Tải bản đầy đủ (.pdf) (433 trang)

how to cheat at volp security

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (44.23 MB, 433 trang )

www.dbebooks.com - Free Books & magazines
VISIT US AT
Syngress is committed to publishing high-quality books for IT Professionals and deliv-
ering those books in media and formats that fit the demands of our customers. We are
also committed to extending the utility of the book you purchase via additional mate-
rials available from our Web site.
SOLUTIONS WEB SITE
To register your book, visit www.syngress.com/solutions. Once registered, you can access
our Web pages. There you may find an assortment of value-
added features such as free e-books related to the topic of this book, URLs of related
Web sites, FAQs from the book, corrections, and any updates from the author(s).
ULTIMATE CDs
Our Ultimate CD product line offers our readers budget-conscious compilations of some
of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to
extend your reference library on key topics pertaining to your area of expertise,
including Cisco Engineering, Microsoft Windows System Administration, CyberCrime
Investigation, Open Source Security, and Firewall Configuration, to name a
few.
DOWNLOADABLE E-BOOKS
For readers who can't wait for hard copy, we offer most of our titles in downloadable
Adobe PDF form. These e-books are often available weeks before hard copies, and are
priced affordably.
SYNGRESS OUTLET
Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt
books at significant savings.
SITE LICENSING
Syngress has a well-established program for site licensing our e-books onto servers in
corporations, educational institutions, and large organizations. Contact us at
for more information.
CUSTOM PUBLISHING
Many organizations welcome the ability to combine parts of multiple Syngress books, as


well as their own content, into a single volume for their own internal use. Contact us at
for more information.
This Page Intentionally Left Blank
Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (col-
lectively "Makers") of this book ("the Work") do not guarantee or warrant the results to be obtained from the
Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS
and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state.
In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or
consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or
limitation of liability for consequential or incidental damages, the above limitation may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working with
computers, networks, data, and files.
Syngress Media| Syngress| "Career Advancement Through Skill Enhancement| "Ask the Author UPDATE|
and "Hack Proofing| are registered trademarks of Syngress Publishing, Inc. "Syngress: The Definition of a Serious
Security Library" TM, "Mission CriticalTM ,, and "The Only Way to Stop a Hacker is to Think Like One TM,, are trade-
marks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service
marks of their respective companies.
KEY SERIAL NUMBER
001 HJIRTCV764
002 PO9873D5FG
003 829KM8NJH2
004 VTY45Q9PLA
005 CVPLQ6WQ23
006 VBP965T5T5
007 HJJJ863WD3E
008 2987GVTWMK
009 629MP5SDJT
010 IMWQ295T6T

PUBLISHED BY
Syngress Publishing, Inc.
800 Hingham Street
Rockland, MA 02370
How to Cheat at VolP Security
Copyright 9 2007 by Syngress Publishing, Inc. All rights reserved. Printed in the United States of America. Except
as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any
form or by any means, or stored in a database or retrieval system, without the prior written permission of the pub-
lisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but
they may not be reproduced for publication.
Printed in the United States of America
1234567890
ISBN 10:1-59749-169-1
ISBN 13:978-1-59749-169-3
Publisher: Amorette Pedersen
Acquisitions Editor: Gary Byrne
Technical Editor: Thomas Porter
Cover Designer: Michael Kavish
Page Layout and Art: Patricia Lupien
Copy Editors: Adrienne Rebello, Mike
McGee
Indexer: Nara Wood
Distributed by O'Reilly Media, Inc. in the United States and Canada.
For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at
Syngress Publishing; email or fax to 781-681-3585.
Thomas Porter,
Ph.D. (CISSR IAM, CCNR CCDA, CCNA, ACE,
CCSA, CCSE, and MCSE) is the Lead Security Architect in Avaya's
Consulting & Systems Integration Practice. He also serves as Director of
Network Security for the FIFA World Cup 2006.

