER 200 OK RTP Alice Bob Attacker Yak Hello? Yak Yak Kevin forges a REFER from Bob

  17. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  18. Countermeasures • Transport Layer Security (TLS) • 使用密鑰演算法在網際網路上提供端點進行身份認證與通訊保密,能在某種程度上讓客戶端/伺服器的應用程序通訊間,預防竊聽、干擾。 • TLS包含三個基本階段: • Peer negotiation for algorithm support. • Key exchange and authentication. • Symmetric cipher encryption and message authentication.

  19. Countermeasures • Transport Layer Security (TLS)

  20. Countermeasures • Secure RTP (SRTP) Protocol • 以RTP Protocol為基礎所定義的加密協議。 • 採用AES演算法,屬於對稱性的密碼技術。 • 對RTP的Data提供加密、消息認證、完整性保證和重放保護。 • 有Master Key跟Session Key,Master Key要透過Key Management的機制來得到,是各自擁有的。而Master Key經過運算後,就會得到Session Key,用來加密或是做訊息認證。

  21. Countermeasures • Secure RTP (SRTP) Protocol • SRTP 使用了HMAC-SHA1演算法(在RFC 2104中定義)。這種演算法使用的是預設160 位元長度的HMAC-SHA1認證密鑰,不過它不能抵禦重放攻擊。 • 要防禦重放攻擊的話,接收方要維護好先前已接收到的封包Sequence number ,將它們與每個新接收到的封包進行比對,只接收那些過去沒有接收過的新封包。不過這種方法十分依賴封包完整性的保護,以杜絕針對封包序號的欺騙技術。

  22. Countermeasures • Virtual LAN(VLAN) • 分離Voice and Data traffic on to different network. • Prevent a number of attack from PC. • 實作上可以利用port的分配來進行分離,或是利用MAC地址的對照來實行。

  23. Countermeasures • Virtual LAN(VLAN)

  24. Countermeasures • Other techniques • Virtual Private Network (VPN): 利用代理的機制,舉例:A公司某部門的某甲想要寄信給B公司某部門的某乙。某甲已知某乙的地址及部門,但公司與公司之間的信並不能註明部門名稱。於是,某甲請自己的秘書把指定某乙所收部門的信(可選擇是否加密)放在寄去某B公司地址的大信封中。當B公司的秘書收到從A公司寄B公司的信件後,該秘書便會把放在該大信封內的指定部門信件以公司內部郵件方式寄給某乙。同樣地,某乙會以同樣的方式回信給某甲。公司就是代理人,外界只看的到代理人在互相通訊,卻不知道實際上的使用者是誰。

  25. Countermeasures • IP Security (Ipsec): 是保護IP協議安全通信的標準,它主要對IP協議分組進行加密和認證。是IPv6中必選的內容,但在IPv4中的則是選擇性的。分成Authentication Header (AH)封裝以及Encapsulating Security Payload (ESP)封裝。 • AH:可以用來確保傳輸的完整性,以及Data的可靠性,但不提供保密性。 • ESP:保證傳輸的可靠性、完整性以及保密性,但是不對IP packet header提供保護。 • 兩者皆有Sequence number,可以抵禦重放攻擊。

  26. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  27. Conclusion • VOIP的技術在未來會被廣泛使用,取代傳統電話。但是,如何維護通話安全卻是個相當重要的問題,只靠單一的安全機制是遠遠不夠的,因此我們可以針對不同技術的特點,如:TLS(認證)、SRTP(加密)、VLAN(物理)三者結合,將可提高整體的安全性。 Authentication TLS Encryption SRTP / IPsec Physical VLAN / VPN

  28. Outline Introduction Sercurity Issues Countermeasures Conclusion Reference

  29. Reference • P. Mehta and S. Udani, “Overview of voice over IP”, Dept. Comput.Inf. Sci., Univ. Pennsylvania, Philadelphia, PA, Rep. MS-CIS-01-31,Feb. 2001. • David Butcher,Xiangyang Li and Jinhua Guo, “Security Challenge and Defensein VoIP Infrastructures”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 37, NO. 6, NOVEMBER 2007. • D. Richard Kuhn, Thomas J. Walsh, Steffen Fries, “Security Considerations for Voice Over IP Systems”, http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf • Raj Jain,” Secure Socket Layer (SSL)and Transport Layer Security (TLS)” , http://mail.google.com/mail/?ui=2&ik=4b91cd88bc&view=att&th=12034a58ceb691f6&attid=0.9 • Swapnil Shah,”Secure Real-time Transport Protocol (SRTP) including Multimedia Internet KEYing (MIKEY) and ZRTP” , http://students.csci.unt.edu/~scs0166/SRTP_Pres-II.ppt. • Rick Kuhn, “Voice Over Internet Protocol (VOIP) Security” , http://www.wutc.wa.gov/rms2.nsf/0/39844ECE6AF35C558825710600826C0A/$file/briefing_Kuhn.pdf.

  30. Reference • Rochester ISSA , “VoIP Security Overview” , http://www.rochissa.org/downloads/presentations/Hagen%20VoIP%20ISSA.ppt , July 27, 2006. • 李濬屹 , “網路與多媒體實驗 VoIP” , http://cobra.ee.ntu.edu.tw/~oops/HTML2/09_oralpresent/Group5/VoIP.ppt • Wikipedia , “VPN” , http://zh.wikipedia.org/w/index.php?title=VPN&variant=zh-tw • Wikipedia, “IPsec”

  31. Thank You !

More Related