IMS and Security

Download Report

Transcript IMS and Security

IMS and Security
Sri Ramachandran
NexTone
Traditional approaches to Security - The “CIA”
principle
 Confidentiality

Am I communicating with the right system or user?
 Can another system or user listen in?
 Integrity

Have the messages been tampered with?
 Availability

Can the systems that enable the communication
service be compromised?
CONFIDENTIAL © 2006, NexTone Communications. All rights
2
The Demarcation Point – Solution for protecting
networks and multiple end systems
 Create a trust boundary by using a firewall
 Firewalls and NATs use the “Authorization”
principle of Confidentiality
Trusted
Private IP
Address
space
Untrusted
Unauthorized stream
“The” Network
Authorized stream
CONFIDENTIAL © 2006, NexTone Communications. All rights
3
Solutions for separate control and data streams
 FTP, BitTorrent, RTSP, SIP have separate
control and data streams
 Data streams are ephemeral
 Solution: Use Application Layer Gateway (ALG)

Scan control stream for attributes of data stream
 2 approaches to building ALGs

Dedicated purpose
 Deep packet inspector/scanner
CONFIDENTIAL © 2006, NexTone Communications. All rights
4
Characteristics of Session Services
 Signaling and media may traverse different
networks
 Intermediate systems for signaling and media
are different
 Signaling and media networks may be
independently secured
 Signaling and media have different quality
characteristics

Media is latency, jitter and packet loss sensitive
 Reliable delivery of signaling messages is more
important than latency and jitter
CONFIDENTIAL © 2006, NexTone Communications. All rights
5
Denial of Service (DoS) Concepts
 Multiple layers:

Layer 3/4 - prevention or stealing of session layer
processing
 Layer 5: - prevention and/or stealing of application
layer processing (prevention of revenue loss)
 Theft of service

Unable to honor Service Level Agreement
 Resource over-allocation
 Resource lock-in
CONFIDENTIAL © 2006, NexTone Communications. All rights
6
Components of a complete security solution
 Ability to create a trust boundary for session services
independent of data
 Ability to strongly authenticate users and end devices at
all session network elements or networks
 Ability to encrypt at the trust boundary
 Prevent denial of service attacks on service
intermediaries

Hardened OS, Intrusion Detection/Prevention
 Secure management of network elements