Porter has spent over 10 years in the networking and security industry
as a consultant, speaker, and developer of security tools. Porter's current
technical interests include VolP security, development of embedded micro-
controller and FPGA Ethernet tools, and H.323/SIP vulnerability test envi-
ronments. He is a member of the IEEE and OASIS (Organization for the
Advancement of Structured Information Standards). Porter recently pub-
lished Foundation articles for SecurityFocus titled "H.323 Mediated Voice
over IP: Protocols, Vulnerabilities, and Remediation" and "Perils of Deep
Packet Inspection."
Tom lives in Chapel Hill, NC, with his wife, Kinga~an Asst. Professor
of Internal Medicine at the University of North Carolina~and two
Chesapeake Bay Retrievers.
Brian
Baskin (MCR CTT+) is a researcher and developer for Computer
Sciences Corporation, on contract to the Defense Cyber Crime Center's
(DC3) Computer Investigations Training Program (DCITP). Here, he
researches, develops, and instructs computer forensic courses for members of
the military and law enforcement. Brian currently specializes in
Linux/Solaris intrusion investigations, as well as investigations of various
network applications. He has designed and implemented networks to be
used in scenarios, and he has also exercised penetration-testing procedures.
Brian has been instructing courses for six years, including presentations
at the annual DoD Cyber Crime Conference. He is an avid amateur pro-
grammer in many languages, beginning when his father purchased QuickC
for him when he was 11, and he has geared much of his life around the
implementations of technology. He has also been an avid Linux user since
1994 and enjoys a relaxing terminal screen whenever he can. He has
worked in networking environment for over 10 years from small Novell
networks to large, mission-critical, Windows-based networks.
Brian lives in the Baltimore, MD, area with his lovely wife and son. He

is also the founder, and president, of the Lightning Owners of Maryland car
club. Brian is a motor sports enthusiast and spends much of his time
building and racing his vehicles. He attributes a great deal of his success to
his parents, who relinquished their household 80286 PC to him at a young
age and allowed him the freedom to explore technology.
Joshua Brashars is a security researcher for the External Threat Assessment
Team at Secure Science Corporation. Before that, Joshua spent many years
in the telecommunications industry as an implementation consultant for
traditional and VolP PBX systems.Joshua would like to extend heartfelt
thanks to his family, friends, Lance James and SSC, Johnny Long and all of
johnny.ihackstuff.com, and a special nod to Natas, Strom Carlson, and
lucky225 for fueling the fire in his passion for telephone systems.
vi
Michael Cross (MCSE, MCP+I, CNA, Network+) is an Internet
Specialist/Computer Forensic Analyst with the Niagara Regional Police
Service (NRPS). He performs computer forensic examinations on com-
puters involved in criminal investigation. He also has consulted and assisted
in cases dealing with computer-related/Internet crimes. In addition to
designing and maintaining the NRPS Web site at www.nrps.com and the
NRPS intranet, he has provided support in the areas of programming, hard-
ware, and network administration. As part of an information technology
team that provides support to a user base of more than 800 civilian and
uniform users, he has a theory that when the users carry guns, you tend to
be more motivated in solving their problems.
Michael also owns KnightWare (www.knightware.ca), which provides
computer-related services such asWeb page design, and Bookworms
(www.bookworms.ca), where you can purchase collectibles and other inter-
esting items online. He has been a freelance writer for several years, and he
has been published more than three dozen times in numerous books and
anthologies. He currently resides in St. Catharines, Ontario, Canada, with

