78
Ofir Arkin [email protected] Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P Why E.T. Can’t Phone Home? Security Risk Factors with IP Telephony

Ofir Arkin [email protected] Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

Embed Size (px)

Citation preview

Page 1: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

Ofir Arkin

[email protected]

Founder, The Sys-Security Group

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

Why E.T. Can’t Phone Home?Security Risk Factors with IP Telephony

Page 2: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

2

Agenda

Introduction

What is IP Telephony?

– IP Telephony Protocols

– A Generic Call Setup Process

– Different IP Telephony Architecture

Security Issues With IP Telephony based Networks

What is at Risk? – Vulnerable targets with IP Telephony based Networks

Closing Remarks

Page 3: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

3

Introduction

Privacy and Security are mandatory requirements with any telephony based network

A certain level of security has been achieved with traditional telephony based networks

IP Telephony based networks are the future of Telecommunications

But IP Telephony introduces caveats and security concerns which traditional telephony based networks do not have to deal with, long forgotten about, or learned to cope with

Page 4: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

4

Introduction

The risk factors associated with IP Telephony based networks are far greater compared to traditional telephony based networks

The risk factors are overshadowed by the technological hype and the way IP Telephony equipment manufactures pushes the technology to the masses

In some cases IP Telephony based equipment is being shipped although the manufacture is well aware of the clear and present danger to the privacy and security of the IP Telephony based network its equipment is part of

Page 5: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

5

What is IP Telephony?

Introduction

Page 6: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

6

What is IP Telephony?

IP Telephony is a technology in which IP networks are being used as the medium to transmit packetized voice

IP Telephony has numerous deployment scenarios and architectures in which the following terms are usually associated with:

– Voice over IP (VoIP) – describes an IP Telephony deployment where the IP network used as the medium to transmit voice traffic is a managed IP network

– Voice on the Net (VON) or Internet Telephony – describes an IP Telephony deployment where the IP network used as the medium to transmit voice traffic is the Internet

Page 7: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

7

What is IP Telephony?

With any IP Telephony based deployment scenario the transport medium, the IP network, is able to carry data as well as voice.

It is in contrast with the current Public Switched Telephony Network (PSTN) where voice and data are being carried on physically separated networks (with some they are being transported on the same physical medium)

The term Converged Network is used to describe networks which carry both voice and data.

Page 8: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

8

What is IP Telephony?

IP Telephony Protocols

Page 9: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

9

The IP Telephony Protocols

Signaling Protocols, performs session management and responsible for:

– Locating a user – The ability to locate the called party

– Session establishment – The ability to determine the availability of the called party as well as its willingness to participate in a call. The called party is able to accept a call, reject a call, or redirect the call to another location or service

– Session setup negotiation – The ability of the communicating parties to negotiate the set of parameters to be used during the session, this includes, but not limited to, type of media, codec, sampling rate, etc.

– Modifying a session – The ability to change a session parameter(s) during the call, such as the audio encoding, adding and/or removing a call participant, etc.

– Tearing down a session – The ability to end a call (and the session)

Page 10: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

10

The IP Telephony Protocols

Media Transport Protocols – are responsible for the digitization, encoding (and decoding), packing, packeting, reception, and ordering of voice and voice samples

Like any other application that uses IP, IP Telephony will make use of other protocols and technologies which are associated and common with any IP based network

Page 11: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

11

What is IP Telephony?

A Generic Call Setup Process

Page 12: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

12

A Generic Call Setup Process

The signaling protocol the IP Phone uses, and the IP

Telephony based network supports, will locate the

called party, either directly or by using other signaling servers on the network

The signaling protocol will be used to determine the called party’s availability and willingness to

participate in the call

If the called party accepts the call request the signaling protocol is used to negotiate the set of parameters to be used during the call (codec,

sampling rate, etc.) and a session will be established between the call participants

Page 13: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

13

Speech will be carried by a media transport protocol, such as the Real-Time transport Protocol (RTP),

which will sample the human speech with the appropriate codec according to the parameters

negotiated by the signaling protocol during the call setup process. Some, but not all, of the media

transport protocol’s operation will be controlled by the signaling protocol.

