A look at security of Voice over IP protocols

19
27 September, 2000 1 Lucent Technologies - Proprietary A look at security of Voice over IP protocols Irene Gassko Lucent Technologies Bell Laboratories Secure Technologies Department [email protected] (978)960- 5767

description

A look at security of Voice over IP protocols. Irene Gassko Lucent Technologies Bell Laboratories Secure Technologies Department [email protected](978)960-5767. Initial incentives. Features that customer demands Money-making services Market penetration Cost savings - PowerPoint PPT Presentation

Transcript of A look at security of Voice over IP protocols

Page 1: A look at security  of Voice over IP protocols

27 September, 2000 1Lucent Technologies - Proprietary

A look at security

of Voice over IP protocols

Irene GasskoLucent Technologies

Bell LaboratoriesSecure Technologies Department

[email protected] (978)960-5767

Page 2: A look at security  of Voice over IP protocols

27 September, 2000 2Lucent Technologies - Proprietary

Initial incentives

• Features that customer demands• Money-making services• Market penetration• Cost savings

• Security is NOT on the list

Page 3: A look at security  of Voice over IP protocols

27 September, 2000 3Lucent Technologies - Proprietary

Page 4: A look at security  of Voice over IP protocols

27 September, 2000 4Lucent Technologies - Proprietary

Security and Reliability of PSTN

Old days

• Party lines• Unreliable• Low quality• In-band signaling• Vulnerable to

attack• Service theft

Nowadays

• Privacy• Reliability• Quality of Service• Out-of-band

signaling• Hardened• Multiple services

Page 5: A look at security  of Voice over IP protocols

27 September, 2000 5Lucent Technologies - Proprietary

1890

1990

Page 6: A look at security  of Voice over IP protocols

27 September, 2000 6Lucent Technologies - Proprietary

Voice over IP

back to Old days

• Party lines• Unreliable• Low quality• In-band signaling• Add network

vulnerabilities

Nowadays

• Privacy• Reliability• Quality of Service• Out-of-band

signaling• Hardened• Multiple services

Page 7: A look at security  of Voice over IP protocols

27 September, 2000 7Lucent Technologies - Proprietary

Considerations

• Whom or what do we want to protect?• What are the threats we want to protect

against?• What vulnerabilities are known and what

are suggested fixes?• Cost of security versus cost of vulnerability.• System is as secure as its weakest link.• Adding new applications or upgrading

existing ones can break existing security.

Page 8: A look at security  of Voice over IP protocols

27 September, 2000 8Lucent Technologies - Proprietary

Breaking points

• Algorithms• Protocols

Impersonation, chosen protocol attack, connection hijacking, ...

• ImplementationsBuffer overflows, race conditions, power and timing

analysis, ...

• Interactions of several productsExample: Excel, IE and E-mail reader vulnerability

• How to ensure that all implementations are broken?

Page 9: A look at security  of Voice over IP protocols

27 September, 2000 9Lucent Technologies - Proprietary

VoIP Standards

• ITU-T H.323 suite• ETSI TIPHON • IETF SIP

also

• MEGACO• IPSec• TLS• etc

Page 10: A look at security  of Voice over IP protocols

27 September, 2000 10Lucent Technologies - Proprietary

H.323

• H.235 Security and encryption for H-Series (H.323 and other H.245-based) multimedia terminals:

• No privacy for control traffic• No integrity protection for data streams• Vulnerabilities in the protocols: Flooding,

Man-in-the-Middle, session highjacking, etc.• No cryptographic algorithms mandated

or recommended therefore compliant non-interoperable implementations are possible.

Page 11: A look at security  of Voice over IP protocols

27 September, 2000 11Lucent Technologies - Proprietary

TIPHON

• No privacy for control traffic• No integrity and authentication protection

for data streams • For signature and key encryption only one

algorithm is required (RSA), nothing else is even recommended

• Unsafe adaptation of ISO 9798-3 authentication mechanism.

• Patch-up approach to security instead of built-in

Page 12: A look at security  of Voice over IP protocols

27 September, 2000 12Lucent Technologies - Proprietary

Denial of Service

• Bandwidth hogging– QoS mechanisms– Feedback by backchannel

• Useless computation– Karn-Simpson method– Puzzle methodology

• Memory depletion– Policies

Page 13: A look at security  of Voice over IP protocols

27 September, 2000 13Lucent Technologies - Proprietary

SIP

• HTTP-like protocol• Text based• Easier to program

However• Control signaling only• Less capabilities • Needs to interoperate with H.323

Page 14: A look at security  of Voice over IP protocols

27 September, 2000 14Lucent Technologies - Proprietary

Security of SIP

• An attempt to incorporate security from scratch

• Privacy protection of control messages• Some protection against traffic analysis• Many vulnerabilities in the first versions• Denial of service• Weak and inefficient authentication• Too many applications

Page 15: A look at security  of Voice over IP protocols

27 September, 2000 15Lucent Technologies - Proprietary

SIP applications

• Instant messaging• Common Gateway Interface • Java applets • Java Mobile Agents• Simple Object Access Protocol (SOAP) • Network-capable appliances• Other

Page 16: A look at security  of Voice over IP protocols

27 September, 2000 16Lucent Technologies - Proprietary

Appliance networking protocols

• Bluetooth• Jini• WAP• CAL• HAVi• UPnP• OSGi

Page 17: A look at security  of Voice over IP protocols

27 September, 2000 17Lucent Technologies - Proprietary

Initial Deployment of the Telephone NetworkOverhead Wires at Broadway and John Street,

New York, 1890

Page 18: A look at security  of Voice over IP protocols

27 September, 2000 18Lucent Technologies - Proprietary

Conclusions

• Use time-tested public algorithms and protocols

• Follow established secure design guidelines

• Involve security experts from day one• Limit functionality• Audit for vulnerability at each level• Divide and conquer

Page 19: A look at security  of Voice over IP protocols

27 September, 2000 19Lucent Technologies - Proprietary

Password derivation vulnerability• H.235, section 10.3.2 authentication

exchange• Based on ISO/IEC 9798-2 standard• Password derivation:

– size(Password)=N, Key=password– size(Password)<N, Key is padded by zeroes– size(Password)>N, all “extra” password octets are

repeatedly folded into Key by XORing

• If N=7 and password is AmericaAmerica then we get an all-zero key.