http://www.whitedust.net/article/30/VoIP%20Security:%20Uncovered/
VoIP Security: Uncovered
By Mark Anderson (Tue, 26 Jul 2005 18:56:42 +0100)
VoIP, short for Voice Over IP, is an umbrella term used for thesoftware,the
hardware devices and the networking protocols that allowusers to make
telephone calls over a computer network, or over theinternet.
For some more introductory information about VoIP - click here
(http://www.voip-info.org/tiki-index.php).
There seems little doubt amongst industry experts, that VoIP usage willonly
grow over the next five to ten years. All public estimates put thegrowth
ofthe VoIP market in the billions over the coming decade.
Considerating the stability and reliability of the tradional
telephonynetworks - a product of decades of work - it seems fool hardy
toreplace it. But the main selling point of VoIP is the low cost, so
it'sroll out is most likely inevidable.
Needless to say, the majority of your long distance calls are already
handled as VoIP traffic.
Of particular relevence to most is the security of the new VoIP networks
that are beginning to spring up. This article will attempt tocover all the
most pressing security concerns regarding VoIP and it'simplementation.
Security Through Obscurity
The most obvious security issue with VoIP is the issue ofavailability, with
regards software, protocols and devices. Access tothis kind of telecom
information is rather rare and at times quiteimpossible. Security through
obscurity may be an unfavourable idea inthe IT security arena, but it has
proved very effective for telecomeproviders over the last 50 years. IP
networks are easily accessible,and receive a much higher amount of unwanted
attention that any phonenetwork ever has. This tends to make IP networks
into 'soft targets'.
Learning From The Past: PSTN
Back in the early 70's public knowledge about the traditional phonenetwork
was sparse. The telcos maintained a high degree of securitythrough
obscurity. But hobbiests (later to be called pheakers) werelearning slowly
and sharing information.
At the time, telephone voice and signaling data were transmitted acrossthe
same wires. This fact was used to lever open the telco systems aspeople
(CaptainCrunch) began to play prerecorded signalling tonesthrough their
telephone handsets to take control of telecom trucklines using everything
from plastic toy whistles to complex electronicboxs (see: red box, bluebox,
brown box, etc). Soon enough, the telco'slearned about the vulnerability
and some frantic redesigning of theproprietary protocols started.
Now days, for security reasons, all modern phone networks (PSTN:
PublicSwitching Telepone Network) seperate voice and data to
physicallyindividual network loops. This means thataccess toa telephone
does notpermit access to the signaling data. Duetothefact that VoIP sends
bothvoice and signaling data across the same network makes it a much
largertarget for hackers and pheakers.
The PSTN design facilitates physical security as the majority
ofintelligence is centrally located. Whereas with VoIP, the
intelligenceresides at the end points, either with a VoIP handset or the
soft phonesoftware.
Resiliance
When a call is placed across the PSTN, a single trunk line is setup
andbecomes dedicated to that phone call. This type of dedicated
switchingprovides a very high degree of resilience. VoIP traffic, on the
otherhand, must pass through (in most cases) several different
networkscontrolled by several distinct organizations. Certainly any
trafficbeing sent across the open Internet will have several hops
beforereaching it's destination. As Quality Of Service (QoS) cannot
beguaranteed a cross physically seperate networks, the stability andindeed
quality of VoIP calls can be easily distrupted.
While VoIP protocols attempt to smooth out problems such as audio delayor
jitter,they are certainly no match against very the most redumentaryDoS tools.
'Unacceptable speech quality is an availability problem, which jeopardizes
the critical infrastructure tag IP telephony has.'
-Ofir Arkin, Sys-Security Group
As VoIP must share network space with tradional IP and as it actuallysits
ontop of the IP protocol, it is inherently linked with thevulnerabilities
of the IP protocol. VoIP protocols by their nature areheavily time
dependant, any attempted denial of service is likely tohave a highdegree of
success.
TCP/IP Insecurity
The fact that VoIP operates across standard networks makes itvulnerable to
all manner of IP hacking - including man in the middleattacks, sniffing,
session hijacking, etc. Eaves dropping on callsignaling packets exchanged
between VoIP servers/routers and softphones may expose to attackers
valuable networking data such as useridentities or VoIP phone numbers. This
could allow an attacker to stealthe identity of the original caller.
