VoIP Security 188
An anonymous reader writes "Whitedust are running an interesting article on the security aspects of VoIP. From the article: "The fact that VoIP operates across standard networks makes it vulnerable to all manner of IP hacking - including man in the middle attacks,sniffing, session hijacking, etc." Considering it's recent growth, how secure is VoIP?" PCM2 sent us a wired bit about Phil Zimmerman of PGP working on a privacy system for Voice over IP calling
The Dumbing-Down of America...part XXVII (Score:5, Informative)
From TFA: And all these errors are in just the introduction.
Now, I don't expect perfection, but the sheer amount of errors present here is beyond the pale, and renders the reader incapable of trusting the subject matter presented, or taking the author seriously.
Mr. Anderson, about 98% of the errors in your article could have been avoided by the use of a simple spell-checker. Nowadays, people don't actually need to know how to spell, as we have software to do that for us...but you have to actually use the software.
Re:The Dumbing-Down of America...part XXVII (Score:2)
The Crux of the Biscuit (Score:2)
A clue as to why... (Score:3, Informative)
Their website [whitedust.net] lists their numbers as: "Tel: 00353 - (0)87 - "...etc numbers, so they're not in North America.
This: (Mon, 14 Feb 2005 16:57:12 +0000) also suggests a European country (I think). So maybe English isn't their first language.
Re:A clue as to why... (Score:3)
They may speak with a funny accent there but they're pretty likely to know English..
Re:A clue as to why... (Score:2)
So then we should be talking about the dumbing down of Ireland then, not America.
I blame Guinness.
Re:The Dumbing-Down of America...part XXVII (Score:3, Informative)
Re:The Dumbing-Down of America...part XXVII (Score:2)
amount (-mount') pronunciation
n.
1. The total of two or more quantities; the aggregate.
2. A number; a sum.
3. A principal plus its interest, as in a loan.
4. The full effect or meaning; import.
5. Quantity: a great amount of intelligence.
I don't find tha
Re:The Dumbing-Down of America...part XXVII (Score:2, Funny)
Re:The Dumbing-Down of America...part XXVII (Score:2, Informative)
It is best, when correcting an article's spelling, not to make grammatical errors yourself.
"The sheer number of errors" would be correct, as errors are counted not measured.
Re:The Dumbing-Down of America...part XXVII (Score:2, Insightful)
I think it is not correct that you discredit the author about the seriousness of his article. After all, from what i can see, most mistakes in there are the usual typos and common mistake from those having english as their second/thi
Man in the middle. (Score:5, Interesting)
The only security problem I see is if the attacker can learn information that lets him make calls billed to my account. This becomes the VOIP vendors problem anyway. When I notice something wrong with the bill I'll do a chargeback on my credit card for the bill and simply change VOIP providers. If this happens a lot, the VOIP vendor will do something about their security problem.
Or am I missing something?
Re:Man in the middle. (Score:3, Interesting)
If an attacker has access to a router beyond your isp/backbone but before the signals reciever then the contents can be subverted.
Admittedly, if all you do is argue about the sports scores then there is not much risk.
But if you were using VOIP as a transparent replacement to POTS (Plain Old Telephone Service) and were ordering a new car or dicussing your new pin number with the bank then things are quite different.
Re:Man in the middle. (Score:5, Informative)
POTS is wide open to MIM attacks.. in fact anyone with a cheap earpiece can do it - no need for a PC even.
Re: (Score:3, Insightful)
Re:Man in the middle. (Score:2)
If you are a man in the middle at a Telco, then you probably have the knowledge of what pair to listen to. That assumes someone who is specifically targetted. You could just be unlucky enough to be the one which is randomly listened to at the Telco.
Unless they are hanging off the pole outside your house (which would be rather brazen) I
Comment removed (Score:5, Insightful)
Re:Man in the middle. (Score:2)
If you just have a person's name to go by, it's a hell of a lot easier to find out where they live (which doesn't change much) rather than what IP address they are currently connecting from.
Re:Man in the middle. (Score:2)
There is one sense in which VOIP is much more secure than POTS and inherantly has to be, and that's in security from "Authority".
All POTs systems have wire-tapping built in for the Intelligence services and available to the police. There is next to nothing that can be done about that short of the telecoms joining the People's Revolution.
VOIP may not automatically be encrypted, but it's pretty easy to learn how and short of the NSA having some secret technology we don't know about, you can know that n
Re: (Score:2)
Re:Man in the middle. (Score:2)
Two things:
There's this thing called a judical branch. It issues other things called warrants. The bad guys (tm) need them before they can tap your phone line.
I never said that I was talking about security except where someone decides to secretly remove it. I was talking about security full stop, even if the government doesn't approve of you having it. With VoIP, you can have security regardless of what the police think.
