VoIP security

19
VoIP security – myths & realities Ishai Rosmarin Sales Director – EMEA [email protected]

description

VoIP security - myths & realities

Transcript of VoIP security

Page 1: VoIP security

VoIP security– myths & realities

Ishai RosmarinSales Director – [email protected]

Page 2: VoIP security

in IPwe don’ttrustanyone!

Page 3: VoIP security

VoIP security in the news

VoIP Security Alert: Hackers Start

Attacking For Cash (June 2006)

Two Men Charged With Hacking Into

VoIP Networks (June 2006)

The Internet's a Scary Place for Voice(May 2006)

Is Your VoIP Phone Vulnerable?

(June 2006)

Are Hackers Eyeing your VoIP Network?

(Sept. 2006)

VoIP Security: It's More Than Data Security(Aug. 2006)

Page 4: VoIP security

4

Security Concerns

• Everyone worries

about security

• DoS attacks and

overloads are biggest

worry

Source: Service Provider Plans for Next Gen Voice 2006 (July 2006)

29%

75%

75%

63%

79%

54%

42%

33%

0% 20% 40% 60% 80%

Trade performancefor security

SPIT

Illegal wiretapping

Service topology exposure

Service fraud

User privacy and confidentiality

User/device authenticationand authorization

DoS attacks and overloads ofnext gen voice service

infrastructure

Percent of Next Gen Voice

Respondents Rating 6 or 7

Page 5: VoIP security

VoIP security threats & solutions

Page 6: VoIP security

IMS: Is Missing Security

DoS/DDoS

attacks

Traffic

overloads

Viruses &

malware

Service

fraud

Identity

theft

Eves -

dropping

SPIT

Security feature requirement IMS function/feature

Access control - static IP address list Core IMS functions, not applicable for UE

Access control - dynamic IP address list Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII x

Topology hiding (NAPT at L3 & L5) I-BCF only, THIG sub-function IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Authentication - subscriber & CSCF IPSec, SIP digest IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Authorization - subscriber HSS function IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Signaling encryption IPSec IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Media encryption Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Admission control - I/S-CSCF constraints Not addressed

Admission control - network bandwidth constraints PDF/RACS functionAdmission control - user limits: sessions (#) Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Admission control - user limits: bandwidth Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

SIP message & MIME attachment filtering/inspection Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Signaling rate monitoring & policing Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Bandwidth monitoring & policing Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Call gapping - destination number Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Call gappping - source/destination CSCF or UE Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

QoS marking/mapping control Not addressed IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII

Page 7: VoIP security

Internet

Types_ Malicious attacks_ Non-malicious – poor behaving

endpoints, power outages

Solution requirements

_ SBC DoS self-protection• Access control - static & dynamic• Trusted & untrusted paths with policed

queues• IDS capabilities

_ Service infrastructure DoS prevention• Access control - static & dynamic• Topology hiding• Signaling rate plicing• Bandwidth policing

DoS/DDoS attacks threatensubscriber retention and revenue

PSTNTransit& O&T

HIP ICServices

O&T

HIP ICServices

1

2

4

3

Page 8: VoIP security

Viruses & malware can threaten ICendpoints and service infrastructure

SIP MIME attachments are powerful tool for richer call ID- vcard text, picture or video

Potential Trojan horse for viruses and worms to general-purpose server-based voice platforms_ SIP softswitch, IMS CSCF, SIP servers, app servers_ SIP PBX_ SIP phones & PCs

New endpoint vulnerabilities_ Embedded web servers - IP phones_ Java apps – liability or asset?

Solution requirements_ Authentication_ SIP message & MIME attachment filtering_ Secure OS environment

SQL

Slammer

Melissa

Code Red

Nimda

Sobig

Love

Bug

Klez

Michelangelo

Page 9: VoIP security

Internet

Service fraud riskis business model dependant

Business model dimensions_ Internet vs. managed network_ Free vs. fee based_ Anonymous vs. not anonymous

Types of fraud_ Service theft_ QoS theft_ Bandwidth theft

Solution requirements_ Access control_ Authentication – subscriber

& SIP signaling elements_ Authorization – subscriber_ Admission control – subscriber

limits - # sessions & bandwidth_ QoS marking/mapping control_ Bandwidth policing

PSTNMPLS

NONE

NONE

DiffServ-31

2

4

3

A B

Page 10: VoIP security

Identity theft can’t beprevented entirely by technology

How do you know you are talking to Bank of America?