If no traffic encryption is in place, an attacker could easily log theVoIP
traffic and relay (or evenresend) the voice data at a later date.Possibly
after doctoring it. Encrypting VoIP traffic can alliviate somerisk, and has
now been written in the protocol revisions. Of course,encyption is still a
luxury in the world of VoIP as the additionalcycles needed can of ten
affect audio quality. And where possible,encryption will always be turned
off by users infavour of call clarity.
You could consider segmenting standard network traffic from VOIPtraffic
using a virtual LAN. This can limit the threat posed bysniffing tools and
the like. VLANs can of course, also affect callquality especially across
the open internet.
The Weakest Link
Any system will be vulnerable to the architecture it's built on.This is
true ofVoIP traffic using the IP protocol, and is also true ofVoIP devices
running on top of vulnerable OS's. For instance, the CiscoCall Manager is
typically installed on Windows 2000 and the Avaya CallManager on Linux,
which means those products are vulnerable toallWindows and Linux exploits.
Originally email was trusted byallwho used it. Then it became a badidea to
open unexpected attachments. Next it became dangerous to evenopen email
from an unknowns ource. VoIP insecurity will most likelyprogress to the
point where answering an incoming call could infectyour OS with a VoIP
enabled virus.
Voice Spam
The ability to place free phone calls over IP networks willbecome automated
(soonerrather than later). This will faciliate voicespam. The medium of
email has become essentially useless for importantcommunication, due to
viruses and spammers. Unless appropriatemeasuresare developed into the core
of VoIP at this early stage, theseplagues will spread to infect the new
voice/data networks that willemerge.
VoiceSpam has already coined it's own acronym - SPIT (Spam overInternet
Telephony). And SPIT will become an issue because VoIP lacksthe inbuilt
authentication that are required to fend off such simpleattacks. This point
harks back to 'learning from the past'.
Specific Attacks
Of course, on top of the insecurities present in the design
andimplementation of VoIP networks, there are individual
vulnerabilitiespresent in VoIP devices and software.
* A model of Avaya IP phone can be rendered unstable by bombarding it
with specific IP traffic.
* Alcatel,Avaya and Cisco phones arereportedlyvulnerable to a DoS that
can betriggered by sending fragmented UDPpackets, and TCP ACK flood.
* Anydenialof service vulnerability in theunderlying Cisco IOS running
on a Gateway device could potentially beexploited to disrupt the VoIP
network. There is a variety of knowndenial of service vulnerabilitie sand
corresponding public exploits forCisco IOS.
* Inarecent test, valuable information was gatheredfrom an Avaya IP
phoneby using SNMP queries with the "public" communityname.
These are just some of the already known vulnerabilities,
experiencesuggests there are plenty more vulnerabilities in VoIP devices
andsoftware waiting to be discovered.
Somebody Call 911
Companies have learnt to accept that occasionally IP networks godown, but
heads still roll every time they do. When phone networks godown, company
executives want blood. Telephone access is certainly apart of any companies
critical infrastructure. But unlike standardtelephone systems, VoIP is
dependant both on internet access and alsoon thepower supply.
Telephones still ring in a black out (unless you use a PBX), but
inemergency situations when power goes down VoIP systems will also
fail.This of course, means that will the standard telephone networks
canroute emergency 911/999 calls - VoIP networks cannot.
Conclusion: Security Is A Process
Security for VoIP must be end-to-end. The security of theoriginating system
must be as secure as the routers and servers thatthe call must pass
through. Authentication, tunnelling, trust zones,firewalls and others
ecurity precautions can help but as discussed canalso hinder.
Ultimately I think we have the experience to hopefully learn from
themistakes ofthe past, but most likely will not. VoIP is coming, now isthe
time to worry about it's security, not after it has becomewidespread. But
do weever learn?
Further Reading
http://www.sans.org/rr/whitepapers/telephone/318.php
http://www.sys-security.net/index.php?page=voip
http://www.voipsa.org/
http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
---
You are currently subscribed to telecom-cities as: archive@mail-archive.com
To unsubscribe send a blank email to [EMAIL PROTECTED]
To set DIGEST mode and only receive one list message per day with all the daily
traffic, please visit the list website at
http://www.informationcity.org/telecom-cities