Furthermore, before you accuse me of deluding myself, you might want to bring
Re: (Score:2)
Re:Man in the middle. (Score:2)
Re:Man in the middle. (Score:2)
If your tinfoil hat is that large then I suggest you give up the computer and move to the woods and live off the grid.
Sorry if my rational arguement has driven you to retreat into strawmans. Tinfoil hat refers to absurdities - mind-control satellites, etc. I think the belief that the US and UK governments spy on people is somehow not quite in that category.
Re:Man in the middle. (Score:2)
First off, thank you for a much more informed rebuttal than the other one.
My more serious answer to your points are as follows:
a) they can trivially break your VoIP security if they do a MITM attack, unless you have a functioning PKI (that you can verify),
That's not an unlikely 'unless.' Exchanging public keys (or fingerprints, I should say) would be quite easy unless you are initiating a call with a complete stranger. Even if you haven't had a chance to swap details with your partner beforehand, y
Re:Man in the middle. (Score:2)
That's not an unlikely 'unless.' Exchanging public keys (or fingerprints, I should say) would be quite easy unless you are initiating a call with a complete stranger. Even if you haven't had a chance to swap details with your partner beforehand, you can always begin the conversation with "my fingerprint is ..."
Telephones are often used for calling strangers. Also, this bas
Re:Man in the middle. (Score:3, Insightful)
Used to be that way with a lot of information crimes, but the internet makes them possible on a whole new scale. Imagine a mim attack that compromises a couple of major VoiP hops, and sorts out the calls to banks and creditcard companies based on phone number, or whatever. That can be automated now, so a guy
Re:Man in the middle. (Score:2)
Ever hear of an inductive amplifier? About $20 gets you one of these treats. You can walk up to someone's house and push the button on it once you find the phone line going into their home. Most phone lines are exposed on the exterior for at least a few feet. Anyone that's ever 'toned a line' knows what to do and how easy this is.
Furthermore, with a lineman's test handset, you open a pedestal in the neighborhood and clip your alligator
Re:Man in the middle. (Score:2)
But doing it from home, with a beer and a movie going in the background? Much easier.
Re:Man in the middle. (Score:2)
Security as a Business Liability issue (Score:2)
Try telling this to a judge. In the event that a security breach does take place (resulting in, for instance, loss of customer data), businesses don't want to be in the position of saying "but you could have sniffed that traffic just as easily on a POTS network, your Honor." Using POTS is the standard for security, and as bad as it is, you don't unduly expose yourself to liability by using tradition
What about... (Score:2)
Re:Man in the middle. (Score:2)
False (Score:2)
The real problem is that the man in the middle may handle the conversation in any way that they see fit. They can then place any set of words in your mouth (and the other parties). It becomes possible for various groups to total misdirect you or the other parties into certain directions. Interestingly enough, this can be used to provide for false convictions. And yes, this is very
Man in the middle is easy with VoIP (Score:2)
Actually it's trivial - by subverting the call setup negotiation. They don't even need to subvert the carrier's servers - replacing or inserting a SIP proxy via, for instance, DNS cache poisoning would do the job. With call setup corrupted the actual streams can be routed through any machines and paths they want.
Even if they can get that access all they can do is listen to my calls, have a chat w
Paranoia (Score:5, Funny)
I thought you were going to give me a lift to Tinas?
Thats tomorrow, have you been taking my pain killers again?
No... erm... ok I'll see you later
*click*
Wait, we are being line-tapped
Oh my god! Execute the Omega 13 Device!
*end of world*
Really - if you want security, talk in tongues, or use a third party audio scrambler, plus encrypt the session. (then unencrypted it will just sound like noise). Plus standon one foot while you talk, and occassionally look through the venetian blinds for snipers across the rooftops.
Re:Paranoia (Score:4, Funny)
and occassionally look through the venetian blinds for snipers across the rooftops.
-SNIP-
Dude, why not stick your head out the door for a few seconds too while your at it? If you take paranoia seriously, you seriously need to set up outdoor pinhole cameras, like I have. I love the espressions of frustration on the sniper's faces. Also, keep in mind your location can be determined by a tempest brainwave triangulation attack, so wear the proper protection. (you have been warned)
Cain and VoIP Sniffing (Score:5, Informative)
Re:Cain and VoIP Sniffing (Score:2, Informative)
http://www.infonomicon.org/irongeek/videos/cainvo
PacketCable VoIP security (Score:5, Interesting)
Of course, now ask how many cable compaines are actually deploying fully PacketCable-compliant systems with all the security turned on the way it was designed to be.
