Title: Columbia - Verizon Research Security : VoIP Denial-of-Service
1Columbia - Verizon ResearchSecurity VoIP
Denial-of-Service
- Somdutt B. Patnaik Gaston Ormazabal
- Columbia University Verizon
Labs - CS Department
2Agenda
- Project Overview
- Previous Work
- Problem Areas
- Goals
- The SIP Threat Model
- DoS attack taxonomy
- Detection and Mitigation strategy
- Testbed and Validation strategy
- Demo
- Discussion
3Previous Work
- Successfully implemented a large scale SIP-aware
Firewall (using dynamic pinhole filtering) - The filter is used as a first-line of defence
against DoS attacks at the network perimeter and
it enforces the following - Only signalled media channels can traverse the
perimeter - End systems are protected against flooding of
random RTP or other attacks.
4Extension to Previous Work
- The firewall(pinhole filtering) approach is a
great first-line of defense but it does not
address the following - Attackers can still traverse the perimeter
through the signalling port and media ports
viz., Pinholes cannot distinguish legitimate from
illegitimate traffic - This lead us to define the new problem...
5Mitigation SolutionSchematic Description
Untrusted
Trusted
sipd
Filter I
Filter II
DPPM
SIP
SIP
SIP
VoIP Traffic Attack Traffic
RTP
RTP
6Motivation
- Telephony services migrating to IP become an
attractive DoS attack target - Attack traffic that traverses the perimeter could
target the availability of signalling VoIP
service - Attack targets could be supporting services (e.g.
DNS), SIP infrastructure elements (proxy,
softswitch, SBC) and end-points (SIP phones)
7VoIP Threat Taxonomy (adopted from VOIPSA)
Scope of our research
Refer to http//www.voipsa.org for more details
on this taxonomy
8Scope of Our Research
Scope of current work
9Goals
- Study VoIP DoS
- Definition define VoIP specific threats
- Detection how do we detect an attack?
- Mitigation defence strategy and implementation
- Validation validate our defence strategy
- Generate requirements for future security network
elements and test tools for their validation
10THE SIP THREAT MODEL
- REFERENCES
- VoIP Security and Privacy Threat Taxonomy,
VoIPSA October 2005
11The SIP Threat Model
- Eavesdropping
- Impersonation of a SIP entity
- Interception and modification of SIP messages
- Service Abuse
- Denial of Service
12SIP Threat Model details (1)
- Eavesdropping
- Attacker can monitor signalling/media streams,
but cannot or does not alter data itself - Signalling channel is not confidential
- Call Pattern Tracking
- Discovery of identity, affiliation, presence
- Traffic Capture
- Packet recording
- Number harvesting
- Unauthorized collection of numbers, emails, SIP
URIs
13SIP Threat Model details (2)
- Impersonating of a SIP entity
- Impersonate a UA
- Absense of assurance of a request's originator
- Registration Hijacking attacker deregisters a
legitimate contact and registers its own device
for that contact - Impersonate a Server
- UAs should authenticate the server to whom they
send requests - Attacker impersonates a remote server and
intercepts the UA's request
14SIP Threat Model details (3)
- Interception and modification of SIP messages
- Man-in-the-middle attack
- UA is using SIP to communicate media session keys
- Call Re-routing
- Attacker might modify the SDP in order to route
media streams to a wire-tapping device - Conversation Degradation
- Attacker might cause intentional reduction in QoS
- False Call Identification
- Change Subject so message considered Spam
15SIP Threat Model details (4)
- Service Abuse
- Call Conference Abuse
- Hide identity for the purpose of committing fraud
- Premium Rate Service Fraud
- Artificially increase traffic in order to
maximize billing - Improper Bypass or Adjustment to Billing
- Avoid authorized service charge by altering
billing records
16SIP Threat Model details (5)
- Denial of Service
- Denial-of-Service preventing users from
effectively using the target services - Complete loss of service
- Service degradation to a not usable point
- Distributed denial-of service attacks continue to
be the main threat facing network operators - Most attacks involve compromised hosts (bots),
with botnets sized from a few thousands to over
100,000 - - Worldwide ISP Security Report, September 2005,
Arbor Networks
17SIP Threat Model details (6)
- Denial of Service (contd.)
