Toll Fraude and how to avoid hacking on SIP Trunking. Remote user (app) access Michael Pisvin SI/SP System Engineer So SECURITY IS IMPORTANT 7 A typical enterprise environment Access to Applications Remote User Data Center VPN Switch Application /server Farm Enterprise Remote locations Application Firewall Internet PC / Workstation Router SIP Trunks SP SBC IMS SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi PC / Workstation 8 A typical enterprise environment Access to Applications Remote User Possible attacks Data Center VPN Switch Application /server Farm Enterprise Remote locations Application Firewall Internet PC / Workstation Router SIP Trunks SP SBC IMS SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi PC / Workstation 9 Application Specific Security Application Level Security Proxy Firewall (Policy Application, Threat Protection Privacy, Access Control) Firewall enterprise SBC Complements Existing Security Architecture 10 SIP trunk what is it? Session Initiation Protocol (SIP) o Controls multimedia communication sessions such as voice, instant messaging, video, etc. o Many types of devices - computers, phones, video equipment, etc. - can exchange data over SIP o SIP is considered a quality protocol with flexibility to support integrated voice & data communications SIP Trunking o Virtual voice channels (or paths) over an Internet Protocol (IP) network o Delivered over an IP connection o One SIP trunk can support many direct inward dial (DID) extensions 11 In almost all the cases you need to have a MPLS access to the Service Provider SIP Trunk Issue Service provider needs to get access to your network to access the Data Center – IP PBX – The user Is MPLS secure? Application /server Farm Router SIP Trunks SP SBC IMS SP provider MPLS PC / Workstation Signaling Corporate Network Corporate Wifi BYOD Wifi Voice 12 MPLS is NOT secure "When looking to move to an MPLS VPN solution, many customers downplay the threats to the security of the transmission path and instead put their full trust in the security of the service provider. The attacks shown in this report make it clear that MPLS VPN customers who need confidentiality and integrity beyond what a public network provides must look to implement some form of encryption at the endpoints to provide complete protection." http://www.certesnetworks.com/newdocs/wp-ianspaper.html 13 In almost all the cases you need to have a MPLS access to the Service Provider SIP Trunk Service provider needs to get access to your network to access the Issue Data Center – IP PBX – The user Is MPLS secure? Put an SBC in between the MPLS and your network to hide your environment Solution Application /server Farm Can activate Voice encryption signaling encrypted Router SIP Trunks SP SBC IMS X SP provider MPLS X VoIP encrypted PC / Workstation Signaling Corporate Network Corporate Wifi BYOD Wifi Voice 14 Four Reasons you need an SBC Security Privacy Interoperability Demarcation 15 SIP Interoperability, is it really a problem? SIP Provider 1 Multiple Service Provider tests Interoper ability SIP Provider 1 Single Service Provider test Router Firewall SBC FMC FMC Recording SIP PBX Conf Video CC WFO IVR Recording SIP PBX Telepresence SIP Signaling 16 Conf Video CC WFO IVR Telepresence SIP Interoperability, Multiple Service Providers?? Interoper ability SIP Provider 2 SIP Provider 1 Multiple Service Provider tests Two Service Provider tests Router Firewall SIP Provider 2 SIP Provider 1 SBC FMC FMC Recording SIP PBX Conf Video CC WFO Recording IVR SIP PBX Telepresence SIP Signaling 17 Conf Video CC WFO IVR Telepresence SIP Privacy, is it really a risk? Privacy I can see session information from all these apps & systems SIP Trunks SIP Trunks I can only see the SBC. It is hiding the network topology Router Firewall SBC FMC FMC Recording SIPPBX Conf Video CC WFO IVR Recording SIPPBX Telepresence SIP Signaling 18 Conf Video CC WFO IVR Telepresence An SBC will protect your UC traffic SBC Protecting your UC infrastructure Security SIP Trunks Demarca tion Router Firewall DOS and Fuzzing not working! SBC protecting The organization SBC SIP PBX SIP Signaling Voice 21 An SBC will protect your UC traffic Session Border Controller Security Privacy SIP Trunks SIP PBX Interop erability Demarcation Back to Back User Agent 22 Comparison SBCs vs. Firewalls with SIP ALGs Firewall with SIP ALG SBC • Back-to-back user agent • Maintains single session ̶ Fully state-aware at layers 2-7 ̶ Fully state-aware at layers 3 & 4 only ̶ Inspects and modifies any application layer header