his lovely wife, Jennifer, his darling daughter, Sara, and charming son, Jason.
Dan Douglass
(MCSE+I, MCDBA, MCSD, MCT, Brainbench .Net
Programmer Job Role) is the Special Projects Manager with a cutting-edge
medical software company in Dallas, TX. His latest venture is as
President/Owner of a new technology firm, Code Hatchery. He currently
provides software development skills and internal training and integration
solutions, as well as peer guidance for technical skills development. Dan's
specialties include enterprise application integration and design; HL7, XML,
XSL, C++, C#, JavaScript, Visual Basic, and Visual Basic.Net; database
design and administration; Back Office and .NET Server platforms; Network
design, including LAN and WAN solutions; all Microsoft operating systems;
and Mac OS X, FreeBSD, and Linux. When he has free time, Dan teaches
programming, database design, and database administration at a prominent
Dallas university. Dan is a former U.S. Navy Nuclear Submariner and lives in
Plano, TX, with his very supportive and understanding wife, Tavish.
Dan wishes to extend special thanks to his mother-in-law, Sue Moffett,
for all her love and support through the years.
Bradley Dunsmore
(CCNR CCDR CCSR INFOSEC, MCSE+I,
MCDBA) is a Software/QA engineer for the Voice Technology Group at
Cisco Systems Inc. He is part of the Golden Bridge solution test team for
IPT based in RTR NC. His responsibilities include the design, deployment,
testing, and troubleshooting of Cisco's enterprise voice portfolio. His focus
area is the integration of Cisco's network security product line in an enter-
prise voice environment. Bradley has been working with Cisco's network
security product line for four years, and he is currently working on his
CCIE lab for Security. Prior to his six years at Cisco, Bradley worked for
Adtran, for Bell Atlantic, and as a network integrator in Virginia Beach, VA.
Bradley has authored, coauthored, or edited several books for Syngress

Publishing and Cisco Press for network security, telecommunication, and
general networking. He would like to thank his fiancSe, Amanda, for her
vii
unwavering support in everything that he does. Her support makes all of
this possible.
Michael Gough is host and webmaster of www.SkypeTips.com, which was
launched in January 2005 and receives more than 100,000 hits per month,
and www.VideoCallTips.com, which receives more than 30,000 hits per
month. Michael writes articles on Skype and related issues. He also explains
Skype's options and instructions to users so that they can practically apply
Skype at home and in the workplace. Michael also evaluates products used
with Skype and provides feedback to the vendors on features and improve-
ments to help drive the direction of Skype-related products. Michael is also
the host and webmaster for www.VideoCallTips.com, a Web site focused on
helping people understand how to make video calls to family and friends,
and maintains ratings of the many video call solutions available.
Michael's full-time employment is as a computer security consultant
with 18 years' experience in the computer technology field. Michael works
for a Fortune 500 company, where he delivers security consulting services
to its clients. Michael also presents for his company at many trade shows
and conferences and works with associations and groups, advising agencies
like the FBI on Skype security and the Center for Internet Security on
wireless security.
Tony
Rosela (PMR CTT+) is a Senior Member Technical Staff with
Computer Sciences Corporation working in the development and delivery
of technical instructional material. He provides leadership through knowl-
edge and experience with the operational fundamentals of PSTN architec-
ture and how the PSTN has evolved to deliver high-quality services,
including VoIE His other specialties include IP enabling voice networks,

WAN voice and data network design, implementation and troubleshooting
as well as spending a great deal of time in the field of computer forensics
and data analysis.
Choon
Shim is responsible for Qovia's technology direction and develop-
ment of the Qovia product line.
viii
Choon was previously President at Widearea Data Systems, where he
designed and developed collaboration platform software. Prior to joining
Widearea Data Systems, he was the Senior Development Manager and
Principal Engineer for Merant.
Choon is a successful technology leader with 20+ years' experience
architecting, building, and delivering large-scale infrastructure software
products. He has extensive hands-on technical development skills and has
successfully managed software teams for well-known enterprise software
companies, including BMC Software and EMC Corporation.
Choon is the author of Community Works and Express/OS shareware
used widely throughout the world. He is a frequent speaker at VoIP and
networking conferences for academic and industry. He recently gave a
keynote speech to an SNPD conference and chaired a VoIP Security Panel
at Supercomm05. Choon holds a B.S. in Computer Science from
Kyoungpook National University and an M.S in Electrical Engineering
from the University of Wisconsin.
Michael Sweeney (CCNA, CCDA, CCNP, MCSE, SCP) is the owner of
the Network Security consulting firm Packetattack.com. Packetattack.com's
specialties are network design and troubleshooting, wireless network design,
security, and analysis. The Packetattack team uses industry-standard tools
such as Airmagnet, AiroPeekNX, and NAI Sniffer. Packetattack.com also
provides digital forensic analysis services.
Michael has been a contributing author for Syngress for the books

