voip security
play

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network - PowerPoint PPT Presentation

VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 *Thanks to Prof. Angelos Keromytis for materials for these lecture slides. CSE545 - Advanced Network Security - Professor McDaniel Page 1 Example of


  1. VoIP Security* Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 *Thanks to Prof. Angelos Keromytis for materials for these lecture slides. CSE545 - Advanced Network Security - Professor McDaniel Page 1

  2. Example of toll fraud attack • Break into company PBX ‣ use them to route calls of your customers ‣ this has actually happened http://www.theregister.co.uk/2006/06/08/voip_fraudsters_nabbed/ http://www.theregister.co.uk/2009/02/11/fugitive_voip_hacker_arrested/ “ Federal authorities yesterday arrested a Miami man who they said made more than $1 million in a hacking scheme involving the resale of Internet telephone service.” “In all, more than 15 Internet phone companies, including the one in Newark, were left having to pay as much as $300,000 each in connection fees for routing the phone traffic to other carriers without receiving any revenue for the calls, prosecutors said.” Systems and Internet Infrastructure Security Laboratory (SIIS) Page 2

  3. What is VoIP/IMS? • Protocol(s) for voice communication over IP-based infrastructures ‣ use of the Internet itself is dependent on operator • Voice over IP: catch-all term for numerous kinds of media ‣ Generally applied to voice and conference oriented products and services, e.g., Skype • IP Multimedia Subsystem : industry standard for IP-based multimedia communications ‣ Video, ‣ Calendaring/scheduling ‣ File-sharing ‣ Collaborative editing, ... 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 3

  4. VoIP in the marketplace • Basis for many products/services ‣ commercial: Vonage, 3, T -Mobile/UMA, T -Mobile@Home, ... ‣ free/semi-free: Skype, GTalk, MSN, Yahoo! IM, AIM, Gizmo, ... • Both enterprise- and consumer-oriented ‣ management simplification ‣ cost reduction • Various architectural models ‣ centralized vs. P2P ‣ open vs. closed Systems and Internet Infrastructure Security Laboratory (SIIS) Page 4

  5. Useful Terms • codec - coder/decoder ‣ Program (not format) used to process media-specific data • SDP - session description protocol ‣ Standard for describing media session parameters Systems and Internet Infrastructure Security Laboratory (SIIS) Page 5

  6. VoIP Protocols • Signaling • Dominant mechanisms ‣ Responsible for call setup and ‣ Session Initiation Protocol (SIP) management ‣ Unlicensed Mobile Access (UMA) ‣ Architectural and operational ‣ Others: Skype, Asterisk, GTalk/ components AIM ... • Principal/endpoint naming, IP ‣ Useful terms mapping, proxying, billing, ‣ codec - “coder/decoder” program access control, device (not format) used to process configuration/management, media-specific data customer support, QoS ‣ SDP - session description protocol is • Data transport a standard for describing media ‣ Codecs, transport protocols session parameters (typically RTP), QoS, content security signaling Systems and Internet Infrastructure Security Laboratory (SIIS) Page 6

  7. Session Initiation Protocol (SIP) • IETF Standardized signaling for IMS ( among others ) ‣ Similar to HTTP ‣ Text-based ‣ Request/response structure ‣ Stateful - highly complex state machine ‣ TCP or UDP (port 5060) • Devices ‣ End-points (soft phones or hardware devices) ‣ Proxy servers (local services acting on behalf of phone) ‣ Registrars (local point to register with network) ‣ Redirect servers (redirects calls) ‣ Location server (VoIP HLR) Systems and Internet Infrastructure Security Laboratory (SIIS) Page 7

  8. SIP Flow Systems and Internet Infrastructure Security Laboratory (SIIS) Page 8

  9. SIP/RTP Call progress 1. Locate endpoint* [SIP] 2. Establish call [SIP] 3. Data Transfer [RTP] 4. Hangup [SIP] *not shown Systems and Internet Infrastructure Security Laboratory (SIIS) Page 9

  10. Call forwarding Systems and Internet Infrastructure Security Laboratory (SIIS) Page 10

  11. SIP Call Flow Systems and Internet Infrastructure Security Laboratory (SIIS) Page 11

  12. Real-time Transport Protocol (RTP) • RTP is a pair of protocols designed to support applications with latency and jitter constraints ‣ Supports the tightly controlled delivery of stream data, ‣ E.g., require some hard or soft QoS (quality of service) • Protocols using ephemeral ports (1025-65535) ‣ RTCP (Real-Time Control Protocol) provides signaling between peers that measures and adjusts session to compensate for changing conditions ‣ RTP - the data channel that delivers the data • SDP sometimes used to describe the session requirements, as negotiated through SIP • Standards support a range of codecs, e.g., RFC 3016 .., Systems and Internet Infrastructure Security Laboratory (SIIS) Page 12