- Worldwide ISP Security Report, September 2005,
Arbor Networks
18SIP Denial of Service Attacks A detailed view
19DoS Attack Taxonomy
- Implementation flaws
- Application level
- Flooding
20DoS Attack Taxonomy details (1)
- Implementation flaws
- Attacker send carefully crafter packet(s) that
exploits a specific implementation flaw - Target vulnerability might originate in different
levels of the network protocol stack or in the
underlying OS/firmware. - Might cause excessive memory/disk/CPU consumption
and/or system reboot or crash
21DoS Attack Taxonomy details (2)
- Application level a feature of SIP is
manipulated to cause a DOS attack - Registration Hijacking
- Attacker registers his device with another user's
URI - Call Hijacking
- Attacker can inject a 301 Moved Permanently
message to an active session - Modification of media sessions
- Attacker can spoof re-INVITE messages thereby
reducing QoS, redirecting media, modifying
security attributes - Attacker can request arbitrarily large bandwidth
in SDP thereby choking the available bandwidth of
the proxy
22DoS Attack Taxonomy details (3)
- Application level (Contd.)
- Session teardown
- Attacker can spoof a BYE message and inject it to
an active session thereby tearing down the
session - Amplification attacks
- Attacker can create bogus requests with falsified
Via header field that identifies a target host - UAs/proxies generates a DDoS against that target
- Media streams attack
- Attacker can inject spoofed RTP packets with high
SEQ numbers into the media streams thereby
changing the playout sequence
23DoS Attack Taxonomy details (4)
- Flooding
- Attacker can flood the network link or overwhelm
the target host - Usually requires more resources from the attacker
- Harder to defend against even the best
maintained networks can become congested - Variant could be UDP floods, ICMP echo attacks,
SYN floods, etc. - Floods of INVITE or REGISTER messages could cause
excessive processing at a SIP proxy
24Our Mitigation Strategy
25Basic Strategy and motivation
- Implementation flaws are easier to deal with
- Systems can be tested before used in production
- Systems can be patched when a new flaw is
discovered - Attack signatures could be integrated with a
firewall - Application level and flooding attacks are harder
to defend against - SIP end-points are dumb - try to defend SIP
infrastructure elements - There are commercially available solutions for
general UDP/SYN flooding (Arbor Networks,
CISCO/Riverhead) but none for SIP
26Main Focus of our Strategy...
- VULNERABILITY A common vulnerability to SIP over
UDP attacks is the ability to spoof SIP requests - Registration/Call Hijacking
- Modification of Media sessions
- Session teardown
- Request flooding
- Bandwidth over-claim using SDP requests
- MITIGATION Perform return routability check
- For UDP use SIP's built-in digest authentication
mechanism - Use null-authentication when no shared secret is
established - Rate-limit spoofed sources
- Maintain a Cloudshield CAM database of INVITE IPs
to verify - and accept a BYE message only from legitimate
IP addresses - Limit bandwidth grants to SDP requests (based on
some heuristics) - For TCP perform SYN relay
27The Scheme
Untrusted
Trusted
sipd
Filter I
Filter II
DPPM
SIP
SIP
SIP
VoIP Traffic Attack Traffic
RTP
RTP
28SIP Digest Authentication (1)
nonce a uniquely generated string used for one
challenge only and has a life time of X seconds
29SIP Digest Authentication (2)
- The introduction of digest authentication
accounts for nearly 80 of processing cost of a
stateless server and 45 of a call stateful
server - 70 of additional cost is for message processing
and 30 for authentication computation (hashing)
