17
SECURING VoIP NETWORK: AN OVERVIEW OF APPLIED APPROACHES AND ANALYSIS Michael Oche, Rafidah Md Noor Member IEEE, Abubakar Bello Tambawal and Mostofa Kamal Nasir ABSTRACT - VoIP is becoming more and more popular and as such a potential target for hackers. Providing security for VoIP services is therefore pertinent for telecommunications. Without correct mechanisms to ensure callers’ authentication, transmission confidentiality and availability of the service, security of the VoIP users is at risk. The fact that VoIP relies on IP infrastructure make it vulnerable to any attack that targets the network. Consequently, whatever may be the nature of the attack, there is a good chance that the attacker is capitalizing on a weakness in the VoIP protocol being used. VoIP is different from other IP services in the sense that its security is normally treated as one of the service properties configurable by the user. This article provides an overview of CISCO VoIP security requirement, aimed at empowering public VoIP user With the strategies to mitigate threats. Keywords: AAA, CIA, PSTN, Telephony, VoIP, 2.0 INTRODUCTION Voice over Internet Protocol (VoIP) is a rapidly growing Internet service. It gained popularity as a way to cut costs of international telephone connections by transporting voice over public IP networks [1]. Today it is being implemented in many IP applications, where it enables direct, and most time free communication over the Internet to users globally. As a

Securing Cisco Voip Network

Embed Size (px)

DESCRIPTION

The fact that VoIP relies on IP infrastructure make it vulnerable to any attack that targets the network. Consequently, whatever may be the nature of the attack, there is a good chance that the attacker is capitalizing on a weakness in the VoIP protocol being used. VoIP is different from other IP services in the sense that its security is normally treated as one of the service properties configurable by the user. This article provides an overview of VoIP security requirement, aimed at empowering public VoIP user With the strategies to mitigate threats.

Citation preview

Page 1: Securing Cisco Voip Network

SECURING VoIP NETWORK: AN OVERVIEW OF APPLIED

APPROACHES AND ANALYSIS

Michael Oche, Rafidah Md Noor Member IEEE, Abubakar Bello Tambawal and Mostofa

Kamal Nasir

ABSTRACT - VoIP is becoming more and more popular and as such a potential target

for hackers. Providing security for VoIP services is therefore pertinent for

telecommunications. Without correct mechanisms to ensure callers’ authentication,

transmission confidentiality and availability of the service, security of the VoIP users is

at risk. The fact that VoIP relies on IP infrastructure make it vulnerable to any attack

that targets the network. Consequently, whatever may be the nature of the attack, there

is a good chance that the attacker is capitalizing on a weakness in the VoIP protocol

being used. VoIP is different from other IP services in the sense that its security is

normally treated as one of the service properties configurable by the user. This article

provides an overview of CISCO VoIP security requirement, aimed at empowering

public VoIP user With the strategies to mitigate threats.

Keywords: AAA, CIA, PSTN, Telephony, VoIP,

2.0 INTRODUCTION

Voice over Internet Protocol (VoIP) is a rapidly growing Internet service. It gained popularity

as a way to cut costs of international telephone connections by transporting voice over public

IP networks [1]. Today it is being implemented in many IP applications, where it enables

direct, and most time free communication over the Internet to users globally. As a

Page 2: Securing Cisco Voip Network

consequence, VoIP technology slowly replaces traditional telephony. There are numerous

attack vectors when dealing with VoIP, and since VoIP depends on the IP infrastructure any

attack that targets the network can be a potential hazard for VoIP. Consequently, whatever

may be the nature of the attack, there is a good possibility that the attacker is capitalizing on a

weakness in the VoIP protocol being used. Providing security for this service is therefore

pertinent for telecommunications. User private information, business negotiation details or

even state secrets could be revealed if not well protected. Without a correct mechanism to

ensure callers’ Authentication, transmission confidentiality and service availability, the

security of VoIP users are at risk. In view of this it is pertinent and imperative to investigate

VOIP security problem and evaluate the service to assure that moving telephony to a new IP-

based platform does not compromise its security [2]. In most cases “advances and trends in

information technology typically surpass the corresponding realistic security requirements” .

