session initiation protocol (sip) · pdf filesession initiation protocol (sip)...

46
Session Initiation Protocol (SIP) Vulnerabilities Mark D. Collier Chief Technology Officer SecureLogix Corporation

Upload: dothuy

Post on 06-Mar-2018

260 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Session Initiation Protocol (SIP) Vulnerabilities

Mark D. CollierChief Technology OfficerSecureLogix Corporation

Page 2: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

What Will Be Covered

Introduction to SIPGeneral SIP securitySIP vulnerabilities and attack toolsRecommendationsLinks

Page 3: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Introduction

Session Initiation Protocol (SIP):Is a general-purpose protocol for managing sessionsCan be used for any type of sessionProvides a means for voice signalingDefined by the IETF (looks like an Internet protocol)Resembles HTTPASCII requests/responses

Page 4: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Introduction

Why is SIP important:Generally viewed as the protocol of the futureDesigned to be simple (it’s not) and extensibleSupported by major vendors (sort of)Used by many service providersProvides a foundation for application supportWill be used for public VoIP access

Page 5: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Introduction

InternetConnectionInternet

Voice VLAN

PublicVoice

NetworkIP

PBX

SIP TrunkTDM Phones

IP Phones

Data VLAN

PCs

Page 6: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Components

User AgentsProxy

SDP Codecs

UDP

RTPRTCP

SIP

TCP

IPv4 IPv6

Page 7: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Call Flow

SIP/SDPUDP/TCP

RTP/RTCPUDP

Proxy

User

Proxy

User

SIP/SDPUDP/TCP

SIP/SDPUDP/TCP

Page 8: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Vulnerabilities

Security issues with SIP:SIP is a complex, free format protocolSIP itself does not require any securitySecurity mentioned in SIP RFC, but not requiredSecurity degrades to common feature setSecurity is not mandatory even if availableUDP is commonly used for SIP transportNetwork Address Translation (NAT) breaks securityData firewalls do not monitor SIP

Page 9: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SIP Vulnerabilities

SIP-Specific Vulnerabilities:EavesdroppingGeneral and directory scanningFlood-based Denial of Service (DoS)Fuzzing Denial of Service (DoS)Registration manipulation and hijackingApplication man-in-the-middle attacksSession tear downcheck-sync rebootsRedirect attacksRTP attacksSPIT

Page 10: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

EavesdroppingProxy

User

Proxy

UserAttacker

Page 11: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Eavesdropping Tools

Page 12: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Eavesdropping Tools

Page 13: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Eavesdropping Tools

Page 14: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

General/Directory ScanningProxyProxy

Attacker

INVITE, OPTION, orREGISTER

Requests

Page 15: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

General Scanning ToolsNmap has the best VoIP fingerprinting database

nmap -O -P0 192.168.1.1-254Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2006-02-20 01:03 CSTInteresting ports on 192.168.1.21:(The 1671 ports scanned but not shown below are in state: filtered)PORT STATE SERVICE23/tcp open telnetMAC Address: 00:0F:34:11:80:45 (Cisco Systems)Device type: VoIP phoneRunning: Cisco embeddedOS details: Cisco IP phone (POS3-04-3-00, PC030301)Interesting ports on 192.168.1.23:(The 1671 ports scanned but not shown below are in state: closed)PORT STATE SERVICE80/tcp open httpMAC Address: 00:15:62:86:BA:3E (Cisco Systems)Device type: VoIP phone|VoIP adapterRunning: Cisco embeddedOS details: Cisco VoIP Phone 7905/7912 or ATA 186 Analog Telephone AdapterInteresting ports on 192.168.1.24:(The 1671 ports scanned but not shown below are in state: closed)PORT STATE SERVICE80/tcp open httpMAC Address: 00:0E:08:DA:DA:17 (Sipura Technology)Device type: VoIP adapterRunning: Sipura embeddedOS details: Sipura SPA-841/1000/2000/3000 POTS<->VoIP gateway

Page 16: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

General Scanning Tools

Page 17: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Directory Scanning Tools

Page 18: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Directory Scanning Tools

Linux tools:dirscan – uses requests to find valid UAsauthtool – used to crack digest authentication

Page 19: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Denial of Service

Media Gateway

Media Gateway

Every ComponentProcessing

Signaling or MediaIs A Target

Proxy Proxy RegistrarRegistrar

User User

FW/NAT FW/NAT

Page 20: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Flood-based Denial of Service

