380 likes | 819 Views
VOIP Security in IC (TLS/SRTP). Amjed Syed. Agenda. Part1: VOIP Security in IC 3.0 Need for VOIP Security Securing SIP, RTP (Understanding TLS/SRTP) Implementing TLS/SRTP in IC Part 2: Demonstration on Implementing VOIP Security Implementing TLS/SRTP on below devices Polycom Phones
E N D
VOIP Security in IC (TLS/SRTP) Amjed Syed
Agenda • Part1: VOIP Security in IC 3.0 • Need for VOIP Security • Securing SIP, RTP (Understanding TLS/SRTP) • Implementing TLS/SRTP in IC • Part 2: Demonstration on Implementing VOIP Security • Implementing TLS/SRTP on below devices • Polycom Phones • SIPLines • Mediant 1000 Gateway • SIP Proxy 4.0 • Using wireshark to Troubleshoot TLS/SRTP
Security Issues in Data Transmission Privacy Anyone can read the content Integrity Someone can alter the content Authentication Not clear whom you are communicating to
Securing Communication through SSL Security Feature enhancements in IC 3.0 Subsystem and Client Connection Security Network(IP) and User connection security SIP Messages and Audio(RTP) Security
What is SSL/TLS SSL is cryptographic protocol that provides Security and Data Integrity for communication of TCP/IP Networks using Public/Private keys and Signed certificates. SSL Encrypts the segments of transport layer protocols in use for an end to end connection across network.
SSL/TLS Implemented SSL/TLS Protocol Versions • SSL – Secure Sockets Layer Version 2.0 • Initially developed by Netscape • SSL 2.0 is sensitive to man-in-the-middle attacks leading to the negotiation of weak 40-bit encryption keys • SSL 2.0 should not be used any more • SSL – Secure Sockets Layer Version 3.0 • Internet Draft authored by Netscape, November 1996 • TLS – Transport Layer Security Version 1.0 • Successor to SSL 3.0 • IETF RFC 2246, January 1999 • TLS 1.0 is not backwards compatible to SSL 3.0 (differences in MAC computation, PRF function for master_secret and key material)
SIP Messages and Audio(RTP) Security • Encrypting SIP messages via Transport Layer Security (TLS) provides an inexpensive layer of security with little overhead that prevents call control from being intercepted and attacks on audio devices. • If additional security is desired to ensure that audio cannot be intercepted or listened to, SRTP (Secure RTP) audio protocol can be used, so that even the audio transmissions will be encrypted.
Understand Different SSL Components • Certificates • Public Key (Asymmetric Key) Encrytion • Symmetric Key Encryption • Hash Algorithms • PKI (Public key Infrastructure)
PKI (Public Key Infrastructure) A system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in a Network Communication.
Different Encryption Algorithms that can be used in SSL • For key exchange(Public-Key): RSA, Diffie-Hellman, ECDH, SRP, PSK • For authentication(Certificates): RSA, DSA, ECDSA • Symmetric ciphers(Encryption): RC4, Triple DES, AES, IDEA, DES, or Camellia. • For cryptographic hash function(Message Hash): HMAC-MD5 or HMAC-SHA are used for TLS, MD5 and SHA for SSL.
Available list of TLS Cipher suites in ICSIP-TLS Line configuration Modes of operation http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
Encryption prevents eavesdroppers from understanding messages
Authentication prevents eavesdroppers from impersonating IC users.
Security on SIP Line Configuration • Transport Protocol • Audio Protocol • Security – TLS Security
Signing Third Party Certificates Note: If using your own third-party CA and line certificates, you must use your own certificate signing utility to sign the third-party device.
Generating Certificates Manually with GenSSLCertsU • GenSSLCertsU -s :: Generates all local server subsystems certificates. • GenSSLCertsU -c <Notifier> :: Generate client connection certificates. • GenSSLCertsU -l <CN Name or Domain Name> [-d] ::Generates a new lines certificate [-d] parameter makes it default. • GenSSLCertsU -d <Notifier> [<IC User Name>] [<IC User Password>] ] ::Request a certificate for a SIP device connection • GenSSLCertsU -r <Notifier> [<IC User Name>] [<IC User Password>] ::Requests a remote IC Server for subsystems connection certificate
Demonstration Part2: Demonstration • Implementing TLS/SRTP on below devices • Provisioning Polycom Phones • SIPLines • Mediant 1000 Gateway • SIP Proxy 4.0 • Using wireshark to Troubleshoot TLS/SRTP