Cisco
Security Specialist's Guide to PIX Firewalls
(ISBN: 1-931836-63-9),
Cisco
Security Specialist's Guide to Secure Intrusion Detection Systems
(ISBN: 1-
932266-69-0), and
Building DMZs for Enterprise Networks
(ISBN: 1-931836-
88-4). Through PacketPress, Michael has also published
Securing Your Network
Using Linux
(ISBN: 1-411621-77-8).
Michael has recently joined the ranks of " Switchers" where he is now
using two OS X Macs full-time in security work and day-to-day activities.
He keeps a running blog on his misadventures and discoveries about Apple,
OS X, and Macs in general at hackamac.packetattack.com.
Michael graduated from the University of California, Irvine, extension
program with a certificate in communications and network engineering.
ix
Michael currently resides in Orange, CA, with his wife, Jeanne, and his
three daughters, Amanda, Sara, and Olivia
Stephen Watkins (CISSP) is an Information Security Professional with
more than 10 years of relevant technology experience, devoting eight of
these years to the security field. He currently serves as Information
Assurance Analyst at Regent University in southeastern Virginia. Before
coming to Regent, he led a team of security professionals providing in-
depth analysis for a global-scale government network. Over the last eight
years, he has cultivated his expertise with regard to perimeter security and
multilevel security architecture. His Check Point experience dates back to

1998 with FireWall-1 version 3.0b. He has earned his B.S. in Computer
Science from Old Dominion University and M.S. in Computer Science,
with Concentration in Infosec, from James Madison University. He is nearly
a life-long resident of Virginia Beach, where he and his family remain active
in their Church and the local Little League.
Andy Zmolek is Senior Manager, Security Planning and Strategy at
Avaya. In that role, Andy drives product security architecture and strategy
across Avaya's voice and data communications products. Previously at Avaya,
he helped launch the Avaya Enterprise Security Practice, led several
Sarbanes-Oxley-related security projects within Avaya IT, and represented
Avaya in standards bodies (IETE W3C) as part of the Avaya CTO Standards
Group. Avaya Inc. designs, builds and manages communications networks for
more than one million businesses worldwide, including over 90 percent of
the FORTUNE 500|
Andy has been involved with network security for over a decade, and is
an expert on Session Initiation Protocol (SIP) and related VolP standards,
Presence systems, and firewall traversal for Vole He holds a degree in
Mathematics from Brigham Young University and is NSA IAM certified.
Prior to .joining Avaya, he directed network architecture and operations at
New Era of Networks, a pioneer of enterprise application integration (EAI)
technology, now a division of Sybase. Andy got his start in the industry as a
systems architect responsible for the design and operation of secure real-time
simulation networks for missile and satellite programs at Raytheon, primarily
with the Tomahawk program.
Contents
Chapter 1 Introduction to VolP Security 1
Introduction 2
The Switch Leaves the Basement 4
What Is VolP? 6
VolP Benefits 6

VolP Protocols 8
VolP Isn't Just Another Data Protocol 9
Security Issues in Converged Networks 11
VolP Threats 14
A New Security Model 15
Summary 16
Chapter 2 The Hardware Infrastructure 19
Introduction 20
Traditional PBX Systems 21
PBX Lines 22
PBX Trunks 24
PBX Features 25
PBX Adjunct Servers 28
Voice Messaging 28
Interactive Voice Response Servers 29
Wireless PBX Solutions 30
Other PBX Solutions 30
PBX Alternatives 30
VolP Telephony and Infrastructure 31
Media Servers 31
Interactive Media Service: Media Servers 32
Call or Resource Control: Media Servers 32
Media Gateways 33
Firewalls and Application-Layer Gateways 34
Application Proxies 34
Endpoints (User Agents) 35
IP Switches and Routers 38
Wireless Infrastructure 38
Wireless Encryption: WEP 38
xi

