Securing Voice Over Network Assets Flashcards
Threats to PBXs
Theft of service – I.e., toll fraud, probably the most common of motives for attackers.
Disclosure of information – data disclosed without authorization, either by deliberate action or by accident. Examples include both eavesdropping on conversations or unauthorized access to routing and address data.
Data modification – data altered in some meaningful way by reordering, deleting or modifying it. For example, an intruder may change billing information, or modify system tables to gain additional services.
Unauthorized access – actions that permit an unauthorized user to gain access to system resources or privileges
Denial of service – actions that prevent the system from functioning in accordance with its intended purpose. A piece of equipment may be rendered inoperable or forced to operate in a degraded state.
Traffic analysis – a form of passive attack in which an intruder observes information about calls and makes inferences from things such as the source and destination numbers, or the length or frequency of the calls.
PBX security vs OS Security
External access/control – Like larger telephone switches, PBXs typically require remote maintenance by the vendor. Instead of relying on local administrators to make operating system updates and patches, organizations normally have updates installed remotely by the switch manufacturer. This of course requires remote maintenance ports.
Feature richness – The wide variety of features available on PBXs, particularly administrative features and conference functions, provide the possibility of unexpected attacks. A feature may be used by an attacker in a manner that was not intended by its designers. Features may also interact in unpredictable ways causing security problems. Even though the features may be fairly standard, the implementation between vendors is different, thus the reason instruments can often not be interchanged between PBXs.
PBX susceptibility to tapping
Three General methods
Analog Voice with separate Control Signals
Analog Voice with inclusive Control Signals
Digital Voice with Inclusive Control Signals
PBX Signaling information
is typically commands to the instrument (turn on indicators, microphones, speakers, etc.) and status from the instrument (hook status, keys pressed, etc.).
Analog Voice with separate Control Signals
Analog voice is passed between the PBX and the instrument on either a single pair of wires or two pairs (one for transmit and one for receive). If there is any additional signaling communication (other than the hook switch) between the PBX and the instrument, it is done on wires that are separate from the voice pair(s). The voice line can be easily tapped by connecting an amplifier to the pair of voice wires. The amplified voice signal can then be heard directly with a speaker or headphones or be recorded.
Analog Voice with inclusive Control Signals
Analog voice and control signaling is passed between the PBX and the instrument on either a single pair of wires or two pairs. This can be done if the signal path is of high enough bandwidth to pass voice information (less than 4KHz) plus additional data information. For example, voice information can be combined with data information modulated onto a carrier tone that is centered outside of the voice band.
Vulnerable to tapping by connecting an amplifier to the pair and passing signal through filters to separate the voice and data information. Data information can be recovered by demodulating the carrier tone.
Digital Voice with Inclusive Control Signals
Voice and control signaling data are passed across the same pair of wires. There may be two pairs of wires, one for each direction, or both directions could be combined onto one pair of wires using echo cancellation. Conventional tapping techniques won’t work against most types of digital lines.
If separate pairs are used for transmit and receive, each pair could be tapped to provide access to the bit streams but the format needs to be determined.
Echo Cancellation
If both transmit and receive are combined on one pair using echo cancellation, the digital voice with inclusive control signals tapping methods would not work.
Each transmit end of the link can only determine what is being received by subtracting out what it is transmitting from the total signal. An attack would depend on a known original condition on an end.
Maintenance Feature Vulnerability - Maintenance-out-of-service (MOS)
this feature allows maintenance personnel to place a line out of service for maintenance. If a line is placed MOS while it is in operation, the PBX may terminate its signaling communication with the instrument and leave the instrument’s voice channel connection active even after the instrument is placed on-hook.
Maintenance Feature Vulnerability - Line Testing Capabilities
the ability to connect two lines together in order to transmit data from one line to the other and verify whether or not the second line receives the data properly. This feature would allow someone with maintenance access to connect a user’s instrument to an instrument at another location in order to eavesdrop on the area surrounding the user’s instrument without the user’s knowledge.
Benefits usually cited for implementing VoIP
Long-Distance toll savings Increased number of calls with less bandwidth Additional and enhanced services Most efficient use of IP assets Combined network/telecom infrastructure
IP Telephony - H.323 Components
Terminal
Gateway
Gatekeeper
MCSU
IP Telephony H.323 Components - Terminal
a terminal, or a client, is an endpoint where H.323 data streams and signaling originate and terminate. It may be a multimedia PC with a H.323 compliant stack or a standalone device such as a USB (universal serial bus) IP telephone. A terminal must support audio communication; video and data communication support is optional.
IP Telephony H.323 Components - Gateway
Gateway – a gateway is an optional component in a H.323-enabled network. When communication is required between different networks a gateway is needed at the interface. It provides data format translation, control signaling translation, audio and video codec translation, and call setup and termination functionality on both sides of the network.
IP Telephony H.323 Components - Gatekeeper
a gatekeeper is a very useful, but optional, component of an H.323-enabled network. Gatekeepers are needed to ensure reliable, commercially feasible communications. When a gatekeeper exists all endpoints (terminals, gateways, and MCUs) must be registered with it.