This is no different in case of VoIP. Most efforts were till today invested in providing more

advanced services and applications, with less attention paid to security. Another prevailing

problem lies in users' perception of VoIP telephony, the fact that VoIP telephony idea is not

completely new, it follows the exemplification of traditional telephony and it’s seen by the

users as a replacement to traditional telephony. A replacement users presumed should provide

similar security level. But unfortunately, VoIP is different, in the sense that its security is

usually treated as one of the service properties configurable by the user. As such in this paper

we reviewed and analyzed basic CISCO VOIP network security requirements, with the aim

of empowering public VoIP users and equipping them with relevant basic tools or

information on how to better secure their VOIP telephony system.

Page 3: Securing Cisco Voip Network

3.0 LITERATURE ANALYSIS

Voice over Internet Protocol is a somehow a different technology, even though an average

telecommunication user knows it concerns the Internet and is relatively cheaper, he/she

probably may not know any details beyond that. The traditional telephony system since its

introduction in 1878 involved three main stages, first it existed in a form of a first generic

telephone network which required a constant human presence to switch and setup call. Later

in 1891 [3] POTS were introduced. Plain Old Telephone System (POTS) provides for

automated switching thereby completely eliminating the need for human presence. In 1970

POTS were replaced with a more advanced system known as the Public Switched Telephone

Network (PSTN). Unlike POTS the PSTN uses digital signals, voice is no longer transmitted

as an analogue signal as in the case of POTS but as a digital signal. This development made it

possible to offer other services such as fax and other database services. The introduction of

the PSTN system marks the beginning of the digital communication system and to make

communication even more seamless the new PSTN was also compatible with the POTS

system, which uses the lowest transmission bandwidth of 4KHz despite the fact that digital

services are transported on higher frequencies [3]. Beginning from 1990 the higher

bandwidth brought about as a result of digitization find their usefulness in data network

access technology. Many Internet access services, like ISDN and then DSL, ADSL are now

offered via the same access lines that were used for PSTN [4].

3.1 THE ARCHTECTURE

The acronym VoIP represents, Voice over Internet protocol which implies that voice packet

is transported using Internet Protocol (IP), it’s a packet switching system. VoIP is different

from the PSTN which is a circuit switched. Unlike the PSTN which irrespective of the

amount of information to be sent, reserved a full transmission bandwidth. VoIP, on the other

hand, is packet switched. Information that is to be sent is divided into packets and

Page 4: Securing Cisco Voip Network

transmitted. Only meaningful information is put into packets. Additionally each packet may

travel with a different route (dynamic routing) in a transport network, as there is no single

reserved path (circuit). As a consequence packet arriving at the destination may come in a

different sequence, than they were sent. Also, as there is no guaranteed bandwidth, some

packets may be lost. These packets are simply transported using the Internet Protocol (IP).

Voice transportation using the IP works just the same way, as in any other application like

WWW or email. The internet's tariffing system is based on a philosophy different from that

of the PSTN. Tariffing is independent of geographical distance between the sender and

receiver. Therefore, transmitting data between any two points costs the client the same

amount, but in the case of traditional PSTN its different (calls are charged based on distance).

Figure 1 shows four scenarios that related to the IP Network PSTN. Figure 1.1 shows

scenario 1, the first VoIP applications, the application permits voice communication between

two users of the Internet, and it has grown so popular to an extent that it is now used in many

Instant Messaging (IM) clients, like Skype, Messenger, etc. Voice transmission over IP works

just as any other Internet service and fully converged with other IM applications. The next

step of VoIP development came with the calls from Internet users to PSTN fixed subscribers

figure 1.2 scenario 2. The main advantage of such a telecommunication solution is that

information traveled through the Internet as long as possible and are forwarded to the PSTN

at the very end – as close to the subscriber as possible. Thanks to this, even international calls

are treated as local calls by PSTN provider. The total cost is considerably diminished [5].

