Top Banner
Defending Voice over IP Networks Defending Voice over IP Networks Rodney Thayer, Canola & Jones, 02/13/06 - Session Code: TUT-031 Rodney Thayer, Canola & Jones, 02/13/06 - Session Code: TUT-031
55

Defending Voice over IP Networks Defending Voice over IP Networks

Nov 28, 2014

Download

Documents

Catharine24

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Defending Voice over IP Networks Defending Voice over IP Networks

Defending Voice over IP NetworksDefending Voice over IP Networks

Rodney Thayer,Canola & Jones,

02/13/06 - Session Code: TUT-031

Rodney Thayer,Canola & Jones,

02/13/06 - Session Code: TUT-031

Page 2: Defending Voice over IP Networks Defending Voice over IP Networks

IntroductionIntroduction

2

Page 3: Defending Voice over IP Networks Defending Voice over IP Networks

What this Tutorial is about

• VoIP (Voice over IP)

• Telephony

• Network Defense

• Studying attacks

• No exploits released

3

Page 4: Defending Voice over IP Networks Defending Voice over IP Networks

Contents

• Three “blocks” – 0900-1045, 1100-1245, 1400-1545

1. Intro; modern telephone networks; data network integration

2. Voice network threats

3. Defending voice networks

4. Impact of policy enforcement

5. Impact of voice/data convergence

6. Future threats

4

Page 5: Defending Voice over IP Networks Defending Voice over IP Networks

• Registration

• Use of cell phones, net, etc,

• Facilities, coat check, etc.

• Feedback forms

Administrivia

5

Page 6: Defending Voice over IP Networks Defending Voice over IP Networks

Who’s Rodney?

Introductions

6

Page 7: Defending Voice over IP Networks Defending Voice over IP Networks

Who are you?

Introductions

7

Page 8: Defending Voice over IP Networks Defending Voice over IP Networks

Telephony in the Modern Era

circa 2006

Telephony in the Modern Era

circa 2006

8

Page 9: Defending Voice over IP Networks Defending Voice over IP Networks

How it was in the old days

• Old school telco gear: analog phones, analog infrastructure

• Legacy (formerly hot, now old and crufty) digital telco gear

• Voice was really data (since 1957)

• Proprietary protocols

• Closed networks (operated by closed minds)

• Security by obscurity

• Hub-and-spoke technology with central control

9

Page 10: Defending Voice over IP Networks Defending Voice over IP Networks

The way things are now

• Voice IS data

• The telephone network IS the Internet

• The streams have been crossed: voice in data, data in phone calls

• The tools have merged: computers are phones and phones arecomputers

• Phone hackers and computer hackers are the same thing

10

Page 11: Defending Voice over IP Networks Defending Voice over IP Networks

Crossing the streams: voice joins the networking world

• First we had data networks: email, web, chat, office automation,data processing

• Then we added more media traffic, including video and audio andtelephone calls

• We added enterprise telephony services (not just phone calls)

• Now the worlds are intertwined: directories, voice mail with dataattachments, merged network traffic, merged or equivalentinfrastructure

• The attack surfaces are now intertwined too.

11

Page 12: Defending Voice over IP Networks Defending Voice over IP Networks

11.1

Page 13: Defending Voice over IP Networks Defending Voice over IP Networks

Voice Network Threats

“Shiny. Let’s be bad guys.”

Voice Network Threats

“Shiny. Let’s be bad guys.”

12

Page 14: Defending Voice over IP Networks Defending Voice over IP Networks

• As a tool

• As a target

• As a vector

An attacker’s view of a phone system

13

Page 15: Defending Voice over IP Networks Defending Voice over IP Networks

Attacker’s view of a phone system: As a tool

— Mis-use of the system

— Theft of services

— Malicious use: illegal, pornography, threats

— Graffitti target: defacement

— SPAM target

— No software or hardware compromise needed for it to be useful

14

Page 16: Defending Voice over IP Networks Defending Voice over IP Networks

An attacker’s view of a phone system: As a target

— Wire tapping

— Con games

— Physical Asset value

— Denial of Service attacks

— Business Process attacks

15

Page 17: Defending Voice over IP Networks Defending Voice over IP Networks

An attacker’s view of a phone system: As a vector

— A vector: a path to attack something else

— Part of the enterprise network infrastructure

— Part of the public network infrastructure

— Target is interconnected so all nodes have value

16

Page 18: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP Network Targets

So many targets, so little time…

VoIP Network Targets

So many targets, so little time…

17

Page 19: Defending Voice over IP Networks Defending Voice over IP Networks

17.1

Page 20: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets

• Management infrastructure

• Instruments

• Core services

• Dedicated infrastructure

• Shared infrastructure

18

Page 21: Defending Voice over IP Networks Defending Voice over IP Networks

18.1

Page 22: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Management Infrastructure

— Probably no logging

— Web UI flaws

— Management network segregation flaws

— Built for phone-heads, not network folk

— Security by obscurity as an implementation strategy

19

Page 23: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Instruments

— It's a $30 box with a full IP protocol stack.