xii Contents
Wireless Encryption: WPA2 39
Authentication: 802. lx 40
Power-Supply Infrastructure 41
Power-over-Ethernet (IEEE 802.3af) 41
UPS 42
Energy and Heat Budget Considerations 43
Summary 44
Chapter 3 Architectures 45
Introduction 46
PSTN: What Is It, and How Does It Work? 46
PSTN: Outside Plant 46
PSTN: Signal Transmission 49
T1 Transmission: Digital Time Division Multiplexing 49
PSTN: Switching and Signaling 55
The Intelligent Network (IN), Private
Integrated Services, ISDN, and QSIG 56
ITU-T Signaling System Number 7 (SS7) 57
PSTN: Operational and Regulatory Issues 61
PSTN Call Flow 61
PSTN Protocol Security 64
SS7 and Other ITU-T Signaling Security 64
ISUP and QSIG Security 66
The H.323 Protocol Specification 67
The Primary H.323 VolP-Related Protocols 68
H.225/Q.931 Call Signaling 71
H.245 Call Control Messages 75
Real-Time Transport Protocol 77
H.235 Security Mechanisms 78
Understanding SIP 82

Overview of SIP 83
RFC 2543 / RFC 3261 84
SIP and Mbone 85
OSI 85
SIP Functions and Features 87
User Location 88
User Availability 88
User Capabilities 88
Session Setup 89
Contents xiii
Session Management 89
SIP URIs ' 89
SIP Architecture 90
SIP Components 90
User Agents 90
SIP Server 91
Stateful versus Stateless 92
Location Service 92
Client/Server versus Peer-to-Peer Architecture 93
Client/Server 93
Peer to Peer 94
SIP Requests and Responses 94
Protocols Used with SIP 97
UDP 97
Transport Layer Security 98
Other Protocols Used by SIP 99
Understanding SIP's Architecture 102
SIP Registration 102
Requests through Proxy Servers 103
Requests through Redirect Servers 103

Peer to Peer 104
Instant Messaging and SIMPLE 105
Instant Messaging 106
SIMPLE 107
Summary 109
Chapter 4 Support Protocols 111
Introduction 112
DNS 112
DNS Architecture 113
Fully Qualified Domain Name
114
DNS Client Operation 115
DNS Server Operation 116
Security Implications for DNS 117
TFTP 118
TFTP Security Concerns 118
TFTP File Transfer Operation 119
Security Implications for TFTP 119
HTTP 120
HTTP Protocol 121
xiv Contents
HTTP Client Request 121
HTTP Server Response 122
Security Implications for HTTP 122
SNMP 123
SNMP Architecture 124
SNMP Operation 124
SNMP Architecture 125
DHCP 126
DHCP Protocol

126
DHCP Operation 127
Security Implications for DHCP 128
RSVP 129
RSVP Protocol 130
RSVP Operation 130
Security Implications for RSVP 131
SDP 132
SDP Specifications 132
SDP Operation 133
Security Implications for SDP 134
Skinny 135
Skinny Specifications 135
Skinny Operation 135
Security Implications for Skinny 136
Summary 138
Chapter 5 Threats to VolP Communications Systems 141
Introduction
142
Denial-of-Service or VolP Service Disruption 142
Call Hijacking and Interception
148
ARP Spoofing 151
H.323-Specific Attacks 155
SIP-Specific Attacks 156
Summary 157
Chapter 6 Confirm User Identity 159
Introduction
160
802. lx and 802.1 li (WPA2)

163
802. lx/EAP Authentication
164
Supplicant (Peer)
164
Authenticator
164
Contents xv
Authentication Server 164
EAP Authentication Types 167
EAP-TLS 169
EAP-PEAP 171
EAP-TTLS 171
PEAPv 1/EAP-GT C 171
EAP-FAST 171
LEAP 172
EAP-MD-5 172
Inner Authentication Types 173
Public Key Infrastructure 175
Public Key Cryptography Concepts 176
Architectural Model and PKI Entities 178
Basic Certificate Fields
180
Certificate Revocation List
181
Certification Path
181
Minor Authentication Methods 182
MAC Tools 182
MAC Authentication 183

