Secure Telephony Enabled Middle

Download Report

Transcript Secure Telephony Enabled Middle

Secure Telephony Enabled
Middle-box (STEM)
STEM is proposed as a solution to network vulnerabilities,
targeting the transmitting of real-time data over enterprise networks.
Maggie Nguyen
Dr. Mark Stamp
SJSU - CS 265
Spring 2003
Topics

IP Telephony Overview




STEM Architecture



IP Telephony Components
IP Telephony Protocols
How SIP Works
Architecture Components
Call Scenarios
STEM Security Countermeasures


DoS Attack
Eavesdropping
IP Telephony Components
1.
2.
3.
4.
5.
Gateways
Gatekeepers
IP Telephones
PC-based Software
Phones
MCUs
IP Telephony Protocols

Internet Engineering Task Force (IETF):
 Signaling: Session Initiation Protocol (SIP)



Transport: Real Time Protocol (RTP)
Media Description: Session Description Protocol (SDP)
International Telecommunications Union (ITU):
 Signaling: H.323


Codecs: G.711 (PCM), G.729, …
ISDN: Q.931
STEM architecture is currently using the network required for SIP
deployment.
How SIP Works
– SIP Call Setup
DNS Server
DNS Query for
the IP Address of
the SIP Proxy of
the Destination
Domain
2
The INVITE is
forwarded
The Location Service is
being queries to check that
the destination SIP URI
represents a valid registered
device, and requests for its
IP Address
Location Service
4
3
A request is sent
(SIP INVITE) to
ESTABLISH a
session
1
SIP Proxy
5
The request is forwarded to
the End-Device
SIP Proxy
SIP IP Phone
6
sip:[email protected]
Media Transport
SIP IP Phone
sip:[email protected]
Destination device returns
its IP Address to the
originating device and a
media connection is opened
How SIP Works
DNS Server
DNS Query for
the IP Address of
the SIP Proxy of
the Destination
Domain
– SIP Call Sequence
The Location Service is
being queries to check that
the destination SIP URI
represents a valid registered
device, and requests for its
IP Address
Location Service
SIP Proxy
SIP Proxy
SIP IP Phone
sip:[email protected]
SIP IP Phone
sip:[email protected]
STEM Architecture Components




Security Manager (SM)
Enhanced Firewall
Media / Signaling Gateway (M/S Gateway)
User Terminals
STEM Enhanced Firewall





Pattern Matcher
Protocol Parser
Flow Monitor
Application Gateway
External Interface
Call Scenarios –
Net-to-Net
Call Scenarios –
Net-to-Phone
STEM Security Countermeasures

Denial of Service





TCP SYN Floods detected by Flow Monitor.
SIP INVITE Floods detected by Protocol Parser.
Malicious RTP Streams detected by Flow Monitor.
M/S Gateway Voice Port saturation.
Eavesdropping


Control Flow: STEM uses secured communication
protocols among SM, firewall, M/S gateways.
Data Flow: STEM replies on application protocols
(SIP or H.323) to implement payload encryption.
References

International Engineering Consortium. H.323.
http://www.iec.org/online/tutorials/h323/

Reynolds, B. Challenges Challenges and Rewards in Enterprise
Deployments of IP Telephony Presentation.
http://networks.cs.ucdavis.edu/~ghosal/Research/Talks/IP-TelNetlab%20talK%20-%20rev%202.ppt

Reynolds, B. Deploying IP Telephony in an Enterprise and the
Vulnerabilities that Come With It Presentation.
http://seclab.cs.ucdavis.edu/secsem2/ReynoldsSeminar.ppt

Reynolds, B. and D. Ghosal. STEM: Secure Telephony Enabled
Middlebox. IEEE Communications Magazine Special Issue on
Security in Telecommunication Networks. October 2002
http://www.off-pisteconsulting.com/research/pubs/ieee_comm.pdf