Overlooked VoIP Security Issues? 42
penciling_in asks: "Voiponder is running an informative article identifying VoIP attacks, which are applicable to current systems but lack public awareness and are, for the most part, misunderstood. The author's primary purpose is to 'discuss two of the most well known attacks that can be carried out in current VoIP deployments. The first attack demonstrates the ability to hijack a user's VoIP Subscription and subsequent communications. The second attack looks at the ability to eavesdrop in to VoIP communications.' This leaves me begging the question: What other not-so-publicized VoIP security issues should companies be watching out for?"
Links to tools (Score:2)
http://www.vopsecurity.org/html/tools.html [vopsecurity.org]
>
http://www.vopsecurity.org.nyud.net:8090/sivus-1.0 9.exe [nyud.net]
And of course, Ethereal for packet sniffing.
It was probably a bad idea for them to link/host the spoofing tool.
I predict Slashdot will go wild with the easy-to-use GUI tool.
Re:Links to tools (Score:1)
Re:Links to tools (Score:2)
Gasp! (Score:4, Insightful)
Re:Gasp! (Score:1)
Re:Gasp! (Score:2)
Re:Cell phone calls are encrypted (sort of) (Score:1)
So the calls are encrypted over the air, but the algorithm is weakened so that it is relatively easy to break. Inside the telco's network different rules of course apply .
Re:Gasp! (Score:2)
Depends on where you live and what kind of service you have. In Georgia, you could be using a CDMA, GSM, or iDEN service. You could even have an older analog cell phone, in which case I'd recommend you get a new phone immediately. GSM in the US should be encrypted. I don't believe CDMA supports REAL e
Re:Gasp! (Score:2)
Compare this to someone using VoIP on an insecure wifi connection in a starbucks, or a hotel where
This leaves me begging the question (Score:2, Insightful)
go ahead mod me down.
Uhh... (Score:3, Insightful)
On the second one
Is anyone in the biz really unaware of this?
Re:Uhh... (Score:1, Insightful)
Further, if someone is directly in the middle of the link for your SIP conversation, use SIP over TLS and don't trust any unauthorized certs. Just like you would do with any other protocol.
Any type of DOS attack (Score:2, Redundant)
-Rick
Re:Any type of DOS attack (Score:2)
Eh? Didn't fear of "The Russians" die with Raegenism? Wolfowitz did a fine job on old Ronald - and you it would seem. Tom Clancy does keeps a few Russian snipers employed these days, but aside from this there's really there's not a whole lot scary about "The Russians" these days.
Frankly a far more realistic fear is found between Americans and their own government... America is the place where the right to personal privacy extends about
Re:Any type of DOS attack (Score:3, Interesting)
It's a common enough occurrence in digital service providers. Get a zombie net together, threaten a company with a demand they can afford, shut them down for a day, then wait for the money. The same attack style that the RIAA uses against college students. Sure, losing $3k as a student
Re:Any type of DOS attack (Score:1, Redundant)
-Rick
Oreka (Score:4, Informative)
Disclaimer: I'm lead developer on Oreka.
You can very easily record all RTP traffic on a given ethernet span to wav files on disk using a sniffing tool such as http://www.oreka.org/ [oreka.org]. Most people don't use encryption yet in the VoIP field. This will catch SIP, H.323 and Cisco Skinny traffic, i.e. most of the existing traffic except IAX (asterisk) type traffic.
Define "Ethernet span..." (Score:2)
If you mean broadcast domain, you're wrong, at least in modern switched networks. If you can find someone still running on shared media (hubs) or unencrypted WLAN, then yes, all of the traffic is accessible. Otherwise, that RTP packet isn't going to appear at the switch port you're plugged into unless you have admin access to the switch, in which case there are more serious security issues if you're a bad guy.
If you mean a SPAN (Switched Port ANalyzer, aka "mirror) port, that's
Re:Define "Ethernet span..." (Score:1)
Using ARP spoofing [wikipedia.org], you can sniff traffic of other machines on a switched network without needing admin access to the switch itself.