ARP Spoofing 183
Port Security 183
Summary 183
Chapter 7 Active Security Monitoring 185
Introduction 186
Network Intrusion Detection Systems 187
NIDS Defined 187
Components 188
Types 189
Placement 191
Important NIDS Features 194
Maintenance 194
Alerting 194
Logging 194
Extensibility 194
Response 194
Limitations
195
Honeypots and Honeynets
195
Host-Based Intrusion Detection Systems 196
xvi Contents
Logging 197
Syslog 197
SNMP 199
What Is a Penetration/Vulnerability Test? 200
Methodology 201
Discovery 201
Scanning 202
Vulnerability Assessment 203

Exploitation 203
Reporting 203
Summary 205
Chapter 8 Logically Segregate Network Traffic 207
Introduction 208
VLANs 209
VLAN Security 212
VLANs and Softphones 212
QoS and Traffic Shaping 214
NAT and IP Addressing 215
How Does NAT Work? 216
NAT Has Three Common Modes of Operation 218
NAT and Encryption 221
NAT as a Topology Shield 225
Firewalls 225
A Bit of Firewall History 226
Shallow Packet Inspection 226
Stateful Inspection 227
Medium-Depth Packet Inspection 227
Deep Packet Inspection 228
VolP-Aware Firewalls 229
H.323 Firewall Issues 230
SIP Firewall Issues 231
Bypassing Firewalls and NAT 232
Access Control Lists 235
Summary 237
Chapter 9 IETF Encryption Solutions for VolP 239
Introduction 240
Suites from the IETF 240
S/MIME: Message Authentication 241

Contents xvii
S/MIME Messages 244
Sender Agent 244
Receiver Agent 244
E-mail Address 244
TLS: Key Exchange and Signaling Packet Security 244
Certificate and Key Exchange 245
SRTP: Voice/Video Packet Security 247
Multimedia Internet Keying 248
Session Description Protocol Security Descriptions 248
Providing Confidentiality 248
Message Authentications 249
Replay Protection 250
Summary 251
Chapter 10 Skype Security 253
Security 254
Blocking Skype 257
Firewalls 257
Downloads 257
Software Inventory and Administration 258
Firewalls 258
Proxy Servers 260
Embedded Skype 260
A Word about Security 260
Chapter 11 Skype Firewall and Network Setup 263
A Word about Network Address Translation and Firewalls . .264
Home Users 266
Small to Medium-Sized Businesses 266
Large Corporations 267
What You Need to Know

About Configuring Your Network Devices 269
Home Users or Businesses
Using a DSL/Cable Router and No Firewall 269
Small to Large Company Firewall Users 269
TCP and UDP Primer 269
NAT vs. a Firewall 270
Ports Required for Skype 271
Home Users or Businesses
Using a DSL/Cable Router and No Firewall 271
xviii Contents
Small to Large Company Firewall Users 271
Skype's Shared.xml file 273
Microsoft Windows Active Directory 273
Using Proxy Servers and Skype 276
Wireless Communications 277
Display Technical Call Information 278
Small to Large Companies 282
How to Block Skype in the Enterprise 282
Endnote 283
Appendix A Validate Existing Security Infrastructure 285
Introduction 286
Security Policies and Processes 287
Physical Security 297
Perimeter Protection 300
Closed-Circuit Video Cameras 300
Token System 300
Wire Closets 301
Server Hardening 301
Eliminate Unnecessary Services 302
Logging 303

Permission Tightening 304
Additional Linux Security Tweaks 306
Activation of Internal Security Controls 308
Security Patching and Service Packs 312
Supporting Services 313
DNS and DHCP Servers 313
LDAP and RADIUS Servers 315
NTP 315
SNMP 316
SSH and Telnet 317
Unified Network Management 317
Sample VolP Security Policy 318
Purpose 319
Policy 319
Physical Security 319
VLANs 319
Softphones 319
Contents xix
Encryption 319
Layer 2 Access Controls 320
Summary 321
Appendix B The IP Multimedia Subsystem:
True Converged Communications 323
Introduction 324
IMS Security Architecture 325
IMS Security Issues 328
SIP Security Vulnerabilities 329
Registration Hijacking 329
IP Spoofing/Call Fraud 329
Weakness of Digest Authentication 329

