+ All Categories
Home > Documents > Best Practices for Securing IP...

Best Practices for Securing IP...

Date post: 22-May-2020
Category:
Upload: others
View: 8 times
Download: 0 times
Share this document with a friend
34
Hosted by Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group
Transcript
Page 1: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Best Practices for Securing IP Telephony

Irwin Lazar, CISSP

Senior Analyst

Burton Group

Page 2: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Agenda

VoIP overview

VoIP risks

Mitigation strategies

Recommendations

Page 3: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

VoIP Overview

Page 4: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

VoIP Functional Diagram

PSTN

QoS-enabledWAN

Soft Phone

IP Phone

Gateway

Soft Phone

IP Phone

Softswitch

IP LAN

Page 5: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Signaling Concepts

PSTN

Call Server

IP WAN

2 – Call Setup3 – E.164 Lookup

4– Call Setup

5 – Ring

5 – Ringback

6 – Offhook

7 – ConnectRTP Stream

1 – Offhook & Dial

IP Phone

IP Phone

Page 6: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

What Do These Diagrams Tell Us?

Voice & data share a common infrastructure• No different from a risk perspective

• Anything that affects data will affect voice

This represents a major change in the way voice services are provided• Historically functions were separate

Page 7: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Hypothesis

Enterprises implementing VoIP have an even greater need to protect their networks than before• There is no fallback mechanism if security is

compromised

• Both data and voice will be effected

Page 8: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Protocols to KnowSignaling protocols:

H.323 - used by most vendors

• Cisco & Siemens use proprietary alternatives

SIP - Session Initiation Protocol

• Emerging “IP” based protocol

H.323 relies on gateways, SIP allows direct any-to-any communications

• Though in reality they are implemented the same way

Page 9: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

More Protocols to Know

Voice Bearer Transport Protocols

RTP - Real-Time Protocol

RTCP - Real-Time Control Protocol

UDP - User Datagram Protocol

Page 10: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

VoIP Risks

Page 11: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Specific Risks to VoIP• External threats

Hacks against phones, call control servers, gateways Denial of Service (DoS) attacks Trojans, viruses, worms Illicit phone system usage VoIP spam Compromise of call data

• Internal Threats Eavesdroppers Illicit phone system usage Compromise of call data

Page 12: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

A Few Possible Scenarios

DoS attack on inbound calling gateway

Worm attack takes down call servers

Worm/Virus causes excessive network congestion

Unauthorized calls routed through your gateway

Calls are secretly recorded

Improper long distance usage

Page 13: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Scared Yet? Well…you should be!

BUT!

• You ought to be protecting against most of this stuff already

• A few of these risks are already out there Unauthorized phone use, outside

hacking

• Mitigation strategies are available

Page 14: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

IP Telephony Security

Mitigation Strategies

Page 15: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Basic Secure IP Telephony Design

Network security principles:

• Logical separation of voice and data via VLANs wherever possible Minimize interconnection points

• VoIP-aware firewalls at interconnection points

• Host-based intrusion detection & virus detection on all call management devices

• Intrusion detection at network exit/entry points

• Session border controllers for external connectivity

• Prioritization of VoIP traffic

Page 16: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Firewall Concerns

Firewalls must be VoIP-aware• VoIP relies on dynamic port creation for voice traffic

• Signaling protocols use well known ports• NAT may get in the way

Solution: Session Border Controllers• Kagoor, Acme Packets, Jasomi, Nextone, etc.• SBCs track call establishment and dynamically handle NAT and port filtering

• May also act as a calling proxy

Page 17: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Security Architecture

Call Server

Subnet A

Subnet B

Subnet A

Subnet B

Data to Data FullVoice to Voice FullVoice to Data BlockedCall Server to Voice FullCall Server to Data Limited

Data VLAN

Voice VLAN

Call Server VLAN

XSBC

External

Page 18: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Logical Separation Issues

