Flaws Threaten VoIP Networks? 159
jdkane writes "CNET News reports that security flaws have been found in products that use VoIP and text messaging, including those from Microsoft and Cisco Systems. What's interesting, in Microsoft's case, is that the Internet Security and Acceleration Server product that's also affected is designed to help protect companies' networks from online attacks. Specifically, a filter used in the server that secures VoIP communications is vulnerable to the flaw."
Imagine That (Score:4, Funny)
Re:Imagine That (Score:1)
Re:Imagine That (Score:4, Interesting)
Nation Public Radio (WBUR 90.9MHz to you fellow Bostonians) for one. Believe it or not, the great unwashed masses are starting to become aware of the problem with Microsoft.
Re:Imagine That (Score:2)
Re:Imagine That (Score:4)
Re:Imagine That (Score:5, Insightful)
Re:Imagine That (Score:1, Insightful)
Re:Imagine That (Score:1)
Though I partially agree with the sentiment, I disagree with your conclusions in both cause and effect.
maturity != security.
likewise:
brevity != security.
There is no magic formula that will equate to security. But there are some practices that will go a long ways and it does not take brevity or maturity to implement them. MS has shown no sign of ever implementing brevity (by any scale that has ever been made public), and matur
Microsoft Dedicated Security Products... (Score:2)
Re:Imagine That (Score:5, Interesting)
Unknown: Avaya, Fujitsu, Hewlett-Packard, Lucent and Nortel
Safe: Apple, Hitachi, NetBSD, Red Hat and Symantec
Is that a point for Security through open source as the two open products are already in the safe pile?
Re:Imagine That (Score:4, Funny)
2 1/2 (Score:1)
Re:Imagine That (Score:1, Funny)
I can make a mail client that never has a security flaw, either:
#!/bin/sh
PATH=/bin:/usr/bin
less
See how that works? No features, no security holes.
Re:Imagine That (Score:1)
Re:Imagine That (Score:2, Insightful)
stones, glass house....
You linked to Microsoft's patch (Score:5, Insightful)
Should we blame lazy sysadmins for not keeping their systems patched?
Or should we blame Microsoft?
Re:You linked to Microsoft's patch (Score:2, Insightful)
Re:You linked to Microsoft's patch (Score:5, Insightful)
Knowing MS, they'll offload packs that will break something else, or require deps on Service Packs. How do I know that upgrading Win2K SP2 to SP4 wont break the medical reporting server?
Re:You linked to Microsoft's patch (Score:1, Flamebait)
Re:You linked to Microsoft's patch (Score:2)
Re:You linked to Microsoft's patch (Score:4, Funny)
http://www.despair.com/consulting.html
Simply enough, it doesnt break once you set it up. Windows setups break on a regular basis, and my employers want yet more and more money.
Consulting with the "good old boy" businesses are the hardset to get Linux in.
Our RH 6.2 servers.. (Score:2)
Simply enough, it doesnt break once you set it up. Windows setups break on a regular basis, and my employers want yet more and more money.
Another reason to go with open protocols is that they don't "rust" with time.
We have RedHat 6.2 machines serving over 50 HTTP requests per second during peak hours. And the only reason we haven't changed them (upgraded ?) is that there are no problems with the services..(we apply our own patches of course)
Try to do that with a Microsoft product and after 2-3 year
Can you trust Microsoft - No (Score:2)
Re:You linked to Microsoft's patch (Score:2)
Re:You linked to Microsoft's patch (Score:2)
so if for isntance you need to run winnt 3.1 on your production floor you would have it segmented off from other networks.
Re:You linked to Microsoft's patch (Score:2)
Re:You linked to Microsoft's patch (Score:1)
Should we blame lazy sysadmins for not keeping their systems patched?
Or should we blame Microsoft? ?
Yes.
Blame the lazy System admin for not applying the patch.
Blame Microsoft for trainning WinNT System admin to not apply the patch.
(Windows admin believe they need to run tests to be sure everything will work with the patch.
Eather that is poor trainning or a history of defective patches. Both are in the hands of Microsoft.)
Re:You linked to Microsoft's patch (Score:1)
Don't blame any!
Microsoft has kindly sent me 5 mails with the patch today. No lazy admin could miss it!
Just check your inbox and be safe.
Put a smiley or something. (Score:2)
The Unix Honor Virus would work if you could make it convincing.
Re:You linked to Microsoft's patch (Score:2)
A flaw in a Microsoft product? (Score:4, Funny)
Thats nothing (Score:5, Funny)
Wonder why we are fed-xing all these remote control cars to russia?? Must be popular there..
