Securing Voice Over Network Assets Flashcards

1
Q

Threats to PBXs

A

Theft of service – I.e., toll fraud, probably the most common of motives for attackers.
Disclosure of information – data disclosed without authorization, either by deliberate action or by accident. Examples include both eavesdropping on conversations or unauthorized access to routing and address data.
Data modification – data altered in some meaningful way by reordering, deleting or modifying it. For example, an intruder may change billing information, or modify system tables to gain additional services.
Unauthorized access – actions that permit an unauthorized user to gain access to system resources or privileges
Denial of service – actions that prevent the system from functioning in accordance with its intended purpose. A piece of equipment may be rendered inoperable or forced to operate in a degraded state.
Traffic analysis – a form of passive attack in which an intruder observes information about calls and makes inferences from things such as the source and destination numbers, or the length or frequency of the calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PBX security vs OS Security

A

External access/control – Like larger telephone switches, PBXs typically require remote maintenance by the vendor. Instead of relying on local administrators to make operating system updates and patches, organizations normally have updates installed remotely by the switch manufacturer. This of course requires remote maintenance ports.
Feature richness – The wide variety of features available on PBXs, particularly administrative features and conference functions, provide the possibility of unexpected attacks. A feature may be used by an attacker in a manner that was not intended by its designers. Features may also interact in unpredictable ways causing security problems. Even though the features may be fairly standard, the implementation between vendors is different, thus the reason instruments can often not be interchanged between PBXs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PBX susceptibility to tapping

Three General methods

A

Analog Voice with separate Control Signals
Analog Voice with inclusive Control Signals
Digital Voice with Inclusive Control Signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PBX Signaling information

A

is typically commands to the instrument (turn on indicators, microphones, speakers, etc.) and status from the instrument (hook status, keys pressed, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Analog Voice with separate Control Signals

A

Analog voice is passed between the PBX and the instrument on either a single pair of wires or two pairs (one for transmit and one for receive). If there is any additional signaling communication (other than the hook switch) between the PBX and the instrument, it is done on wires that are separate from the voice pair(s). The voice line can be easily tapped by connecting an amplifier to the pair of voice wires. The amplified voice signal can then be heard directly with a speaker or headphones or be recorded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Analog Voice with inclusive Control Signals

A

Analog voice and control signaling is passed between the PBX and the instrument on either a single pair of wires or two pairs. This can be done if the signal path is of high enough bandwidth to pass voice information (less than 4KHz) plus additional data information. For example, voice information can be combined with data information modulated onto a carrier tone that is centered outside of the voice band.
Vulnerable to tapping by connecting an amplifier to the pair and passing signal through filters to separate the voice and data information. Data information can be recovered by demodulating the carrier tone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Voice with Inclusive Control Signals

A

Voice and control signaling data are passed across the same pair of wires. There may be two pairs of wires, one for each direction, or both directions could be combined onto one pair of wires using echo cancellation. Conventional tapping techniques won’t work against most types of digital lines.

If separate pairs are used for transmit and receive, each pair could be tapped to provide access to the bit streams but the format needs to be determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Echo Cancellation

A

If both transmit and receive are combined on one pair using echo cancellation, the digital voice with inclusive control signals tapping methods would not work.

Each transmit end of the link can only determine what is being received by subtracting out what it is transmitting from the total signal. An attack would depend on a known original condition on an end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Maintenance Feature Vulnerability - Maintenance-out-of-service (MOS)

A

this feature allows maintenance personnel to place a line out of service for maintenance. If a line is placed MOS while it is in operation, the PBX may terminate its signaling communication with the instrument and leave the instrument’s voice channel connection active even after the instrument is placed on-hook.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maintenance Feature Vulnerability - Line Testing Capabilities

A

the ability to connect two lines together in order to transmit data from one line to the other and verify whether or not the second line receives the data properly. This feature would allow someone with maintenance access to connect a user’s instrument to an instrument at another location in order to eavesdrop on the area surrounding the user’s instrument without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits usually cited for implementing VoIP

A
Long-Distance toll savings
Increased number of calls with less bandwidth
Additional and enhanced services
Most efficient use of IP assets
Combined network/telecom infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Telephony - H.323 Components

A

Terminal
Gateway
Gatekeeper
MCSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Telephony H.323 Components - Terminal

A

a terminal, or a client, is an endpoint where H.323 data streams and signaling originate and terminate. It may be a multimedia PC with a H.323 compliant stack or a standalone device such as a USB (universal serial bus) IP telephone. A terminal must support audio communication; video and data communication support is optional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP Telephony H.323 Components - Gateway

