Secure VoIP, an Achievable Goal 103
An anonymous reader writes "ITO is running a comprehensive article on VoIP security issues and how one can protect against them: "VoIP creates new ways of delivering fully-featured phone services that promise big cost savings and open the way for a whole new range of multimedia communication services. After years of 'will it, won't it' speculation and unfulfilled predictions of universal adoption, Gartner is now positioning VoIP firmly on its way to the 'plateau of productivity' on its widely-respected technology hype cycle. But questions about its security and reliability persist.""
It Sure Is (Score:5, Informative)
Re:It Sure Is (Score:2)
Re:It Sure Is (Score:2)
It is, however, the best set of ideas that have come up yet - with an implementation too.
Re:It Sure Is (Score:3, Informative)
I've read the FAQ and I don't think this is the case. ZPhone gives you an authentication string that you read to the person on the other end of the line, and they read (theirs) to you, so you can be sure that the node that your computer is connected to is the same one that the person at the other end of the call is sitting in front of. This seems to prevent most passive MiTM attacks that would insert a server somewhere into the middle of the connection that decrypted your si
I'd like to be able to hear the pin drop first. (Score:4, Informative)
Re:I'd like to be able to hear the pin drop first. (Score:3, Interesting)
I'm more interested in the security aspect. Cell phones used to be atrociously noisy but the technology rapidly evolved to where, when your call isn't being inconveniently dropped, you can hold a conversation that's pretty clear. It will take VoIP a while, but in the end the audio quality will match what the phone company offers now. I just hope the prices don't start to balloon shortly thereafter.
Re:I'd like to be able to hear the pin drop first. (Score:1)
Re:I'd like to be able to hear the pin drop first. (Score:5, Informative)
Re:I'd like to be able to hear the pin drop first. (Score:3, Insightful)
First, the PSTN uses 64kbps, even if the sampling is only over 4khz of spectrum. Thus it is misleading to look at the spectrum when in most cases this is entirely adequate and not where the problem is.
Secondly, VOIP runs over packet networks as a streaming service. Packet networks were never developed with voice traffic in mind, unlike the circuit switched PSTN. This means that network traffic or congestion has different effects in these two networks. With PSTN, you get
Re:I'd like to be able to hear the pin drop first. (Score:3, Interesting)
I run an Asterisk-based switch for all the company PBX traffic as well as a separate one for our VSAT satellite customers. We have full control over all aspects of the network and we have our own PSTN termination circuits, so there
Re:I'd like to be able to hear the pin drop first. (Score:1)
"They can hear you now." - NSA courtesy of AT&T.
Re:I'd like to be able to hear the pin drop first. (Score:2)
I always thought of this as a fallacy.
Generally, in major disaster or emergency situations you loose both power and lan line since most areas put them on the same pole.
If a tree falls during a hurricane it generally takes out both lines.
Unless of course if you have the phone lines buried and the powerlines on the poles or vice versa... This of course depends on where you live and how good your power is.
While livi
Re:I'd like to be able to hear the pin drop first. (Score:1)
On a closer to home note, our company found out the hard way relying on cell phones doesn't work during an earthquake. All cellular channels were immediately switched to route emergency traffic (police, fire, etc.), our staff emergency personnel were completely cut off (NexTel radios and Ve
Re:I'd like to be able to hear the pin drop first. (Score:2)
I was going to mention HAM radio and CB's
You are right, they are pretty much there are the only reliable form of communication when there is a major disaster (as long as you've got a sulf sufficient power supply with and UPS or a power generator).
For other times, I have found a c
Re:I'd like to be able to hear the pin drop first. (Score:1)
Re:I'd like to be able to hear the pin drop first. (Score:2)
Re:I'd like to be able to hear the pin drop first. (Score:1)
Re:I'd like to be able to hear the pin drop first. (Score:2)
I'm active in a radio club that's major focus is disaster preparedness and management. We have a 2m repeater with a big diesel generator, a bunch of "go kits," coordination with local PD, FD, and Red Cross. It's interesting to think about what you'd do in a total loss-of-communication situation.
Anyone planning on using their cellphone when the lights go out may be in for a very nasty surprise: one that will come in the form of the 'fast busy' signal because the circuits
Re:I'd like to be able to hear the pin drop first. (Score:1)
Re:I'd like to be able to hear the pin drop first. (Score:2)
Re:I'd like to be able to hear the pin drop first. (Score:2)
Of course, Skype runs on the public Internet and is subject to traffic congestion, etc. so you can get delays and breakup but I have used it successfully from very distant places in Africa and Asia and it works very well.
Re:I'd like to be able to hear the pin drop first. (Score:1)
Obligatory Ali G. (Score:2)
Security, techmology... What's it all about? Is it good or is it whack?
sure (Score:1, Funny)
I'm guessing the blurb isn't refering to Gartner (as it should).
