Hiding Packets in VoIP Chat 90
holy_calamity writes "Two Polish researchers say they have developed a system to hide secret steganographic messages in the packets of a VOIP connection. It exploits the fact that VoIP uses UDP, not TCP; it is designed to tolerate some packets going missing -- so hijacking a few to transmit a hidden message is not a problem." You may also be interested in reading the original paper.
Too late (Score:5, Informative)
Re:Too late (Score:5, Informative)
There is this too... http://it.slashdot.org/article.pl?sid=04/01/10/2358247 [slashdot.org]
Re: (Score:2)
Re:Too late (Score:5, Informative)
Re: (Score:3, Interesting)
The second is just looking for out of band communication in data streams. It could be configured to look for it in Voip traffic, but most of it is encrypted. It wouldn't be easy, particularly doing it in something like real time, but not impossible.
Re:Too late (Score:5, Funny)
Patterns in the noise (Score:4, Interesting)
Imagine a series of
Come to think of it, there's no reason why this necessarily couldn't be the case with some of the vast volumes of blog comment spam out there. Spread out wide enough and with a resilient enough algorithm, there could be more than enough signal to cover for the noise of spam-killed comments...
Pay for 388 words? (Score:5, Insightful)
Thanks Slashdot, because I really want to go to Slashdot to get links to a story that I have to pay to read.
Re:Pay for 388 words? (Score:5, Funny)
You're welcome?
Re:Pay for 388 words? (Score:5, Funny)
You must be new here.
Re: (Score:2)
It's sometimes confusing to remember the rules. When talking about Playboy / Maxim / etc, you get it 'just for the articles'.
And then you go to /. and since there's no eye candy (Unless you get rickrolled or goatse'd) and you actually read the stuff, but have to hide that you do. Confusing!
Complete article (Score:5, Informative)
Re:Complete article, without ads (Score:5, Informative)
Here is the actual paper [arxiv.org] as a clean PDF. This is the good version.
The linked Technology Marketing Corporation page mentioned in the parent post has only the beginning of the article. It also has 24/7 Media ads in the middle of the article, Google ads on the right, TMC ads at the top, bottom, and in boxes within the article, buttons for more promoted services at the left, a Flash banner at the top, ads from OAS at the lower right, a Digg button, and an email signup box. Oh, and the page refreshes itself every two minutes to change the ads.
Re:Complete article, without ads (Score:5, Funny)
Sounds like you need adblock.
Well... (Score:4, Insightful)
Re:Well... (Score:5, Funny)
Re:Well... (Score:5, Funny)
I'm on to you.
Re: (Score:3, Insightful)
You would have to know all my accounts, on all forums, plus know the method to decipher the data.
Muahaha.
Re:Well... (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
Re:Well... (Score:4, Funny)
Re: (Score:2, Funny)
Re: (Score:2)
this must be the exception.
Re: (Score:2, Funny)
Okay, so the code has MISSING as well as added letters. Extra 'T', missing 'S' -- ah ha! Terrorist State! Wait'll the NSA finds out, it'll be Gitmo for y....
No, no! I was just decoding the message for you guys! Hey! I'm not the recip....
*klank!*
Re: (Score:2)
Re: (Score:1, Offtopic)
Re:Well... (Score:5, Interesting)
That reminds me of a neat story.
A few years ago at a tech conference I met someone who worked for the data storage division at Dell. Some of the technical manuals that the engineer needed for their work were classified as secret (product hadn't gone to market yet) and the engineer had to sign various NDAs with the company to get access to the documents.
Said engineer compared their copy of a manual with another engineer's copy and discovered that each manual had a different set of spelling errors. Apparently Dell was generating documents with unique sets of typos in order to be able to track down the identify of the person who leaked a document.
Re: (Score:2)
Although Dell wasnt the first to do so, it is still generally a good idea, because serial numbers, and other tags, can easily be swapped/removed.
But it's not perfect, given that if someone manually typed out the document, and removed all spelling mistakes, or even created new ones, the system fails, likewise, if someone was "in the know" about the scheme, they could essentially impersonate another (rival)
Re: (Score:2, Funny)
Re: (Score:1)
Re: (Score:1, Insightful)
That's crude. There are other schemes that encode the identity of a document in the microspacing between the letters.