— Mis-optimized: fashion, cost per unit, physical reliability, minimal

functionality

— Not resilience, management instrumentation

— Complete functionality

— Designed to leak information

— Not designed to be a secure endpoint

— Fully functional network peer

— Typically poorly monitored, as a network device

20

Page 24: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Core services

— A “call manager” of some sort

— Gateway stuff, to get to POTS/outside world

— Bandwidth feed into network (core)

— Traditional telephony core services:

— Directory

— Call accounting

— Telephone usage policy enforcement

21

Page 25: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Core services (more)

— Data interconnect to data network services

— Conventional servers, effectively stand-alone

— Strong telephony maintenance

— Weak network maintenance

22

Page 26: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Dedicated infrastructure

— Switches

— Wiring

— VLANs

— Parallel data network

— “Parallel” management infrastructure

— Siloed staff

23

Page 27: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Shared infrastructure

External:

— Shared data trunks

— Shared core/edge network gear

— Shared services infrastructure (hvac, power, physical)

24

Page 28: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Shared infrastructure

Internal:

— Avoid better instrumentation, management

— Increased attack surface of data network

— More heterogeneous use of data network means easier to hide

— Soft phones: just another weakness in the desktop

25

Page 29: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP components as targets: Conclusions

— Phones are likely to be weak.

— Phone software likely to be weak

— Infrastructure likely to be poorly defended

— Promising path into data network

26

Page 30: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIPDefending VoIP

27

Page 31: Defending Voice over IP Networks Defending Voice over IP Networks

“Trust but verify.”“Trust but verify.”

28

Page 32: Defending Voice over IP Networks Defending Voice over IP Networks

“Security is hard.”“Security is hard.”

29

Page 33: Defending Voice over IP Networks Defending Voice over IP Networks

“First do no harm.”“First do no harm.”

30

Page 34: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Overview

• Voice system and staff

• New, different, complicated gear

• Different paths in and out

• Different suppliers and resources

• Voice vendor solutions

• Network vendor solutions

• Process solutions

31

Page 35: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Options

• Hardening

• Instrumentation

• Maintenance

• Passive defenses

• Active defenses

32

Page 36: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Hardening

— Fixed interconnect is safer than flexible interconnect.

— Tight binding of instruments to infrastructure

— Strict control of data flow

— Conventional core service defenses

— “Conventional” infrastructure defenses

— Treat phones as endpoints, apply endpoint security strategies.

33

Page 37: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Instrumentation

— It’s a network. It needs logging.

— Integrated event management for all nodes

— ‘Logging’ means network logging, not call logging.

— Instrument core services too (especially directories)

34

Page 38: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Maintenance

— All equipment should be maintained just like network gear.

— Ask for “windows update” for phones.

— Maintenance processes are now a superset of (voice, data)

processes.

— Processes should reflect that voice is part of your data network.

35

Page 39: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Passive Defenses

— Firewalls (Data and VoIP)

— IDS (Data and VoIP)

— Event monitoring

— (Standard data network defenses)

36

Page 40: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Active Defenses

— Intrusion Prevention

— Access controls

— Segregated networks

— Standards

— (Standard data network defenses)

— Policies, e.g. endpoints are expendable

— Policy enforcement points

37

Page 41: Defending Voice over IP Networks Defending Voice over IP Networks

38

Page 42: Defending Voice over IP Networks Defending Voice over IP Networks

VoIP Policy EnforcementVoIP Policy Enforcement

39

Page 43: Defending Voice over IP Networks Defending Voice over IP Networks

Policy Enforcement for VoIP

• Phones are computers.

• Phones are nodes on the network.

• Network policy enforcement should be balanced to work.

• Therefore, policy enforcement should be applied to phones.

40

Page 44: Defending Voice over IP Networks Defending Voice over IP Networks

Policy Enforcement for VoIP: Options

— 802.1X/etc. for soft phone PC’s

— ‘Thick’ phones with security features

— NIST Opinions

— Update policies

— Integrated policy enforcement

41

Page 45: Defending Voice over IP Networks Defending Voice over IP Networks

Convergence

What happens when you cross the streams?

Convergence

What happens when you cross the streams?

42

Page 46: Defending Voice over IP Networks Defending Voice over IP Networks

Convergence: Definition

— Wireless everywhere

— 802.11 and GSM are just two kinds of radios.

— All phones are mobile phones.

— Phones are thick clients with rich services.

— Some vendor is going to talk you into doing a forklift upgrade.

43

Page 47: Defending Voice over IP Networks Defending Voice over IP Networks

Convergence: Issues

— How’s all that authentication work?

— Do all those radios really work?

— Rich services means large attack surface.

— Phone vendor mentality does not yield reliable products.

44

Page 48: Defending Voice over IP Networks Defending Voice over IP Networks

45

Page 49: Defending Voice over IP Networks Defending Voice over IP Networks

45.1

Page 50: Defending Voice over IP Networks Defending Voice over IP Networks

45.2

Page 51: Defending Voice over IP Networks Defending Voice over IP Networks

45.3

Page 52: Defending Voice over IP Networks Defending Voice over IP Networks

ConclusionsConclusions

46

Page 53: Defending Voice over IP Networks Defending Voice over IP Networks

Defending VoIP: Conclusions

• VoIP networks are viable targets. Be afraid.

• You can defend a VoIP network. Don’t be cheap about it.

• Sexy features trump secure implementations in the marketplace.

• The current state of the art tends to produce vulnerable targets.

• Push your vendors for solutions: patch management, reliablephones, defendable voice systems.

47

Page 54: Defending Voice over IP Networks Defending Voice over IP Networks

Rodney ThayerRodney Thayer

[email protected]@canola-jones.com

Page 55: Defending Voice over IP Networks Defending Voice over IP Networks