VoIP Security Threats Defined 60
Zonorph writes "Information week is reporting that the recently formed industry group Voice over IP Security Alliance (VOIPSA) just published their first draft of a VoIP Security Threat Taxonomy for public comment. From the VOIPSA, 'This VoIP Security Threat Taxonomy is meant to define the many potential security threats to VoIP deployments, services, and end users. Part of the challenge of devising effective VoIP security protections requires first identifying these threats in the first place.'"
This roughly translates to: (Score:1)
Re:This roughly translates to: (Score:2)
Its very encouraging to see that they are taking a methodical approach to securing this. It is a hint that people are starting to take security in every public channel very seriously.
I would very readily give money to someone who makes me more secure about my communications.
Re:This roughly translates to: (Score:1)
So please forgive me my cynicism
Re:This roughly translates to: (Score:5, Insightful)
No, that's not the issue. The good old PSTN is public and insecure. The post (snail mail) is public and insecure. If people want to send their information securely, they scramble their phone calls and encrypt (code/cipher/whatever) their post. The same applies to VoIP (VPN, encryption etc.).
The issue here is cost.
When a VoIP system is cracked, it costs somebody money.
The problem here is a lack of understanding on how to secure (*NOT* encrypt) VoIP connections.
Nick.
Re:This roughly translates to: (Score:2)
Just coz it wasn't done doesn't mean it shouldn't have been done. That is why its a good thing that this is happening now. People are taking security more seriously.
Re:This roughly translates to: (Score:3, Insightful)
Two very bad examples because they are both more secure than standard unencrypted network data.
* Eavesdropping on classic PSTN requires physical access to the line or switch. If you manage to find network access to a console port, it's possible to copy a data stream from one trunk port to another. You still need to get connected to it somehow.
* Snail mail
Re:This roughly translates to: (Score:2)
I can easily listen to my next door neighbour if I really wanted to. Often the telco junction boxes are unlocked or sometimes they are even completely missing their covers in my part of the World.
* Snail mail conversations also require physical access.
People work at post offices. People cannot be trusted.
The potential "men in the middle" in your Internet traffic, are mostly ISP staff. ISP staff, telco staff, post office staff, wh
Re:This roughly translates to: (Score:2)
Re:This roughly translates to: (Score:1)
I know it sounds crazy, but how about being secure in your communications? Don't disclose things to people in areas that are insecure. Why does society think it's always up to somebody else to protect us from ourselves?
Beyond that, companies that study things are hired researchers. They're largely hired to legitimize a predetermined answer; not actually research an answer, for that answer may contradict the company
Re:This roughly translates to: (Score:2)
Make that "ANY channel which leaves your scrutiny". Even if it does not pass the public.
Years ago, I was chatting with a friend on the phone and we started talking about our local telco, which I had previously worked for. We were having a bit of a bitch session about how poor their service is, their dodgy workmanship, the incredible profits they make and what a lazy bunc
"Security" "Threat" is largely expectations (Score:5, Insightful)
If they think it's a public chatroom (like an IRC channel) they'll be careful what they say, and fewer problems will result.
Same for email - if it were only widely known that email can be forged by anyone and read by anyone, the nigerian spammers wouldn't have any luck finding a mark. But the damn "email security" industry and ISPs set peoples expectations incorrectly and a lot of people get hurt.
Re:"Security" "Threat" is largely expectations (Score:4, Insightful)
Somehow noone get's all excited about those security holes; but somehow computers have some mystical aura that makes people expect them to be locked down to a far greater extent than their physical phone or mailbox. This seems pretty odd, since my physical mailbox gets lots of stuff in it that's far more valuable than my email.
Re:"Security" "Threat" is largely expectations (Score:2, Insightful)
Re:"Security" "Threat" is largely expectations (Score:3, Insightful)
To remotely tap your Internet connection, this would typically be done at your Internet Service Provider.
To remotely tap your telephone connection, this would typically be done at your Telephone Service Provider.