A Generic Call Setup Process

During the call, when needed, the signaling protocol will be used to change a call

parameter(s). The signaling protocol is also responsible for tearing down the call.

Signaling information sent between different participants of a call might

traverse through several signaling related servers until it reaches another

participant(s), while the packetized voice is usually sent directly between the call

participants.

Page 14: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

14

What is IP Telephony?

Different IP Telephony Architectures

Page 15: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

15

Different IP Telephony based Architectures – A Carrier

A Carrier can use IP Telephony as part of its infrastructure (i.e. core network) and/or as part of its service offerings (in the U.S.A. we can name WorldCom/MCI as an example).

Any telephony architecture which connects an IP Telephony based network(s) with the PSTN has to have elements which will translate signaling information and packetized voice between the IP Telephony IP network & the PSTN (and vice versa).

Therefore some gateways are introduced with the architecture of a Carrier which utilizes IP Telephony technology.

Page 16: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

16

Different IP Telephony based Architectures – A Carrier

A Media Gateway is a network element which converts audio signals carried on telephone

circuits into data packets carried in packet

switched networks, and vice versa

A signaling gateway is a network element which

converts SS#7 signaling information from the PSTN into formats understood by the

network elements in the IP network, and presents an accurate view of the

elements of the IP network to the SS#7

network (and vice versa)

A Media Gateway Controller (MGC) is a

network element used to control a Media Gateway

Page 17: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

17

Different IP Telephony based Architectures – A Carrier

Protocols used between a Media Gateway and

Media Gateway Controllers (i.e. MGCP,

Megaco), are also known as Gateway

Control Protocols (GCP)

Protocols used between a Media Gateway and a Signaling Gateway (i.e. SCTP, M2UA, M3UA)

Protocols used between Media Gateway

Controllers to initiate a session between users

(i.e. SIP)

Protocols used within the IP Network (i.e. SIP)

Page 18: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

18

Different IP Telephony based Architectures – A Carrier

A Carrier using IP Telephony as part of its core network and/or service offerings would enjoy significant cost savings resulting from:

– Lower equipment cost

– Lower bandwidth requirements

– The ability to introduce new services (and faster)

– Quick time-to-market

– Extreme Flexibility (compared with the PSTN; i.e. changing the codec used)

Page 19: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

19

Different IP Telephony based Architectures (ITSP)

An Internet Telephony Service Provider (ITSP) belongs to the new bread of telephony service providers.

An ITSP uses IP to provide low cost voice connections through the combinations of the Internet, leased lines, and the PSTN

An ITSP uses the Internet as the main transport medium for carrying packetized voice and signaling information to and from its subscribers.

Page 20: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

20

Different IP Telephony based Architectures (ITSP)

Both the ITSP and its subscribers will be connected to the Internet; the ITSP via a fast dedicated link(s) while the subscribers using their existing connections to the Internet (dial-up, xDSL, etc.) via different Internet Service Providers (ISPs).

A subscriber is able to use different methods in order to place a call, all requiring the subscriber to present its credentials before the call request will be processed. A subscriber is able to use a softphone, which is a telephony based application installed on a PC, an IP Phone, or any other hardware based solution (i.e. different phone adapters) to place the call.

Page 21: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

21

Different IP Telephony based Architectures (ITSP)An Example

An ITSP’s infrastructure includes support for

authentication, billing and other required

features

The ITSP uses voice gateways placed in different countries, and connected to the ITSP’s IP backbone through leased lines, as hooks to the local traditional telephony networks in the countries the voice gateways are deployed in

A voice gateway will translate the packetized voice and signaling information

carried by IP-based protocols to information that can be carried by

protocols used with traditional telephony networks and vice versa

Page 22: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

22

Different IP Telephony based Architectures (ITSP)

Because the Internet is its main medium to transmit packetized voice, an ITSP does not have to build a full blown telephony infrastructure and therefore enjoys significantly lower maintenance costs compared with traditional carriers enabling the ITSP to offer low cost long distance and international phone calls rates.

The problem with the ITSP module of operation is the usage of the Internet as “part” of the ITSP’s infrastructure, and therefore the inability to ensure quality of service (enough bandwidth, no congestion, etc.) which might lead to a reduced quality of speech.

