Top Banner
Secure VoIP Mobile Secure Communication Solutions for Enterprises April 2015 Marco Pozzato - CTO [email protected] Emanuele Gambaro – Android Engineer [email protected]
19

Secure VoIP - DroidCon 2015

Jul 19, 2015

Download

Technology

Marco Pozzato
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Secure VoIP - DroidCon 2015

Secure VoIP

Mobile Secure Communication Solutions for Enterprises April 2015

Marco Pozzato - CTO

[email protected]

Emanuele Gambaro – Android Engineer

[email protected]

Page 2: Secure VoIP - DroidCon 2015

Agenda

● Introduction● Network challenges● SW Engineering challenges● MultiPlatform challenges● Security challenges

Page 3: Secure VoIP - DroidCon 2015

Introduction

Privacy & Business threats● Industrial espionage● Mass surveillance

Secure Voice & Text Communications

Page 4: Secure VoIP - DroidCon 2015

Mobile Communications

● GSM is insecure

● Data Over Voice codec

● CSD is phased out

● → SVOIP

Network challenges

Page 5: Secure VoIP - DroidCon 2015

Mobile Communications

Mobile data networks are evil● Packet loss● Burst based● Highly congested● TCP exponential backoff● VoIP block (censorship or contractual)

Network transparency myth!

Network challenges

Page 6: Secure VoIP - DroidCon 2015

Mobile Platforms for VIP

VIP smartphones in enterprises● Blackberry OS 5/6/7: push email● Iphone: cool device● Android: power users and geeks● Blackberry 10: strong security & EMM

Tech Guys are scaling organizations hierarchy

Multiplatform challenges

Page 7: Secure VoIP - DroidCon 2015

Porting from Blackberry 5

Blackberry VS Android● Differences between platforms

● Our first try● Our final solution

Multiplatform challenges

Page 8: Secure VoIP - DroidCon 2015

Porting to BlackBerry 10

Blackberry 10 and Android runtime

● Easy to port application from android to Blackberry 10.3

● ...but a lot of missing important features

● Our solution: a native app

Multiplatform challenges

Page 9: Secure VoIP - DroidCon 2015

Zorg

Zorg – a cross-platform ZRTP library

● What are ZRTP and ZORG?

● Diffie-Hellman is slow in sw

● Embed standard BC with ECDH → package name clash

Software engineering challenges

Page 10: Secure VoIP - DroidCon 2015

Multi-product codebase

One codebase, different products

● Manage UI resources

● Manage different languages and product name

● Manage different products from the same source code

Software engineering challenges

Page 11: Secure VoIP - DroidCon 2015

Data In Transit

How to protect communications between device and server

● Using secure connections and PKI

● Use only right ciphers"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"

● Trust only one Certificate Authority

Security challenges

Page 12: Secure VoIP - DroidCon 2015

Data At Rest / 1

How to protect key and password on device

● Android keystore support

● Keystore bughttps://code.google.com/p/android/issues/detail?id=61989

● API changes from 4.x to Lollipop

Security challenges

Page 13: Secure VoIP - DroidCon 2015

Data At Rest / 2

How to protect user data on device● Protect sqlite databases using sqlcipher for Android

● Secure logging

Security challenges

Page 14: Secure VoIP - DroidCon 2015

Randomness and entropy

Java SecureRandom bug

Our test on Samsung S3 with android 4.3

***** BUG FEED DATABASE *****

Run # 3987

Duplicates #15

Pid | seed

6945|96c8cf6b3c3f0786|2

6958|ade560b0c3d272f6|2

[...]

9378|0b9b08fe52b6003d|2

Our solution: using device microphone

Security challenges

Page 15: Secure VoIP - DroidCon 2015

Generate key from password

Use PBKDF2 as key derivation function

● Generate strong encryption password from PIN or password

● Iteration tuning

● Android charset bug

Security challenges

Page 16: Secure VoIP - DroidCon 2015

Vulnerability assessment

● Made by third party company

● Different methodologies

● Some examples

Security challenges

Page 17: Secure VoIP - DroidCon 2015

Static analysis

Static analysis on android application

● Goal of a static analysis

● What can be found with static analysis?

● Common false positive

Security challenges

Page 18: Secure VoIP - DroidCon 2015
Page 19: Secure VoIP - DroidCon 2015

Links● support.privatewave.com● www.zrtp.org