45
SIP Trunking & Security Dan York, CISSP VOIPSA Best Practices Chair September 2, 2009

SIP Trunking & Security

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SIP Trunking & Security

SIP Trunking & Security

Dan York, CISSPVOIPSA Best Practices Chair

September 2, 2009

Page 2: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Page 3: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Privacy

Compliance

Cost Avoidance

Availability

Business Continuity

Confidence

Mobility

Page 4: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Page 5: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Page 6: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Page 8: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

TDM security is relatively simple...

TDMSwitch

PSTNGateways

PhysicalWiringVoicemail

Page 9: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Voicemail PhysicalWiring

DatabasesDirectories

E-mailSystems

WebServers

VoIP security is more complex

OperatingSystems

Firewalls

DesktopPCs

Voice overIP

NetworkSwitches

WirelessDevices

PDAs

PSTNGateways

InstantMessaging

Standards

Internet

Page 10: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 11: SIP Trunking & Security

VoIP Security Concerns

Page 12: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Security concerns in telephony are not new…

Image courtesy of the Computer History Museum

Page 13: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Nor are our attempts to protect against threats…

Image courtesy of Mike Sandman – http://www.sandman.com/

Page 14: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Security Aspects of IP Telephony

Media / Voice

PSTN

CallControl

TCP/IPNetwork

Management

Policy

Page 15: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

The SIP Call Flow

Alice Bob

ProxyA

ProxyBSIP

SIP

RTP

SIP

Page 16: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

The SIP Call Flow

Alice Bob

ProxyA

ProxyBSIP

SIP

RTP

SIP

Internetor WAN

Page 17: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Media

Eavesdropping

Degraded Voice Quality

Encryption

Packet Filtering

Virtual LANs (VLANs)

Page 18: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Signaling

Denial of Service

Impersonation

Encryption

Proper ProgrammingEncrypted Phone Software

Toll Fraud

Page 19: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Management

Web InterfacesAPIs!

Encryption

Patches? We don’t need...

Change Default Passwords!

Phones!

Page 20: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

PSTN

Page 21: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Geography

Page 22: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Internet LAN

Page 23: SIP Trunking & Security

SIP Trunking

Page 24: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

PSTN

Page 25: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

CarrierNetwork

SIP Trunking

SIP ServiceProvider

IP-PBX

PSTN

Page 26: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet

The Challenge of SIP Trunking

SIP ServiceProvider

IP-PBX

PSTN

Page 27: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

PSTN

Page 28: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet

SIP Trunking - Business Continuity

SIP ServiceProvider

IP-PBX

SIP ServiceProvider

SIP ServiceProvider

PSTN

Page 29: SIP Trunking & Security

Cloud Computing

Page 30: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Geography

Page 31: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

Moving Voice Applications into “the Cloud”

ApplicationPlatform

IP-PBX

PSTN

Page 32: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

LAN

Internet / WAN

Moving Telephony into “the Cloud”

Hosted“IP-PBX”

Firewall

PSTN

Page 33: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Can you trust “the Cloud”to be there?

Page 34: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Questions for SIP Trunk Providers or Cloud Computing Platforms?

• What kind of availability guarantees / Service Level Agreements (SLAs) does the platform vendor provide?

• What kind of geographic redundancy is built into the underlying network? • What kind of network redundancy is built into the underlying network? • What kind of physical redundancy is built into the data centers?• What kind of monitoring does the vendor perform? • What kind of scalability is in the cloud computing platform? • What kind of security, both network and physical, is part of the computing

platform? • Finally, what will the vendor do if there is downtime? Will the downtime

be reflected in your bill?

Page 35: SIP Trunking & Security

Spam / SPIT

Page 36: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

What about SPIT? (“SPam over Internet Telephony”)

• What does a traditional telemarketer need?• Makes for great headlines, but not yet a significant threat • Fear is script/tool that:

– Iterates through calling SIP addresses:• [email protected], [email protected], …• Opens an audio stream if call is answered (by person or voicemail)

– Steals VoIP credentials and uses account to make calls

• Reality is that today such direct connections are generally not allowed

• This will change as companies make greater useof SIP trunking and/or directly connect IP-PBXsystems to the Internet (and allow incoming callsfrom any other IP endpoint)

• Until that time, PSTN is de facto firewall

SPAM

Page 37: SIP Trunking & Security

Resources

Page 38: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

What is the Industry Doing to Help?

Security Vendors

“The Sky Is Falling!”(Buy our products!)

VoIP Vendors

“Don’t Worry, Trust Us!”(Buy our products!)

Page 39: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Voice Over IP Security Alliance (VOIPSA)

ClassificationTaxonomy of

Security Threats

SecurityResearch

Best Practicesfor VoIPSecurity

SecuritySystemTesting

OutreachCommunication

of Findings

Market and SocialObjectives and

Constraints

Published Active Now OngoingLEGEND

• www.voipsa.org – 100 members from VoIP and security industries• VOIPSEC mailing list – www.voipsa.org/VOIPSEC/• “Voice of VOIPSA” Blog – www.voipsa.org/blog• Blue Box: The VoIP Security Podcast – www.blueboxpodcast.com• VoIP Security Threat Taxonomy• Best Practices Project underway now

Page 40: SIP Trunking & Security

www.voipsa.org/Resources/tools.php

© 2008 VOIPSA and Owners as Marked

Page 41: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Page 42: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Tools, tools, tools...

• UDP Flooder• IAX Flooder• IAX Enumerator• ohrwurm RTP Fuzzer• RTP Flooder• INVITE Flooder• AuthTool• BYE Teardown• Redirect Poison• Registration Hijacker• Registration Eraser• RTP InsertSound• RTP MixSound• SPITTER

• Asteroid• enumIAX• iWar• StegRTP• VoiPong• Web Interface for SIP Trace• SIPScan• SIPCrack• SiVuS• SIPVicious Tool Suite• SIPBomber• SIPsak• SIP bot

Page 43: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

Security Links

• VoIP Security Alliance - http://www.voipsa.org/ – Threat Taxonomy - http://www.voipsa.org/Activities/taxonomy.php– VOIPSEC email list - http://www.voipsa.org/VOIPSEC/– Weblog - http://www.voipsa.org/blog/– Security Tools list - http://www.voipsa.org/Resources/tools.php– Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com

• NIST SP800-58, “Security Considerations for VoIP Systems”– http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf

• Network Security Tools– http://sectools.org/

• Hacking Exposed VoIP site and tools– http://www.hackingvoip.com/

Page 44: SIP Trunking & Security

© 2008 VOIPSA and Owners as Marked

VoIP can be more secure than the PSTN if it is properly deployed.

Page 45: SIP Trunking & Security

Q&eh?

www.voipsa.org

Dan York - [email protected]