INVITE Flooding 329
BYE Denial of Service 330
RTP Flooding 330
Spam over Internet Telephony (SPIT) 330
Early IMS Security Issues 330
Full IMS Security Issues 331
Summary 332
Related Resources 332
Appendix C Regulatory Compliance 333
Introduction 334
SOX: Sarbanes-Oxley Act 336
SOX Regulatory Basics 336
Direct from the Regulations 336
What a SOX Consultant Will Tell You 338
SOX Compliance and Enforcement 341
Certification 341
Enforcement Process and Penalties 342
GLBA: Gramm-Leach-Bliley Act 342
GLBA Regulatory Basics 343
Direct from the Regulations 343
What a Financial Regulator or
GLBA Consultant Will Tell You 347
GLBA Compliance and Enforcement 349
No Certification 350
Enforcement Process and Penalties 350
xx Contents
HIPAA: Health Insurance
Portability and Accountability Act 351
HIPAA Regulatory Basics 351
Direct from the Regulations 351

What a HIPAA Consultant Will Tell You 358
HIPAA Compliance and Enforcement 359
No Certification 359
Enforcement Process and Penalties 359
CALEA: Communications Assistance
for Law Enforcement Act 360
CALEA Regulatory Basics 363
Direct from the Regulations 364
What a CALEA Consultant Will Tell You 375
CALEA Compliance and Enforcement 376
Certification 376
Enforcement Process and Penalties 377
E911: Enhanced 911 and Related Regulations 377
E911 Regulatory Basics 378
Direct from the Regulations 378
What an E911 Consultant Will TellYou 382
E911 Compliance and Enforcement 383
Self-Certification 383
Enforcement Process and Penalties 383
EU and EU Member States'
eCommunications Regulations 384
EU Regulatory Basics 385
Direct from the Regulations 385
What an EU Data Privacy Consultant Will TellYou .389
EU Compliance and Enforcement 390
No Certification 390
Enforcement Process and Penalties 390
Summary 390
t~
aJ

"0
I'D
II
2 Chapter 1
9
Introduction to VolP Security
Introduction
The business of securing our private data is becoming more important and more relevant each
day. The benefits of electronic communication come with proportionate risks. Critical business
systems can be and are compromised regularly, and are used for illegal purposes. There are
many instances of this: Seisint (Lexis-Nexis research), Choicepoint, Bank of America, PayMaxx,
DSW Shoe Warehouses, Ameriprise, and T-Mobile are all recent examples.
9 Seisint (Lexis-Nexis research) was hacked, potentially compromising names,
addresses, and social security and driver's license information relating to 310,000
people.
9 Choicepoint, one of the nation's largest information aggregators, allowed criminals
to buy the private identity and credit information of more than 150,000 customer
accounts. Besides the harm done to Choicepoint's reputation, in late January, 2006,
Choicepoint was fined $15 million by the FTC for this breach. This figure does
not include the millions of dollars spent by Choicepoint on the cleanup of this
debacle. This settlement makes it clear that the FTC is increasingly willing to esca-
late security-related enforcement actions.
Victims of personal data security breaches are showing their displeasure by
terminating relationships with the companies that maintained their data,
according to a new national survey sponsored by global law firm White &
Case. The independent survey of nearly 10,000 adults, conducted by the
respected privacy research organization Ponemon Institute, reveals that
nearly 20 percent of respondents say they have terminated a relationship
with a company after being notified of a security breach.
"Companies lose customers when a breach occurs. Of the people we sur-