Page 23: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

23

Different IP Telephony based Architectures (ITSP)

Some ITSPs are using the Internet to allow subscribers to connect to the service, but uses local International Telephone Carriers or other Carriers to lease international phone lines

Still, the cost for the ITSP is significantly lower then building its own infrastructure

The international leased line(s), and the SLA with the Carrier, allows the ITSP to maintain a reasonable quality-of-service

Page 24: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

24

Different IP Telephony based Architectures (ITSP)Where ITSP Security Fails

MSN Voice.NET (source – Cisco Systems)

Page 25: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

25

Different IP Telephony based Architectures – A Corporate

Instead of running two separate networks for data and voice, a corporate can use one IP based network to run both. Usually the data and voice will be virtually separated using technologies such as Virtual LANs (VLANs).

Instead of using the traditional telephone network to place calls between different corporate branches it is possible to save the long-distance charges, imposed by the PSTN, when using the same dedicated leased lines (or VPNs over the Internet) used by an organization to transmit data between its branches to carry packetized voice as well.

Page 26: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

26

Different IP Telephony based Architectures – A Corporate

Corporate employees working from remote offices will be able to easily, remotely, connect to the corporate data and voice network. It would enable remote employees to receive and make phone calls at a remote location if they are at the office using the same phone number.

Page 27: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

27

Different IP Telephony based Architectures – A Corporate

Page 28: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

28

Other Important Parameters with IP Telephony

Quality of Speech

Quality of Service

Availability

Scalability

Page 29: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

29

Security Issues With IP Telephony based Networks

Page 30: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

30

Security Issues with IP Telephony-based Networks

IP Telephony allows the terms “Phreaker” and “Hacker” to come closer then ever before because of the convergence between Telephony and IP*.

Several characteristics of IP Telephony makes it easier for a phreaker/hacker to try to compromise and/or control different aspects or parts of an IP Telephony based network.

The security threat associated with IP Telephony is far greater than with regular telephone networks. It is combined from a number of different factors that needs to be evaluated before any deployment of IP Telephony based solution.

Page 31: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

31

Security Issues with IP Telephony-based Networks

The Usage of the IP Protocol

– IP Telephony is using the IP protocol as the vessel for carrying voice; therefore it inherits the known, and unknown, security weaknesses that are associated with the IP protocol

IP Networks Are Common

– IP networks are easily accessible allowing more people to explore security issues, and for security issues to be spread when found and published. This is unlike the obscurity which characterizes the PSTN.

Page 32: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

32

Security Issues with IP Telephony-based Networks

The Signaling Information & Packetized Voice Share the Same Network

– Unlike the PSTN, where the only part of the telephony network both the signaling and voice will share is the connection between the subscriber’s phone to its telephony switch, where thereafter the signaling information will be carried on a different network physically separated from the voice* (the SS#7 network), with IP Telephony no such isolation or physical separation between signaling information and packetized voice is available, increasing the risk level of misuse.

Page 33: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

33

Security Issues with IP Telephony-based Networks

Voice & Data Share the Same Network

– With the PSTN voice and data are being carried on physically separated networks.

– Although several technologies can be used to virtually separate voice and data when they share the same IP network, such as virtual LANs (VLANs), these technologies and other measures might be bypassed and defeated increasing the risk level of misuse.

– Interference (denial-of-service, jam, etc.) with the operation of the voice network is possible utilizing the data network (and vice versa), since both virtual networks will be sharing the same network equipment.

– For example denial of service attacks launched from the data network targeting shared network equipment such as a switch.

Page 34: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

34

Security Issues with IP Telephony-based Networks

The Placement of Intelligence

– With traditional telephone networks the phones are no more than a “dumb terminal” where the telephony switch holds the actual intelligence. The phones are able to interact only with the telephony switch they are connected to.

– With some IP Telephony signaling protocols some, or all, of the intelligence is located at the end-points (IP phones, softphones, etc.).

– An end-point, using or supporting this type of a signaling protocol(s), will have the appropriate functionality and ability to interact with different IP Telephony components and services as well as different networking components within the IP Telephony based network.