A

Gateway – a gateway is an optional component in a H.323-enabled network. When communication is required between different networks a gateway is needed at the interface. It provides data format translation, control signaling translation, audio and video codec translation, and call setup and termination functionality on both sides of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IP Telephony H.323 Components - Gatekeeper

A

a gatekeeper is a very useful, but optional, component of an H.323-enabled network. Gatekeepers are needed to ensure reliable, commercially feasible communications. When a gatekeeper exists all endpoints (terminals, gateways, and MCUs) must be registered with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IP Telephony H.323 Components - Gatekeeper Services

A

Address translation
Admission and access control of endpoints
Bandwidth management
Routing capability

17
Q

IP Telephony H.323 Components - MCU

A

A multipoint control unit (MCU) enables conferencing between three or more endpoints. Although the MCU is a separate logical unit it may be combined into a terminal, gateway, or gatekeeper. The MCU is an optional component of an H.323-enabled network.

The MCU provides a centralized location for multipoint call setup. Call and control signaling are routed through the MC so that endpoints capabilities can be determined and communication parameters negotiated.

18
Q

IP Telephony H.225 and H.245

A

H.225 performs the signaling for call control. H.225 uses H.245 to establish and terminate individual logical channels for communication

19
Q

Five phases of signaling process

A

Call setup
Initial communications and capability exchange
Establishment of audiovisual communication
Call services
Call termination

20
Q

Which protocols does signaling use?

A

TCP (H.225 and H.245), UDP(everything else), and IP(everything)

21
Q

If an organization uses a networking vendor, do they use a PBX?

A

No. A data switch.

22
Q

If an organization uses PBX vendor, do they use a PBX?

A

Yes.

23
Q

If an organization uses a telecom firewall, do they use a PBX?

A

Yes. See picture.

24
Q

Benefits of Telecom Firewall Strategy

A

Least cost Routing
Security – PSTN & Internet
Leverage Existing Infrastructure

25
Q

QOS Issues w/ IP Telephony

A
Bandwidth (minimum)
Latency (maximum)
Jitter (delay variation)
Packet loss (network congestion or errors)
Availability (individual)
Reliability (network)
26
Q

Special VoIP Security Considerations

A

Availability requirements for VoIP are extremely critical, higher than normal network operations.
VoIP applications are badly behaved IP applications.
-Tend to use dynamically negotiated ports.
Makes security job harder since we don’t know in advance which port numbers represent legitimate communication.
VoIP applications are more sensitive to delays and other performance issues
-IP designed to work over slow, noisy networks.
Current IP security devices designed to meet the needs of a data-oriented network.

27
Q

Benefits of Security in IP Telephony

A

CIA and AN

28
Q

Basic Threats to IP Telephony

A

Data network access through VoIP ports (tunneling)
Free long distance calls over PSTN (spoofing)
Eavesdrop on conversations (packet sniffing)
Record conversations without authorization
Modify, delete, or replace fax/voice packets
Forward incoming phone calls to somewhere else
Denial-of-Service attack on business phone system
Denial-of-Service attack on business data network
Expose private conversations on Internet
Hijack conversations
Block calls of targeted individuals
Log all calls through an organization

29
Q

VOMIT Application

A

Converts Cisco IP phone convo into a wave file. Can be player from tcpdump output file.

30
Q

IP Telephony Security Restraints (The reason security is practically non-existent)

A

adds latency to the voice packet
increases computational load of network devices
doesn’t work well with data-centric VPNs
doesn’t work well with data-centric firewalls
increases bandwidth requirements
public-key infrastructure not globally available
doesn’t work well with NAT-enabled routers/firewalls

31
Q

VOIP Gateway w/ IP Firewall port issue

A

Some firewall ports are left open to allow VoIP packets. Opened ports can be attacked.

32
Q

A VoIP Capable Firewall should

A

Allow a host to send packets to another through dynamically

assigned ports, Allow signaling devices to “control” the firewall.

33
Q

Traditional Responses to IP Telephony Security Threats

A

IP Firewalls
-must prioritize to not delay critical packets such as VoIP
-must handle multiple dynamic UDP port assignments
-must be able to handle or else not use NAT
VPNs
-must prioritize VoIP packets
-must handle numerous smaller packets
-must not add too much latency
Encryption
-needs to be FAST
-PKI issues need to be addressed