veyed who received notifications, 19 percent said that they have ended their
relationship with the company after they learned that their personal infor-
mation had been compromised due to security breach. A whopping 40 per-
cent say that they are thinking about terminating their relationship," said
Larry Ponemon, founder and head of the Ponemon Institute.
Bank of America announced that it had "lost" tapes containing information on over
1.2 million federal employee credit cards, exposing the individuals involved and the
government to fraud and misuse.
Introduction to VolP Security
9
Chapter 1 3
9 PayMaxx Inc., a Tennessee payroll management company, suffered a security lapse
that may have exposed financial data on as many as 100,000 workers.
9 DSW Shoe Warehouses revealed that credit card data from about 100 of its stores
had been stolen from a company computer over the past three months.
9 A hacker even attacked T-Mobile, the cellular telephone network used by actress
Paris Hilton, and stole the information stored on Hilton's phone, including private
phone numbers of many other celebrities.
These are just a few examples from one month in 2005. Everyone "knows" that infor-
mation security is important, but what types of damage are we talking about? Certainly, Paris
Hilton's phone book is not critical information (except, perhaps to her). Table 1.1 lists the
types of losses resulting from attacks on data networks.
Table 1.1 Losses Resulting from Attacks on Data Networks
Direct Losses
Indirect Losses
Economic theft
Theft of trade secrets
Theft of digital assets
Theft of consumer data
Theft of computing resources

Productivity loss due to data
Productivity loss due to spam
Recovery expenses
Loss of sales
Loss of competitive advantage
Brand damage
Loss of goodwill
Failure to meet contract obligations
Noncompliance with privacy regulations
corruption
Officer liability
Reparations
The aforementioned bullet points are based on data network examples. VoIP networks
simply haven't existed long enough to provide many real-world examples of information
breaches. But they will.
The practice of information security has become more complex than ever. By Gartner's
estimates, one in five companies has a wireless LAN that the ClO doesn't know about, and
60 percent of WLANs don't have their basic security functions enabled. Organizations that
interconnect with partners are beginning to take into account the security environment of
those partners. For the unprepared, security breaches and lapses are beginning to attract law-
suits. "It's going to be the next asbestos," predicts one observer.
The daily challenges a business faces~new staff, less staff, more networked applications,
more business partner connections, and an even more hostile Internet environment~should
not be allowed to create more opportunities for intruders. The fact is, all aspects of com-
merce are perilous, and professional security administrators realize that no significant gain is
www.syngress.com
4 Chapter 1
9
Introduction to VolP Security
possible without accepting significant risk. The goal is to intelligently, and economically, bal-

ance these risks.
This book is based on the premise that in order to secure VolP systems and applications,
you must first understand them. In addition, efficient and economical deployment of secu-
rity controls requires that you understand those controls, their limitations, and their interac-
tions with one another and other components that constitute the VolP and supporting
infrastructure.
The Switch Leaves the Basement
Telephone networks were designed for voice transmission. Data networks were not.
Recently~within the last three to five years~PBX functionality has moved logically (and
even physically) from the closet or fenced room in the basement into the data networking
space, both from physical connectivity and management standpoints. Additionally, the com-
ponents of the converged infrastructure (gateways, gatekeepers, media servers, IP PBXes, etc.)
are no longer esoteric variants ofVxWorks, Oryx-Pecos, or other proprietary UNIXs, whose
operating systems are not well enough known or distributed to be common hacking targets;
but instead run on well-known, commonly exploited Windows and Linux OSes. SS7, which
hardly any data networking people understand, is slowly being replaced by SIGTRAN
(which is basically SS7 over IP), H.323 (which no one understands Q), and SIP (which is
many things to many people), running over TCP/IP networks. By the way, hackers under-
stand TCP/IR
Most people, if they even think about it, consider the traditional public switched tele-
phone network (PSTN) secure. On the PSTN the eavesdropper requires physical access to
the telephone line or switch and an appropriate hardware bugging device.
"Whenever a telephone line is tapped, the privacy of the persons at both
ends of the line is invaded, and all conversations between them upon any
subject, and although proper, confidential, and privileged, may be overheard.
Moreover, the tapping of one man's telephone line involves the tapping of
the telephone of every other person whom he may call, or who may call him.
As a means of espionage, writs of assistance and general warrants are but
puny instruments of tyranny and oppression when compared with wire tap-
ping."

~Justice Louis Brandeis, Olmstead v. United States, 1928.

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×