– A malicious party can take advantage of this functionality…

Page 35: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

35

Security Issues with IP Telephony-based Networks

No Single Authority Controls an IP Medium

– Voice related traffic might traverse different providers which their infrastructure security is questionable (exactly like the PSTN)

The Nature of Speech

– Speech quality with IP Telephony is a function of several key factors such as latency (delay), jitter (delay variation), packet loss, and other.

– The number of factors affecting speech quality, and the different ways to stimulate those conditions, are far greater with IP Telephony based networks than with the PSTN.

Page 36: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

36

Security Issues with IP Telephony-based Networks

The IP Telephony based Network Components

– The IP Telephony Components

Combined from standard computer equipment, and in many cases built using known operating systems, which are fully functional.

The IP Telephony components interact with other computer systems on the IP network, and are more susceptible to a security breach than the equipment combining the PSTN which is usually proprietary equipment which also means its way of operation is somewhat obscure.

– The Other Components

Other common components found in any other IP network – networking components, network servers, etc.

They make another attack venue possible

Page 37: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

37

Security Issues with IP Telephony-based Networks

The IP Telephony-based Protocols

– Design without Security in mind

– Design Flaws with IP Telephony Protocols

The Supporting Protocols & Technologies

Physical Access

– Physical access to the wire, the network or to a network element(s) is usually regarded as an end-of-game scenario, a potential for total compromise.

– A malicious party gaining such a physical access will be able to have several key advantages over a similar scenario with the PSTN.

– The advantage is a direct result of the way IP networks work, the placement of intelligence with some IP Telephony based networks, and the boundaries regarding physical security and access posed with the PSTN.

Page 38: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

38

Security Issues with IP Telephony-based Networks

Page 39: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

39

Security Issues with IP Telephony-based Networks

Improper IP Telephony Network Designs

– Most of the current offered network designs for the implementation of IP Telephony based networks do not offer proper mechanisms to defeat several basic security threats to IP Telephony.

– Example I: IP Telephony based elements are not being authenticated to the network. This makes the work of the new age phreaker easier; in some cases by plugging a rogue device to the network, free phone calls can be made

Page 40: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

40

Security Issues with IP Telephony-based Networks

Improper IP Telephony Network Designs

– Example II: In many IP Telephony based networks no correlation is performed between an IP Phone’s (a user’s) physical location to the network credentials it uses.

– It is not sufficient that a network switch will be configured to use “port security” and bind the port connected to an IP Phone with the IP phone’s MAC address.

– There should be a mechanism to correlate between the credentials presented, the MAC address the phone is using and the physical port on the network switch the IP Phone is connected to

Page 41: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

41

Security Issues with IP Telephony-based Networks

Improper Adoption of Security Technologies from the IP world

– An example with Virtual Private Networks

Page 42: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

42

Security Issues with IP Telephony-based Networks

Availability, or Why Low-Tech is Very Dangerous

– No Electricity? – No Service!

Subscribers at home are in danger

No Electricity – no 911 emergency services! (a violation of the E911 regulations in the U.S.A.)

– Redundancy

Equals $$$

Different IP Telephony Architectures

Page 43: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

43

Security Issues with IP Telephony-based Networks

Non-Trusted Identities

– Without proper network designs and configuration of an IP Telephony based network, one cannot trust the identity of another call participant.

– The user’s identity, the ‘Call-ID’ information (e.g. a phone number or other means to identify a subscriber in an IP Telephony based network), with IP Telephony based networks is easily spoofed using one of a variety of methods.

– An identity related attack might occur anywhere along the route signaling information is taking between call participants.

– A malicious party might use designated software to perform digital impersonation, adding to the attacker’s arsenal of available tools.

Page 44: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

44

What is at Risk?

Page 45: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

45

What is at Risk?

Everything is at risk.

With IP Telephony there is even a greater meaning to the phrase that a security of a particular architecture is good as its weakest link.

Multiple venues exist for a malicious party to choose from in order to launch an attack against an IP Telephony based network.

Page 46: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

46

What is at Risk?

The most disturbing issue is the fact that in most cases it is only the question of subverting one network server or one IP Telephony element (e.g. IP Phones) to achieve complete control over an IP Telephony-based network or its functionality.

(*) For more information please see

http://www.sys-security.com/html/projects/VoIP.html

Page 47: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

47

Vulnerable Targets with IP Telephony-based Networks

A malicious party can take advantage of multiple attack venues when targeting an IP Telephony-based network.

