+ All Categories
Home > Technology > SIP Trunking & Security in an Enterprise Network

SIP Trunking & Security in an Enterprise Network

Date post: 18-Nov-2014
Category:
Upload: dan-york
View: 11,376 times
Download: 1 times
Share this document with a friend
Description:
How secure are your VoIP systems as you deploy SIP-based systems in an enterprise environment? In this slide deck presented by VOIPSA Best Practices Chair Dan York at the Ingate SIP Trunking Seminars at ITEXPO September 17, 2008, Dan York walks through the security issues related to VoIP (with a focus on SIP trunking), the tools out there to attack/test VoIP systems, best practices and resources. (An audio recording of this session was made and will be available.)
43
SIP Trunking & Security in an Enterprise Network Dan York, CISSP VOIPSA Best Practices Chair September 17, 2008
Transcript
Page 1: SIP Trunking & Security  in an Enterprise Network

SIP Trunking & Security in an Enterprise Network

Dan York, CISSP

VOIPSA Best Practices Chair

September 17, 2008

Page 2: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Page 3: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Privacy

Compliance

Cost Avoidance

Availability

Business Continuity

Confidence

Mobility

Page 4: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Page 5: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Page 6: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Page 8: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

TDM security is relatively simple...

TDMSwitch

PSTNGateways

PhysicalWiringVoicemail

Page 9: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

VoicemailPhysicalWiring

DatabasesDirectories

E-mailSystems

WebServers

VoIP security is more complex

OperatingSystems

Firewalls

DesktopPCs

Voice overIP

NetworkSwitches

WirelessDevices

PDAs

PSTNGateways

InstantMessaging

Standards

Internet

Page 10: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 11: SIP Trunking & Security  in an Enterprise Network

VoIP Security Concerns

Page 12: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Security concerns in telephony are not new…

Image courtesy of the Computer History Museum

Page 13: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Nor are our attempts to protect against threats…

Image courtesy of Mike Sandman – http://www.sandman.com/

Page 14: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Security Aspects of IP Telephony

Media / Voice

PSTN

CallControl

TCP/IPNetwork

Management

Policy

Page 15: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Media

Eavesdropping

Degraded Voice Quality

Encryption

Packet Filtering

Virtual LANs (VLANs)

Page 16: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Signaling

Denial of Service

Impersonation

Encryption

Proper Programming

Encrypted Phone Software

Toll Fraud

Page 17: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Management

Web Interfaces

APIs!

Encryption

Patches? We don’t need...

Change Default Passwords!

Phones!

Page 18: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

PSTN

Page 19: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Geography

Page 20: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Internet LAN

Page 21: SIP Trunking & Security  in an Enterprise Network

SIP Trunking

Page 22: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

Page 23: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

CarrierNetwork

PSTN

SIP Trunking

SIP ServiceProvider

IP-PBX

Page 24: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

Page 25: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

Page 26: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet

PSTN

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

SIP ServiceProvider

Page 27: SIP Trunking & Security  in an Enterprise Network

Cloud Computing

Page 28: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Geography

Page 29: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

PSTN

Moving Voice Applications into “the Cloud”

ApplicationPlatform

IP-PBX

Page 30: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

PSTN

Moving Telephony into “the Cloud”

Hosted“IP-PBX”

Firewall

Page 31: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Can you trust “the Cloud”to be there?

Page 32: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Questions for SIP Trunk Providers or Cloud Computing Platforms?

• What kind of availability guarantees / Service Level Agreements (SLAs) does the platform vendor provide?

• What kind of geographic redundancy is built into the underlying network?

• What kind of network redundancy is built into the underlying network? • What kind of physical redundancy is built into the data centers?

• What kind of monitoring does the vendor perform? • What kind of scalability is in the cloud computing platform? • What kind of security, both network and physical, is part of the computing

platform?

• Finally, what will the vendor do if there is downtime? Will the downtime be reflected in your bill?

Page 33: SIP Trunking & Security  in an Enterprise Network

Spam / SPIT

Page 34: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

What about SPIT? (“SPam over Internet Telephony”)

• What does a traditional telemarketer need?• Makes for great headlines, but not yet a significant threat

• Fear is script/tool that:– Iterates through calling SIP addresses:

[email protected], [email protected], …

• Opens an audio stream if call is answered (by person or voicemail)

– Steals VoIP credentials and uses account to make calls

• Reality is that today such direct connections are generally not allowed

• This will change as companies make greater useof SIP trunking and/or directly connect IP-PBXsystems to the Internet (and allow incoming callsfrom any other IP endpoint)

• Until that time, PSTN is de facto firewall

SPAM

Page 35: SIP Trunking & Security  in an Enterprise Network

Resources

Page 36: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

What is the Industry Doing to Help?

Security Vendors

“The Sky Is Falling!”(Buy our products!)

VoIP Vendors

“Don’t Worry, Trust Us!”(Buy our products!)

Page 37: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Voice Over IP Security Alliance (VOIPSA)

ClassificationTaxonomy of

Security Threats

SecurityResearch

Best Practicesfor VoIPSecurity

SecuritySystemTesting

OutreachCommunication

of Findings

Market and SocialObjectives and

Constraints

Published Active Now OngoingLEGEND

• www.voipsa.org – 100 members from VoIP and security industries• VOIPSEC mailing list – www.voipsa.org/VOIPSEC/• “Voice of VOIPSA” Blog – www.voipsa.org/blog• Blue Box: The VoIP Security Podcast – www.blueboxpodcast.com• VoIP Security Threat Taxonomy• Best Practices Project underway now

Page 38: SIP Trunking & Security  in an Enterprise Network

www.voipsa.org/Resources/tools.php

© 2008 VOIPSA and Owners as Marked

Page 39: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Page 40: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Tools, tools, tools...

• UDP Flooder• IAX Flooder

• IAX Enumerator• ohrwurm RTP Fuzzer

• RTP Flooder• INVITE Flooder• AuthTool

• BYE Teardown• Redirect Poison

• Registration Hijacker• Registration Eraser• RTP InsertSound

• RTP MixSound• SPITTER

• Asteroid• enumIAX

• iWar• StegRTP

• VoiPong• Web Interface for SIP Trace• SIPScan

• SIPCrack• SiVuS

• SIPVicious Tool Suite• SIPBomber• SIPsak

• SIP bot

Page 41: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

Security Links

• VoIP Security Alliance - http://www.voipsa.org/ – Threat Taxonomy - http://www.voipsa.org/Activities/taxonomy.php

– VOIPSEC email list - http://www.voipsa.org/VOIPSEC/

– Weblog - http://www.voipsa.org/blog/

– Security Tools list - http://www.voipsa.org/Resources/tools.php

– Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com

• NIST SP800-58, “Security Considerations for VoIP Systems”– http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf

• Network Security Tools– http://sectools.org/

• Hacking Exposed VoIP site and tools– http://www.hackingvoip.com/

Page 42: SIP Trunking & Security  in an Enterprise Network

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 43: SIP Trunking & Security  in an Enterprise Network

Q&eh?

www.voipsa.org

Dan York - [email protected]


Recommended