20031014-Video-Gemmill

Download Report

Transcript 20031014-Video-Gemmill

Secure
Videoconferencing
Today
Jill Gemmill
University of Alabama at Birmingham
[email protected]
Why is security for
videoconferencing needed
today?

Some applications require privacy:
Telemedicine: for patient comfort and
HIPAA requirements
 Sensitive meetings: grant reviews;
counter-terrorism planning


The Internet is no longer a friendly
place: any network connected system
is a target for attacks.
What is meant by
“videoconference security”?

At a “gut level”, we might think of:
No eavesdropping
 No denial of service or break-ins
 No “spamming” (video/voice from
unwanted visitors)
 Making sure resources like MCU’s are
used only by those authorized

Standards for Security:
ITU X.800 and IETF RFC 2828
Authentication
 Access Control
 Data Confidentiality
 Data Integrity
 Nonrepudiation
 Availability Service

Standard Security Mechanisms
ITU X.800








Encryption
Digital Signature
Access Control
Data Integrity
Authentication
Exchange
Traffic Padding
Routing Control
Notarization





Trusted
Functionality
Security Label
Event Detection
Security Audit Trail
Security Recovery
“Legacy” Videoconference
Security (H.320)
Used leased telephone line (ISDN)
lines – you were buying your own
private circuit
 No IP connection used
 Expensive
 “Nailed Down”, not reconfigurable.

Basic Security Concerns
(H.323 and SIP)



Remote management interfaces:
 use strong password for remote logins
(Tandberg alone in offering SSL)
 Turn off streaming
 Disable FTP, HTML, Telnet and SNMP
functions
Disable Viavideo web interface by
clearing password
Watch for security patches and update
systems immediately.
Downside of basic
security….
Usually breaks ability for video
support organization to
monitor/manage your systems
 Makes it harder to update software
(no FTP)
 Solution: put systems behind a firewall

Firewalls and NATs

Found especially in medical centers
Firewall: Blocks incoming network
traffic
 Network Address Translator (NAT):
Hides your network addresses so they
can’t be reached from outside


For videoconferencing, these
protections become OBSTACLES to
overcome (securely, of course!)
Encryption



For total privacy, encryption is needed.
All encryption methods are designed to
protect data in transit, so that it is readable
only at the source and destination
Some encryption methods are tied to user
authentication, so that you are assured of
who the data came from and that it can be
read only by the intended recipient
Encrypt End-to-End or per
Link/Hop?
*



End-to-End approach encrypts at source and
decrypts at destination
 Good news: can’t be read in the middle
 Issue: routers need to read addresses. Data
is secure, destination address is not.
Per Link/Hop Encryption: decrypt/encrypt at
router
 More time consuming (increases latency)
 Unencrypted data at router is vulnerable
It is possible to use both approaches
simultaneously
 Overhead includes increased bandwidth and
latency
Where to encrypt?

APPLICATIONS


TRANSPORT (TCP/UDP)
NETWORK (IP)
Data Link (hardware address)
Physical Layer (wires)

Encryption managed
by the application
Encryption managed
near transport layer
Encryption managed in
the network layer
By design, each layer
is unaware of what
occurs at other layers
Virtual Private Network
(VPN)
IPSec
 Capable of
encrypting/authenticating
ALL data at the IP layer
 Transparent to
applications (no changes
needed)
APPLICATIONS
TRANSPORT (TCP/UDP)
NETWORK (IP)
Data Link (hardware address)
Physical Layer (wires)
Secure Socket Layer (SSL)




Created and torn
down on a persession basis
Frequently used on
web servers –
https://
Transparent to the
application
Note: over TCP
only
APPLICATIONS
SSL / TLS
UDP
TCP
TRANSPORT
NETWORK (IP)
Physical Layer (wires)
Application Specific
Encryption
Examples
 E-Mail



APPLICATIONS
S/MIME
PGP
Kerberos
TRANSPORT (TCP/UDP)
NETWORK (IP)

Video / Voice ????
Physical Layer (wires)
Does the videoconferencing
application do encryption?