No discussion about this, w/out VoIPsec list (Score:5, Informative)
Re:No discussion about this, w/out VoIPsec list (Score:2)
PGPfone (Score:2, Informative)
http://web.mit.edu/network/pgpfone [mit.edu]
Damn hippies.... (Score:2)
Anyone who believes that this is some 'golden age' of free communications is on crack. And cheap crack at that.
POTS is also vulnerable (Score:2, Informative)
If you have a set of aligator clips and a phone. Or a set of diaganol cutters (DoS attack).
I mean, really
- Brian Roach
One has to wonder... (Score:2, Insightful)
Re:One has to wonder... (Score:2, Informative)
In fact, if you want to believe NIST, most of the hardened encryption algorithms can all verge on introducing too much delay into the process. The solution is to introduce a priority scheduling component into encryption engines, but given the language of the report, I'm not sure that's widely done at the moment.
NIST has a nice technical report regarding all (or most) of the VoIP security approaches. It's quite lengthy, though, so use the ToC. http: [nist.gov]
What about something like OTR? (Score:3, Interesting)
Anonymous Diffie-Hellman would be "good enough" (Score:3, Insightful)
The downside is, that a MITM is possible to get the key, but that's pretty damn unlikely compared to people just sniffing and listening to your call or blindly injecting data to an existing one. From what information is available about Skype, it does something like this, I believe.
But, designing horribly complicated systems that cover the corner cases seems to be the norm, and those get ignored due to complexity and thus everyone does the unencrypted thing in the end
Re:Anonymous Diffie-Hellman would be "good enough" (Score:2)
Not to say that anonymous DH w/ SRTP
So what? (Score:4, Interesting)
How secure is the PSTN? (Score:5, Interesting)
If you think the PSTN is really secure, you might want to look through some old issues of 2600...
Nomadic vs Non-Nomadic VoIP (Score:2, Interesting)
I've been using VoIP for the better part of two years now, and it's maintained by my ISP. I run it over the Ethernet hookup I have, and as far as functionality is concerned I hardly notice the difference from POTS.
Outages? I've had two. Once when my apartment lost power (thus the VoIP-box lost power) and once when some major link in my ISP's chain went down. As a matter of fact, I've had FEWER problems with VoIP th
To Be Banned (Score:2, Interesting)
I wonder how long it will be until things like VoIP encryption is illegal to implement on the user-to-user end. Once the government catches wind via some wacked-out organization, they're going to be pushing legislation to ban such products - all in the name of preventing terrorism, of course.
Heck, my opinion is it's only because of the history of the open nature of computing that this industry is allowed to have encryptions like SSL where the government can't tap the line.
And if you don't believe me, s
SIP/SSL? (Score:2, Interesting)
PGP-type encryption would be good {key servers, if you use them properly, are incredibly powerful: post your out-of-date private keys and now nothing you ever signed using any of them can be authenticated!}, but it isn't transparent.
Whatever solution is adopted
Killer Crypto Application - secure SIP (Score:2)
Re:Killer Crypto Application - secure SIP (Score:2)
So what's wrong with SRTP? (Score:2)
I'd worry about the market for a new product when the demand has already been tested and found wanting.
Then there's always the option of running your calls on a VPN, as several people have pointed out already. That's what I would suggest to a potential client in an initial consultation.
*sigh* (Score:3, Interesting)
With VoIP you have to actually be on the network.. and not just on the network.. but IN the packet stream.
Hacker A who is on a server off the switch can't listen to your conversation... they woudl have to interrupt the packet stream flowing through the router.
VPN (Score:3, Interesting)
1. they don't have to be bothered with trying to figure out what ports to forward on the firewall and
2. they have so much difficulty in troubleshooting their own systems that they love to blame everything on us.
In any event, I picked up the new o'reilly book on voip and they talk a lot about avoiding vpn as it creates lag. They also indicate that sending all of your QOS flagged traffic down a VPN tunnel eliminates the ability of the upstreams to "see" the QOS flags as they are encrypted. Anyone else have experience with this?
Re:VPN (Score:2)
If it's a TCP tunnel, you add really bad delay and jitter in response to packet loss.
If it keeps UDP as a form of UDP (IPSEC might do this), you only lose the QOS flags plus any VPN-related delay (which may be non-trivial, or may be no worse than direct SRTP encryption).
Not an Afterthought (Score:2)
Patriot Actions (Score:2, Interesting)
The Justice Department officials who "investigated" Zimmerman (persecuted him) set back the availability of privacy tech by at least half a decade, right when the Internet exp
You want security? (Score:2)
It's amazing what good design can do to improve security.
"Oh you mean just setting up random SIP connections over the net is a bad idea?"
Voice Security (Score:2, Interesting)
So much safer. (Score:2)
Re:So much safer. (Score:2)
Hrm. Tough call.