Page 5: Securing Cisco Voip Network

Figure 1: VoIP/PSTN basic scenarios [5].

The last two scenarios (figure 1.3 and figure 1.4) might be used by providers when the need

arises (whenever circumstance requires its implementation). Unquestionably, there are allot

more complicated scenario cases in used, but they would merely be a variation of the four

presented in Figure1.

3.2 PROTOCOLS AND CONCEPTS

While introducing VoIP one has to mention some basic elements and concepts of a VoIP

system. As can be seen in Figure 2 there are four basic elements of a VoIP System [5].

Page 6: Securing Cisco Voip Network

� Terminal – In a VoIP environment it refers to the end point of communication

devices , usually where the calls are being terminated. A terminal could either be

software base or hardware based and could also involve some automatic interaction

such as voice mails.

� Server – server is the focal point of a VoIP system. Registration of terminals and data

information such as location and IP is stored here. Also the server performs some

other operations such as setup call routing mechanism, authorization and accounting

operation.

� Gateway – Is the outmost edge of the VoIP network. It ensures the interoperability of

the VoIP network with other networks such as converting voice calls and fax calls

amidst PSTN and IP network..

� Conference Bridge – For multi point communication. Allows for the functionality of

several communication points. Because of the high resource requirement of the

conference bridge it is isolated from the server just as shown in figure 2.

Page 7: Securing Cisco Voip Network

Figure 2: VoIP basic architecture

4.0 SECURITY REQUIREMENTS ANALYSIS

Risk assessment of Voice over IP in public networks should start with analysis of security

expectations. One should state what requirements are imposed on the system. Of course

before such an analysis may be performed, definitions of the basic and most widespread

security requirements should be given.

4.1 GENERAL REQUIREMENTS

There are many different ways to classify the security requirements. One of them is the CIA

triad, which concerns three most basic security problems – Confidentiality, Integrity and

Availability [6]. These three issues describe properties of the communication process that

happens between two parties. They are usually also considered superior requirements and all

the others, mentioned in the following subsections are just requirements that help to meet

Page 8: Securing Cisco Voip Network

those three major ones, by covering more specific problems. CIA are basic system security

requirements, but it does not mean they are simple.

Confidentiality: - usually mean: “restrictions on the accessibility and dissemination of

information” Which in case of VoIP (or generally telephony) means limited access to the

information exchanged between two or more communication endpoints. It is usually

accomplished by encryption of the transmitted information [6].

Integrity: - usually regards insertion, deletion or modification of information. In VoIP

telephony, two integrity issues appear – data and signaling. Data integrity regards the

exchanged content and signaling integrity considers all the protocol information necessary for

transmission handling. Compromising signaling integrity may result in compromising almost

every other security requirement [4]. That is why the “correctness, completeness, wholeness,

soundness and compliance with the intention of the creators of the data” has to be ensured.

Availability: - is one of the most important security requirements that needs to be ensured. If

the service is not available most of the time, the technology will not be considered feasible,

reliable and trustworthy by the users. The availability of a system is usually measured in a

time unit - system's uptime. In traditional telephony this uptime is at least 99,999% [6].

Providing such a low downtime on an IP based platform is an extremely challenging

problem. If Availability is not guaranteed, the system will suffers from degradation or

interruption in its Service to the customer as a consequence of failures of one or more of its

part. Since VoIP requires a real-time transmission, already lowered quality may make the

conversation impossible to be carried out.

Page 9: Securing Cisco Voip Network

4.2 AUTHENTICATION, AUTHORIZATION, ACCOUNTING

While CIA requirements describe the properties of a communication process, the AAA

regards mostly user-system interaction. It stands for Authentication, Authorization and

Accounting [7], [8]. The AAA requirements are also complicated, but not as ambiguous as

CIA.

Authentication: regards checking identity. There are many possible system subjects that may

be authenticated. It may be the provider, end-user, or any other intermediate device. Because

of that there are two basic types of authentication in VoIP:

� End-to-end, where only the communication end points authenticate to one another, the

devices in between, or provider do not take part in the process and they are not aware of

end-users identity, as most of the communication details are hidden,

� Hop-to-hop, which is safer and easier to implement, as devices in between also

authenticate the users and one another and have access to all the communication details.