No, you can't... (Score:2)
LOL. An AC... (Score:2)
If you do ARP spoofing, the switch will merely update its FDB to indicate the MAC moved to a different port, and will stop forwarding to the port of the real host. You cannot use ARP spoofing to cause the same packets to appear on bothports on a properly implemented switch, a packet will be sent to one or the other. Therefore:
1. As soon as you start doing ARP spoofing, packets bound for the real VoIP client will go to the sniffer and not the client, causing severe vo
There's an unspoken assumption here. (Score:3, Insightful)
Re:There's an unspoken assumption here. (Score:1)
Sure, you'd want to infect something that's supposed to connect to the internet, so as to avoid outbound firewalls. But I don't see how VOIP software makes any better target than, say, a web browser.
Re:There's an unspoken assumption here. (Score:2)
I never said it made a better target, and I didn't mean to imply it. What I was getting at is that VOIP is another target, and that this wasn't even mentioned in the article.
Securityschmurity (Score:5, Interesting)
It's easy for someone to listen in on your phone call. All they need to do is be in a position of trust between your handset and the other person's handset. You wouldn't even know they were there. Do you really trust all the line techs and the people who run the telecoms networks not to snoop on you?
Admittedly, it's not as easy to hijack a phone line unless you are in the same position of trust. VoIP makes stealing the connection a little easier. Software faults lead the way to security issues and the ability to break into VoIP servers or just do nasty things to the data on the wire.
I liken VoIP to having a cordless phone on your line. With the right equipment I can sniff a corless phone call and play back the parts of it that tell the base station the handset wants to make a phone call. DECT is a littler harder, but apparantly still doable. If you're still using a 30MHz FM cordless phone then the right equipment is available for tens of dollars at your local rat shack!
Phil Zimmermann recently released some encrypted VoIP software that solves the eavesdropping problem with a good level of security. I can imagine that phone companies and governments will soon be trying like shit to outlaw encrypted VoIP comms because it means all those wiretaps they are so fond of doing become useless.
I trust my VoIP provider, currently. I log into their SIP server which is at the other end of my DSL connection. They are also my ISP so I know my data never leaves their network except when it is put back on the PSTN. This also has advantages for downstream QoS (they implement it for their own SIP server) so I don't ever get dropouts.
Re:Securityschmurity (Score:2)
How do you know your VoIP provider are passing your call to the PSTN - it's likely in fact that they send it over the internet to someone else closer to the final call destination who makes that final link. That's especially true for international calls.
What if the person you're calling has V
Re:Securityschmurity (Score:2)
I've heard the results -- VoIP over Speakeasy is far better and more consistent than, say, Vonage.
Re:Securityschmurity (Score:2)
And I know my ISP is putting my calls on the PSTN because I mostly make calls to PSTN numbers in my local calling area. Somewhere they have to end up on the Telstra network!
Re:Securityschmurity (Score:1)
BTW: DECT is finally coming to the USA, which is a Good Thing(sm)
Re:Securityschmurity (Score:2)
Encryption (Score:2, Interesting)
That being said, we have just switched Freeswitch [freeswitch.org] to use SRTP in the past few days, which appears to support keyed transport. Does anybody else have experience using this library and can tell about your experience encrypting SIP and/or RTP with it?
Re:Encryption (Score:1)
voip security (Score:2)
No different than wireless networking (Score:2)
If you want to secure your VoIP, there are products available from some of the equipment manufacturers that will do encryption in hardware. Even without that, if you have a way to set up a VPN tunnel the packets will essentially be encrypted from an external point of view.
Many VoIP phones have vulnerabilities... (Score:1)
Some resources to learn more about VoIP Security (Score:1)
There are a wide range of security issues related to VoIP, although many if not most of them actually are the standard threats relating to the underlying data networks. One place to learn more is the VoIP Security Alliance [voipsa.org] which last fall released a threat taxonomy [voipsa.org] that outlined threats to VoIP.
You may also find of value our weekly podcast on the subject
Theft of VoIP Service Is Easy (Score:2)
I have installed three Asterisk servers at three different
companies over the last two years. I have told everyone I
know that VoIP is the way of the future.
That said, VoIP is an emerging technology and as such its
security limitations are not fully understood nor are they
fully mediated.
Take BroadVoice (wonderful company, by the way), for
instance. They allow you to bring your own device unlike
so many other VoIP companies. You can use Asterisk with
them or