  13. In reality... • Much “hidden” shared infrastructure ‣ DNS, web, NAT, TFTP , DHCP/PPPoE, Int/DiffServ, firewalls,... • Emergent properties ‣ example: web-based UI poisoning through SIP-field manipulation • Live aspect makes problems harder ‣ e.g., how can we filter voice spam based on content? 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 13

  14. SIP Security • Largely the ad hoc application of existing general-purpose security mechanisms ‣ Authentication uses HTTP-style digest authentication ‣ TLS - when TCP is used ‣ S/MIME - used to encode/secure payloads ‣ IPsec - can be used to secure any protocols run over IP ‣ Secure Real-time Transport Protocol (SRTP) - crypto extensions to protect real-time sessions, e.g., encrypt the voice channel • Implication : security largely pushed on infrastructure Systems and Internet Infrastructure Security Laboratory (SIIS) Page 14

  15. SIP authentication 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 15

  16. Unlicensed Mobile Access (UMA) • Route GSM calls over the Internet (or a public network) ‣ (usually) transparent handover between GSM and UMA • Popular with cellphone providers ‣ T -Mobile USA, Orange France, ... • Benefits ‣ reduce need to install expensive cell towers / upgrade capacity ‣ reduce spectrum needs / utilization ‣ improve “reception” in difficult locations ‣ depending on billing, avoid roaming charges (think international!) • Not to be confused with pico-/micro-/femto-cells 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 16

  17. UMA deployment Source: http://www.umatechnology.org/ 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 17

  18. UMA details • Encapsulation of GSM/3G inside IP ‣ complete frame, minus the on-the-air crypto ‣ can transfer voice, IM and (in the future) video • Typically, devices are WiFi-supporting cellphones ‣ not strictly necessary, e.g., T -Mobile@Home in USA • GSM frames are not natively protected ‣ A5/2 is anyway weak (i.e., broken) 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 18

  19. UMA Security • Handset-to-provider IPsec ‣ Strong crypto and integrity protection ‣ Key management (IKE, IKEv2) is a different story altogether ‣ Authentication done via EAP-SIM (based on shared secret) • The key management protocol (IKE/IKEv2) is complex ‣ Perhaps “too big” to be trusted ‣ More importantly, easy to misconfigure • not as big a problem in a tightly managed environments (cellphones) • but, UMA+smartphones spells trouble • Provider must interface internal network with Internet ‣ higher risk of compromise by external attackers ‣ large numbers of potentially malicious insiders Systems and Internet Infrastructure Security Laboratory (SIIS) Page 19

  20. Threat in VoIP systems • Everyone thinks of the traditional C/I/A threats • Loss of communication confidentiality and privacy (C) ‣ traffic analysis, content privacy • Loss of communication integrity (I) ‣ impersonation (inbound, outgoing calls), modification of content, falsification of call records • Loss of communication availability (A) ‣ accidental or intentional denial of service (DoS) Systems and Internet Infrastructure Security Laboratory (SIIS) Page 20

  21. Unique VoIP characteristics • Elaborate billing infrastructure in place • Users are used to paying for telephony services • Most charges are for relatively small amounts • Large number of charges per billing cycle ‣ unlikely that small unauthorized charge will be noticed or challenged • Phone infrastructure is “trusted” by average user ‣ perception carried over from PSTN ‣ not grounded on facts or experience Systems and Internet Infrastructure Security Laboratory (SIIS) Page 21

  22. VoIP-Specific Threats and Risks • Theft of service , e.g., toll fraud, billing fraud • Social engineering , e.g., phishing/spear-phishing • Direct charge-back , e.g., immediate monetization • Risks ‣ Some in common with other types of systems (software vulnerabilities) ‣ Some are very specific to IMS (protocol vulnerabilities) ‣ Some are common, but are amplified by some IMS feature, e.g., large-scale phishing through impersonation or call hijacking • Q: are these substantially different than in cell networks? Systems and Internet Infrastructure Security Laboratory (SIIS) Page 22

  23. VoIP/IMS risk vectors • Variety of risk vectors ‣ some in common with other types of systems • software vulnerabilities ‣ some are very specific to IMS • protocol vulnerabilities ‣ some are common, but are amplified by some IMS feature • large-scale phishing through impersonation or call hijacking 2 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend