Practical VoIP Security

Contents Chapter 1 Introduction to VoIP Security . . . . . . . . . . . . . 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 The Switch Leaves the Basement . . . . . . . . . . . . . . . . . . . . .4 What Is VoIP? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 VoIP Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 VoIP Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 VoIP Isn’t Just Another Data Protocol . . . . . . . . . . . . . . . . .10 Security Issues in Converged Networks . . . . . . . . . . . . . . . .13 VoIP Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 A New Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .21 Chapter 2 Asterisk Configuration and Features . . . . . . 23 Introduction: What Are We Trying to Accomplish? . . . . . . . .24 What Functions Does a Typical PBX Perform? . . . . . . . . . . .24 PBX Administration . . . . . . . . . . . . . . . . . . . . . . . . . . .27 Asterisk Gateway Interface (AGI) . . . . . . . . . . . . . . .27 Asterisk Manager API . . . . . . . . . . . . . . . . . . . . . . . .27 Dial Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28 Numbering Plans . . . . . . . . . . . . . . . . . . . . . . . . . . .29 Choosing a Numbering Scale for Your Private Numbering Plan . . . . . . . . . . .31 Extensions Based on DID . . . . . . . . . . . . . . . . . . . . .33 Dialing Plan and Asterisk PBX . . . . . . . . . . . . . . . . .34 Billing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Billing Accounting with Asterisk PBX System . . . . . .35 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 xvi Contents Time-of-Day Routing . . . . . . . . . . . . . . . . . . . . . . .39 Day-of-Week Routing . . . . . . . . . . . . . . . . . . . . . . .39 Source Number Routing . . . . . . . . . . . . . . . . . . . . .39 Cost-Savings Routing . . . . . . . . . . . . . . . . . . . . . . . .39 Disaster Routing . . . . . . . . . . . . . . . . . . . . . . . . . . .39 Skill-Based Routing . . . . . . . . . . . . . . . . . . . . . . . . .40 DUNDi Routing Protocol . . . . . . . . . . . . . . . . . . . .40 Other Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Music on Hold . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Call Parking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Call Pickup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Call Recording . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 Conferencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 Direct Inward System Access . . . . . . . . . . . . . . . . . . .45 Unattended Transfer (or Blind Transfer) . . . . . . . . . . .46 Attended Transfer (or Consultative Transfer) . . . . . . .46 Consultation Hold . . . . . . . . . . . . . . . . . . . . . . . . . .46 No Answer Call Forwarding . . . . . . . . . . . . . . . . . . .46 Busy Call Forwarding . . . . . . . . . . . . . . . . . . . . . . . .46 Do Not Disturb (DND) . . . . . . . . . . . . . . . . . . . . . .47 Three-Way Calling . . . . . . . . . . . . . . . . . . . . . . . . . .48 Find-Me . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48 Call-Waiting Indication . . . . . . . . . . . . . . . . . . . . . .49 Voice Mail and Asterisk PBX . . . . . . . . . . . . . . . . . . . . . . .49 How Is VoIP Different from Private Telephone Networks? . .51 Circuit-Switched and Packet-Routed Networks Compared . . . . . . . . . . . . . . .51 What Functionality Is Gained, Degraded, or Enhanced on VoIP Networks? . . . . . . . . . . . .52 Gained Functionality . . . . . . . . . . . . . . . . . . . . . . . .52 Degraded Functionality . . . . . . . . . . . . . . . . . . . . . .54 Enhanced Functionality . . . . . . . . . . . . . . . . . . . . . .55 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .58 Contents xvii Chapter 3 The Hardware Infrastructure . . . . . . . . . . . . 59 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .60 Traditional PBX Systems . . . . . . . . . . . . . . . . . . . . . . . . . . .61 PBX Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 PBX Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64 PBX Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65 PBX Adjunct Servers . . . . . . . . . . . . . . . . . . . . . . . . . . .68 Voice Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . .69 Interactive Voice Response Servers . . . . . . . . . . . . . .70 Wireless PBX Solutions . . . . . . . . . . . . . . . . . . . . . . . . .71 Other PBX Solutions . . . . . . . . . . . . . . . . . . . . . . . . . .71 PBX Alternatives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71 VoIP Telephony and Infrastructure . . . . . . . . . . . . . . . . . . . .72 Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72 Interactive Media Service: Media Servers . . . . . . . . . .73 Call or Resource Control: Media Servers . . . . . . . . . .73 Media Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Firewalls and Application-Layer Gateways . . . . . . . . .75 Application Proxies . . . . . . . . . . . . . . . . . . . . . . . . . .76 Endpoints (User Agents) . . . . . . . . . . . . . . . . . . . . . .76 IP Switches and Routers . . . . . . . . . . . . . . . . . . . . . . . .80 Wireless Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . .80 Wireless Encryption:WEP . . . . . . . . . . . . . . . . . . . .80 Wireless Encryption:WPA2 . . . . . . . . . . . . . . . . . . .81 Authentication: 802.1x . . . . . . . . . . . . . . . . . . . . . . .82 Power-Supply Infrastructure . . . . . . . . . . . . . . . . . . . . .83 Power-over-Ethernet (IEEE 802.3af ) . . . . . . . . . . . .84 UPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Energy and Heat Budget Considerations . . . . . . . . . .85 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . .88 Chapter 4 PSTN Architecture . . . . . . . . . . . . . . . . . . . . . 91 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92 PSTN: What Is It, and How Does It Work? . . . . . . . . . . . . .92 PSTN: Outside Plant . . . . . . . . . . . . . . . . . . . . . . . . . .93 xviii Contents PSTN: Signal Transmission . . . . . . . . . . . . . . . . . . . . . .95 T1 Transmission: Digital Time Division Multiplexing 96 PSTN: Switching and Signaling . . . . . . . . . . . . . . . . . .102 The Intelligent Network (IN), Private Integrated Services, ISDN, and QSIG . . . . . .105 ITU-T Signaling System Number 7 (SS7) . . . . . . . .106 PSTN: Operational and Regulatory Issues . . . . . . . . . .110 PSTN Call Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 PSTN Protocol Security . . . . . . . . . . . . . . . . . . . . . . . . .114 SS7 and Other ITU-T Signaling Security . . . . . . . . . . .114 ISUP and QSIG Security . . . . . . . . . . . . . . . . . . . .117 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .120 Chapter 5 H.323 Architecture . . . . . . . . . . . . . . . . . . . 123 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 The H.323 Protocol Specification . . . . . . . . . . . . . . . . . .124 The Primary H.323 VoIP-Related Protocols . . . . . . . . . . .126 H.225/Q.931 Call Signaling . . . . . . . . . . . . . . . . . . . .129 H.245 Call Control Messages . . . . . . . . . . . . . . . . . . . .134 Real-Time Transport Protocol . . . . . . . . . . . . . . . . . . .136 H.235 Security Mechanisms . . . . . . . . . . . . . . . . . . . . . . .137 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .143 Chapter 6 SIP Architecture. . . . . . . . . . . . . . . . . . . . . . 145 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 Understanding SIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 Overview of SIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147 RFC 2543 / RFC 3261 . . . . . . . . . . . . . . . . . . . . .148 SIP and Mbone . . . . . . . . . . . . . . . . . . . . . . . . . . .149 OSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149 SIP Functions and Features . . . . . . . . . . . . . . . . . . . . . . . .152 User Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152 User Availability . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Contents xix User Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Session Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Session Management . . . . . . . . . . . . . . . . . . . . . . . .153 SIP URIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 SIP Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .154 SIP Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 User Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 SIP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 Stateful versus Stateless . . . . . . . . . . . . . . . . . . . . . .157 Location Service . . . . . . . . . . . . . . . . . . . . . . . . . . .157 Client/Server versus Peer-to-Peer Architecture . . . . . . .158 Client/Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158 Peer to Peer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 SIP Requests and Responses . . . . . . . . . . . . . . . . . . . .159 Protocols Used with SIP . . . . . . . . . . . . . . . . . . . . . . .162 UDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 Transport Layer Security . . . . . . . . . . . . . . . . . . . . .164 Other Protocols Used by SIP . . . . . . . . . . . . . . . . .165 Understanding SIP’s Architecture . . . . . . . . . . . . . . . . .168 SIP Registration . . . . . . . . . . . . . . . . . . . . . . . . . . .169 Requests through Proxy Servers . . . . . . . . . . . . . . .169 Requests through Redirect Servers . . . . . . . . . . . . .170 Peer to Peer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171 Instant Messaging and SIMPLE . . . . . . . . . . . . . . . . . . . . .172 Instant Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . .172 SIMPLE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .180 Chapter 7 Other VoIP Communication Architectures . 183 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 Skype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 Skype Protocol Design . . . . . . . . . . . . . . . . . . . . . . . .186 Skype Messaging Sequence . . . . . . . . . . . . . . . . . . . . . . . .186 Skype Protocol Security . . . . . . . . . . . . . . . . . . . . . . .189 xx Contents H.248 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190 H.248 Protocol Design . . . . . . . . . . . . . . . . . . . . . . . .191 H.248 Messaging Sequence . . . . . . . . . . . . . . . . . . . . . . . .193 H.248 Protocol Security . . . . . . . . . . . . . . . . . . . . . . .194 IAX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195 IAX Protocol Design . . . . . . . . . . . . . . . . . . . . . . . . . .195 IAX Messaging Sequence . . . . . . . . . . . . . . . . . . . . . . . . .195 IAX Protocol Security . . . . . . . . . . . . . . . . . . . . . . . . .197 Microsoft Live Communication Server 2005 . . . . . . . . . . .197 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199 MLCS Protocol Design . . . . . . . . . . . . . . . . . . . . . . . .199 MLCS Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .200 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .203 Chapter 8 Support Protocols . . . . . . . . . . . . . . . . . . . . 205 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206 DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206 DNS Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 Fully Qualified Domain Name (FQDN) . . . . . . . . .208 DNS Client Operation . . . . . . . . . . . . . . . . . . . . . .209 DNS Server Operation . . . . . . . . . . . . . . . . . . . . . .211 Security Implications for DNS . . . . . . . . . . . . . . . . . . .212 TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .212 TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .213 TFTP File Transfer Operation . . . . . . . . . . . . . . . . .214 Security Implications for TFTP . . . . . . . . . . . . . . . . . .215 HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216 HTTP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .216 HTTP Client Request . . . . . . . . . . . . . . . . . . . . . .217 HTTP Server Response . . . . . . . . . . . . . . . . . . . . .217 Security Implications for HTTP . . . . . . . . . . . . . . . . .218 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219 SNMP Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . .219 SNMP Operation . . . . . . . . . . . . . . . . . . . . . . . . . .220 Contents xxi SNMP Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . .221 DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 DHCP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . .222 DHCP Operation . . . . . . . . . . . . . . . . . . . . . . . . . .223 Security Implications for DHCP . . . . . . . . . . . . . . . . .224 RSVP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .225 RSVP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .226 RSVP Operation . . . . . . . . . . . . . . . . . . . . . . . . . .227 Security Implications for RSVP . . . . . . . . . . . . . . . . . . . . .228 SDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228 SDP Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . .229 SDP Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230 Security Implications for SDP . . . . . . . . . . . . . . . . . . .231 Skinny . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 Skinny Specifications . . . . . . . . . . . . . . . . . . . . . . . . . .232 Skinny Operation . . . . . . . . . . . . . . . . . . . . . . . . . .232 Security Implications for Skinny . . . . . . . . . . . . . . . . .233 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .237 Chapter 9 Threats to VoIP Communications Systems 239 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .240 Denial-of-Service or VoIP Service Disruption . . . . . . . . . .240 Call Hijacking and Interception . . . . . . . . . . . . . . . . . . . . .248 ARP Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251 H.323-Specific Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . .256 SIP-Specific Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . .257 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .258 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .261 Chapter 10 Validate Existing Security Infrastructure 263 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .264 Security Policies and Processes . . . . . . . . . . . . . . . . . . . . .265 Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .277 Perimeter Protection . . . . . . . . . . . . . . . . . . . . . . . . . .279 xxii Contents Closed-Circuit Video Cameras . . . . . . . . . . . . . . . .279 Token System . . . . . . . . . . . . . . . . . . . . . . . . . . . . .280 Wire Closets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281 Server Hardening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281 Eliminate Unnecessary Services . . . . . . . . . . . . . . . . . .282 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .283 Permission Tightening . . . . . . . . . . . . . . . . . . . . . . . . .284 Additional Linux Security Tweaks . . . . . . . . . . . . . . . .287 Activation of Internal Security Controls . . . . . . . . . . . .289 Security Patching and Service Packs . . . . . . . . . . . . . . .293 Supporting Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294 DNS and DHCP Servers . . . . . . . . . . . . . . . . . . . .294 LDAP and RADIUS Servers . . . . . . . . . . . . . . . . . .296 NTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .297 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .297 SSH and Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . .298 Unified Network Management . . . . . . . . . . . . . . . . . . . . .299 Sample VoIP Security Policy . . . . . . . . . . . . . . . . . . . .300 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300 Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301 Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . .301 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301 Softphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .301 Layer 2 Access Controls . . . . . . . . . . . . . . . . . . . . . .302 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .304 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .306 Chapter 11 Confirm User Identity . . . . . . . . . . . . . . . . 309 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .310 802.1x and 802.11i (WPA2) . . . . . . . . . . . . . . . . . . . . . . .313 802.1x/EAP Authentication . . . . . . . . . . . . . . . . . . . . .315 Supplicant (Peer) . . . . . . . . . . . . . . . . . . . . . . . . . .315 Authenticator . . . . . . . . . . . . . . . . . . . . . . . . . . . . .315 Authentication Server . . . . . . . . . . . . . . . . . . . . . . .315 EAP Authentication Types . . . . . . . . . . . . . . . . . . . . . .319 Contents xxiii EAP-TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322 EAP-PEAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322 EAP-TTLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .322 PEAPv1/EAP-GTC . . . . . . . . . . . . . . . . . . . . . . . .323 EAP-FAST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 LEAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 EAP-MD-5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323 Inner Authentication Types . . . . . . . . . . . . . . . . . . .324 Public Key Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . .327 Public Key Cryptography Concepts . . . . . . . . . . . . . . .328 Architectural Model and PKI Entities . . . . . . . . . . . . . .330 Basic Certificate Fields . . . . . . . . . . . . . . . . . . . . . . . . .332 Certificate Revocation List . . . . . . . . . . . . . . . . . . . . .333 Certification Path . . . . . . . . . . . . . . . . . . . . . . . . . . . .334 Minor Authentication Methods . . . . . . . . . . . . . . . . . . . . .335 MAC Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .335 MAC Authentication . . . . . . . . . . . . . . . . . . . . . . .335 ARP Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . .336 Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . .336 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .337 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .338 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .339 Chapter 12 Active Security Monitoring . . . . . . . . . . . . 343 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344 Network Intrusion Detection Systems . . . . . . . . . . . . . . . .346 NIDS Defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346 Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346 Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .348 Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .349 Important NIDS Features . . . . . . . . . . . . . . . . . . . . . .353 Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 Extensibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .353 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .354 xxiv Contents Honeypots and Honeynets . . . . . . . . . . . . . . . . . . . . . .354 Host-Based Intrusion Detection Systems . . . . . . . . . . . . . .355 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356 Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .358 Penetration and Vulnerability Testing . . . . . . . . . . . . . . . . .360 What Is a Penetration/Vulnerability Test? . . . . . . . . . . .361 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .362 Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .362 Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .363 Vulnerability Assessment . . . . . . . . . . . . . . . . . . . . .364 Exploitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .368 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .370 Chapter 13 Logically Segregate Network Traffic. . . . . 373 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .374 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .375 VLAN Security . . . . . . . . . . . . . . . . . . . . . . . . . . .378 VLANs and Softphones . . . . . . . . . . . . . . . . . . . . . .379 QoS and Traffic Shaping . . . . . . . . . . . . . . . . . . . . . . . . . .380 NAT and IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . .382 How Does NAT Work? . . . . . . . . . . . . . . . . . . . . . . . .383 NAT Has Three Common Modes of Operation . . . .385 NAT and Encryption . . . . . . . . . . . . . . . . . . . . . . .388 NAT as a Topology Shield . . . . . . . . . . . . . . . . . . . .391 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .392 A Bit of Firewall History . . . . . . . . . . . . . . . . . . . . . . .392 Shallow Packet Inspection . . . . . . . . . . . . . . . . . . . .392 Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . .393 Medium-Depth Packet Inspection . . . . . . . . . . . . . .393 Deep Packet Inspection . . . . . . . . . . . . . . . . . . . . . .394 VoIP-Aware Firewalls . . . . . . . . . . . . . . . . . . . . . . . . .396 H.323 Firewall Issues . . . . . . . . . . . . . . . . . . . . . . .396 SIP Firewall Issues . . . . . . . . . . . . . . . . . . . . . . . . . .399 Contents xxv Bypassing Firewalls and NAT . . . . . . . . . . . . . . . . .400 Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . .403 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .406 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .409 Chapter 14 IETF Encryption Solutions for VoIP . . . . . 411 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 Suites from the IETF . . . . . . . . . . . . . . . . . . . . . . . . . . . .412 S/MIME: Message Authentication . . . . . . . . . . . . . . . . . . .414 S/MIME Messages . . . . . . . . . . . . . . . . . . . . . . . . . . .416 Sender Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .416 Receiver Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .417 E-mail Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .417 TLS: Key Exchange and Signaling Packet Security . . . . . . .417 Certificate and Key Exchange . . . . . . . . . . . . . . . . . . .418 SRTP:Voice/Video Packet Security . . . . . . . . . . . . . . . . .420 Multimedia Internet Keying . . . . . . . . . . . . . . . . . . . . .421 Session Description Protocol Security Descriptions . . .421 Providing Confidentiality . . . . . . . . . . . . . . . . . . . . . . .422 Message Authentications . . . . . . . . . . . . . . . . . . . . . . .422 Replay Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . .423 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .425 IETF RFCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .425 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .428 Chapter 15 Regulatory Compliance. . . . . . . . . . . . . . . 431 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .432 SOX: Sarbanes-Oxley Act . . . . . . . . . . . . . . . . . . . . . . . . .434 SOX Regulatory Basics . . . . . . . . . . . . . . . . . . . . . . . .434 Direct from the Regulations . . . . . . . . . . . . . . . . . .434 What a SOX Consultant Will Tell You . . . . . . . . . . .437 SOX Compliance and Enforcement . . . . . . . . . . . . . . .440 Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .440 Enforcement Process and Penalties . . . . . . . . . . . . . .441 GLBA: Gramm-Leach-Bliley Act . . . . . . . . . . . . . . . . . . . .441 GLBA Regulatory Basics . . . . . . . . . . . . . . . . . . . . . . .442 xxvi Contents Direct from the Regulations . . . . . . . . . . . . . . . . . .442 What a Financial Regulator or GLBA Consultant Will Tell You . . . . . . . . . . . . . .447 GLBA Compliance and Enforcement . . . . . . . . . . . . . .450 No Certification . . . . . . . . . . . . . . . . . . . . . . . . . . .450 Enforcement Process and Penalties . . . . . . . . . . . . . .450 HIPAA: Health Insurance Portability and Accountability Act . . . . . . . . . . . . . . . . . . . . . . . . . . .451 HIPAA Regulatory Basics . . . . . . . . . . . . . . . . . . . . . .451 Direct from the Regulations . . . . . . . . . . . . . . . . . .452 What a HIPAA Consultant Will Tell You . . . . . . . . .459 HIPAA Compliance and Enforcement . . . . . . . . . . . . .460 No Certification . . . . . . . . . . . . . . . . . . . . . . . . . . .460 Enforcement Process and Penalties . . . . . . . . . . . . . .460 CALEA: Communications Assistance for Law Enforcement Act . . . . . . . . . . . . . . . . . . . . . . . . .461 CALEA Regulatory Basics . . . . . . . . . . . . . . . . . . . . . .464 Direct from the Regulations . . . . . . . . . . . . . . . . . .465 What a CALEA Consultant Will Tell You . . . . . . . . .477 CALEA Compliance and Enforcement . . . . . . . . . . . . .478 Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 Enforcement Process and Penalties . . . . . . . . . . . . . .479 E911: Enhanced 911 and Related Regulations . . . . . . . . . .479 E911 Regulatory Basics . . . . . . . . . . . . . . . . . . . . . . . .480 Direct from the Regulations . . . . . . . . . . . . . . . . . .480 What an E911 Consultant Will Tell You . . . . . . . . . .485 E911 Compliance and Enforcement . . . . . . . . . . . . . . .486 Self-Certification . . . . . . . . . . . . . . . . . . . . . . . . . .486 Enforcement Process and Penalties . . . . . . . . . . . . . .486 EU and EU Member Sates’ eCommunications Regulations 486 EU Regulatory Basics . . . . . . . . . . . . . . . . . . . . . . . . .487 Direct from the Regulations . . . . . . . . . . . . . . . . . .488 What an EU Data Privacy Consultant Will Tell You .492 EU Compliance and Enforcement . . . . . . . . . . . . . . . .493 No Certification . . . . . . . . . . . . . . . . . . . . . . . . . . .493 Contents xxvii Enforcement Process and Penalties . . . . . . . . . . . . . .493 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .494 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .494 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .496 Chapter 16 The IP Multimedia Subsystem: True Converged Communications . . . . . . 499 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .500 IMS Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501 Access Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501 Core Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502 User Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502 Call/Session Control . . . . . . . . . . . . . . . . . . . . . . . . . .502 Application Servers . . . . . . . . . . . . . . . . . . . . . . . . . . .503 Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .504 Breakout Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . .505 Application Level Gateway . . . . . . . . . . . . . . . . . . . . . .505 Communication Flow in IMS . . . . . . . . . . . . . . . . . . . . . .505 IMS Security Architecture . . . . . . . . . . . . . . . . . . . . . . . . .506 IMS Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .510 SIP Security Vulnerabilities . . . . . . . . . . . . . . . . . . . . .510 Registration Hijacking . . . . . . . . . . . . . . . . . . . . . .511 IP Spoofing/Call Fraud . . . . . . . . . . . . . . . . . . . . . .511 Weakness of Digest Authentication . . . . . . . . . . . . .511 INVITE Flooding . . . . . . . . . . . . . . . . . . . . . . . . .511 BYE Denial of Service . . . . . . . . . . . . . . . . . . . . . .511 RTP Flooding . . . . . . . . . . . . . . . . . . . . . . . . . . . .512 Spam over Internet Telephony (SPIT) . . . . . . . . . . .512 Early IMS Security Issues . . . . . . . . . . . . . . . . . . . . . . .512 Full IMS Security Issues . . . . . . . . . . . . . . . . . . . . . . .513 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .514 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .514 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .515 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .517 Chapter 17 Recommendations . . . . . . . . . . . . . . . . . . 519 Reuse Existing Security Infrastructure Wisely . . . . . . . . . .522 xxviii Contents Server hardening . . . . . . . . . . . . . . . . . . . . . . . . . . .524 Supporting Services . . . . . . . . . . . . . . . . . . . . . . . .524 Combine Network Management Tools and Operations . . . . . . . . . . . . .524 Confirm User Identity . . . . . . . . . . . . . . . . . . . . . . . . . . .525 802.1x and 802.11i . . . . . . . . . . . . . . . . . . . . . . . . .527 Public Key Infrastructure . . . . . . . . . . . . . . . . . . . . .527 Active Security Monitoring . . . . . . . . . . . . . . . . . . . . . . . .528 NIDS and HIDS . . . . . . . . . . . . . . . . . . . . . . . . . .528 Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529 Penetration and Vulnerability Testing . . . . . . . . . . . .529 Logically Segregate VoIP from Data Traffic . . . . . . . . . . . . .530 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .530 QoS and Traffic Shaping . . . . . . . . . . . . . . . . . . . . .532 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .532 NAT and IP Addressing . . . . . . . . . . . . . . . . . . . . .534 Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . .534 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535 Regulations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .536 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .537 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . .540 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . .546 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549

pdf592 trang | Chia sẻ: banmai | Lượt xem: 2211 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Practical VoIP Security, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
rn off SNMP if you can. If not, ensure that community strings are com- plex. 24. Use IPSec or Secure Shell (SSH) for all remote management and auditing access. www.syngress.com 538 Chapter 17 • Recommendations 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 538 25. Forge strong relationships with your ISPs to defend against external DoS attacks. 26. VoIP components should reside on a separate voice VLAN. 27. VoIP VLAN ports that are not in use should be disabled. 28. If VoIP phones contain a built-in data network port, disable the port when not in use, and if it is use, the port must be configured on the appropriate data VLAN. 29. Approval prior to the use of any IP softphone agent software must be authorized. 30. Personal installation and use of private softphones are prohibited. 31. All softphones must utilize a separate dedicated NIC for VoIP VLAN access. 32. Ensure that all IP phones and softphones are both: VLAN aware and reside in the voice VLAN. 33. All VoIP security perimeter firewalls should be dedicated to VoIP traffic to reduce transmission latency caused by processing latency. 34. The network time protocol (NTP port 123) should be blocked at the secu- rity perimeter. Local NTP clients should receive clock information from a local Stratum 2, 3, or 4 clock source. 35. All HTTP connections to VoIP security perimeter firewalls for administra- tive/management purposes must be tunneled through a VPN or use secure HTTPS. 36. Critical VoIP servers must be secured in compliance with applicable guide- lines. 37. All remote administrative connections to critical VoIP servers must be encrypted. 38. All VoIP traffic that is sent over a public IP network (i.e., Internet,) is encrypted. 39. Ensure that the server hosting the voice-mail service is properly hardened and secured. 40. If wireless VoIP (VoWLAN) is used, all of the aforementioned requirements apply. www.syngress.com Recommendations • Chapter 17 539 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 539 41. No VoIP systems IP phones, softphones, VoIP-related server hardware and software, or networks will be put into operation without certification that they have complied in every manner with the aforementioned recommendations. Solutions Fast Track Reuse Existing Security Infrastructure Wisely  A security policy provides the framework, justification, and metrics for all other security-related development.  A policy that is not consistently enforced is worse than having no policy at all.  The most important step in security policy practices is communicating the policy contents to everyday users—these “human firewalls” are the best security investment an organization can make.  Upgrading a data network to a data and VoIP network is an ideal time to reexamine and revamp the security state of your support infrastructure.  Require more than one type of authentication for access into critical areas.  Remember to lock doors and windows.  Turn off all unnecessary services and listening daemons.  The risk of implementing the service pack or security patch should ALWAYS be LESS than the risk of not implementing it.  If you make the effort to generate log files, then review them regularly. Logged data are a great resource for understanding the day-to-day operation of your infrastructure.  If possible, dedicate your support infrastructure components to either data or VoIP networks, but not both.  Ensure that multiple DHCP servers do not coexist in the same broadcast domain.  Ensure that SNMP community strings are not set to default values.  Replace telnet with SSH at every opportunity. www.syngress.com 540 Chapter 17 • Recommendations 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 540  Delay, jitter, and packet loss are the major network variables that impact VoIP quality.  Always segregate management traffic on a dedicated, secure management network. Confirm User Identity  Authentication is made up of three factors:“something you have” (a key or certificate),“something you know” (a password or secret handshake), and/or “something you are” (a fingerprint or iris pattern).Authentication mechanisms validate users by one or a combination of these.  The 802.1x protocol defines port-based network access control that is used to provide authenticated network access.  EAP (Extensible Authentication Protocol) is a general authentication protocol that provides a framework for multiple authentication methods.  Most of the more recent EAP types are made up of two components: an outer and an inner authentication type.  The three components of an 802.1x infrastructure are the supplicant (client), the authenticator (NAS), and the authentication server (normally a RADIUS server).  802.11i is also known as WPA2.  Within the PKI framework, who you are is defined by the private keys you possess.  The fact that the same key is used for both encryption and decryption determines a symmetric exchange.  PKI relies on a public/private key combination.  Public and private keys are mathematical entities that are related. One key is used to encrypt information, and only the related key can decrypt that same information; however, if you know one of the keys, it is computationally unfeasible to calculate the other.  The private key is also used to digitally sign the sent message so that the sender’s identity is guaranteed. www.syngress.com Recommendations • Chapter 17 541 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 541  Information security is often defined as a number of layers.The basis for this is the idea that every time and place a logical or physical impediment can be created that might reasonably stop an attacker (without hindering normal users’ access to network resources) it should be done.  A basic security rule is that endpoints cannot be trusted until the identity of the endpoint is confirmed or authenticated.  In the case of VoIP, a method for authentication of IP phones is the hardware or MAC address. Active Security Monitoring  A network intrusion detection system (NIDS) is designed to alert administrators when malicious or illegitimate traffic is detected.  A networkk-based IDSs can monitor an entire large network with only a few well-situated nodes or devices and impose little overhead on a network.  NIDSs are normally classified according to the methods they use for attack detection; either as signature-based, or anomaly detection.  NIDS should be located where they can most effectively monitor critical traffic.  Communication between the IDS components (sensors and management console) should be encrypted using strong authentication.  A host-based IDS (HIDS) consists of applications that operate on information collected from individual computer systems.  Tripwire is the reference model for many of the follow-on HIDS.  Most HIDS software establishes a “digital inventory” of files and their attributes in a known state and use that inventory as a baseline for monitoring any system changes.  The key to successful log analysis is to adopt the proper tools for your environment to automatically parse, visualize, and report summarized log data. www.syngress.com 542 Chapter 17 • Recommendations 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 542  Syslog messages use UDP/514 for transport.  The syslog protocol provides a transport to allow a machine to send event notification messages across IP networks to event message collectors, also known as syslog servers.  Syslog messages (ASCII-based) may be sent to local logs, a local console, a remote syslog server, or a remote syslog relay.  The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices.  An SNMP network normally consists of three key components: managed devices, agents, and network-management systems.  If you must use SNMP, immediately change the values of the default read/write community strings.  Penetration/vulnerability tests are useful tools for determining the current security posture of an organization.  Penetration tests (pen-tests) usually refer to tests against perimeter defenses, whereas vulnerability testing refers to tests against specific systems (host, applications, or networks).  The results of a penetration/vulnerability test reflect the security status only during the testing period. Even minor administrative and architectural changes to the environment performed only moments after a penetration test can alter the system’s security profile. Logically Segregate VoIP from Data Traffic  Separate voice and data traffic via VLANs.  VLANs provide security and make smaller broadcast domains by creating logically separated subnets.  Disable unused ports and put them in a unique unused VLAN.This is a simple but effective means to prevent unauthorized access. www.syngress.com Recommendations • Chapter 17 543 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 543  For a good discussion of L2 access controls see: www.cisco.com/en/US/products/hw/switches/ps708/products_white_pap er09186a008013159f.shtml.  QoS and traffic shaping VoIP have strict performance requirements.  VoIP quality is negatively affected by increased latency, jitter, and packet loss.  QoS can provide some security against DoS attacks.  Network address translation (NAT) is a method for rewriting the source and/or destination addresses of IP packet.  NAT also rewrites TCP and UDP checksums based on a pseudo-header  Hosts behind a NAT device do not have true end-to-end Internet connectivity and cannot directly participate in Internet protocols that require initiation of TCP connections from outside the NAT device, or protocols that split signaling and media into separate channels.  The key to the incompatibility of NAT and the IPsec AH mode is the presence of the Integrity Check Value (ICV).  NAT provides a security function by segregating private hosts from the publicly routed Internet.  Firewall mechanisms include packet filtering, stateful inspection, application-layer gateways, and deep packet inspection.  Packet-filtering firewalls inspect only a few header fields in order to make processing decisions.  Application-layer gateways provide intermediary services for hosts that reside on different networks, while maintaining complete details of the TCP connection state and sequencing.  Deep packet inspection analyzes the entire packet, and may buffer, assemble, and inspect several related packets as part of a session. www.syngress.com 544 Chapter 17 • Recommendations 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 544  H.323 calls are difficult to firewall because IP addresses and ports are embedded in each previous packet stream, because packets are ASN.1 PER encoded, and because media and signaling take place on different channels—some of which are dynamically created.  When used as a VoIP application, SIP is difficult to firewall because NAT often hides the “real” IP address of endpoints, and because, media and signaling take place on different channels—some of which are dynamically created.  Access control lists (ACLs) are tablelike data structures.  A general rule-of-thumb is that outbound ACLs are more efficient than inbound ACLs.  ACLs provide extremely granular control of traffic streams if configured correctly. www.syngress.com Recommendations • Chapter 17 545 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 545 Q: What’s the difference between a network intrusion detection system (NIDS) and a host-based intrusion detection system (HIDS)? A: A NIDS inspects all inbound and outbound network activity and identifies patterns of packet data that may indicate a network or system attack.A HIDS, on the other hand, normally resides as an application on the server that it monitors. Q: What is the Windows equivalent of syslog? A: Windows doesn’t really have a native equivalent.The eventlog service enables event log messages issued by Windows-based programs and components to be viewed in Event Viewer. Q: I’ve setup to log to syslog, but it’s not working. What should I do? A: Make sure you have an entry in your syslog.conf file to save the apropriate messages. Don’t forget to send a SIGHUP to your syslogd so that it re-reads its conf file.Also, remember that syslogd does not create log files.You need to create the file before syslogd will log to it (i.e.: touch /var/log/myfile). Q: If you have multiple security devices reporting to a remote syslog server, what is the best way to parse or separate the logs? A: Log parsing is difficult to do in an efficient, scalable manner.A number of commercial products claim to parse various formats and store the informa- tion in a backend database.There are numerous open source log parsing pro- jects at Freshmeat or SourceForge.Also simple shell, awk, or perl scripts can be used. www.syngress.com 546 Chapter 17 • Recommendations Frequently Asked Questions The following Frequently Asked Questions, answered by the authors of this book, are designed to both measure your understanding of the concepts presented in this chapter and to assist you with real-life implementation of these concepts. To have your questions about this chapter answered by the author, browse to www.syngress.com/solutions and click on the “Ask the Author” form. 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 546 Q: Should my company be running its own honeypot or honeynet? A: Probably not. Most organizations still have problems completing and main- taining basic security controls. Honeypots and honeynets are primarily learning tools. Most honeynets are run in academia, the military, and govern- ment. Q: I’m looking for a utility that enables me to change community names on multiple devices from a single management console. Where can I find one? A: Because the methodology for setting community strings is not standardized, every type of device/agent version may have a different mechanism for han- dling this chore.Therefore, there are no “single console” products for setting community strings. For this to be feasible, you would have to be able to dif- ferentiate every agent type, and know how that particular vendor/system/agent handles it. Q: What is RMON? A: The Remote Network Monitoring MIB is a SNMP MIB for remote man- agement of networks.Although other MIBs usually are created to support a network device whose primary function is other than management, RMON was created to provide management of a network. RMON is one of the many SNMP based MIBs that are on the IETF Standards track. Q: What are red-teams or blue-teams? A: In penetration testing, a red-team approach means that the testers adopt a stealthy posture—that is, they take on the role of untrusted attacker attempting to sneak into the network. Blue-team signifies an approach where the tester is an insider, and test tool collateral “noise” is not an issue. www.syngress.com Recommendations • Chapter 17 547 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 547 372_PRAC_VoIP_17.qxd 3/2/06 1:00 PM Page 548 549 Index 802.1 standard. See IEEE 802.1 standard A AAA (authentication, authorization, and accounting), 296, 317, 503 access control lists (ACLs), 403–405 ACK SIP signaling command, 159 ACLs (access control lists), 403–405 active security monitoring host-based intrusion detection systems, 355–356 network intrusion detection systems, 346–355 overview, 344–345, 528 penetration/vulnerability testing, 360–366 system logging, 356–359 address resolution protocol (ARP) caching addresses, 251 overview, 250 spoofing, 251–256, 336 Admission Confirm (ACF) message, 133 Admission Reject (ARJ) message, 133 Admission Request (ARQ) message, 133 Advanced Encryption Standard (AES), 314 AES (Advanced Encryption Standard), 314 AGI (Asterisk Gateway Interface), 27 AH (Authentication Header) protocol, 388–391 AIM (America Online Instant Messenger). See instant messaging (IM) ALGs (application-layer gateways), 11, 75, 76, 393–394, 505 Alliance for Telecommunications Industry Solutions (ATIS), 117 analog lines, 62, 63 Analog Telephony Adapter (ATA), 75, 295 analog-to-digital conversion, 97, 98 ANI (Automatic Number Identification), 107, 108, 117, 256 Application layer, OSI, 150, 151 application-layer gateways (ALGs), 11, 75, 76, 393–394, 505 application proxies, 21, 76 application servers (AS), 503–504 ARP (address resolution protocol) caching addresses, 251 overview, 250 spoofing, 251–256, 336 AS (application servers), 503–504 ASN.1 notation, 130–131, 141 Asterisk Gateway Interface (AGI), 27 Asterisk Manager API, 27–28 Asterisk PBX software billing, 35–38 call parking feature, 41–42 conferencing feature, 44–45 dial plan, 34–35 Do Not Disturb feature, 47–48 DUNDi routing protocol, 40 and Open Source, 66–67 overview, 26–27 voice mail and, 49–51 ATA (Analog Telephony Adapter), 75, 295 ATIS (Alliance for Telecommunications Industry Solutions), 117 AT&T, 110–111 attended transfers, 46 authentication. See also IEEE 802.1 standard EAP types, 319–327 inner types, 324–326 and Internet mail (See S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol) outer types, 319–323 overview, 310–313 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 549 550 Index passwords as, 324 servers, 315–316 Authentication Header (AH) protocol, 388–391 authenticators, defined, 315 authorization, 82–83 Automatic Number Identification (ANI), 107, 108, 117, 256 B Bank of America, 3 Bellovin, Steve, 392 BGCF (Breakout Gateway Control Function), 505 billing and Asterisk PBX system, 35–38 open source solutions, 38 overview, 35 postpaid, 37–38 prepaid, 37–38 biometric devices, 280 blind transfer, 46 blueboxing, 103–104 bots, 242 Breakout Gateway Control Function (BGCF), 505 buddy lists, 174 busy call forwarding, 46 BYE SIP signaling command, 160 C cabling, 93–95 cache poisoning, 251–256 CALEA (Communications Assistance for Law Enforcement Act) certification, 478 compliance and enforcement, 478–479 core IP system issues, 478 defined, 461 and FCC, 471–477 overview, 461–464 regulatory basics, 464–477 role of consultants, 477–478 and Telecommunications Industry Association, 470–471 timeline, 463 and VoIP networks, 401 and XBox, 462 Call Detail Recording (CDR), 71 call forwarding, 46 call interception, 248–256 call parking, 41–42 call recording, 43 Call/Session Control Function (CSCF), 502–503, 505, 506, 507–510 call sniffers, 14 call-waiting indication, 49 Caller ID, 108, 256 CANCEL SIP signaling command, 160 CAs. See certification authorities (CAs) CCITT. See ITU-T signaling systems CCS (Common Channel Signaling), 107 Centrex, 60, 71 CERT, 244 certificate revocation lists (CRLs), 331, 332, 333 certification authorities (CAs), 331, 418–420 certification paths, 334–335 Challenge Handshake Authentication Protocol (CHAP), 321, 326. See also MS-CHAP authentication type challenge/response tokens, 280 CHAP (Challenge Handshake Authentication Protocol), 321, 326. See also MS-CHAP authentication type Choicepoint, 2 CIA triad (confidentiality, integrity, and availability), 13 circuit-switched networks vs. packet-routed networks, 51–52 Cisco Systems. See Skinny protocol 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 550 Index 551 CLASS (Custom Local Area Signaling Services), 107, 117 Client error (4xx) SIP response code, 160, 161–162 client/server architecture, 158–159 closed-circuit video cameras, 279–280 codecs G.700 series, 127 Common Channel Signaling (CCS), 107 Communications Assistance for Law Enforcement Act. See CALEA (Communications Assistance for Law Enforcement Act) consultation holds, 46 consultative transfers, 46 converged networks, 6. See also VoIP new security paradigm for, 16–17 security issues, 13–16 cost-savings routing, 39 CRLs (certificate revocation lists), 331, 332, 333 cryptography. See PKI (public key infrastructure) CSCF (Call/Session Control Function), 502–503, 505, 506, 507–510 Custom Local Area Signaling Services (CLASS), 107, 117 CVE (Common Vulnerabilities and Exposures), 244 D DACs (digital access cross-connect systems), 99, 101, 102 Data Link layer, OSI, 151 day-of-week routing, 39 denial-of-service (DoS) attacks as difficult threat, 14 overview, 240–245 and UDP, 163–164 device authentication, 310 DHCP (Dynamic Host Configuration Protocol) defined, 221 operations, 222–223 protocol overview, 221–222 security issues, 224 server overview, 294–296 types of packets used, 222 dial plans, PBX and Asterisk, 34–35 designing for private telephone systems, 32–33 numbering plans, 27–31 DIAMETER protocol, 317 dictionary attacks, 327 DID (Direct Inward Dialing) numbers, 33 digital access cross-connect systems (DACs), 99, 101, 102 digital lines, 63 digital-to-analog conversion, 97, 98 Direct Inward Dialing (DID) numbers, 33 Direct Inward System Access (DISA), 45–46 DISA (Direct Inward System Access), 45–46 disaster routing, 39–40 distributed denial-of-service (DDoS) attacks, 240. See also denial-of- service (DoS) attacks (Distributed Universal Number Discovery (DUNDi) routing protocol, 40 DND (Do Not Disturb), 47–48 DNS (Domain Name System) architecture, 207–212 client operations, 209–211 defined, 206 poisoning, 249 protocol overview, 206–207 recursive lookups, 209–211 root servers, 208 security issues, 212 server operations, 211–212 server overview, 294–296 server zone transfers, 211–212 Do Not Disturb (DND), 47–48 DoS (denial-of-service) attacks 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 551 552 Index as difficult threat, 14 overview, 240–245 and UDP, 163–164 DPI (Deep Packet Inspection), 394–396 DSIP (Session Initiation Protocol) and URIs, 154 user agent component, 155 user aspects, 152–153 DSW Shoe Warehouses, 3 Dual-Tone Multi-Frequency (DTMF), 104 dumb cards, 280 DUNDi (Distributed Universal Number Discovery) routing protocol, 40 Dynamic Host Configuration Protocol. See DHCP (Dynamic Host Configuration Protocol) E e-mail. See S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol E.164 International Numbering Plan, 30 E911 compliance and enforcement, 486 core IP system issues, 485 defined, 479 E911 (enhanced 911) overview, 479–480 regulatory basics, 480–485 role of consultants, 485 EAP (Extensible Authentication Protocol), 314, 319–327 EAP-FAST authentication type, 321, 323 EAP-MD-5 authentication type, 321, 323 EAP-PEAP authentication type, 321, 322 EAP-TLS authentication type, 321, 322 EAP-TTLS authentication type, 321, 322–323 eavesdropping, 248–256 eBay, 185 802.1 standard. See IEEE 802.1 standard Encapsulating Security Payload (ESP) protocol, 388–391 encryption, 535 and NAT, 388–391 sample VoIP security policy, 301–302 encryption, wireless Wi-Fi Protected Access, 81–82 Wired Equivalent Privacy, 80–81 endpoints, 76–79, 124, 125, 245 enhanced 911. See E911 ESP (Encapsulating Security Payload) protocol, 388–391 European Union, 486–493 Extensible Authentication Protocol. See EAP (Extensible Authentication Protocol) F FCC (Federal Communications Commission), 471–477 FDM. See Frequency-Division Multiplexing (FDM) Federal Communications Commission (FCC), 471–477 Field-Programmable Gate Arrays (FPGAs), 395 Find-Me PBX feature, 48 firewalls bypassing by using VPNs, 390–403 H.323 issues, 396–398 history, 392–396 overview, 75 SIP issues, 399–400 stateful inspection, 393 and VoIP, 5 VoIP-aware, 396–403 Foreign eXchange Office (FXO) port, 295 Foreign eXchange Subscriber (FXS) port, 295 FPGAs (Field-Programmable Gate Arrays), 395 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 552 Index 553 FQDNs (fully-qualified domain names), 208–209 Frequency-Division Multiplexing (FDM), 94 fully-qualified domain names (FQDNs), 208–209 FXO (Foreign eXchange Office) port, 295 FXS (Foreign eXchange Subscriber) port, 295 G gap analysis, 268, 269–274 Gatekeeper Confirm (GCF) message, 133 Gatekeeper Reject (GRJ) message, 133 Gatekeeper Request (GRQ) message, 133, 134 gatekeepers as H.323 entity, 73–74, 124, 125–126 messages, 133–134 gateways application-layer, 75 as H.323 entity, 124, 125 media, 75 Media Gateway Control Protocol, 190–191 overview, 75 voice, 75 Geer, Dan, 274 Generic Token Card (GTC) authentication type, 323, 326 GLBA (Gramm-Leach-Bliley Act) compliance and enforcement, 450–451 core IP system issues, 449 defined, 441 overview, 441–442 regulatory basics, 442–449 role of consultants, 447–449 Title V, 442–446 Global failure (6xx) SIP response code, 160, 162 government regulation CALEA, 461–479 E911, 479–486 European Union, 486–493 Gramm-Leach-Bliley Act, 441–451 HIPAA, 451–461 overview, 432–434 Sarbanes-Oxley Act, 434–441 Gramm-Leach-Bliley Act. See GLBA (Gramm-Leach-Bliley Act) ground start, 62 GTC (Generic Token Card), 323, 326 H H.225/Q.931 defined, 127 overview, 129–134 port, 128 H.225.0/RAS defined, 127 port, 128 H.235 defined, 127, 128 profiles, 138–141 scope, 138 security mechanisms, 137–141 vs. SIP-related protocols, 412 H.245 call control messages, 134–136 defined, 127 ports, 128, 135 H.248 call flow, 193–194 design, 191–192 history, 190–191 messaging sequence, 193–194 overview, 189 security issues, 194 H.323 call setup and control, 396–398 defined, 9 firewall issues, 396–398 as gatekeeper, 73–74 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 553 554 Index as one of two VoIP protocols, 8, 412 ports, 134, 135 as signaling protocol, 8, 412 vs. SIP, 8, 412 specification, 124–126 subprotocols, 126–137 H.323-specific attacks, 256–257 Health Insurance Portability and Accountability Act. See HIPAA (Health Insurance Portability and Accountability Act) HIDs (host-based intrusion detection systems), 355–356 HIPAA (Health Insurance Portability and Accountability Act) compliance and enforcement, 460–461 core IP system issues, 459–460 defined, 451 overview, 451 Privacy Rule, 452 regulatory basics, 451–460 role of consultants, 459 Security Rule, 452–459 honeynets, 354–355 honeypots, 354–355 host-based intrusion detection systems (HIDs), 355–356 Hosted IP-telephony services, 60, 71 HTTP (Hypertext Transfer Protocol) client requests, 216–217 overview, 215–216 security issues, 218 server response, 217 Hypertext Transfer Protocol (HTTP) client requests, 216–217 overview, 215–216 security issues, 218 server response, 217 I IAX (Inter-Asterisk Exchange) protocol call flow, 195–197 defined, 66 design, 195 messaging sequence, 195–197 overview, 195 security issues, 197 vs. Session Initiation Protocol, 195 and Skype, 186 ICE (Interactive Connectivity Establishment) protocol, 10, 403 ICQ. See instant messaging (IM) IEEE 802.1 standard defined, 82, 313 and EAP authentication, 315–318 and IEEE 802.11i, 313, 314 overview, 82–83, 313–315 IEEE 802.3af standard, 84 IEEE 802.11i (WPA2), 313, 314 IM. See instant messaging (IM) IMS (IP Multimedia Subsystem) communication flow, 505–506 defined, 500 early vulnerabilities, 512–513 overview, 500–505 security architecture, 506–510 security issues, 510–513 Informational (1xx) SIP response code, 160, 161 instant messaging (IM) clients as user agents, 78 overview, 172–174 security issues, 175–176 and SIMPLE, 172, 174–175 Skype features, 173, 174, 184 Integrated Services Digital Network (ISDN), 63, 106 Inter-Asterisk Exchange (IAX) protocol, 66, 186 Interactive Connectivity Establishment (ICE) protocol, 10, 403 interactive media service, 73 Interactive Voice Response (IVR) servers, 70 International Telecommunications Union. See ITU-T signaling systems Internet Engineering Task Force (IETF) 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 554 Index 555 defined, 148 and ICE, 403 and PKI, 327 and SIP, 148, 412–424 Internet mail. See S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol Intgelligent Network (IN) model, 105 INVITE SIP signaling command, 159 IP addresses, and NAT, 382–391 IP-Centrex, 60, 71 IP Multimedia Subsystem. See IMS (IP Multimedia Subsystem) IP-PBX systems, 60, 64 IP routers, 80 IP switches, 80 IP telephony, 6, 10, 72. See also VoIP IPsec protocol, 388–391 ISDN. See Integrated Services Digital Network (ISDN) ISDN User Part (ISUP), SS7, 107, 109, 117 ITU-T signaling systems ITU-T SS7 standard, 106–110 numbering plans, 30 overview, 106–107 security issues, 114–117 IVR. See Interactive Voice Response (IVR) servers J jitter, 380 K KTS (Key Telephone Systems), 60, 71 L law enforcement. See CALEA (Communications Assistance for Law Enforcement Act) LDAP (Lightweight Directory Access Protocol), 296–297 LEAP authentication type, 321, 323 Lexus-Nexus, 2 Lightweight Directory Access Protocol (LDAP), 296–297 lines, PBX, 62–64 Linux platform additional security tweaks, 287–289 eliminating unnesessary services, 282–283 logging, 283–284 permission tightening, 285–286 location service, defined, 157 logging and NIDs, 353 overview, 356 syslog protocol, 356–358 loop start, 62, 63 M MAC (Media Access Control), 250, 335–336 mail, Internet. See S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol Mbone, 149 MCUs (multipoint control units), as H.323 entity, 124, 126 MD5 (Message-Digest algorithm 5), 321, 326 Media Access Control (MAC). See MAC (Media Access Control) Media Gateway Control Protocol (MGCP), 166, 167–168, 190–191. See also H.248 media gateways. See gateways Media Resource Function (MRF), 504 media servers call or resource control, 73–74 interactive media service, 73 overview, 72–73 Megaco. See H.248; MGCP (Media Gateway Control Protocol) 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 555 556 Index Message-Digest algorithm 5 (MD-5), 321, 326 Message Transfer Parts (MTP), SS7, 107, 109 messaging, voice. See voice mail MGCP (Media Gateway Control Protocol). See also H.248 defined, 166 and H.248, 190–191 overview, 167–168 Microsoft Challenge Handshake Authentication Protocol (MS- CHAP), 324–325, 326 Microsoft Office Communicator (MOC), 197 Microsoft Office Live Communications Server (MLCS), 197–201 Microsoft Windows Messenger (MWM), 197 MIKEY (Multimedia Internet Keying), 421 MIME. See S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol MLCS. See Microsoft Office Live Communications Server (MLCS) modified-setup PDUs, 398–399 MRF (Media Resource Function), 504 MS-CHAP authentication type, 321, 324–325, 326 MSN Messenger. See instant messaging (IM) MTP (Message Transfer Parts), SS7, 107, 109 Multicast Backbone, 149 Multimedia Internet Keying (MIKEY), 421 music-on-hold feature, 41 N NAS (Network Access Server), 315, 316, 317–318 NAT. See Network Address Translation (NAT) Neighbor Discovery (NP) protocol, 250 Network Access Server (NAS), 315, 316, 317–318 Network Address Translation (NAT) bypassing by using VPNs, 390–403 common modes of operation, 385–388 and encryption, 388–391 how it works, 383–391 and IAX protocol design, 195 and IPsec, 388–391 overview, 382 as topology shield, 391 Network Interconnection Interoperability Forum (NIIF), 117 network intrusion detection systems. See NIDs (network intrusion detection systems) Network layer, OSI, 151 network-management systems (NMSs), 358–359 networks circuit-switched vs. packet-routed, 51–52 management tools, 299–300 reviewing pre-VoIP security infrastructure, 264–302 telephone vs. data, 4–6 time synchronization, 297 VoIP vs. private, 51–52 NIDs (network intrusion detection systems) components, 346–348 defined, 346 features, 353–354 and honeypots, 354–355 limitations, 354 maintenance, 353 overview, 346–348, 528 placement, 349–352 types, 348–349 NIIF (Network Interconnection Interoperability Forum), 117 NMSs (network-management systems), 358–359 no answer call forwarding, 46 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 556 Index 557 North American Numbering Plan (NANP), 30, 31 NOTIFY SIP signaling command, 160 NTP. See time synchronization numbering plans, 27–31 O Open Source, 38, 66–67 Open System Interconnect. See OSI reference model OPTIONS SIP signaling command, 160 OSI reference model list of layers, 150–151 overview, 149–151 P P2P (peer-to-peer) architecture, 159, 171–172 P2P (point to point) technology, and Skype, 186 packet-routed networks vs. circuit-switched networks, 51–52 packet sniffers, 165 packets deep inspection, 394–396 medium-depth inspection, 393–394 modified-setup PDUs, 398–399 shallow inspection, 392–393 PAP (Password Authentication Protocol), 321, 326 parking calls, 41–42 Password Authentication Protocol (PAP), 326 passwords breaking, 327 as form of authentication, 324 and Sarbanes-Oxley, 438 significance, 281 PayMaxx, 3 PBX (private branch exchange) adjunct servers, 68–70 administration, 27–28 alternatives, 71–72 analog stage, 25–26 Asterisk software, 66–67 billing, 35–38 call forwarding features, 46 call parking feature, 41–42 call recording, 43 call-waiting indication feature, 49 conferencing feature, 43–45 consultation hold feature, 46 dial plans, 28–35 digital stage, 25–26 Direct Inward System Access feature, 45–46 features, 65–67 Find-Me feature, 48 history, 25–26 manual switchboard stage, 25 music-on-hold feature, 41 and open source, 66–67 overview, 60, 61–62 private numbering plans, 31–33 routing calls, 38–40 security issues, 67, 68, 69–70, 71 station lines, 62–64 traditional systems, 61–71 transfer features, 46 trunks, 64–65 typical functions, 24–49 VoIP stage, 25–26 wireless extensions, 71 PDUs (Protocol Data Units), 132, 398–399, 413 PEAPv1/EAP-GTC authentication type, 321, 323 peer-to-peer architecture, 159, 171–172 penetration tests, defined, 361. See also vulnerability tests pharming, 248 phone jacks, 63 phone phreaks, 103–104 photo ID cards, 280 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 557 558 Index phreaks. See phone phreaks Physical layer, OSI, 151 physical security, 277–281, 301 PISN. See Private Integrated Services Network (PISN) PKI (public key infrastructure). See also S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol architectural model, 330–332 basic certificate fields, 332–333 certification paths, 334–335 and IETF, 327 and MLCS security, 200–201 overview, 327–330 and TLS, 417–420 POE. See Power-over-Ethernet (POE) policies, security characteristics, 274–275 developing, 265–277 gap analysis, 268, 269–274 VoIP sample, 300–302 port security, 202, 302, 336 POTS (Plain Old Telephone Service), 63 Poulsen, Kevin, 104 Power-over-Ethernet (POE), 84 power-supply infrastructure, 83–85 power surges, 85 presence, defined, 8 Presentation layer, OSI, 150 private branch exchange. See PBX (private branch exchange) Private Integrated Services Network (PISN), 105–106 private keys, 328–330 private numbering plans, 31–33 PROTOS suite, 132 proxy servers, 76, 156, 169–170 PSTN (Public Switched Telephone Network) cable plant, 93–95 call flow, 111–114 how it works, 93–111 operational and regulatory issues, 110–111 overview, 60, 92–93 protocol security, 114–117 security issues, 4–6 signal transmission, 95–102 switching and signaling, 102–110 PTT (Public Telephone and Telegraph) organizations, 110–111 public key infrastructure. See PKI (public key infrastructure) public keys, 328–330. See also PKI (public key infrastructure) Public Switched Telephone Network (PSTN). See PSTN (Public Switched Telephone Network) Public Telephone and Telegraph (PTT) organizations, 110–111 Q Q.931, 127, 128, 129–134 QoS, 380–382 Q.SIG, 106, 117, 130 R RADIUS (Remote Authentication Dial In User Service) protocol, 296–297, 315, 317, 318 RAs (registration authorities), 331 Real-Time Control Protocol (RTCP), 127, 128, 136–137 Real Time Protocol (RTP). See RTP (Real Time Protocol) Real-Time Streaming Protocol (RTSP), 10, 166, 168 recursive lookups, 209–211 redirect servers, 74–75, 156–157, 170–171 Redirection (3xx) SIP response code, 160, 161 REGISTER SIP signaling command, 159 registration authorities (RAs), 331 Registration Confirm (RCF) message, 133 Registration Reject (RRJ) message, 133 Registration Request (RRQ) message, 133 registration servers, 74 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 558 Index 559 regulation, 536 See also government regulation Requests for Comment (RFCs), 148, 149 Reseource Reservation Protocol. See RSVP (Resource Reservation Protocol) RFC 2543, 148 RFC 3261, 148 RFCs (Requests for Comments), 148, 149 routing calls, PBX, 38–40 RSVP (Resource Reservation Protocol) defined, 10, 225 message types, 225–226 operations, 226–227 overview, 225 security issues, 227–228 RTCP (Real Time Control Protocol), 127, 128, 136–137 RTP (Real Time Protocol) defined, 127, 166 and IP Multimedia Subsystem, 500 overview, 136–137, 167 ports, 128 RTSP (Real-Time Streaming Protocol), 10, 166, 168 S SAI (Serving Area Interface), 93 Sarbanes-Oxley Act certification, 440–441 compliance and enforcement, 440–441 core IP system issues, 440 overview, 434 regulatory basics, 434–440 role of consultants, 437–439 Section 404, 434–436 SBCs (Session Border Controllers), 400–401 SCCP (Signaling Connection Control Part), SS7, 108, 109 SCCP (Skinny Client Control Protocol). See Skinny protocol SCPs (Service Control Points), 109 SCTP (Stream Control Transmission Protocol), 8–9, 109 sdescriptions, 421 SDP (Session Description Protocol) defined, 10, 166, 228 and IP Multimedia Subsystem, 167, 505 operations, 229–230 overview, 166, 228 Security Descriptions, 421 security issues, 230 specifications, 228–229 Secure/Multipurpose Internet Mail Extensions protocol (S/MIME), 414–417 Secure Real-Time Transfer Protocol. See SRTP (Secure Real-Time Transfer Protocol) Secure Shell (SSH), 298–299 Secure Socket Layer (SSL), 200 security active monitoring, 344–366 additional server tweaks, 287–293 änd Skype, 189 breaches, 2–4 as competitive advantage, 266 converged network issues, 13–16 developing effective policies, 265–277 DHCP issues, 224 and DNS, 212 H.248 issues, 194 and HTTP, 218 and IAX protocol, 197 instant messaging issues, 175–176 PBX issues, 67, 68, 69–70, 71 performing gap analysis, 268, 269–274 perimeter protection, 279–280 physical, 277–281 PSTN issues, 114–117 reviewing pre-VoIP infrastructure, 264–302 role of VLANs, 375–380 RSVP issues, 227–228 sample VoIP policy, 300–302 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 559 560 Index SDP issues, 230 server hardening, 281–294 service packs and patches, 293–294 and Skinny protocol, 231–232 SS7 and other ITU-T signaling, 114–117 supporting services, 294–299 and TFTP, 213, 215 token systems, 280 VoIP issues, 13–16, 55 Security Gateways (SEGs), 506, 507 security patches, 293–294 SEGs (Security Gateways), 506, 507 Seisint, 2 Server error (5xx) SIP response code, 160, 162 servers adjunct, 68–70 for authentication, 315–318 in client/server architecture, 158–159 eliminating unnesessary services, 282–283 hardening, 281–294 logging, 283–284 permission tightening, 284–286 as proxies, 76, 156, 169–170 redirect, 156–157, 170–171 as registrars, 156, 169 SIP, 155–157 stateful vs. stateless, 157 Service Control Points (SCPs), 109 service packs, 293–294 Service Switching Points (SSPs), 109 Service Transport Points (STPs), 109 Serving Area Interface (SAI), 93 Session Border Controllers (SBCs), 400–401 Session Description Protocol. See SDP (Session Description Protocol) Session Initiation Protocol (SIP). See SIP (Session Initiation Protocol) Session layer, OSI, 150 Setup-PDUs, 132, 398–399 shallow packet inspection, 392–393 signal transmission analog, 95–96 digital, 96–102 SS7 standard, 106–110 T1, 96–102 table of hierarchies, 100 Signaling Connection Control Part (SCCP), SS7, 108, 109 Simple Network Management Protocol. See SNMP (Simple Network Management Protocol) SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions), 172, 174–175, 198, 199–200 Simple Traversal of UDP through NATs (STUN) protocol, 10, 401–402 SIP (Session Initiation Protocol). See also SIMPLE (SIP for Instant Messaging and Presence Leveraging Extensions) as application-layer control framework, 8 architecture, 154–172 components, 155–157 defined, 9 encryption vs. nonencrypted data, 165 firewall issues, 399–400 how it works, 168–172 vs. IAX, 195 and IP Multimedia Subsystem, 500 and Mbone, 149 as one of two VoIP protocols, 8 and OSI Application layer, 151 overview, 146–151 protocol suites from IETF, 412–424 protocols used with, 162–168 and PSTN call flow, 112–114 and registration, 156, 169 response codes, 160, 161–162 security vulnerabilities, 510–512 server component, 155–157 session management, 153 session setup, 153 signaling commands, 159–160 as signaling protocol, 8, 9 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 560 Index 561 and S/MIME protocol, 414–417 and TLS, 164, 165 and UDP, 162–163 SIP-specific attacks, 257 skill-based routing, 40 Skinny protocol defined, 230 operations, 231 overview, 230 security issues, 231–232 specifications, 230–231 Skype call flow, 186–189 defined, 184 history, 185 how it works, 186–189 messaging sequence, 186–189 overview, 184–186 protocol design, 186 security issues, 189 smart cards, 280 S/MIME (Secure/Multipurpose Internet Mail Extensions) protocol, 414–417 sniffers, 14 SNMP (Simple Network Management Protocol) and active monitoring, 358–359 architecture, 219–221 defined, 218 network components, 358–359 operations, 220 overview, 218 security issues, 297–298 softphones, 76–77, 301, 379–380 softswitch, 73 SONET rings, 95 source number routing, 39 SOX. See Sarbanes-Oxley Act spoofing ANI, 108, 256 and ARP, 251–256, 336 SRTP (Secure Real-Time Transfer Protocol) confidentiality services, 422 defined, 420 message authentication, 422–423 and Multimedia Internet Keying, 421 overview, 420–421 replay protection, 423–424 SS7 (signaling system 7), 106–110 SSH (Secure Shell), 298–299 SSL (Secure Socket Layer), 200 SSPs (Service Switching Points), 109 stateful inspection firewalls, 393 stateful servers, 157 stateless servers, 157 STPs (Service Transport Points), 109 Stream Control Transmission Protocol (SCTP), 8–9 Strowger,Almon, 104 STUN (Simple Traversal of UDP through NATs) protocol, 10, 401–402 SUBSCRIBE SIP signaling command, 160 Success (2xx) SIP response code, 160, 161 supplicants, defined, 315 SXS (Step by Step) system, 104 syslog protocol, 356–358 system logging. See logging T T-Mobile, 3 T1 transmission, 96–102 T1 trunks, 65 TCAP (Translation Capabilities Applications Part), SS7, 108, 109 TCP Wrappers, 289 TDM. See Time-Division Multiplexing (TDM) Telephone User Part (TUP), SS7, 107, 109 Telnet, 298–299 Temporal Kewy Integrity Protocol (TKIP), 314 TFTP (Trivial File Transfer Protocol), 212–215 three-way calling, 48 tie lines, 64 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 561 562 Index Time-Division Multiplexing (TDM), 96–98 time-of-day routing, 39 time synchronization, 297 TKIP (Temporal Kewy Integrity Protocol), 314 TLD (top-level domain servers), 208 TLS (Transport Layer Security) protocol defined, 10, 417 and EAP, 321, 322 as IETF encryption solution, 417–420 and MCLS, 200 overview, 164, 319, 417 and PKI, 417–420 and SIP, 164, 165 token systems, 280 toll fraud, 103–104, 255 top-level domain servers (TLD), 208 Touch Tones, 104 traffic shaping, 380–382 Translation Capabilities Applications Part (TCAP), SS7, 108, 109 Transport layer, OSI, 151 Transport Layer Security. See TLS (Transport Layer Security) protocol Traversal Using Relay NAT (TURN) protocol, 10, 402 Tripwire software, 289–293 Trivial File Transfer Protocol (TFTP), 212–215 trunks, PBX, 64–65 TTLS (Tunneled Transport Layer Security). See EAP-TTLS authentication type TUP (Telephone User Part), SS7, 107, 109 TURN (Traversal Using Relay NAT) protocol, 10, 402 U UDP (User Datagram Protocol) and denial-of-service attacks, 163–164 and SIP, 162–163 vs.TCP, 162–163 unattended transfers, 46 uninterruptible power supply (UPS), 84–85 UNIX, 4 UPS. See uninterruptible power supply (UPS) URIs (Universal Resource Identifiers), 148, 154 U.S. Federal Communications Commission (FCC), 471–477 user agents defined, 155 as endpoints, 76–79 and location service, 157 overview, 155 and peer-to-peer architecture, 159, 171–172 and SIP architecture, 168–172 and SIP servers, 155–157 and stateful mode, 157 User Datagram Protocol (UDP) and denial-of-service attacks, 163–164 and SIP, 162–163 vs.TCP, 162–163 user identity. See authentication V video cameras, closed circuit, 279–280 virtual private networks (VPNs), 64, 390–403 VLANs overview, 375–378 sample VoIP security policy, 301 security issues, 378 separation, 530 and softphones, 379–380 Voice Firewalls, 71 voice gateways. See gateways voice mail, 49, 69–70 VoIP 911 issues, 54–55 architectural overview, 72–86 benefits, 7–8 and business telephony equipment, 60 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 562 Index 563 combined functionality, 53 cost issues, 52–53 functionality degraded, 54–55 functionality enhanced, 55 functionality gained, 52–53 how it works, 10–12 vs. IP telephony, 10–12 list of data and service threats, 15–16 list of vulnerabilities, 240 mobility issues, 53 new security paradigm for, 16–17 power issues, 83–85 vs. private telephone networks, 51–52 protocol issues, 5 protocol overview, 8–10 QoS issues, 54 recent improvements, 6–7 rich-media conferencing issues, 53 role in PBX history, 25–26 sample security policy, 300–302 and Sarbanes-Oxley, 434–441 security issues, 13–16, 55 service disruption, 240–248 threat taxonomy, 15–16, 248 threats, 240–257 wiring and scalability issues, 53 VOIPong, 14 VoWLAN (Voice over Wireless LAN), 314 VPNs (virtual private networks), 64, 390–403 vulnerability tests assessment, 363–364 defined, 361 discovery, 362–363 exploitation, 364 methods, 362–366 overview, 360–362 reporting results, 364–366 scanning, 363–364 W Wavelength Division Multiplexing (WDM), 98–99 WDM. See Wavelength Division Multiplexing (WDM) WEP. See Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) key features, 314, 315 overview, 81–82 vs. WEP, 81–82, 314 Windows platform eliminating unnesessary services, 283 logging, 284 permission tightening, 284–285 wire closets, 281 Wired Equivalent Privacy (WEP) key features, 314, 315 overview, 80–81 security issues, 314 vs. WPA, 81–82, 314 wireless infrastructure authentication, 82–83 encryption, 80–82 IEEE 802.1 standard, 82–83 overview, 80–83 Wi-Fi Protected Access, 81–82 Wired Equivalent Privacy, 80–81 wireless PBX, 71 wireless VoIP clients, 79 WMM (Wi-Fi Multimedia), 314 WPA. See Wi-Fi Protected Access (WPA) WPA2 (IEEE 802.11i), 313, 314, 315 X X.509 PRIX, 416 XBox, 462 Y Yahoo Messenger. See instant messaging (IM) Z zone transfers, 211–212 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 563 Securing IM and P2P Applications for the Enterprise Paul Piccard, Marcus H. Sachs As an IT Professional, you know that the majority of the workstations on your net- work now contain IM and P2P applications that you did not select, test, install, or configure. As a result, malicious hackers, as well as virus and worm writers are targeting these inadequately secured applications for attack This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers. ISBN: 1-59749-017-2 Price: $49.95 US $69.95 CAN Cisco PIX Firewalls: Configure, Manage, & Troubleshoot Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting internal networks from unwanted intrusions and attacks. Virtual Private Networks (VPNs) are the means by which authorized users are allowed through PIX Firewalls. Network engineers and security specialists must constantly balance the need for air-tight security (Firewalls) with the need for on-demand access (VPNs). In this book, Umer Khan, author of the #1 best selling PIX Firewall book, provides a concise, to-the-point blueprint for fully integrating these two essential pieces of any enterprise network. It is fully current with the newest PIX Software Version 7 and is appropriate for the new CSPFA exam covering PIX Software Version 7. ISBN: 1-59749-004-0 Price: $49.95 U.S. $69.95 CAN Skype Me! From Single User to Small Enterprise and Beyond Michael Gough This first-ever book on Skype takes you from the basics of getting Skype up and running on all platforms, through advanced features included in SkypeIn, SkypeOut, and Skype for Business. The book teaches you everything from installing a headset to configuring a firewall to setting up Skype as telephone Base to developing your own customized applications using the Skype Application Programming Interface. ISBN: 1-59749-032-6 Price: $34.95 US $48.95 CAN AVAILABLE NOW order @ www.syngress.com AVAILABLE NOW order @ www.syngress.com AVAILABLE NOW order @ www.syngress.com Syn•gress (sin-gres): noun, sing. Freedom from risk or danger; safety. See security. Syngress: The Definition of a Serious Security Library 372_PRAC_VoIP_Index.qxd 3/2/06 1:13 PM Page 564

Các file đính kèm theo tài liệu này:

  • pdfPractical VoIP Security.pdf
Tài liệu liên quan