Problme with security today and SIP (Score:5, Informative)
Secure VoIP is easy (Score:3, Interesting)
The vonage server in that case would only exist to do call setup, teardown and control etc.
If you are making a call to a PSTN user, its encrypted all the way from you to the PSTN connection link server again with keys known only to both ends.
I am sure there are ways to handle secure key exchange and such to make this actually work (and ways that dont require the user to know anything about how to create keys and other things)
And there are encryption algorithims good enough to use for real-time encryption of compressed voice data.
With this idea, no-one between the 2 points can listen to the phonecall. (other than what can normally be done on the PSTN side of the PSTN linkup if it is a PSTN call)
Re:Secure VoIP is easy (Score:2)
Actually, this is a non-trivial problem. I have been looking at this problem from an IM perspective recently, and there are basically two approaches that people are using:
Re:Secure VoIP is easy (Score:2)
Re:Secure VoIP is easy (Score:2)
Your second step adds exactly zero security. If someone is performing a man-in-the-middle attack, then they can very easily substitute the fingerprints that each user sends for the one that they will actuall
Re:Secure VoIP is easy (Score:2)
Re:Secure VoIP is easy (Score:2)
The only way this could be secure is if the correct fingerprint were transmitted out-of-band. If the local
Re:Secure VoIP is easy (Score:2)
You connect to me, I supply my public key, you accept, create tunnel with it. (And vice versa.)
Now, your client displays the fingerprint of the public key you received from me, and my client displays the fingerprint of the public key I sent.
I ask you what the fingerprint is (via voice), and you tell me. It should match. Of course, if the MITM could synthesise your voice, and replace
Re:Secure VoIP is easy (Score:2)
Re:Secure VoIP is easy (Score:2)
I agree, normally key verification has to talk place outside the main communication band normally otherwise MITM can occur.
PS. I've quoted you on my website.
Out of band key exchange is ok (Score:2)
One thing to keep in mind: In many cases (ok, not all cases, but many) out-of-band key exchange is actually pretty reasonable. I don't know about you, but a lot of the people that I talk to on the phone, are people I have met in real life.
And the amount of info that could be exchanged is staggering; you could exchange gigabytes of OTP instead of merely cipher keys. Your phone has a microphone, a radio receiver, and many have a CCD. The
Re:Secure VoIP is easy (Score:2)
Won't CALEA prevent VoIP providers from providing truly secure calls? Can you really trust a provider who knows the encryption keys?
no-one between the 2 points can listen to the phonecall. (other than what can normally be done on the PSTN side of the PSTN linkup
In this case the government and the phone company employees can certainly listen in.
Re:Secure VoIP is easy (Score:1)
My Problem With VoIP (Score:2, Interesting)
Granted, I hate the phone company too so I was going to check into a VoIP solution just so I didn't have to pay the phone company "as" much as I currently did. So, the problem is - phone companies do not offer a data only DSL package. To even get DSL you have to have full phone package.
So, my choices...go back to the
Re:My Problem With VoIP (Score:2)
Re:Mod Parent Down - 'Mis-Informative' (Score:1)
Re:Mod Parent Down - 'Mis-Informative' (Score:2)
They can usually swing you a data only line even if your phone company swears up and down that you can't.
Re:Mod Parent Down - 'Mis-Informative' (Score:1)
Re:My Problem With VoIP (Score:1)
Re:My Problem With VoIP (Score:1)
Re:My Problem With VoIP (Score:2)
So, move to Wentachee Washington and it will get better.
Impossible. (Score:5, Funny)
Re:Impossible. (Score:2)
What are the current problems with VOIP security? (Score:1, Interesting)
Now the reliability aspect is something else and it does need to be addressed, when people pick up a phone they expect and sometimes depend on it working. When they dial 911, they expect help to get to the right address. The building can be on fire a
the only secure voice communications system (Score:1)
VoIP Security is more "secure" than pstn (Score:1)
Re:VoIP Security is more "secure" than pstn (Score:1)
Hmmm (Score:2, Interesting)
Re:Hmmm (Score:2)
Gartner.......respected..... in which universe? (Score:1, Insightful)
Gartner's 'hype' cycle is widely regarded as a joke in my experience. Guess what, the press and marketeers AND Gartner play up new technologies. Guess what, even after the stories stop some of them continue to make lots of money. Gartner reports are just about always *after* the event - and they don't tell you anything about which ideas will succeed and which are just VC fodde
Better Way (Score:2)
Re:Better Way (Score:2)
VoIP crypto with Diffie-Hellman? (Score:2, Interesting)
Re:VoIP crypto with Diffie-Hellman? (Score:2, Interesting)
Re:VoIP crypto with Diffie-Hellman? (Score:2, Informative)
You still need some other mechanism to make sure that you are actually talking directly to the right person and not to some man in the middle.
