project ppt

advertisement
The
study
and
demonstration on SIP
security vulnerabilities
Mahidhar Penigi
Vamsi Krishna Karnati
Introduction

Session Initiation Protocol, is a text based protocol

Signaling protocol to initiate, manage and terminate voice sessions

BICC, H.323, MGCP and MEGACO

SIP is very similar to HTTP

For secure SIP transmissions SIP secure (SIPS) is used

SIP establishes and terminates a session in a series of handshakes (Illustrated
in the next slide)
The three way handshake
http://www.packetizer.com/ipmc/sip/papers/understanding_sip_voip/sip_call_flow.png
Major drawbacks of SIP

SIP does not have inbuilt security Elements like:

Encryption Authentication, and Confidentiality have to deployed a another layer
for additional security in SIP

Encryption: Malicious users and hackers are easily able to intercept and
decode SIP messages retrieved using the simple networking tools/softwares.

Authentication:

It is not very simple for an unauthorized user to be traced down without additional
layers of security.

Due to this IP spoofing could be performed to enter the network and by replacing
another device with the same IP and kicking it out of the network.

This user is then authenticated within the SIP network since authentication
schemes come as a part of an external solution and is not inbuilt
SIP message protection is also required

Protecting content exchanged between two user or end devices during any
kind of exchange over an IP network is called message protection

Very important for end to end voice delivery to be reliable and secure to
avoid a major section of attacks that are classified by the attacker being able
to recognize and understand an ongoing target session
Attacks due to lack of encryption

Malformed message attacks

Message Tampering
http://blogs.ixiacom.com/default/assets/Image/SIP_fuzzing_attack.gif
Attacks due to lack of authentication

Denial of service attacks

IP spoofing

IP address of an authenticated device is borrowed temporarily to utilize the
services of the network, this is not authorized
Computer.howstuffworks.com
Attacks due to lack of authentication

Man in middle attacks, Eavesdropping and Registration Hacking
Other Attacks

Proxy Impersonation is where the attacker claims the identity of the proxy
server taking temporary control over all ongoing sessions (voice) and devices
interacting with it
http://www.asteriskdocs.org/en/2nd_Edition/asterisk-book-html-chunk/figs/web/ast2_0801.png
The solution for better security

A Telephony Solution that is need based is often deployed over SIP to take
care of the general security issues mentioned earlier

TCP/IP rather than UDP for SIP

Even though most SIP deployments are a compromise in infrastructure when
additional security is required


SIP is going to be accompanied with some kind of a TLS as well
Raw UDP transport method with ZRTP could also keep most hackers and
attacks away
PACKET TRACER 5

Network simulation Program provided by CISCO.

It helps to learn complex Technology concepts.

Unlimited Devices can be added into a network for demonstration.

Cisco certified tool for learning complex networks.
Demonstration of Attacks: Packet Tracer
5.0

IP spoofing

Registration Hacking

Denial of Service due to Packet flooding
Conclusion

Now specially with the advent of VoLTE, that provisions for a higher level
integration between the PSTN, IMS and VoIP networks is higher, and a small
loophole in one segment of one of the voice based networks could eventually
lead to a bigger threat for the larger VoLTE system in place. SIP is one such
loophole and it is very necessary to recognize, understand and prevent the
issues pertaining to Session Initiation Protocol (SIP) and hence deploy a better
network with better security standards.
References

www.voip-info.org/wiki/view/SIP+security

download.securelogix.com/library/SIP_Security030105.pdf

http://backtrack-linux.org
Download