sip security & the future of voip

19
SIP Security & the Future of VoIP Nate Klingenstein APAN 26 Queenstown August 5, 2008 tp://people.internet2.edu / dk/apanSIP.pdf

Upload: oleg-burch

Post on 01-Jan-2016

37 views

Category:

Documents


5 download

DESCRIPTION

SIP Security & the Future of VoIP. Nate Klingenstein APAN 26 Queenstown August 5, 2008. http://people.internet2.edu / ~ndk/apanSIP.pdf. Securing SIP. The threats The existing protocol’s problems Attempted solutions Skype for comparison Next steps. The Threat Model. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SIP Security & the Future of VoIP

SIP Security & the Future of VoIP

Nate KlingensteinAPAN 26 Queenstown

August 5, 2008

http://people.internet2.edu/~ndk/apanSIP.pdf

Page 2: SIP Security & the Future of VoIP

Securing SIP

•The threats

•The existing protocol’s problems

•Attempted solutions

•Skype for comparison

•Next steps

Page 3: SIP Security & the Future of VoIP

The Threat Model•A lot like any other network

application’s problems

•Denial-of-Service (DoS) attacks

•Eavesdropping / Man in the Middle

•Spoofing, replay, spam (SPIT)

•Poor authentication, authorization

•Demonstrated attacks

Page 4: SIP Security & the Future of VoIP

Are these threats hypothetical?

•Security must always be pragmatic and proportional

•http://www.loria.fr/~nassar/readme.html

•http://www.voipsa.org/Resources/tools.php

•Human faces and voice recognition do provide limited authentication & protection

Page 5: SIP Security & the Future of VoIP

Enterprise Middleware

•Many universities and companies manage information about their members

•Directories, databases

•Applications use these data for better security, auditing, user services

•Large benefits for enterprise webapps

Page 6: SIP Security & the Future of VoIP

Specific Problems

•Authentication: HTTP digest, basic

•Realm-specific

•Traffic unencrypted

•Trust between realms and proxies poor

•Disconnected from identity management infrastructure

Page 7: SIP Security & the Future of VoIP

Possible Solutions

•Look a lot like the solutions for other old protocols:

•Hack security into an old protocol

•Firewall everything

•Accept that SIP is too difficult to secure

Page 8: SIP Security & the Future of VoIP

Security Attempts

•Many tries with varying success

•New RFC’s, internet-drafts

•Integration with RADIUS, TLS authentication

•Integration with directories

•Improved deployment practices

Page 9: SIP Security & the Future of VoIP

SURA/ViDe 4th Annual WorkshopSURA/ViDe 4th Annual Workshop

Inter-Realm SIPInter-Realm SIP

Bob on a desktopWith a SIP VC-UA

SIP Proxy Alice on a desktopWith a SIP VC-UA

INVITE

Invite from Bob

180 Ringing

180 Ringing

200 OK

SIP Proxy

If Bob is valid,Forward INVITE

Can I trust you?

Sure, I belongto the same club

180 Ringing

Realm CGU.EDU Realm: Microsoft.com

Page 10: SIP Security & the Future of VoIP

SAML + SIP

•Attempt to fix three major problems

•Authentication methods

•Realm trust

•Connection to infrastructure

•internet-drafts were written to make a SAML MIME on the invite, but failed

Page 11: SIP Security & the Future of VoIP

Firewall Everything

•Private networks

•VPN

•IDS/IPS

•TLS/IPSec

•Dedicated hardware devices

•STUN & TURN

Page 12: SIP Security & the Future of VoIP

Issues with Firewall Everything

•Cross-realm trust not addressed

•Possibly multiple interfaces and/or devices with private network

•One more step towards Internet quarantine...

Page 13: SIP Security & the Future of VoIP

Securing SIP

•A combination of approaches is necessary

•Network-level protection

•Federated trust

•Middleware integration

•Phones and other hardware make modification more difficult

Page 14: SIP Security & the Future of VoIP

14

Use of IPS between VoIP network and data IP network.

Use of IDS between VoIP network and data IP network.

Use NAC (network access control) such as 802.1X and RADIUS to authenticate hard phones.

Softphones require the use of the separate VoIP network (physical LAN, VLAN, subnet address, etc.) from the data IP network.

Softphones are allowed with IPSEC transport mode.

Softphones are allowed with IPSEC VPNs.

Use NAC (network access control) such as 802.1X and RADIUS to authenticate hard phones.

Allow NAT traversal via STUN or TURN Internet proxies.

Provide separate dedicated bandwidth for VoIP traffic to the Internet.

VoIP Higher Ed Security Survey

Which VoIP Security mechanisms do[n’t] you use?

Page 15: SIP Security & the Future of VoIP

15

VoIP Higher Ed Security Survey

Page 16: SIP Security & the Future of VoIP

The Skype Model

•Proprietary, decentralized protocol

•RC4 encryption

•Firewall and NAT detection, agility

•Central login server, hashed

•SIP used by SkypeOut/SkypeIn with PSTN interconnections; gateways to SIP phones

Page 17: SIP Security & the Future of VoIP

Can SIP Learn from Skype?

•TLS/IPSec offer good encryption

•Authentication over TLS (digest/PKI/SAML) is good

•Bandwidth, centralization not big problems

•The world has no central login server

•Cross-domain trust not solved

Page 18: SIP Security & the Future of VoIP

Conclusions

•SIP needs a lot of attention to be secure

•Existing ideas can address some shortcomings

•Some efforts stopped

•No central work combining all efforts

•Some attacks don’t have cost-effective solutions

Page 19: SIP Security & the Future of VoIP

Questions?

•http://www.internet2.edu/sip.edu/

[email protected]