In IPsec they use either a shared secret, a public key or a certificate to authenticate parties.
already secure? (Score:2)
Re: (Score:1)
end user: securely call PSTN lines? (Score:1)
When I was shopping for an end-user VOIP solution to replace telephone services a year ago (a move cause a sharp increase in phone rates), I could find
In the end, I settled with SkypeOut - though nobody can check how they really encrypt and who as access to the keys.
(Requirements: work
Re:end user: securely call PSTN lines? (Score:2)
Seems like this requirement is the real killer, since it would require the person on the receiving end to have some sort of specialized equipment on their telephone, to decrypt the call. Much like a STU-III or its commercial equivalents.
Unless you meant encryption only while the call was traveling over the packet-switched network, but really what's the point of that? If someone wants to intercept your ca
future of VOIP? (Score:1)
Re:future of VOIP? (Score:1)
It isn't feasible for my grandmother, and everyone else, to switch, but, companies can afford it and they can also afford to pay enought for new routers to be put in and new lines to be built. Once they drop their telephone lines and just have IT staff, the cost isn't much more. Especially if they used a Free Software VOIP system.
Now, once businesses do switch, start swit
Voip is HUGE and these are very minor hangups (Score:2, Interesting)
Re:Voip is HUGE and these are very minor hangups (Score:1)
Re:Voip is HUGE and these are very minor hangups (Score:1)
Re:Voip is HUGE and these are very minor hangups (Score:1)
I don't know any company (not just VoIP hardware) that open sources their hardware (firmware/driver wise).
It's only necessary to get hardware which supports open standards like SIP or H.323. These are different things, but I consider open standards to be a hundred times more important.
New NSA guide for securing VOIP (Score:5, Informative)
Re:New NSA guide for securing VOIP (Score:1)
Not a single chance (Score:2)
Terror or child porn, pick your reason.
Monkeywrench CALEA! Whoop! (Score:2)
disbelief (Score:1)
much like building that big shell around the sun. obviously impossible
Oh for crying out loud. (Score:1)
Really, I want to answer: "Who cares? Do you ask 'how secure is it' to Bell? No, you just get a phone line from them and stop worrying about it."
In fact, any schmuck can splice wires into a physical landline. My friend and I used to do it all the time to hassle my sister, and this was when we were 10. If a couple of ten year olds can monitor phone calls by sticking wires
Re:Oh for crying out loud. (Score:2)
Yeah right. :P (Score:1)
Now you want them to create sets of keys and upload the
What type of security? (Score:2)
It's interesting to see that most people when talking about VoIP security are looking for stream encryption. In my opinion encrypting the voice stream is nearly meaningless until the entire worldwide system is VoIP with the possibility of encrypted voice streams. If your call is connected to or through the PSTN at any point it can be listened to with ease.
The focus of security should be in the setup of a call. If it is difficult to spoof a phone device and place calls on someone else's dime the system b
Gartner Hasn't Seen OpenSER (Score:2)
While I do not have encryption enabled, it's certainly less difficult than learning how to manipulate openser.cfg.
I guess it goes to show you that Gartner only listens to IPO-bound companies blowing smoke up their rear-ends at lunches/dinners.
Also:
For every person that thinks skype is somehow secure, no one knows because the encryption system is not availble for review.
How many times can the average american be screwed by
Do the editors not even RTFA anymore!? (Score:1)
Thats Intrusion Prevention not Anti-Virus. Does he even understand what those words mean?
Just be glad that H.235 died (Score:2)
VPN, SSL, and other open transportation security layers are a much better choice.
But there are a lot of folks out there who do not encrypt VoIP at all. The future will include a few scandals about personal/company/government VoIP phone calls that were monitored, recorded, and posted on the Internet.
Re:Just be glad that H.235 died (Score:2)
Commercial VoIP terminations (like the ones Vonage et al ship) run either Linux or VXWorks, or something similar, don't they?
What's the downside of simply using OpenSSH tunnelling between the terminating devices?
(assuming the compression/decompression is also done at the ends)
The key exchange is already handled, BSD licsense etc...
Government Snooping? (Score:1)
Re:Government Snooping? (Score:1)
Re:Government Snooping? (Score:1)
News Flash! (Score:1)
"news" sites that use google adsense (Score:1)
Could the editors use their influence in a way to make more valuable and valid stories easily accessible for the open source crowd. All the time wasted on meaningless jibberish slows us down as a whole. We're only given 24 hours in a day, and I'd like to get out and about as much as possible.