Secure Telephony Enabled Middle
Download
Report
Transcript Secure Telephony Enabled Middle
Secure Telephony Enabled
Middle-box (STEM)
STEM is proposed as a solution to network vulnerabilities,
targeting the transmitting of real-time data over enterprise networks.
Maggie Nguyen
Dr. Mark Stamp
SJSU - CS 265
Spring 2003
Topics
IP Telephony Overview
STEM Architecture
IP Telephony Components
IP Telephony Protocols
How SIP Works
Architecture Components
Call Scenarios
STEM Security Countermeasures
DoS Attack
Eavesdropping
IP Telephony Components
1.
2.
3.
4.
5.
Gateways
Gatekeepers
IP Telephones
PC-based Software
Phones
MCUs
IP Telephony Protocols
Internet Engineering Task Force (IETF):
Signaling: Session Initiation Protocol (SIP)
Transport: Real Time Protocol (RTP)
Media Description: Session Description Protocol (SDP)
International Telecommunications Union (ITU):
Signaling: H.323
Codecs: G.711 (PCM), G.729, …
ISDN: Q.931
STEM architecture is currently using the network required for SIP
deployment.
How SIP Works
– SIP Call Setup
DNS Server
DNS Query for
the IP Address of
the SIP Proxy of
the Destination
Domain
2
The INVITE is
forwarded
The Location Service is
being queries to check that
the destination SIP URI
represents a valid registered
device, and requests for its
IP Address
Location Service
4
3
A request is sent
(SIP INVITE) to
ESTABLISH a
session
1
SIP Proxy
5
The request is forwarded to
the End-Device
SIP Proxy
SIP IP Phone
6
sip:[email protected]
Media Transport
SIP IP Phone
sip:[email protected]
Destination device returns
its IP Address to the
originating device and a
media connection is opened
How SIP Works
DNS Server
DNS Query for
the IP Address of
the SIP Proxy of
the Destination
Domain
– SIP Call Sequence
The Location Service is
being queries to check that
the destination SIP URI
represents a valid registered
device, and requests for its
IP Address
Location Service
SIP Proxy
SIP Proxy
SIP IP Phone
sip:[email protected]
SIP IP Phone
sip:[email protected]
STEM Architecture Components
Security Manager (SM)
Enhanced Firewall
Media / Signaling Gateway (M/S Gateway)
User Terminals
STEM Enhanced Firewall
Pattern Matcher
Protocol Parser
Flow Monitor
Application Gateway
External Interface
Call Scenarios –
Net-to-Net
Call Scenarios –
Net-to-Phone
STEM Security Countermeasures
Denial of Service
TCP SYN Floods detected by Flow Monitor.
SIP INVITE Floods detected by Protocol Parser.
Malicious RTP Streams detected by Flow Monitor.
M/S Gateway Voice Port saturation.
Eavesdropping
Control Flow: STEM uses secured communication
protocols among SM, firewall, M/S gateways.
Data Flow: STEM replies on application protocols
(SIP or H.323) to implement payload encryption.
References
International Engineering Consortium. H.323.
http://www.iec.org/online/tutorials/h323/
Reynolds, B. Challenges Challenges and Rewards in Enterprise
Deployments of IP Telephony Presentation.
http://networks.cs.ucdavis.edu/~ghosal/Research/Talks/IP-TelNetlab%20talK%20-%20rev%202.ppt
Reynolds, B. Deploying IP Telephony in an Enterprise and the
Vulnerabilities that Come With It Presentation.
http://seclab.cs.ucdavis.edu/secsem2/ReynoldsSeminar.ppt
Reynolds, B. and D. Ghosal. STEM: Secure Telephony Enabled
Middlebox. IEEE Communications Magazine Special Issue on
Security in Telecommunication Networks. October 2002
http://www.off-pisteconsulting.com/research/pubs/ieee_comm.pdf