There are lots of points where these things can be eavesdroppe
Re:"Security" "Threat" is largely expectations (Score:1, Insightful)
Re:"Security" "Threat" is largely expectations (Score:2, Insightful)
Re:"Security" "Threat" is largely expectations (Score:1)
Re:"Security" "Threat" is largely expectations (Score:3, Interesting)
Actually, while it's not "magically" secure, it would be possible to make VoIP a lot more secure than about any other communication system. Just think encryption, plus the fact that you can say the key fingerprint out loud so that a "man in the middle" would actually need to imitate your voice in real-time in order to gain access. Of course, you're still vulnerab
It would be bad if my parents had VoIP when... (Score:2, Funny)
The biggest security threat to VOIP is CALEA (Score:2, Interesting)
Re:The biggest security threat to VOIP is CALEA (Score:3, Insightful)
Yes indeed. VoIP transmissions can be easily secured with *strong* encryption like RSA or AES with long keys. But governments will prevent it from becoming standard. Of course the caller and callee can make additional arrangements to use strong encryption, when available (ala PGP mail). And in the current political climate, that wil be marked as illegal use too. Sigh
Re:The biggest security threat to VOIP is CALEA (Score:1)
Encryption (Score:5, Insightful)
That would probably reduce security (Score:2)
C'mon... (Score:2)
Allow me to rephrase:
Well...duh....
Re:I was on the committee (Score:2, Interesting)
Seriously, this really sounds like a load of bs to me. Perhaps auto-generated [mit.edu]?
Re:I was on the committee (Score:1)
Indeed. It's the new craze for trolls who lack the humour and creativity to actually come up with anything themselves. Personally I have a lot of sympathy for them - it must be terrible for one's self esteem to have the desire to troll but to lack the ability to do so. A kind of trolling impotence if you will.
Communication security (Score:3, Informative)
If someone really cares about security (and "privacy") issues, she will provide for her own private VoIP service.
Very few people knows whether the communication will travel safely through the net and related servers.
Yes, my link to my favourite VoIP carrier is encrypted with a zillion bits encryption key. And what happens after?
The solution is to avoid using public services for security and privacy concerned communications.
There is very little to do if you dictate your credit card numbers by phone, whatever technology you use!
Re:Communication security (Score:1)
And the link from my browser to the webserver of my favorite merchant is encrypted using SSL. Since my merchant uses 3rd party hosting and simply repackages the form information in a plain-text email to get that information from the server back to his store, I guess that solid-lock in my browser is a false sense of security, huh? See "Are Secure Internet Transactions Really Secure?" [jsweb.net], a paper
VOIP is hackable, just like the PSTN (Score:4, Insightful)
Re:VOIP! It would be good if skype didn't mute my (Score:2)
Re:VOIP! It would be good if skype didn't mute my (Score:1)
So just because your machine/net connection/tech ability sucks, Don't label voip as crap.
And us VoIP/Switch/PBX providers will be blamed (Score:5, Informative)
Luckily, we do.
Hypothetical: One of their PCs gets compromised. It runs packet sniffing software which then copies the voice traffic off elsewhere.
Hypothetical: One of their PCs gets compromised. It runs packet sniffing software which then registers with the switch and proxys external connections out over the customer's PSTN/VoIP trunks, at the customer's expense.
None of these have happened yet (in fact, one compromised machine we were called in to look after could have given the cracker access to 30 PSTN lines, but was just used for IRC botting), but I'm just waiting for the day when the customer's trunks are attacked. Of course, when this happens, there is a tangible cost element (in terms of the telco charges for the calls made).
The worrying thing is that there are a number of telecomms wannabees starting up. These are typically IT companies who are seeing their margins disappear and wanting to branch out. These people are mainly selling Asterisk or some form of virtual PBX service. Sadly, these people don't understand telecomms and (much to my surprise), don't appear to understand basic network protocols and terminology (let alone security). These are the companies who'll give VoIP a bad name and who'll cost their customers a fortune.
Luckily, as with IT, when the sh1t hits the fan, companies like ours will be there to sort it out (and make more money from sorting it out than we would have done in the first place).
Ho hum.
Nick.