Re:Thats nothing (Score:2)
***RIMSHOT***
Re:Thats nothing (Score:3, Interesting)
Theos?!? (Score:2)
Re:Theos?!? (Score:2)
They managed to implement TCP/IP but for whatever reason we can't get more then 350 kb/s out of them on our 100 MB networks. The GUI was final
Thanks (Score:2)
Not to defend Microsoft (Score:3, Interesting)
Give them a break (Score:5, Insightful)
In Cisco products - they are also vulnerable [cisco.com] - and particularly when used as firewalls or edge devices.
But then again it's more fun to blame MS isn't it ;-)
Re:Give them a break (Score:1)
Great quote (Score:5, Interesting)
Wow that ought to really bolster a customer's confidence: NOt only are you saying this type of mistake is common in your experience, your excuse is "Hey we're only human"! Uh isn't that why you're supposed to have quality assurance?
I can't wait to hack this... (Score:2, Funny)
wow (Score:5, Insightful)
Wow. While other companies are investigating, the MS patch machine has already spit one out. Give 'em a little credit. Nah, this was just lucky hehe
Re:wow (Score:2, Interesting)
Blah. (Score:2, Funny)
I guess... (Score:2, Funny)
Oh, the horror!
ISA's Track Record is very bad (Score:4, Informative)
Re:ISA's Track Record is very bad (Score:1, Funny)
Re:ISA's Track Record is very bad (Score:2, Informative)
You haven't looked very hard. My company uses squid [squid-cache.org], and it uses NTLM authentication against a windows 2000 domain. Users are authenticated automagically using the integrated IE authentication, and there's only one password store - the active directo
Re:ISA's Track Record is very bad (Score:1)
My worry is. . . (Score:2)
Is the audience of this page really the people we want running and securing corporate networks?
What about Open H.323 (Score:3, Interesting)
Anyone know whether that project is going to be
suffering the same vunerability ?
Re:What about Open H.323 (Score:1)
Who will exploit this first? (Score:1, Insightful)
New commercial slogan? (Score:5, Funny)
meh... (Score:5, Interesting)
Altho, as I think about it, I get the feeling that Cisco got a bunch of network multimedia handling code from MS. I remember back in '98 or '99, they announced a software partnership w/ MS, causing much hand-wringing on
The fact that this looks to a few vendors (MS and Cisco being the biggies), and knowing how MS looks to diversify only makes me wonder how much of MS's wonderful code has managed to worm it's way into the other devices I use...
Hmm... Maybe this had something to do w/ all the dreadful STP and bridging issues I had on the Catalyst 8540 platform...
Re:meh... (Score:5, Informative)
Re:meh... (Score:2)
Uh, sorry, but the ATA 18x series equipment are hardware boxes that are in no way Windows Services.
Vonage uses the ATA 186 for their service, although it's not vulnerable as in Vonages case it's SIP.
More here [cisco.com]
Re:meh... (Score:2, Interesting)
Re:meh... (Score:2, Informative)
Well, it's obvious you've looked at the Cisco IP Telephony product
Re:meh... (Score:2)
It's not that hard to change the spash screen on Windows. The issue is more likely to be that Windows is a "Personal Computer" operating system. Where such tinkering is often not only possible but encouraged...
Re:meh... (Score:2)
No, but I own a company whose primary focus is the successful deployment of Cisco IP Telephony solutions.
Not sure what Crosspoint Towers is, nor Lowell.
Re:meh... (Score:2)
The 7905 and ATA18X are hardware devices that have no Windows OS.
All the Cisco IOS routers affected that runs as H.323 gateways, H.323 proxies, NAT and/or CBAC that are affected have no MS product in them whatsoever.
Furthermore, the CCM issue has nothing to do with the MS ISA server vulnerability as CCM doesn't even ship with or allow you to run ISA server. It is further not affected by the vulnerability with CCM 3.1-
Re:meh... (Score:1)
Re:meh... (Score:2)
As you can guess, this does not help router performance
Re:CallManager *IS* being ported to Linux. (Score:1, Funny)
Re:CallManager *IS* being ported to Linux. (Score:2)
Also, the Linux ba
It's not MS, it's VoIP -- expect more (Score:5, Insightful)
Taken all together, VoIP should be deployed very carefully in places where network security is important. You might even run into a case where even if your computer network is completely separate from the Internet, but you use VoIP over the internal LAN via a IP PBX, someone might hack your phone/VoIP endpoint through the encoded voice stream and gain access to your LAN. Stranger things have happened.