However, there is an issue of trusting those devices, as we share our authentication

information with them.

Authentication is necessary to correctly set up the communication between endpoints. It

usually includes identification of the users and verifying the integrity of messages containing

authentication information [7].

Authorization: Once the end-user has been identified, his/her rights in the system have to be

determined. Authorization process is necessary to check if a user (or some administrator) is

allowed to perform a requested operation or access requested data. For example, it is used by

providers in VoIP authorization, to find out what tariff plan should be used for a given user,

what data may be accessed by him/her, etc. It is also a crucial process of accessing VoIP

Page 10: Securing Cisco Voip Network

server (IP-PBX) [8]. Unauthorized access and modification of configuration data may result

in compromising many other security requirements.

Accounting: is regarded as the activity, practice, or profession of maintaining the business

records of a person or organization and preparing forms and reports for tax or other financial

purposes. It is a process necessary for creating billing invoices for clients1. Because of that it

is a very important issue for the provider – as it wants to be paid for the service; and for the

client, as he/she does not want to pay more than necessary [8].

5.0 METHOD OF SECURING CISCO VoIP NETWORK SYSTEM

Cisco maintains a set of best practices collected in a solution reference network design

(SRND) document that provides guidelines for deployment and installation of the unified

Call Manager. Much of Cisco’s IP telephone infrastructure relies on a Cisco Call Manager

(CCM) which is a software-based call-processing component of the Cisco IP telephony

solution. Skinny Client Control Protocol (SCCP) is Cisco’s proprietary signaling protocol

used between CCM and phones. Below are Cisco approaches to mitigating security threats

[9].

5.1 CISCO DISCOVERY PROTOCOL (CDP) SNIFFING

If an attacker is an insider or already has partial access to one internal network, there are

varieties of passive host discovery techniques specific to a Cisco VoIP deployment that he

can perform. Cisco Discovery Protocol (CDP) is a proprietary layer 2 network management

protocol built into most Cisco networking devices, including VoIP phones. CDP is used

particularly in a callmanager environment to discover and remove IP phones dynamically, for

dynamic allocation of VLANs to IP phones’ and other management functions. CDP packets

are broadcast on the local Ethernet segment and contain a wealth of useful reconnaissance,

information transmitted in plaintext about Cisco devices, including IP address, software

versions, and VLAN assignments. Most network sniffers can easily decode CDP traffic.

Page 11: Securing Cisco Voip Network

Cisco recommends turning off CDP on Cisco devices especially where the environment is

mostly static. However, in a VoIP environment CDP can offer so much management

functionality that keeping enabled where absolutely needed might be an acceptable trade-off.

But from a strict security perspective, however CDP can provide attackers with a wealth of

data about one network and should be disabled. Also Cisco switches and routers have

security feature called DHCP snooping that will cause the device to act as a DHCP

firewall/proxy between trusted and untrusted network interfaces [9].

5.2 PROTECTING A VoIP NETWORK WITH SECURITY APPLIANCES

Security appliances such as firewalls and VPN termination devices also can be used to protect

voice networks. However the, one challenge of protecting voice networks with a firewall is

that the administrator is unsure what UDP ports will be used to transmit the RTT voice

packets. For example in a Cisco environment a UDP port for an RTP stream typically is an

even number port selected from the range of 16,384 to 32, 767. Opening this entire range of

potential ports could open unnecessary security hole. But Cisco firewalls that is the PIX and

Adaptive security appliance (ASA) firewalls solve this problem because it can dynamically

inspect call setup protocol traffic e.g. H.323 traffic to learn the UDP port to be used for RTP

flows. The firewall then temporarily opens those UDP ports for the duration of the RTP

connection [10].

5.3 HARDENING VOICE ENDPOINTS AND APPLICATION SERVERS

Recall that a Cisco IP phone makes a collection of configuration information freely available

by pointing a web browser to the IP address of Cisco IP phone. This potential weakness can

be mitigated by changing the web access parameter from enabled to disabled. Also to prevent

man-in-the-middle attack, one can change the gratuitous ARP setting from enable to disable.