IPSec, HTTPS, SSH
 Allow network or flow based correlation and aggregation
CONFIDENTIAL © 2006, NexTone Communications. All rights
7
Convergence of Services
Back Office
Collaboration
IPTV
VoIP
Back Office
Application
Application
Service Delivery/
Session Control
Service Delivery/
Session Control
Transport
Internet
Triple play services
Wirelesse
TV
Internet
Voice
Vertically integrated apps
Transport
Terminals
CONFIDENTIAL © 2006, NexTone Communications. All rights
8
Back Office
Application
Service Delivery/
Session Control
Service Delivery/
Session Control
CONFIDENTIAL © 2006, NexTone Communications. All rights
Collaboration
IPTV
Back Office
Application
Transport
Presence
VoIP
Collaboration
IPTV
Internet
VoIP
Network to Service Centric
Transport
9
Back Office
Collaboration
IPTV
Presence
VoIP
Collaboration
IPTV
Presence
VoIP
Migration to IMS
Back Office
Application
Application
Service Delivery/
Session Control
Service Delivery/
Session Control
CSCF
Transport
Transport
Wireline
CONFIDENTIAL © 2006, NexTone Communications. All rights
HSS
Wireless
10
Back Office
Application
Collaboration
IPTV
Presence
VoIP
Collaboration
IPTV
Back Office
Back Office
Back Office
Application
Application
Service Delivery/
Session Control
Transport
Presence
IPTV
Internet
VoIP
Wirelesse
TV
Internet
Voice
Triple play services
Vertically integrated apps
VoIP
Collaboration
Path to IMS
Transport
Service Delivery/
Session Control
Transport
Application
CSCF HSS
Service Delivery/
Session Control
Transport
Wireline Wireless
Terminals
Separate Applications
Converged Network
CONFIDENTIAL © 2006, NexTone Communications. All rights
Common
Session Control
IMS
11
CableLabs PacketCable 2.0 Reference Architecture
Peer
Network
Interconnect
DHCP
Time
Operational
Support Systems
ENUM
PAC
NMS & EMS
CDF
PSTN
Core
PSTN GW
SG
SLF
Application
Presence
Server
HSS
Application
Server
MG
I-CSCF
S-CSCF
Policy
Server
PacketCable
Multimedia
PacketCable
Multimedia
Edge
TURN Server
P-CSCF
STUN Server
PacketCable
Application Manager
Access
Network
CMTS
DOCSIS
NAT &
Firewall
Traversal
IMS Service
Delivery
BGCF
MGC
CMS
Compatible
with
E-MTAs
Provisioning,
Management,
Accounting
Media Proxy
PacketCable
1.5 Endpoints
Re-use
PacketCable
PSTN
gateway
components
Border Element
Interconnect
Proxy
DNS
1.5
E-MTA
Cable
Modem
Cable
Modem
Different
UE
UE
types of
CONFIDENTIAL
clients © 2006, NexTone Communications. All rights
Cable
Modem
Cable
Modem
IMS
Elements
adopted and
enhanced
for Cable
Other
Access
Point
NAT &
Firewall
UE
UE
UE
Local
Network
12
Issues with IMS today
 Access differentiates IMS flavors
 IMS functions and value misunderstood
 Bridge from ‘legacy’ to IMS networks mostly
underplayed
 Ignores Web 2.0 and non-SIP based sessions
 Focus on pieces inside ‘walled garden’ – not on
interconnecting
 Not enough focus on applications
CONFIDENTIAL © 2006, NexTone Communications. All rights
13
Access Defines IMS Components
Visited Network
SeGW + UNC
P-CSCF +
C-BGF
WiFi
(UMA)
Internet
WiMAX,
WiFi
BB
Internet
DSL
BB
Cable
CONFIDENTIAL © 2006, NexTone Communications. All rights
Home Network
PDG +
P-CSCF +
C-BGF
IMS
Core
A-BCF +
C-BGF +
P-CSCF
P-CSCF +
App Manager +
C-BGF
14
Secure Border Function (SBF)




Similar concept to a firewall
Is alongside CSCF network elements
Thwarts DoS/DDoS attacks
Uses established techniques to do firewall/NAT
traversal
 Adds previously non-existent Rate based
Admission Control capabilities
CONFIDENTIAL © 2006, NexTone Communications. All rights
15
SBF Logical Security Architecture
Analytics/
Post-processing
Reporting &
Monitoring
Alarming &
Closed Loop
Control
Layer 7 – Application Call Admission Control with Authentication/Authorization
Layer 5 – SIP
SIP Control with Rate Admission Control
Network based
Correlation
• Theft of service
mitigation
• SPAM/SPIT prevention
•SIP Protocol vulnerabilities
•DoS protection
Layer 4 – TCP/UDP
TCP/IP Stack in Operating System
•Hardened OS
•DoS protection
Layer 3 - IP
Packet Filter
Layer 2 - Ethernet
Queue/Buffer Management
CONFIDENTIAL © 2006, NexToneSIGNALING
Communications. All rights
Packet rate mgmt
MEDIA
16
SBF
Consolidation of Functions
Application
SBC-S
Access & Interconnect
Session Management
Access &
Interconnectivity
A-BCF
PDG
PDG
WAP/WAG
WAG
WiFi
CONFIDENTIAL © 2006, NexTone Communications. All rights
WiMAX
I-BCF
SeGW
BGF
Edge
UMA
BB
17
Benefits of SBF
 Security for both signaling and media
 Signaling and media can be disaggregated or
integrated
 Can be integrated with any signaling or media
element to protect it
 Consolidates all access types
CONFIDENTIAL © 2006, NexTone Communications. All rights
18
Thank You!
For further comments and discussion:
[email protected]
www.nextone.com/blog
CONFIDENTIAL © 2006, NexTone Communications. All rights
19