Different IP Telephony based architectures will have different risk factors, but all will share the same vulnerable targets which are discussed within this section:

– The information exchanged between call participants

– Identities (spoofing)

– IP Telephony elements

– IP Telephony functionality

– Network elements, Servers, Hosts, and IP functionality within the IP Network

Page 48: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

48

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

One of the most valuable information sources for a malicious party is the information exchanged between call participants – the signaling information, controlling various aspects of a call, and the packetized voice.

The call related information exchanged between call participants is exposed to a number of possible attacks. First and foremost the information exchanged between call participants can be eavesdropped (rough devices in the network, specialized software, etc.), altered, jammed, and actively modified.

Page 49: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

49

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

The outcome of this type of attacks might lead to:

– “Call Tracking”, logging of the source and destination of all numbers being called.

– “Call Hijacking”, direct a participant or participants of a call to a node not representing an intended recipient.

– Availability related issues (i.e. denial of service)

– Privacy breaches, such as the ability to record the conversation, or even being a part of it unknowingly to the call participants, and

– Other outcomes

Page 50: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

50

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

Usually physical access to the wire (or to the equipment) will be required to perform this type of attacks.

But several scenarios exist for a malicious party to produce the same results, or even a better outcome, when compromising one of the network servers, and/or one of the IP Telephony entities within an IP Telephony network.

Page 51: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

51

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

Example: Compromising a SIP Proxy

Unauthorized Access gained to a SIP Proxy server

A malicious party will easily collect (and might also modify) information about all

signaling information exchanged between different call participants utilizing the

compromised server

Page 52: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

52

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

A malicious party might target different parts of an IP Telephony based network in order to gain physical access to the wire.

With IP Telephony based networks the ‘last mile’ and the ‘local loop’ are not the only targets for gaining physical access to the wire, but nearly the entire network.

Physical access to the wire can be achieved in creative ways taking advantage of the wrong access technologies which a provider of IP Telephony services might use.

One good example is Broadband Wireless Access networks using the Local Multipoint Distribution Service (LMDS) technology.

Page 53: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

53

Vulnerable Targets with IP Telephony-based Networks, The information exchanged between call participants

If encryption will be used between the Base Station to the residential transceiver it will cripple the connection so badly several LMDS equipment manufactures admit it is useless (price vs. performance vs. available bandwidth) when encryption is enabled.

If the link between the Base Station to the residential transceiver will not be encrypted, than any malicious party using the right equipment will be able to gain access to all call information passing through

Page 54: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

54

Vulnerable Targets with IP Telephony-based Networks, Spoofing Identities

By spoofing one or more of the following identities: a call participant, IP Telephony entity (an end-point IP Telephony device, an IP Telephony based server, etc.), network server(s) or any other network element within the IP network, a malicious party might be able to perform:

– “Call Hijacking”, call requests that will be redirected to another node instead of the intended node representing the destined participant. This might be achieved by impersonating to an end-point, registering as the destined participant with a ‘registration’ service, redirecting call requests using a signaling protocol response code(s), manipulating outgoing call requests by impersonating to an IP Telephony entity (e.g. server), etc.

– Hijacking of the signaling path, by adding a rough device to the route the signaling information takes between call participants.

Page 55: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

55

Vulnerable Targets with IP Telephony-based Networks, Spoofing Identities

– Active modifications of either the signaling information or the media exchanged between call participants

– Availability related attacks, for example, call requests that will be rejected

– Integrity and authenticity problems – The real legitimate user, which a call destined to its end-point, was hijacked, denying the conversation ever took place

Page 56: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

56

Vulnerable Targets with IP Telephony-based Networks, Spoofing Identities

– “Toll Fraud”,

A malicious party might impersonate to an IP Telephony based server and “request” an end-device to perform authentication before dealing with its requests.

IP-PBX subversion (much more interesting then doing the same things from the PSTN)

Using the end-point’s IP Telephony network credentials the malicious party will be able to authenticate to any IP Telephony based server, place free of charge phone calls, as well as the ability to perform any other functionality the end-point’s credentials allows within the IP Telephony based network (e.g. registering as the destined participant with a ‘registration’ service, performing “Call Hijacking”, etc.).