By disabling the gratuitous ARP feature, one is preventing a Cisco IP phone from believing

Page 12: Securing Cisco Voip Network

unsolicited address resolution protocol (ARP) replies, which potentially could have come

from an attacker claiming to be the next-hop gateway for the Cisco IP phone. Aside from

voice end points, other popular attack target on voice networks includes application servers,

such as Cisco UCM server. Also Cisco had already provided a hardened version of the

operating system that runs on a UCM server to take care of this problem [10].

5.4 PROTECTING A VoIP WITH AUXILIARY LANS

Part of Cisco’s SRND recommends segmenting the voice and data networks with logically

separate VLANs. This will help restrict access to the phones and critical servers. A

fundamental approach to protecting voice traffic from attackers is to place it in a VLAN

separated from data traffic. This voice VLAN is often called an auxiliary VLAN. VLAN

separation alone protects voice traffic from a variety of layer 2 attacks. For example, an

attacker would be unable to launch a man-in-the-middle attack against the IP phone’s next-

hop gateway. Such an attack will be mitigated, because the attacker’s PC would be connected

to a data VLAN while the IP phone was connected to the auxiliary VLAN.

Many models of Cisco IP phones include an extra Ethernet port to which a PC can attach.

The attached PC communicates through the Cisco IP phone can transmit traffic in a separate

VLAN (that is a data VLAN for the PC traffic and an auxiliary VLAN for the phone’s voice

traffic) while still connecting to a single Cisco Catalyst switch port [10].

6.0 CISCO HARDENING RECOMMENDATIONS

� Enabling port security on Cisco switches to help mitigate ARP spoofing. Port

security is a mechanism that allows one to allocate a legitimate MAC address of

known server and devise ahead of time specific to each port on the switch. Thus one

can block access to an Ethernet, fast Ethernet, or Gigabit Ethernet port when the

Page 13: Securing Cisco Voip Network

MAC address detected is not on the preassigned list. This will help prevent ARP

spoofing attack.

� Dynamically restrict Ethernet port access with 802-1x port Authentication. This

enabling 802.1x port authentication protects against physical attacks whereby

someone walking around inside the organization plugs a laptop into an empty

network jack in order to sniff traffic.

� Enabling DHCP snooping to prevent DHCP spoofing. DHCP snooping is a feature

that blocks DHCP responses from ports that don’t have DHCP servers associated

with them. This prevents attack by man-in-the-middle that masquerades as a valid

DHCP server in order reroute traffic to his machine. Also traffic entries should be put

in the DHCP-snooping binding table to be used with the dynamic ARP inspection

and IP source guard that do not use DHCP.

� Configure IP source guard on catalyst switches. The IP source guard (IPSG) feature

uses DCHP snooping to prevent IP snooping on the network by closely watching all

DHCP IP allocations. The switch then allows only the valid IP address that has been

allocated by the DHCP server on that particular port. This feature mitigates the

ability of an attacker trying to spoof an IP address on the local segment.

� Change the default native VLAN value to thwart VLAN hopping. Most switches

come installed with a default native VLAN ID of VLAN 1. Because attackers can

sometimes perform VLAN hopping attacks if they know the VLAN IDs ahead of

time, it is usually a good idea to never use VLAN1 for any traffic. Also change the

default native VLAN ID for all traffic going through the switch, from VLAN1 to

something hard to guess [11].

Page 14: Securing Cisco Voip Network

Table 1. Summaries of CISCO mitigating methods.

ATTACK

MITIGATION

DESCRIPTION

Using auxiliary

VLANs

Auxiliary LANs transport voice traffic in a different VLAN from data

traffic. This improves voice transmission quality and assist in securing

voice traffic from layer two attacks.

Using firewalls Effective use of firewalls could prevent potential harmful traffic from

entering a voice network while dynamically opening suitable UDP port

number of distinctive RTP flows.