Web site techniques don’t work for IC- work for many-one, not many-many

Solution requirements– Authentication, access control– Trust chains - pre-established technical & business relationships

Page 11: VoIP security

Eavesdropping threat is over hyped

Less risk than email, who encrypts email?_ Email is information rich (attachments), voice not_ Email always stored on servers, only voice mail_ Email always stored on endpoints, voice not

Who is at risk?_ Bad guys - Osama, drug cartels,

pedophiles, etc._ Law enforcement_ Money, love, & health-related

– insider trading, adultery, ID theft,

Solution requirements_ Authentication – subscriber_ End-to-end encryption (EXPENSIVE)

• Signaling (TLS, IPSec)• Media (SRTP, IPSec)

Page 12: VoIP security

SPIT will be annoying,& possible tool for ID theft

Will anonymous, cheap Yahoo subscriber (aka SPITTER)be able to call money-paying Verizon subscriber to solicit- phone sex, penis enlargement, Viagra pill purchase?

Techniques that won’t work_ Access control – static_ Content filtering_ Charging - $/call_ Regulation

Solution requirements_ Access control

– dynamic, IDS-like_ Authentication_ Admission control

– subscriber limits (#)_ Trust chains - pre-established

technical & business relationships

Page 13: VoIP security

Who is responsible for security?

The individual The organization

Page 14: VoIP security

The future IC net?

The Internet

I

The Federnet

FF

F

F F

Page 15: VoIP security

Net-Net

Security issues are very complex and multi-dimensional

Security investments are business insurance decisions_ Life – DoS attack protection_ Health – SLA assurance_ Property – service theft protection_ Liability – SPIT & virus protection

Degrees of risk_ Internet-connected ITSP ` High_ Facilities-based HIP residential services_ Facilities-based HIP business services

_ Peering Low

_ NEVER forget disgruntled Malcom, OfficeSpace

Session border controllers enable service providersto insure their success

Page 16: VoIP security

Monitor, report & recordattacks & attackers;provide audit trails

Net-SAFE – security requirementsframework for session border control

Protect against SBC DoS attacks & overloads(malicious & non-malicious)

Session-awareaccess control

for signaling& media

Prevent DoSattacks on serviceinfrastructure &subscribers

Completeservice

infrastructurehiding & user

privacy support

Support for L2 and L3 VPNservices and security

Prevent misuse & fraud;protect againstservice theft

Page 17: VoIP security

Acme Packet Net-Net SD “flawlessly passedall of CT Labs’ grueling attack tests”

Total of 34 different test cases, using over 4600 test scripts

No failed or dropped calls, even for new callsmade during attacks

No lost RTP packets during attacks

Protected the service provider equipment – did notallow flood attacks into core, stopped packets at edge

SD performance not impacted during attack

– SD CPU utilization - only10% increase

– Signaling latency - only2 ms average increase

– RTP jitter – lessthan 1 ms increase(not measurable bytest equipment)

Page 18: VoIP security

Acme Packet SBCDoS/DDoS protection

Network processor (NPU) -based protection– L3/4 (TCP, SYN, ICMP, etc.) & signaling attack detection & prevention -– Dynamic & static ACLs (permit & deny) to SPU– Trusted & untrusted paths to SPU w/configurable bandwidth allocation &

bandwidth policing per session– Trusted devices - guaranteed signaling rates & access fairness– Untrusted devices – can access unused

trusted bandwidth– Separate queues for ICMP, ARP, telnet, etc.– Reverse Path Forwarding (uRPF)

detection - signaling & media– Overload prevention - 10 Gbps

NPUs > 8 Gbps network interfaces

Signaling processor (SPU)-based protection– Overload protection threshold

(% SPU) w/graceful call rejection– Per-device dynamic trust-binding

promotes/demotes devicesNetwork

processor

Intelligenttraffic

manager

Networkprocessor

Signalingprocessor

Securityprocessor

Page 19: VoIP security

The leaderin session border control

for trusted, first classinteractive communications