Not really
Standards exist (next speakers)
 Not implemented in the market
 Certain vendors offer proprietary use
of standard encryption algorithms and
claim to have a “standards-based
solution” BUT no inter-operability
(Tandberg, VCON)

Encryption political issues
Encryption software is slow;
Encryption hardware is expensive and
increases the cost of the product
 Encryption algorithms may be covered
by patents and use requires licensing
(eg: RSA)
 Encryption algorithms may be subject
to export control (eg: DES)

Let’s Consider the
videoconferencing application
Hop to Hop
Communication
End-to-End
Communication
Model for both H.323 and SIP architectures
Things to notice in the model




SIP Call Control is over
TCP
H.323 Call control is
UDP at ends and TCP
in the middle
Media streamS –
separate voice, video,
data, etc. Perhaps two
video streams (one in
each direction)
UDP precludes use of
SSL
Review:
Encryption can be done with IPSec,
SSL or by Application
 No application-layer encryption for VC
 No SSL for VC due to UDP
 Guess that leaves IPSec and “clever
hacks”

Let’s place the model in a
university medical center



Videoconferencing
uses dynamic ports
– BLOCKED
Outside calls
coming in –
BLOCKED
Willingness to
reconfigure firewall
- NONE
One approach to secure
videoconferencing today
Unencrypted here
“Secure Telemedicine Utilizing State-Wide Internet”
NIH-SBIR Phase 1. Jim Chamberlain, AZ Technology. Julie
Harper, Jill Gemmill UAB.
Pros and Cons



PRO
Very inexpensive if
you already own the
firewall
Relatively simple to
install and operate
Requires cooperation
of firewall
management




CON
Requires remote VC
station that can load
VPN client software
Suitable for fixed
point to point only
Requires cooperation
of firewall
management
VC station must be
able to send VPN IP
address, not its own
Another approach: a pair of
departmentally managed VPN’s
Pros and Cons


PRO
Can be installed at
departmental level
Works with
“appliance” VC units
like Polycoms



CON
VC units must be
able to send VPN IP
address as reply
address rather than
their own
Added expense of
firewall/VPN units
Fixed locations only
IP Freedom Solution
Encryption
Module
Announced
& due in
market
shortly
Works with
SIP and
H.323 Call
Servers
Pros and Cons







PRO
Extremely easy to install;
no need to contact
network staff
Flexible connectivity
Available as an I2
Commons service
Transparent to end users
Works for both SIP and
H.323
Client software is free
Supports mobile users




CON
Expensive
Encryption module :
more expensive
Licensing is based on
number of concurrent
users; number shrinks
with bandwidth used,
and encryption
Proprietary technology
(but only need one!)
“Clever hack”
Other gotcha’s
If your campus has a bandwidth
manager (Packeteer-type device) your
VC multimedia may be mistaken for
annoying video/music and have its
bandwidth limited
 Result – can degrade or terminate VC
session

Action Items ?
Collect “Best Practices” for Secure
Videoconferencing?
 Feedback to I2/federal agencies on
importance of Application-layer
security for video/voice applications
 Other ?

Acknowledgments
“ViDe.Net: Middleware for Scalable Video
Services for Research and Higher Education”
NSF ANI-022710 (Gemmill, Chatterjee,
Johnson)
“Alabama Internet2 Middleware Initiative”, NSF
EPSCoR, EPS-0091853 via UA-01-016)
(Shealy, Gemmill)
“Secure Telemedicine Utilizing State-Wide
Internet” NIH-SBIR Phase 1. Jim Chamberlain,
AZ Technology. Julie Harper, Jill Gemmill UAB.
Any opinions, findings or recommendations expressed in this material are
those of the authors and do not necessarily reflect the views of the
National Science Foundation.