info (SIP, SDP, etc.) ̶ Inspects and modifies only application layer addresses (SIP, SDP, etc.) ̶ Can terminate, initiate, re-initiate signaling & SDP ̶ Unable to terminate, initiate, re-initiate signaling & SDP ̶ Static & dynamic ACLs ̶ Static ACLs only Data center Data center SIP trunking IP PBX UC server SIP trunking 23 Acme Packet IP PBX UC server 23 VoIP Security is Different Layer 3 attack Layer 4 attack OS attack Application attack SIP protocol fuzzing SIP denial of service/distributed denial of service SIP spoofing SIP advanced toll fraud (call walking, stealth attacks) Remote Worker Media Replication Signaling/Media Encryption Firewall SBCE Standard IDS / IPS SBCE Advanced IP-PBX …requires intimate knowledge of VoIP and call states 24 Remote Users Access via VPN Access to Applications Remote User Data Center VPN Switch Application /server Farm Access via Firewall for applications as Email, etc.. Enterprise Remote locations Application Firewall Internet PC / Workstation Router SIP Trunks Access via SIP for SIP users SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi PC / Workstation 25 Office Users Access to Applications Remote User Data Center VPN Switch Application /server Farm signaling encrypted Enterprise Remote locations Application Firewall Internet PC / Workstation VoIP encrypted Router SIP Trunks Identity control to put the user in the correct VLAN SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi PC / Workstation 29 Customers Facing Rapid Technology Change More Collaboration and Mobile Devices… More Enterprise Security Threats 4:1 Mobile projects will outnumber PC projects 400% 802 30% 16% Million Increase in dedicated video soft clients by 2016 Tablets by 2016 Increase in mobile enterprise investments through 2015 Of enterprise will be cloud based by 2015 Source: Gartner 30 Office Users (BYOD) Access to Applications Remote User Data Center VPN Switch Application /server Farm Enterprise Remote locations Application Firewall Internet PC / Workstation Router SIP Trunks SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi 31 Identity control to put the user in the correct VLAN Check OS etc.. Only access to office application via SBC/firewall PC / Workstation The full secure Network Access to Applications Remote User Data Center VPN Switch Application /server Farm Enterprise Remote locations Application Firewall Internet PC / Workstation Router SIP Trunks SP SBC IMS SP provider MPLS Enterprise remote offices PC / Workstation Corporate Network Corporate Wifi BYOD Wifi PC / Workstation 32 Risk Management: Seeking Balance 33 33 © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. Thank You What can Avaya do for you here? © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 36 Enterprise Collaboration Platforms Mobile Clients Video & Conferencing Switched Video & Conferencing UC & CC Managed Services Do not duplicate, publish or distribute further without the express written permission of Avaya. High Availability SPB / Fabric Connect SLA Mon Technology Avaya Aura Conferencing ACA Low Bandwidth High Definition Video IP Office Top of Rack © 2014 Avaya Inc. Avaya – Confidential & Proprietary Multi-Channel Collaboration Environment Self-Service Desktop Video Client Multicast Video Surveillance Avaya Diagnostic Server Avaya Messaging Service Speech Analytics Session Border Controller Identity Engine Avaya Automated Chat Where can Avaya help you? Avaya Multilayer security in the UC/CC world Full data network (Edge to Core) SPB Stealth Network (for LAN and Wan) Full separated network depending on the organization Avaya SBC for the enterprise for the full SIP security Identity Engine (so that every user/device is in the correct secured network) © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. Avaya’s Multilayer Security Strategy Secure by Design • Secure deployment strategy • Separates UC applications & servers from enterprise production network • Trusted communications framework with trust relationships for Administration, for Managing Elements, SIP Elements & Enterprise Network • Authentication & Authorization framework Security Built-In • Hardened Linux OS with inherent security features • Secures mission-critical applications and protects • Reduces potential Linux “attack surface” by limiting access to ports, services and executable • Security updates • Denial of Service protection mechanisms • Least privileges • Digital certificates • Insecure protocols disabled Secure Communications • Standard security protocols & trust relationships protects access and