Re: (Score:3, Insightful)
Re:So much safer. (Score:2)
I don't think that word means what you think it means.
DoS attack? Want to take out a neighborhood? Piece of rope tied to a car bumper and the little 2ft post on the side of the road. Or just knock the lock off with a cheap hammer, then reach in and pull out a handfull of wires.
Hit a big box with your car to cause real havoc.
How about listening to cell calls with a scanner? Ask Newt Gingrich about that one.
Monitoring a POTS line is still as simple as climbing a pole and attaching a couple of
You could (Score:2)
Re:So much safer. (Score:2)
Try clicking the receiver a bunch of times... no good. If there is a way to free the line, I don't know what it is. Since you are such a brilliant fellow, I am sure you know.
Point is... if you ar
Re:So much safer. (Score:3, Informative)
Check your house for nosy people and failing that call your telco to have it looked at.
Of course I've never heard of that problem before. Doesn't mean you're making it up but more than likely the reason is more than a "remote DoS" attack.
Mostly call-centers can only fake their CID information [but not ANI] which makes call display all fucked up [but not their billing]. That's about
Re:So much safer. (Score:2)
If your experiment doesn't work as I predicted, let me know. I've had it happen on more than one line, and yes, I am sure no one on my end picked up a receiever.
Maybe call-waiting would get around it, but if you didn't have it, I know I could tie
Re:So much safer. (Score:3, Informative)
Tom
Re:So much safer. (Score:2)
It's normal behaviour for the caller to control the state of the call - it's actually useful - for example if someone phones you and you pick it up on an extension you can hang up and go to the another phone and pick up.. and the caller will still be there.
In this country all phones work like this, even the new digital exchanges. I'd expect in the US it's more varied as there isn't one telco running everything.
Re:So much safer. (Score:2)
Re:So much safer. (Score:2)
Re:So much safer. (Score:2)
What country are you in?
Re:So much safer. (Score:2)
The CALLER can hang up quickly
But on EITHER end a hangup of more than 3-4 seconds is enough to totally disconnect the call.
Maybe you are confusing "hang up" with "put on hold"? Calls on hold are still off-hook just the audio has been muted.
Tom
Re:So much safer. (Score:2)
It's "you're" by the way
Re:So much safer. (Score:2)
In reality if you stood on a soap box spouting crap like that I'd tell you to shut up as well.
And it doesn't make me feel better, it makes me sad that there are people like you living amongst us. It makes me weep for the future, do you have or plan on having kids? Seriously consider giving them up for adoption.
Tom
Comment removed (Score:5, Interesting)
Re:Hmm... (Score:2)
I live in a college-heavy neighborhood, in a DUI-heavy state...you'd be surprised just how often this can happen (though I lose power more often than phone).
I once had drunk drivers crash into some box two houses down that apparently my home power runs through twice in three weeks. Same box. Different cars. No joke. And it wasn't even the snowy season.
Of course, this has nothing to do with VoIP security...
Re: (Score:2)
Re:Hmm... (Score:4, Insightful)
[sarcasm] Yeah, fuck progress! [/sarcasm]
taxes and fees (Score:2, Interesting)
My phone company charges $12 for my no-frills service. Somehow the bill I pay is $45 after all the fees and taxes. Those extra charges are the main reason I'm considering bailing from POTS to VoIP. They'll catch up sooner or later, but for a time, I can keep some of my money.
Heck I might have some cash to enter the sucker mill^H^H cell phone subscriber pool.
Re: (Score:2)
Re:Hmm... (Score:2)
Keep risk management in perspective. In the case of a business, I think it would be a good idea to keep at least one POTS line, to prevent a total outage of phone se
Re:Hmm... (Score:2, Informative)
It is good enough, and that's exactly what we do. I have a VoIP "line" from AT&T at our business for outgoing long distance, plugged right into our phone system. It saves us probably $200 - $300 a month in long distance (You should see what busi
Re:Hmm... (Score:2)
Cant we just stick to regular telephones? I dont want my 911 call to be interrupted by a denial of service attack...
Police arrive in time to arrest a suspect less than 3% of the time when 911 is called and a much smaller percentage of the time in order to actually stop a crime. Fire departments have a little bit better track record, but usually if you don't get out yourself, they aren't going to save you. Basically, don't overvalue the 911 system. It is not really very useful in most emergencies and th
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
Re:Hmm... (Score:2)
Yes, and then funny enough when I try to use that capability by wanting to transfer my number from ATT to Vonage then suddenly ATT is incapable of doing this and have been dragging their feet for 2 months already.
It has now reached the point where if ATT became the only phone supplier in the world then I would have to go back to snail mail. Idiots.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Cisco / Encryption (Score:2)
It makes sense on one level - you're preventing
Re:speakeasy's VoIP service (Score:2)