SIP Phone

FloodApplication

On PC

INVITE, REGISTERFloods

SIPProxy

SIP Phone SIP Phone SIP Phone

Page 21: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Flood-based Denial of Service Tools

Page 22: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Flood-based Denial of Service Tools

Linux tools:inviteflood – floods target with INVITE requestsregisterflood – floods registrar with REGISTER requests

Page 23: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Fuzzing Denial of ServiceINVITE sip:[email protected]:6060;user=phone SIP/2.0Via: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…From: UserAgent<sip:[email protected]:6060;user=phone>To: 6713<sip:[email protected]:6060;user=phone>Call-ID: [email protected]: 1 INVITESubject: VovidaINVITEContact: <sip:[email protected]:6060;user=phone>Content-Type: application/sdpContent-Length: 0

Page 24: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Fuzzing Denial of Service Tools

Linux tools:protos SIP test suite

Commercial tools:Codenomicon

Page 25: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Registration ManipulationProxy

User

Proxy

UserAttacker

Erasing, Adding, orHijacking aRegistration

Page 26: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Registration Manipulation Tools

Page 27: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Registration Manipulation Tools

Linux tools:erase_registrations – removes a registrationadd_registrations – adds one or more bogus registrations

Page 28: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Registration HijackingProxy

User

Proxy

UserAttacker

HijackedSession

HijackedMedia

Page 29: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Registration Hijacking Tools

Linux tools:reghijacker – hijacks a registration, even when using authenticationauthtool – cracks digest authentication

Page 30: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Application Man-in-the-middle

User UserAttacker

Attacker

Proxy

Attacker PlacesThemselves

Between ProxiesOr Proxy/UA

Proxy

Page 31: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Application Man-in-the-middle Tools

Linux tools:sip_rogue – rogue SIP proxy or B2BUA

Page 32: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Session Tear Down

Attacker SendsBYE Messages

To UAs

Attacker

Proxy Proxy

User User

Page 33: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Session Tear Down Tools

Linux tools:teardown – used to terminate a SIP call

Page 34: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Check-sync Reboot

Attacker Sendscheck-sync Messages

To UA

Attacker

Proxy Proxy

User User

Page 35: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Check-sync Reboot Tools

Page 36: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Check-sync Reboot Tools

Linux tools:check_sync – causes a SIP phone to reboot

Page 37: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Redirection

Inbound CallsAre Redirected

Attacker

Proxy Proxy

User User

Attacker Sends“301/302 – Moved”

Message

Page 38: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Redirection Tools

Linux tools:redirector – used to redirect calls from a SIP UA

Page 39: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

RTP/Audio Injection/Mixing

Attacker ObservesRTP and Injects or

Mixes in New Audio

Attacker

Proxy Proxy

User User

Page 40: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

RTP/Audio Injection/Mixing

Linux tools:rtpinjector – monitors an RTP session and injects or mixes in new audio

Page 41: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SPIT

Page 42: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

SPIT Tools

Linux tools:Asterisk – a free, easily installed SIP PBX that makes it easy to generate SPITspitter – a tool that creates SPIT files for Asterisk

Page 43: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Links

www.hackingvoip.comSIP attack tools –ethereal – www.ethereal.comwireshark – www.wireshark.comSiVuS – www.vopsecurity.orgCain and Abel - http://www.oxid.it/cain.htmlFuzzing - http://www.ee.oulu.fi/research/ouspg/protos/index.htmlCodenomicon – www.codenomicon.comAsterisk – www.asterisk.orgTrixbox – www.trixbox.org

Page 44: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Recommendations

Establish policies and proceduresFollow best practices for data securitySecure the platforms, network, & applicationsUse standards-based security, such as TLS and SRTPUse SIP firewallsContinue to protect legacy networksUse knowledgeable security consultants, to design,test, and secure your network

Page 45: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Key Points to Take Home

SIP is an important VoIP protocolSIP will be used for public VoIP accessSIP is vulnerable to attacksThere are tools available to implement these attacksThere are steps you can take to improve security

Page 46: Session Initiation Protocol (SIP)  · PDF fileSession Initiation Protocol (SIP) Vulnerabilities ... SIP vulnerabilities and attack tools ... Cisco IP phone

Contact:Mark D. [email protected](210) 402-9669

QUESTIONS?