Re: (Score:2)
Re: (Score:2)
No way (Score:4, Funny)
Stop this research. No way I am going to say GoodBye to my Secretary. She knows a lot more than just stenography;)
Re: (Score:2)
Re: (Score:1)
UDP Only... (Score:5, Interesting)
One of the reasons they are leaning this way is security. Go figure.
Besides that, I don't really see the point. What does this solve that just encrypting sensitive data wouldn't?
Re:UDP Only... (Score:4, Insightful)
Re: (Score:3, Insightful)
If someone is using an encrypted connection/transfer, then its obvious they are doing something, and also trying to keep it hidden, whereas, if they were to carry out a normal transmition, but have the "secret" part of it hidden in this, someone looking, would see a normal interaction and possibly skip over the noise.
You could also have an encrypted message, that also requires data from the steganographic 'noise' and vice versa to become usable data, that way if one is "
Re: (Score:2, Informative)
Plain cryptography is something like having a locked safe sitting in a room. It might not be easy to get into, but you know it when you see it. This is like having a safe behind a painting. You don't notice that there is anything being kept away from you.
Re: (Score:1)
Re: (Score:2)
Well, that's nothing like steganography
Re:UDP Only... (Score:5, Funny)
Plain cryptography is something like having a locked car sitting in a room. It might not be easy to get into, but you know it when you see it. This is like having a car behind a painting. You don't notice that there is anything being kept away from you. Well, other than that big-assed painting.
No? How about this...
Plain cryptography is something like having a locked car sitting in a room. It might not be easy to get into, but you know it when you see it. This is like having the locks of the car behind paintings. You don't notice the keyholes. Well, other than those out-of-place paintings hanging off the door handles.
No? How about this...
Plain cryptography is something like driving your car across the border while trying to keep from having to show your passport to the border patrol (by showing them fake ID). This is like doing the same while having the trunk full of cocaine when you do so.
Bah, nevermind.
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Obscurity is not security, but can be complementary. In the VoIP example the security would be the encryption of your signal, the obscurity would be the addition of meaningful UDP packets.
Obscurity is helpful when dealing with cursory inspections, but doesn't actually increase security because being secure requires more than being non-obvious.
Think of contraband transportation. Driving around with illegal contraband in plain sight - say s
Re: (Score:2)
Re:UDP Only... (Score:5, Interesting)
When a security hole is found, it needs to be plugged because the threats it poses are not always explicitly understood at first glance.
In fact, in computing in general, there are multiple ways to sneak a couple of packets through here and there if you're willing to be patient. I'd mention a few of them, but that would probably get me on a fucked up watch list. The fact remains that this is but one way to do so. Monitoring the network packet for packet won't uncover them all either, nor will it out any terrorists who don't want anyone watching their communications. Why, even my music on hold can contain data for transmission to the right person with the right audio equipment. Never mind a blog post, or email. In fact... woooootttt! I could use the NSA's website as the key for an encryption routine that they would never decode in several decades of trying. sigh, but that won't stop them from telling us that it's all for our protection.
Just encrypting it would not stop the possibility of rogue data if your application can withstand a few missing packets. VoIP is not the only protocol which is susceptible.
Re:UDP Only... (Score:5, Informative)
So... let me get this straight.... (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Even though specific applications may use steganography in conjunction with encryption it does not imply that encryption is involved.
Re:UDP Only... (Score:5, Informative)
First, wide adoption of RTP transmission via TCP is highly unlikely, due to the nature of streaming media in general which UDP is designed for and TCP is not. Fixed datagrams and packet ordering protocol are a major pain in the a$$ for streaming media.
Where as the call control protocol (SIP, H.323, MGCP, etc) via TCP is probablly more likely and most standards support transmission under either, though the vast majority is still UDP based.
You are right from a security perspective with TCP you know if information is gone missing, where as UDP you never really know.
Re: (Score:1, Informative)
A lot. Remember when W. told OBL that we were listening in on their sat phones? Well, between that incident and the time that reagan gave up info about the KAL incident told a lot about our intel world (the 2 should have been swung, or gone on a hunting trip with cheney, for those actions of being traitors; it took several years for pilots to talk again and a number of interesting channels were s
Re: (Score:2)
Make noises (Score:5, Funny)
Typical stenographic VoIP conversation (Score:1)
"Hey."