Re:And us VoIP/Switch/PBX providers will be blamed (Score:1)
Security? (Score:4, Informative)
If you need to believe that what you are saying is secure, or need to advise people that need to believe that you can secure things, surely thats what you tell them.
VoIP is has a few killer advantages: reduced costs, CD quality sound, potential to expand to video and REDUCED COSTS.
The security surrounding it may stop pesky neighbourhood kids splicing into your phone line and listening in, but there is NO technology that will prevent a dedicated and skilled cracker from listening into anything you broadcast or keep on your computer. But they are few and far between and I like those odds (its not as if I have any real secrets). What really bothers me about this is the idea of government mandated backdoors.
How can a country that gives its citizens the right to bear arms and form militia not see that in the information age encryption is the next Smith and Western? In that respect its not designed to stop the police from arresting you, or to help you rob banks. Sure you can use it for such, but thats not what it was designed for, it is designed to help you protect yourself, your family and your possesions and act as a deterent. Just don't expect your six-shooter to defend you from a trained assasin.
I live in the UK, so I don't carry a gun (not that I would in the US either), but I do lock my house and my car - and I don't give the police a master key unless they ask me and provide a warrant. Thats fair. Builders don't look the other way whilst the police come on site and install a special secret door that only they can use and the reason that doesn't happen, is because there would be two sets of people that have the key, the police and the criminals. Its the same with encryption.
Re:Security? (Score:3, Informative)
With a secure telephone, like a STU-III [wikipedia.org], your hypothetical "dedicated and skilled cracker" is hopelessly outclassed.
Re:Security? (Score:2)
From what I understand of cracking, you always take the path of least resistance. If cracking the encryption is hard, you think outside the box and use other technologies to get what you want, lazer listening devices, mole
Re:Smith & Wesson (Score:1)
Locks only keep honest people honest (Score:1)
Let's face it: you can add all the security you want, but a determined thief/hacker/criminal will always find a way in. Always. Protect yourselves as much as you can, yes. Just don't expect anything to be 100% secure forever.
Looking at the VOIPSA Wiki [voipsa.org], there is a section entitled "Social Threats." Naively I assumed this section would cover things like social engineering, telemarketing, etc. Instead it has such gems as "Modern interactive communication systems can include more than two people in a sessio
Re:Locks only keep honest people honest (Score:2)
This needs to be explained?
As a security person, I should think so, yeah. Because if we don't explicitly model these activities, then we may end up leaning heavily on weak or even false assumptions for our security. Worse, any po
VoIP is coming! (Score:1)
Re:VoIP is coming! (Score:1)
reviewed (Score:1)
Re:reviewed (Score:1)
ITYM Skype say that they recently got the encryption code that they say is part of their software reviewed by someone they say is an independant security expert.
And the "review" document was written by Skype based on the summary of the report. It says so on their site.
In other words, this will only make you trust their software if you already trust them.
Maybe you can t
Why was there never one of these for POTS? (Score:4, Interesting)
To actually tap VoIP you need to be in the path of the packet somewhere. It isn't like you can just hack a server and sniff the traffic. You'd actually need to be on a router someplace, and have some way to get the packets off the router and into some form that you could make into an audio file.... Yeah, which would you do?
Government tyranny is the largest threat (Score:2)
A voip system that uses assymetric encryption
Re:Government tyranny is the largest threat (Score:2)
Imagine that my brother and I exchange public keys and keep our private keys private. What can the government do to crack our phone call if doing so requires the private keys that we are smart enough not to share?
Anything can be cracked given time and money. The issue comes down to does the government think what you communicated is worth their time and money.
From the Dept. of Redundancy Dept. (Score:2)
More on VoIP security (Score:1)
Security vs. Security (Score:2)
With any sort of telco system there are two distinct areas of security. First is the security of the equipment. If crackers gain access to your equipment (in the case of VoIP your servers) they can cost you a lot of money. The second is security of the conversation, if crackers/government can eavesdrop on your conversations it may cost you in other ways.
The PSTN is somewhat secure in the first area and totally insecure in the second. In my opinion the VoIP world needs to work on the security of equipme