43
IP Telephony Security 101 Dan York, CISSP VOIPSA Best Practices Chair IP Telephony University June 24, 2008

IP Telephony Security 101

Embed Size (px)

DESCRIPTION

A presentation by Dan York at IP Telephony University in Alexandria, VA, on June 24, 2008

Citation preview

Page 1: IP Telephony Security 101

IP Telephony Security 101

Dan York, CISSP

VOIPSA Best Practices Chair

IP Telephony UniversityJune 24, 2008

Page 2: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Page 3: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Privacy

Compliance

Cost Avoidance

Availability

Business Continuity

Confidence

Mobility

Page 4: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Page 5: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Page 6: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Page 8: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

TDM security is relatively simple...

TDMSwitch

PSTNGateways

PhysicalWiringVoicemail

Page 9: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

VoicemailPhysicalWiring

DatabasesDirectories

E-mailSystems

WebServers

VoIP security is more complex

OperatingSystems

Firewalls

DesktopPCs

Voice overIP

NetworkSwitches

WirelessDevices

PDAs

PSTNGateways

InstantMessaging

Standards

Internet

Page 10: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 11: IP Telephony Security 101

VoIP Security Concerns

Page 12: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Security concerns in telephony are not new…

Image courtesy of the Computer History Museum

Page 13: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Nor are our attempts to protect against threats…

Image courtesy of Mike Sandman – http://www.sandman.com/

Page 14: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Security Aspects of IP Telephony

Media / Voice

PSTN

CallControl

TCP/IPNetwork

Management

Policy

Page 15: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Media

Eavesdropping

Degraded Voice Quality

Encryption

Packet Filtering

Virtual LANs (VLANs)

Page 16: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Signaling

Denial of Service

Impersonation

Encryption

Proper Programming

Encrypted Phone Software

Toll Fraud

Page 17: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Management

Web Interfaces

APIs!

Encryption

Patches? We don’t need...

Change Default Passwords!

Phones!

Page 18: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

PSTN

Page 19: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Geography

Page 20: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Internet LAN

Page 21: IP Telephony Security 101

SIP Trunking

Page 22: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

Page 23: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

CarrierNetwork

PSTN

SIP Trunking

SIP ServiceProvider

IP-PBX

Page 24: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

Page 25: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

Page 26: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

SIP ServiceProvider

Page 27: IP Telephony Security 101

Cloud Computing

Page 28: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Geography

Page 29: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

PSTN

Moving Voice Applications into “the Cloud”

ApplicationPlatform

IP-PBX

Page 30: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

PSTN

Moving Telephony into “the Cloud”

Hosted“IP-PBX”

Firewall

Page 31: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Can you trust “the Cloud”to be there?

Page 32: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Questions for SIP Trunk Providers or Cloud Computing Platforms?

• What kind of availability guarantees / Service Level Agreements (SLAs) does the platform vendor provide?

• What kind of geographic redundancy is built into the underlying network?

• What kind of network redundancy is built into the underlying network? • What kind of physical redundancy is built into the data centers?

• What kind of monitoring does the vendor perform? • What kind of scalability is in the cloud computing platform? • What kind of security, both network and physical, is part of the computing

platform?

• Finally, what will the vendor do if there is downtime? Will the downtime be reflected in your bill?

Page 33: IP Telephony Security 101

Spam / SPIT

Page 34: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

What about SPIT? (“SPam over Internet Telephony”)

• What does a traditional telemarketer need?• Makes for great headlines, but not yet a significant threat

• Fear is script/tool that:– Iterates through calling SIP addresses:

[email protected], [email protected], …

• Opens an audio stream if call is answered (by person or voicemail)

– Steals VoIP credentials and uses account to make calls

• Reality is that today such direct connections are generally not allowed

• This will change as companies make greater useof SIP trunking and/or directly connect IP-PBXsystems to the Internet (and allow incoming callsfrom any other IP endpoint)

• Until that time, PSTN is de facto firewall

SPAM

Page 35: IP Telephony Security 101

Resources

Page 36: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

What is the Industry Doing to Help?

Security Vendors

“The Sky Is Falling!”(Buy our products!)

VoIP Vendors

“Don’t Worry, Trust Us!”(Buy our products!)

Page 37: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Voice Over IP Security Alliance (VOIPSA)

ClassificationTaxonomy of

Security Threats

SecurityResearch

Best Practicesfor VoIPSecurity

SecuritySystemTesting

OutreachCommunication

of Findings

Market and SocialObjectives and

Constraints

Published Active Now OngoingLEGEND

• www.voipsa.org – 100 members from VoIP and security industries• VOIPSEC mailing list – www.voipsa.org/VOIPSEC/• “Voice of VOIPSA” Blog – www.voipsa.org/blog• Blue Box: The VoIP Security Podcast – www.blueboxpodcast.com• VoIP Security Threat Taxonomy• Best Practices Project underway now

Page 38: IP Telephony Security 101

www.voipsa.org/Resources/tools.php

© 2008 VOIPSA and Owners as Marked

Page 39: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Page 40: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Tools, tools, tools...

• UDP Flooder• IAX Flooder

• IAX Enumerator• ohrwurm RTP Fuzzer

• RTP Flooder• INVITE Flooder• AuthTool

• BYE Teardown• Redirect Poison

• Registration Hijacker• Registration Eraser• RTP InsertSound

• RTP MixSound• SPITTER

• Asteroid• enumIAX

• iWar• StegRTP

• VoiPong• Web Interface for SIP Trace• SIPScan

• SIPCrack• SiVuS

• SIPVicious Tool Suite• SIPBomber• SIPsak

• SIP bot

Page 41: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

Security Links

• VoIP Security Alliance - http://www.voipsa.org/ – Threat Taxonomy - http://www.voipsa.org/Activities/taxonomy.php

– VOIPSEC email list - http://www.voipsa.org/VOIPSEC/

– Weblog - http://www.voipsa.org/blog/

– Security Tools list - http://www.voipsa.org/Resources/tools.php

– Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com

• NIST SP800-58, “Security Considerations for VoIP Systems”– http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf

• Network Security Tools– http://sectools.org/

• Hacking Exposed VoIP site and tools– http://www.hackingvoip.com/

Page 42: IP Telephony Security 101

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 43: IP Telephony Security 101

Q&eh?

www.voipsa.org

Dan York - [email protected]