"I'm sending you a stenographically encrypted file through this call."
"Oh, okay."
"Uh, hello?"
"Sorry, I gotta give it enough talk time to transmit."
"Oh, gotcha."
"So, how's the family?"
authors (Score:1, Funny)
Re: (Score:3, Funny)
A Polish guy goes in for his yearly eye examination.
The eye doctor says, "OK, read the smallest line down on the chart that you can."
The guy reads out, "W... Z... P... X... Y... I... Z... Y... K...".
The doctor says, "Wow, that's great, you can read the bottom line?"
The Polish guy says, "Read it? Hell, I know the man!"
ATTACK!!! (Score:3, Funny)
W Szczebrzeszynie chrzszcz brzmi w trzcinie.
(note: your head may explode)
(PS. and don't look at my nickname
oops... (Score:2)
chrzaszcz
There, should be much easier to you
Original paper? (Score:4, Funny)
there goes my work privacy again... (Score:1)
Re: (Score:2)
Amazing! (Score:5, Funny)
VoIP doesn't just use UDP (Score:2)
Saying "VOIP uses UDP, not TCP" is overly simplistic. RTP can run over either UDP or TCP, while SRTP runs over TLS-over-TCP.
Re: (Score:3, Interesting)
I used to have an IPSec bridge to the office, with RTP running over UDP on that bridge. Everything worked great. Now my company has turned off end-user IPSec, and requires use of the Cisco SSL/TCP-based VPN client.
"VoIP" is not exclusively UDP (Score:3, Insightful)
VoIP doesn't "use UDP instead of TCP". VoIP (which is usually SIP+RTP, but there are other protocols out there used to carry voice over IP networks) can use UDP over TCP, and that configuration is the most common one. But not the only one possible as the article suggests.
Also, the article in the /. article kind of suggests that VoIP (which is a concept, not a protocol) can use only UDP, which is not true. It's like saying Internet is used only for HTTP.
Isn't VOIP illegal where data-hiding is needed? (Score:2)
Telephone service is usually a government monopoly in the developing world. VOIP bypasses the government telecommunications monopoly. And since that monopoly is so profitable, the government authorities in these places violently suppress anyone that they catch using VOIP.
What kind of information would be hidden in VOIP transmissions? General political tracts and religious boo
Re: (Score:2)
PayPal is anonymous??
Re: (Score:3, Interesting)
Viruses will be the next safe transmitters (Score:3, Insightful)
Forget just VoIP. In the future we'll hide communications networks under multiple layers of encryption inside trojan'd everything that is awfully hard to tell innocent user data from something else. We'll probably also host websites and files that way in a coalescence and then expansion of BT/P2P and anonymous remailer methods but not so much with identifiable clients but instead viral ware that people choose to allow on their machines so as to prevent privacy invasion by government and business.
My VoIP is one big hidden message (Score:2)
Serial numbers in ARP packets (Score:3, Interesting)
I can't remember whether it was FTP Software of NetManage, but one of those used to hide the serial number of the software in the bits between the end of broadcast ARP requests and the end of the Ethernet frame.
That way they could check for duplicate license keys on the same net without bothering anybody. Only worked across the broadcast domain, but that was adequate for that purpose.
There's lots of other places too.
RTP packets have optional extension headers that can be used, DNS can hold extra information in parts of the query and response packets - I once encountered someone tunneling music feed via buggered DNS packets. (It became very visible when it caused a Cisco firewall to go haywire.)
Video gives more bandwidth, and DRM is an issue (Score:1)
One interesting thing about the paper is that it implies that some types of DRM mimic stego. Is this a reason to outlaw DRM?
Great paper... to wipe your butt with (Score:1)
In circumstances like Skype (not RTP), it is possible to talk and text chat at the same time. All of it is encrypted.
The application of this type of stegonographic message is for stored data. But for that, the data would have to be stored. There's just not point in storing a voice conversation as RTP packets on the users' system. In fact, it would be almost ridiculous to store audio i