Re:It's not MS, it's VoIP -- expect more (Score:3, Funny)
Yes! Wardialing is back!
Overseas coding making it worse? (Score:2)
If you make the assumption that most core network systems we use now were largely coded before shipping work overseas was so widespread but newer protocol implementations like VoIP (yes, I know its more of a "system" than a specific protocol), are those protocols/systems going to be vulnerable to all the usual drawbacks
Grass is always greener... (Score:5, Insightful)
Is it any suprise that everyone on here, pulling from their "wide" experience on both types of networks, thinks that things are oh-so-much worse with VoIP than they were/are with analog?
Look: vulnerabilities exist everywhere. If you had more people on this board that do analog telephony as a hobby/job than do PCs/*nix/etc. the articles would all be about Lucent/AT&T's switch vulnerabilities and how we should all switch to the "new bulletproof VoIP" stuff I keep hearing about.
I'll also bet *2* meeeeeelion dollars that if MS wasn't mentioned in the article, that nowhere near as many people would be jumping on this (although that's a big fat DUH).
Re:Grass is always greener... (Score:1)
About my sig... It worked!
Re:Grass is always greener... (Score:2)
Re:Grass is always greener... (Score:1)
Re:Grass is always greener... (Score:1)
Where I ork, we have 6 fax machines, a modem pool, and payroll service that submits via modem. Desktop keysets are digital, however.
Re:Grass is always greener... (Score:1)
Having worked for many years with telco sector companies, I know too well how most traditional PBXs and equipment have virtually no security: countless cases of hard-coded passwords, clear text access protocols, plain telnet remote administration, not to mention the enormous security holes of the more common variety whenever a computer is integrated into the system.
Now many of these manufacturers are moving into VoIP by hybridizing their proprietary 'protocols' with RTP. What can yo
"VoIP" is not a protocol (Score:5, Informative)
Suppose that a new bug were described as a "file sharing security flaw". Now, does that affect Samba? FTP? NFS? Kazaa? File server bots on IRC? One expects good technical reporting to mention the affected services -- or better yet, actual products -- rather than simply describing a general application category.
Specifically, in the VoIP application category, there are two major signaling protocols in use: H.323 and SIP. The last round of "VoIP security flaws" affected SIP software. The current discoveries affect H.323. Describing both as "VoIP flaws" and suggesting that the application domain itself is "threatened" is really quite silly. It is as if someone suggested that a certain bug in IIS and another in Freenet together suggested that "file transfer" on the Internet were threatened.
(For those who don't know much about VoIP: H.323 is the older of the two protocols, and is closer to the "telecoms" way of doing things. It was, IIRC, originally connected to ISDN. SIP is newer, and closer to the "Internet" way of doing things -- if you look at packet captures of it, they look vaguely reminiscent of HTTP, only they're UDP.)
Re:"VoIP" is not a protocol (Score:3, Informative)
Not just vaguely reminiscent. SIP message formats (request/status line followed by headers) are pretty much like HTTP headers. The response codes like 200 (OK), 404 (Not Found) too are from HTTP. SIP implements authentication using the HTTP digest authentication scheme. Most of the early SIP implementations were on UDP. TCP is however the mandatory transport to be supported by SIP end-points and servers. SIP also works over TLS.
Re:"VoIP" is not a protocol (Score:2)
You're 100% correct. My much more informative article with 4 times the links was rejected, no doubt because the title was "H.323 vulnerability affects Cisco, MS, and more (articles,security) (rejected)" and H.323 just isn't "catchy" enough to be an article subject.
Re:"VoIP" is not a protocol (Score:2)
Wierd Quote? (Score:1, Offtopic)
Google shows very few hits for "sillema".
Re:Wierd Quote? (Score:1)
ummm (Score:2)
Didn't we mean:
'Specifically, a filter used in the server that secures VoIP communications is vulnerable due to the flaw.' ...?
Why am I not surprised? (Score:1)
Re:Why am I not surprised? (Score:1)
Great opportunity (Score:5, Funny)
Love those buffer exploits...
Re:Great opportunity (Score:2)
Pragmatically, though..... (Score:5, Informative)
I don't think that this is going to be as large of a problem as Cisco's earlier [cisco.com] issues [cisco.com]. Although a worm could target home users running IP telephony applications on their PC's, this vulnerability is non-replicating and the potential for abuse is rather limited.