transmissions • Encrypted communications protect media, signaling & management traffic • Ensure protection of sensitive information • IP endpoints can authenticate to network infrastructure Use of Avaya’s multilayer security strategy prevents security violations and attacks © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. The full network Architecture VSP 9000 VSP 7000 ERS 8000 Collaboration Pod Identity Engine VSP 8000 WLAN 9100 VSP 4000 ERS 4000/5000 ERS 3000 Start with Fabric Connect-enabled infrastructure switches Add Fabric Connect access switches Use Fabric Attach for Avaya and 3rd party devices © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. WLAN 8100 From Complex, Rigid and Cumbersome Networks Server Access X Server Data Center Core VLAN VLAN VLAN STP VLAN X VLAN VLAN VLAN VLAN Campus Core VLAN VLAN VLAN VLAN VLAN VLAN VLAN VLAN Edge VLAN VLAN VLAN VLAN VLAN VLAN X VLAN STP VLAN VLAN VLAN Server STP SMLT/RSMLT MSTP VLACP/SLPP RSTP FlexLink OSPF OSPF Static routes routes Static BGP BGP PIM-SM/DVRMP PIM-SM/DVRMP VRF VRF STP SMLT/RSMLT MSTP VLACP/SLPP RSTP FlexLink To Simple, Agile and Resilient Networks Data Center Core Campus Core Distribution Edge VLAN Server Access VLAN Server VLAN VLAN Server Fabric Connect: IEEE 802.1aq / RFC 6329 © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. What is a “Stealth” Network Any network that is enclosed and self contained with no reachability into and/or out of it. It also must be mutable in both services and coverage characteristics The common comparible terms used are MPLS IP-VPN, Routed Black Hole Network, IP VPN Lite Avaya’s Fabric Connect based on IEEE 802.1aq provides for fast and nimble private networking circuit based capabilities that are unparalleled in the industry “Stealth” Networks are private ‘dark’ networks that are provided as services within the Fabric Connect cloud L2 Stealth A non-IP addressed L2 VSN environment L3 Stealth A L3 VSN IP VPN environment © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. 43 Superior Virtual Networking Use Case – Multi-Tenancy: Transportation Industry Extremely complicated Practically un-scalable Error prone Static model © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. Highly scalable Agile configuration Simple troubleshooting Highly dynamic Secure Guest and BYOD Networking Use Case – Unified User Access Multi-vendor solutions Manual integration Independent security layers Wired and wireless access © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. Identity Engines Employee Mobile Zone Guest Zone Secure employee and guest access wired and wireless Automatic VLAN / QoS / VSN Assignment Single Sign-on for Aura Applications Reporting and analytics for compliance Access Policies Identity Engines Role-based Access IF (identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) Case 1 Employee with corporate laptop THEN GRANT FULL ACCESS IF (identity = HR employee) AND IF (device = personal iPad) Case 2 Employee with personal iPad © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. AND IF (medium = wireless) THEN GRANT LIMITED ACCESS The Solution – Avaya Session Border Controller for Enterprise Portfolio Industry Leading Enterprise UC Security Secure VoIP and UC over any network to any device, including smartphones, alternative devices and SIP endpoints Innovative VPN’less remote worker offering - enabling true BYOD Price/Performance Optimized for Enterprise & SME Fit for purpose SME / Enterprise solution Not a repackaged carrier SBC Scalability – up to 5,000 sessions and more in the near future Ease of Implementation & Management Rapid implementation of safe SIP trunks, remote workers and advanced UC applications SIP trunks operational in minutes, not months High Availability GUI-based SIP normalization tool TCO & ROI VMWare compatible © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya. Avaya Product Security Support Team – PSST Assessment / Penetration Testing Avaya’s Product Security Support Team - PSST Internally-focused Security Assessment / Penetration testing of Avaya products Penetration test tool kit leveraged across GCS Products Security Assessment testing includes: Replicate customer or “attacker” methodology Find / Resolve issues before the field does Measure progress against standards e.g., CTO, JITC, Nessus /Retina: “.mil” plug-ins Unscripted testing Champion best security practices across Avaya © 2014 Avaya Inc. Avaya – Confidential & Proprietary Do not duplicate, publish or distribute further without the express written permission of Avaya.