Page 57: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

57

Vulnerable Targets with IP Telephony-based Networks, Spoofing Identities

Page 58: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

58

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements

Any network device with IP telephony functionality might be a target for an attack.

If a malicious party will be able to compromise such a device an attacker will usually gain such privileges that will allow him to control any aspect of the IP Telephony related device’s functionality.

Page 59: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

59

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements

End Device

– The Cisco SIP-based IP Phone 7960 (and Cisco’s design of IP Telephony networks)

– Pingtel xpressa SIP-based IP Phones

Page 60: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

60

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Page 61: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

61

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Page 62: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

62

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

The following sequence of events takes place when a Cisco SIP-based IP Phone 7960 boots & connected to a Cisco 6500 switch:

– The firmware image stored in the Flash memory of the IP Phone is loaded.

– The IP Phone receives from the Cisco switch, via CDP, the VLAN tag to use.

– The IP Phone configures its IP related settings, either by DHCP or from its manually configured settings stored in its Flash memory. These settings include the IP Phone’s IP address, the address of the TFTP server (if any), DNS settings, etc.

Page 63: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

63

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

– The IP Phone confirms that it is running the latest firmware image. This is done by comparing its current firmware version against the firmware images stored on the root directory of the TFTP server.

– The IP Phone configures its SIP settings. If the IP Phone is using a TFTP server, the settings will be extracted from configuration files stored on it (generic to all and a specific one), otherwise local settings from Flash memory will be used.

– If the configuration files the IP Phone retrieved from the TFTP server refer to a different image version than what the IP Phone is using, it will perform a firmware upgrade. The IP Phone will download the required firmware image from the TFTP server, write the image to its Flash memory and then reboot.

Page 64: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

64

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

TFTP based attacks have several stages:

– Download the default configuration file from the TFTP server

– Gain knowledge of the MAC addresses used by IP Phones on the network

Abuse the network, or

Use remote telnet access to the IP Phone

– Download the IP Phones specific configuration files from the TFTP server

Page 65: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

65

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Abuse the Network

– If a malicious party is connected to the same distribution switch(s) as the IP Phones, the malicious party can gain knowledge of the MAC addresses of the IP Phones because a frame containing a reply from an answering device will also carry its MAC address.

– Some possible techniques for retrieving this information include: SIP INVITE request sweep; “ping sweep”; combining ARP attacks with sniffing the wire; mis-configuration issues, etc.

Page 66: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

66

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Abuse remote telnet access to the IP Phone

– A malicious party, having remote access to the IP Phone via telnet, could use the command ‘show network’ to receive information about all of the following:

Phone platform

DHCP server

IP address and subnet mask

Default gateway

IP address of the TFTP server

MAC address

Domain name, and

Phone name

Page 67: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

67

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Download the IP Phone’s specific configuration file from the TFTP server

– The MAC address of an IP Phone will probably be used to construct the filename of the specific configuration of the IP Phone. The malicious party merely needs to examine the ‘tftp_cfg_dir’ parameter within the generic configuration file to determine where the specific configuration files are stored. Retrieving the file is readily accomplished as TFTP is an unauthenticated protocol.

– The most important information stored within the specific configuration file is the credentials used by the Cisco IP Phone’s user(s) to authenticate to the IP Telephony network. These parameters are found under the ‘line’ configuration parameters: ‘linex_authname’ and ‘linex_password’.

Page 68: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

68

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

If there is no Telnet access to the IP Phone than it is also possible to:

– Brute Force Filenames on the TFTP Server

– Re-Enabling the Telnet Service

– Manipulating the Cisco SIP-based IP Phone 7960 Firmware Image

The firmware image for the Cisco SIP-based IP Phone 7960 is downloaded and installed without authentication. The firmware image is not signed in any way to verify that it is valid. Any image with a higher version number than the current one is implicitly trusted. Complicating matters, no authorization from the user is required before a new firmware image is installed. The combination of the lack of authentication and authorization of the firmware image means that an attacker with write access to the TFTP server is capable of completely controlling all aspects of the IP Phone.