Employing IPSec-

protected VPNs

Employing IPSec-protected VPNs to mitigate against voice signal and

media packet interception or modification.

Disabling web

access

To prevent attackers from using the web access to CISCO IP phone to

acquire knowledge of other servers such as the DHCP server, DNS and

UCM server IP addresses, by Disenabling the web access to the Cisco

IP phones, which by default is usually enabled.

Disabling

gratuitous ARP

Disenabling gratuitous ARP (GARP) can check against man-in-the-

middle attack. This will prevent an attacker from sending unsolicited

ARP replies to a Cisco IP phone’s next-hop gateway in the attacker’s

PC MAC address

Disabling

unneeded services

Unneeded services such as TFTP service on a UCM server that is not

acting as a TFTP server should be disabled to close any potential

security holes that might exist in a system.

Page 15: Securing Cisco Voip Network

Figure 3 Summaries Threat Taxonomy.

Page 16: Securing Cisco Voip Network

7.0 CONCLUSION /FUTURE WORK

There are many security requirements, but from among them in this paper only a few most

important ones have been chosen to describe VoIP Cisco networks: The bottom line of the

security solutions analysis is that, although there are some attacks that are extremely difficult

to handle, most may be eliminated with the use of existing security measures. Correct

deployment of available security solutions can make VoIP a service with security level very

close to those known from the PSTN, while keeping all its advantages, like advanced services

such as user control, flexibility and lower costs. However, the biggest problem of VoIP

system is that those security solutions are actually seldom deployed. This problem regards

most of all, end users. The truth is that most of the users do not have any idea about security

threats and countermeasures in IP networks, and to make it even worse, they do not want to

know. More serious threats to VoIP system may be realized due to weak end-devices

protection or lack of encryption. Both are caused by users' lack of expertise and knowledge. It

is, however, difficult to expect the user to be a specialist in VoIP technology just to make a

phone call. Any service or application that is being offered in public network should be

simple and the security taken care of by the provider. In the future researchers need to

research on better VoIP security measure that does not involve the end user participation in

the security process.

ACKNOWLEDGEMENTS

The authors would like to thank the High Impact Research of Ministry of Higher Education of Malaysia

(UM.C/HIR/MOHE/FCSIT/09) for their support.

Page 17: Securing Cisco Voip Network

REFERENCES

[1] A. D. Keromytis, "A Comprehensive Survey of Voice over IP Security Research,"

Communications Surveys & Tutorials, IEEE, vol. 14, pp. 514-537, 2012.

[2] D. R. Kuhn, et al., "Security considerations for voice over IP systems," NIST special

publication, pp. 800-58, 2005.

[3] K. B. Otterstedt, "Risk analysis on VoIP systems," MSc thesis, University of Iceland, 2011.

[4] Digital subscriber line. Available: http://en.wikipedia.org/wiki/Digital_subscriber_line

[5] S. Niccolini, et al., "IP Telephony Cookbook," ed: TERENA, 2004.

[6] D. Butcher, et al., "Security Challenge and Defense in VoIP Infrastructures," Systems, Man,

and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 37, pp. 1152-

1162, 2007.

[7] D. Sisalem, et al., "Denial of service attacks targeting a SIP VoIP infrastructure: attack

scenarios and prevention mechanisms," Network, IEEE, vol. 20, pp. 26-31, 2006.

[8] C. Rensing, et al., "AAA: a survey and a policy-based architecture and framework," Network,

IEEE, vol. 16, pp. 22-27, 2002.

[9] D. Endler and M. Collier, Hacking Exposed VoIP: Tata McGraw-Hill Education, 2007.

[10] M. Watkins and K. Wallace, "CCNA Security Official Exam Certification Guide (Exam 640-

553)," 2008.

[11] I. Dacosta, et al., "Security Analysis of an IP Phone: Cisco 7960G," in Principles, Systems and

Applications of IP Telecommunications. Services and Security for Next Generation Networks.

vol. 5310, H. Schulzrinne, et al., Eds., ed: Springer Berlin Heidelberg, 2008, pp. 236-255.