Basically, there are two major Cisco product lines that are affected by this bug. The first is Cisco's VoIP infrastructure products: the Cisco CallManager server, Conferencing Server, Softswitch and IOS-based routers running H.323 services, among others. Except where the public has access to VoIP services over the Internet, these servers and routers are located on the inside of a firewall. In a best-practices network design, all access to these servers and routers is either via the internal LAN or through a secure VPN connection over the Internet (or any other public network, for that matter). I would find it very unusual to have these services available publicly. If I left a Cisco router with POTS access and an easily guessable dial peer on an Internet-accessible LAN, the potential for toll fraud would be enormous (free calls, lots 'o free calls).
The second group of products that are vulnerable are Cisco routers performing NAT and firewall services. Cisco's Content Based Access-Control (CBAC) -- a "dynamic firewall" technology -- is also vulnerable to the H.323 DoS attacks in the same manner as the Microsoft IAS server. Once again, unless H.323 ports are open to unrestricted access from the Internet, routers are not vulnerable from random outside attacks. Traffic that originated from behind the firewall would be able to disrupt services, however it's much easier to apply an access list to track and block the offending traffic than it is to prevent an external DoS attack.
What's my point? I don't see a widespread attack being able to disable servers and routers on a large scale. Unless attacks are originated from inside a corporate firewall, the potential for disrupted services are minimal. I'm sure that large VoIP service providers are scrambling to patch and secure whatever systems possible - however, they are much better equipped to handle this issue than a Mom and Pop business who happens to have a CallManager server (at least we hope).
For people who are running these products, I'm recommending a thorough review of external firewall policies to make sure that there aren't any exposed H.323 ports. I'm also recommending an upgrade when it's feasible, but IMHO, there aren't many situations that would require burning the midnight oil to install patches.
Just my $.02.
RTFA from Cisco (Score:2)
This time, the PIX code base is unaffected, but Cisco claims that they incorporate legacy IOS code into the PIX software: "Provides comprehensive OSPF dynamic routing services on Cisco PIX Security Appliances using te
Outsourcing...good idea (Score:1, Offtopic)
Expect such flaws in 2.6 soon (Score:4, Interesting)
The linux kernel 2.6 just got ASN.1 parsing INSIDE THE KERNEL in order to implement AUTH_KERB as part of the NFS/Kerberos client. Expect ASN.1 parsing based bugs inside the Linux kernel real soon now.
Acid Test (Score:3, Insightful)
The acid test will be how long it will take for Vonage [vonage.com] to respond to this Advisory. They ship affected Cisco routers.
They can run a telephone communications business with a mere fraction of the people that AT&T does, but can they effectively managed their system when something goes wrong?
Re:Acid Test (Score:1)
According to Cisco:
"Cisco ATA 18x series products are only vulnerable when configured for H.323. They are not vulnerable when configured for SIP."
http://www.cisco.com/warp/public/707/cisco-sa-2
Re:Acid Test (Score:1)
I should know.... (Score:1)
So, can I say that ssh suX big time just because of that ? Guess not, at least not me...
I work with both microsoft and linux servers, I like them both for different reasons!
The example of OpenSSH is one out of many. And Microsoft has many bugs too, I'm not saying the contrary. But I think many people here, sho
Re:I should know.... (Score:1)
Cisco equipment can be totally locked up requiring rebooting, for example, due to IOS flaws supporting VoIP. And it affects practically every IOS version that's out there. That is pretty serious stuff in my book.
Sometimes it's better to
Re:I should know.. MS bugs are proprietary.. (Score:2)
Here's the real deal. (Score:1)
H.323 Security Flaw Real, Impact Minimal
(January 13, 2004) Apex, NC - An article published today on CNET and resulting from a security advisory posted by NISCC reported a security vulnerability with H.323. The flaw is related to H.323 and its use of ASN.1 Packed Encoding Rules (PER) for encoding and decoding messages, improper handling
Re:You should read this before committing to Linux (Score:3, Informative)
Muh? Granted the parent poster is a troll, but there's no need to lie in response.
Windows NT 3.1 - a 32-bit operating system built from the ground-up was released in July 1993 [microsoft.com] (there was no NT version 1.0 or 2.0, they skipped ahead to keep up with the Windows 3.1 version number). As anyone who tried to run DOS games on Windows NT / 2000 / XP can tell you - it is definitely *NOT* based on DOS.
Taking release dates, Windows NT is two years younger than Li
Re:You should read this before committing to Linux (Score:2)