Page 69: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

69

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements – Cisco SIP-based IP Phone 7960

Physical Access to the Cisco SIP-based IP Phone 7960

– A malicious party with unauthorized physical access to a Cisco SIP-based IP Phone 7960 is able to reconfigure the IP Phone’s ‘Network Settings’, and the ‘SIP Settings’, using the IP Phone’s user interface. Access to the settings is achieved using a key combination: ‘**#’ (star, star hash).

– If physical access to the Cisco SIP-based IP Phone 7960 is gained then all is possible (i.e. rebooting the phone, retrieving the MAC address, etc.)

Page 70: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

70

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Elements

IP Telephony Servers

Viruses, Worms, Malicious Code

– Example, Nimda and Cisco’s Call Manager

Page 71: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

71

Vulnerable Targets with IP Telephony-based Networks, IP Telephony Functionality

A malicious entity might choose to target a certain functionality provided by an IP Telephony entity.

By attacking the particular functionality an attacker might be able to subvert the IP Telephony network’s functionality or interfere with its availability.

Page 72: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

72

Example Solutions

Page 73: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

73

Solutions for Network Infrastructure

Layer 2 (Enterprise)

– A network switch an IP Phone is connected to must have ‘security intelligence’

– IP Phones needs to ignore GARPs (gartitus ARP)

Devices pretending to be the switch will be ignored (another MAC address)

Devices pretending to be the IP phone will be ignored if the IP phone will switch IP address automatically and will let the Telephony-based network and elements know about it

– A network switch that binds IP addresses and MAC addresses should not replace entries when other connected devices pretend to be the IP phone in which is connected on another port of the device (should be easy). The switch must maintain this state even if DHCP is involved.

Layer 3

– Limit access to the network by using authentication to the network (802.1x)

Page 74: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

74

Solutions Identity, Integrity & General Privacy

The use of:

– 802.1x (Authentication of devices to the infrastructure)

– Digital Certificates (Identity)

– Encryption! Encryption! Encryption?!?! (Integrity, Privacy)

Use secure signaling (using TLS or IPSEC)

Use SRTP (the RTP payload is encrypted)

Page 75: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

75

Solutions Identity, Integrity & General Privacy

The use of:

– Harden the IP Telephony-based Elements

Harden the IP Telephone

– Limit what a user can do with its IP Phone

– Digitally sign IP phone images

Harden the IP Telephony-based servers

– Harden the Operating System

– Apply ‘Hot Fixes’

And there are other solutions…

Page 76: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

76

Conclusion

Securing an IP Telephony based solution is not a trivial task. One must evaluate the security risks associated with an IP Telephony based solution, and try to find a proper remedy before any deployment. Asking the right questions during (and before) the design phase will save later embarrassments when the IP Telephony based solution will be deployed and operational.

It is crucial to understand the different threats with IP Telephony. New technologies and their first implementations usually suffer from poor security. It usually takes several design cycles for a new technology until an adequate level of security is achieved.

IP Telephony is still not at that stage in its development.

Page 77: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

77

Questions?

Page 78: Ofir Arkin ofir@sys-security.com Founder, The Sys-Security Group O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P© 2 0 0 2 – 2

O F I R A R K I N, F O U N D E R, T H E S Y S – S E C U R I T Y G R O U P © 2 0 0 2 – 2 0 0 4 T H E S Y S – S E C U R I T Y G R O U P

78

Resources

Advisories

– Arkin Ofir, “More Vulnerabilities with Pingtel xpressa SIP-based IP Phones”, August 2002. Available from: http://www.sys-security.com/archive/advisories/More_Vulnerabilities_with_Pingtel_xpressa_Phones.pdf

– Arkin Ofir & Anderson Josh, “Multiple Vulnerabilities with Pingtel xpressa SIP Phones”, July 2002. Available from: http://www.sys-security.com/archive/advisories/a071202-1.txt

Papers

– Arkin Ofir, “Security Risk Factors with IP Telephony based Networks”, November 2002. Available from: http://www.sys-security.com/archive/papers/Security_Risk_Factors_with_IP_Telephony_based_Networks.pdf

– Arkin Ofir, “The Cisco IP Phones Compromise”, September 2002. Available from: http://www.sys-security.com/archive/papers/The_Trivial_Cisco_IP_Phones_Compromise.pdf