• Requires Ethernet switches to support 802.1Q VLAN Trunking

• Two implementation methods

Ethernet switch in IP phone

Ethernet switch in closet performs separation

• Difficult to implement in softphone environments

Page 19: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Phones at 802.1Q Trunks

L2 Switch

IP Phone Desktop PC

Phone Subnet

Data Subnet

Page 20: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Call Security Options

• End-point security:

User authentication for hard/soft phones

• 802.1x - based

Phone authentication to call controller

Use of MAC address filters to prevent rogue assignment of IP addresses and transfer of configuration files

Page 21: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Call Security Options (2)

• Call data security SSL/TLS encryption between end-points and

call control servers• Negative performance impact

S/MIME signing & encryption of call data SRTP - Secure RTP

• Prevent anonymous in-bound calling Inbound calls only accepted from trusted or

verifiable sources• Use of trusted certificate authority

Page 22: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Call Security Options (3)

Protection against Denial of Service Attacks

• Only an issue when there is direct connectivity of VoIP “Islands”

• Use of DoS mitigation techniques or devices

E.g. Arbor Networks, Riverhead (Cisco)

Page 23: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Does it Work?

“Breaking through IP telephony security” Network World - May 24, 2004

• Mier test of Avaya & Cisco VoIP Security

• Findings: Both were secure against hacker attacks

against call control infrastructure Both were susceptible to passive probes Avaya phones could be disrupted

• Bottom line: Both systems were reasonably secure IF security architectures were fully implemented

Page 24: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Future Developments

Security becoming increasingly important• Encryption more widely available (Cisco

Call Manager 4.0)• Better availability of VoIP-aware security

products

Increasing use of softphones presents new challenges

Remote users also present challenges• One solution: Zultys builds IPsec client

directly into phones

Growing concerns as we evolve past “Islands” of VoIP

Page 25: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

What About Public Services?

Public VoIP services are rapidly emerging

• Network complexity transferred to a service provider

Page 26: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

SIP

Enterprise Network

Service Provider Network

Network Gateway

SIPSIP

ATA

MgmtBackup

FeatureServers

SIP

Class 5Switch

Analog/ISDN

Service Architecture

Page 27: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Service Issues

Security Risks to corporate data stored on and

carried by service providers Risks of denial of service attacks on

provider infrastructure Risks to enterprise data network Risks of data carried over the public

Internet (for broadband service providers) Eavesdropping Reliance on service provider for security

management Are services subject to wiretapping laws?

Page 28: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Recommendations

Page 29: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Recommendations

Conduct security assessment as part of your VoIP planning

Recommended evaluation criteria:

• Corporate security policies

• Cost vs. Risk

• Network capabilities (to support 802.1Q for example)

• Firewall capabilities

• Need for encryption

Page 30: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted byRecommended Security Guidelines

Best practices: Logical separate of voice and data (use VLANs in the

LAN) Firewalls/IDS at interconnection points Host-based IDS for call control servers Authenticate both phone and user Implement QoS mechanisms to prioritize voice Encrypt where necessary

For users of public services• Work carefully with providers to understand security

methodologies & services

Page 31: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

What is your primary area of concern with regard to VoIP security?

l Hackers disrupting system

l Hackers misusing system

l Internal misuse?

l No concerns?

54%

10%

33%

3%

1 2 3 4

Page 32: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Who is responsible for VoIP security in your organization?

l Internal network security team?

l VoIP management team

l Network management team

l Nobody

23%

8%

50%

20%

1 2 3 4

Page 33: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Is encryption of voice a requirement?

1. Yes

2. No

3. Not sure

28%

42%

31%

1 2 3

Page 34: Best Practices for Securing IP Telephonycdn.ttgtmedia.com/searchNetworking/downloads/Best_Practices_for... · Recommended Security Hosted by Guidelines Best practices: Logical separate

Hosted by

Who manages your VoIP environment?

l Outsourced private solution

l Outsource public solution

l In-sourced

l Not sure?

14%3%

75%

8%

1 2 3 4


Recommended