- SIP Security Issues The SIP Authentication
Procedure and its Processing Load, Salsano et
al., IEEE Network, November 2002
30Mitigation SolutionOverview
Untrusted
Trusted
sipd
Filter I
Filter II
DPPM
SIP
SIP
SIP
VoIP Traffic Attack Traffic
RTP
RTP
31Mitigation Implementation (1)
- Use the Cloudshield to rate-limit SIP
authentication attempts to the proxy - Use the firewall controlling proxy model
- Columbia's SIP Proxy sipd controls the
Cloudshield 2000 Deep Packet Inspection Server - Utilize wire-speed deep packet inspection
- State is only kept at Cloudshield
- Utilize the Firewall Control Protocol to
establish filters in real time - Insert filters for SIP UAs that are being
challenged
32Mitigation Implementation (2)Return-Routability
Succeeds
Untrusted
Trusted
DPPM
sipd
SIP UA
NPU
RAM
CAM
IP 128.59.21.70
(128.59.21.70, nonce"6ydARDP51P8Ef9H4iiHmUc7iFDE
" )
33Mitigation Implementation (3) Return-Routability
Fails
Untrusted
Trusted
DPPM
sipd
SIP UA
NPU
X
CAM
RAM
IP 1.2.3.4
(1.2.3.4, nonce"6ydARDP51P8Ef9H4iiHmUc7iFDE" )
34Mitigation Implementation (5)Integrated DDOS and
Dynamic Pinhole filter
Linux server
ASM
sipd
DPPM
FCP/UDP
Lookup
Switch
Drop
35Testbed and Validation StrategySIPStone
- SIPStone is benchmarking tool for SIP proxy and
redirect servers - SIPStone attempts to measure the request handling
capacity of a SIP server or a cluster of servers - The implementation performs a series of tests
that generates a pre-configured workload - For our project SIPStone was enhanced with
- Null digest authentication
- Optional spoofed source IP address SIP requests
36Testbed and Validation StrategyMethodology
- Use the SIPStone testing tool in a distributed
environment to generate SIP traffic - Generate both spoofed and legitimate source
address requests - Measure the following calls/sec throughput
values - Legitimate requests, without authentication
(Capacity) - Legitimate requests, with authentication (Normal)
- Legitimate and spoofed requests, without
authentication (Attack) - Legitimate and spoofed requests, with
authentication (Defense) - Identify the impact of spoofed addresses floods
on the calls/sec rate of legitimate requests - We should see A ltlt N, and ideally, D N
37Testbed Architecture
Call Handlers (SIPStone)
Attack Loaders (SIPStone)
Legitimate Loaders (SIPStone)
GigE Switch
GigE Switch
The Cloudshield
SIP Proxy
38Demonstration
- Flood of spoofed INVITE requests
- Acquire a legitimate UA IP address
- Send a flood of spoofed INVITE requests using the
UAs IP address - While the firewall blocks the attacker source IP,
try to send an INVITE from the legitimate UA - The UAs INVITE is blocked
- Session teardown attack
- Sniff on the signaling channel
- Acquire an active sessions dialog identifiers
(Call-ID, tags) and UAs SIP URIs - Send a spoofed BYE message
39Discussion...
40Impact of TLS on DOS
- A good number of attacks identified will be
eliminated - TLS is not ready for prime time yet
- Few IP phone vendors are implementing SIP over
TCP, a first step towards TLS
41Conclusions
- Have demonstrated SIP vulnerabilities
- Have implemented some carrier-class mitigation
strategies - Have built a validation testbed to measure
performance - Need to generalize methodology to cover a broader
range of cases and apply anomaly detection,
pattern recognition and learning systems
42Backup Slides
43CS-2000 Physical Architecture
44CS2K CALL SERVER COMPLEX
SMDI
VOICEMAIL
ISM
SS7 LINKS
MS/ENET
FLPP
STP PAIR
CALEA PMA
COAM (N240)
COAM (N240)
SDM
XA-CORE
BCT MAS
SIP
LCR
AER
AER
AER
AER
ADM
LCR
GWR
ADM
MG15K (PVG)
C6509
C6509
GR303
S/BC
S/BC
OLT
MG9K
Session Border Controllers
PON
PSTN (CLASS 4/5 E911 TOPS AIS)
ONT
NETSCREEN
SS8 VOICEMAIL