280 likes | 760 Vues
VoIP Security (Voice over Internet Protocol). Brian Martin Matt Protacio February 28, 2007. History of VoIP. First “ internet phone ” service offered in 1995 by a company called Vocaltec Most people didn ’ t yet have broadband, and most soundcards were half duplex.
E N D
VoIP Security(Voice over Internet Protocol) Brian Martin Matt Protacio February 28, 2007
History of VoIP • First “internet phone” service offered in 1995 by a company called Vocaltec • Most people didn’t yet have broadband, and most soundcards were half duplex. • First PC to phone service in 1998, followed by phone to phone service. Cisco, Nortel, and Lucent develop hardware VOIP switches (gateways). • VOIP traffic exceeded 3% of voice traffic by 2000
History of VoIP (Continued) • Around 2004 began mass marketing for “digital phone” service bundled with broadband arranged so calls would be received over regular phones. • “Digital phone” services use an adaptor from the modem to a phone jack so there is almost no difference between that and regular phone service. Other services use software clients requiring a computer with a microphone.
VoIP vs. Old Phones • Benefits: • More efficient bandwidth usage • Only one type of network required, data abstraction in the network • Criticisms: • 911 localization doesn’t always work • Phones aren’t useable in a power outage, unless UPS are deployed • Fax machines might not work
Common VoIP Security Threats • VoIP Security Alliance, founded in 2005 • Threat Taxonomy • Forums, Articles • Caller misrepresentation, caller id spoofing • Unwanted calls, spam or stalking
Common VoIP Security Threats (Continued) • Traffic Capture • Eavesdropping • Interception • Alteration (conversion quality, content) • Black holing • Call Hijacking • SIP (Session Initiation Protocol) register hijacking • DoS
SIP registration hijacking with SiVuS and a botnet • SIP • Session Initiation Protocol • Application layer control protocol for initiating VOIP sessions • Control messages were not encrypted and had no mechanism to verify integrity • So even if registration requires authentication, it can be sniffed easily
The basic attack plan • Both Callers must register with a registrar server before a call may be initiated • DoS the receiver with zombie minions • Deregister him with the registrar • Falsify his registration with SiVuS • Anyone planning to call him will not know and you can try to claim you are the legitimate call receiver. • Chances are the intended call receiver will not notice either
Good Ideas • If using SIP use TLS • Transport Layer Security (encryption, basically) • The text based messages of SIP are considered a feature though • If only VoIP appliances are connected to the the network, then no PCs are available to launch attacks from. • Segregate data and voice to their own Virtual Lans (VLANs) • Encrypt!!! • Prevents voice injections and casual eavesdropping • Redundant network to deal with DoS. • Secure IP-PBX and gateway boxes
VoIP Popularity • “VoIP use has more than doubled in the past year, according to Telegeography Research, and experts expect the growth to continue.” • New York Daily News, Februray 26, 2007
Popular VoIP Services • Enterprise • Cisco CallManager • Home • Vonage • Skype • Cable Companies (Time Warner, Insight, Comcast, etc.)
Cisco CallManager • Enterprise VoIP Product • Marketed towards companies and organizations looking to replace legacy PBX (Private Business Exchange) systems or install a new IP telephony based system
Cisco CallManager System Design • Phones • Deskphones, model 7960 • Ethernet, PoE (Power over Ethernet) • Software Phone • IP Communicator • Popular for using across a VPN
Cisco CallManager System Design (continued) • Servers • CallManager Subscribers and Publishers • Windows or Linux Servers running Cisco Software • Process all calls • Interface with existing PBX systems
CallManager Security • Multiple VLANs • Separate VLANs for Voice and Data • Higher Security by isolating voice on separate VLAN • Primary Protocols • SIP • H.323
H.323 Attack • Attacker can exploit the open standard protocol to establish malicious phone calls • Microsoft Netmeeting can be used to initiate an H.323 Phone Call • Malicous phone calls can be established to make international calls • Threat can be eliminated by not allowing international dialing on lines from telephone company
IP Phone Tap • Capture IP packets from Phone • Use Ethereal network sniffer • Extract audio from packets • Export audio file of phone call
Prevent Phone Tapping • Encrypt voice traffic • Prevent attacker from capturing traffic out of a phone • Lock down access to network switch phone is connected to
Conclusion • VoIP is established as the future of telephones • Security is critical when designing and maintaining VoIP systems Questions?