[VOIPSEC] Soft Phone Vulnerabilities

Yaron Sheffer yaronf at checkpoint.com
Mon Jun 12 10:08:14 CDT 2006


Hi Craig,

Although in principle I support the "open is more secure" argument, I have to add that you are only half-right on the specific case of GSM. In GSM the protocols are indeed open, but the crypto algorithms are (still!) secret. They have been reverse-engineered and then broken.

The situation is better for 3G (UMTS).

BTW, there are some underlying design issues even with UMTS ciphering (stream ciphers, encryption but no authentication) so I wouldn't be surprised to hear news on this front, too.

Thanks,
	Yaron 

> -----Original Message-----
> From: Craig Southeren [mailto:craigs at postincrement.com] 
> Sent: Friday, June 9, 2006 3:02
> To: Jon Callas; Voipsec at voipsa.org
> Subject: Re: [VOIPSEC] Soft Phone Vulnerabilities
> 
> On Thu, 8 Jun 2006 11:34:25 -0700
> Jon Callas <jon at pgpeng.com> wrote:
> 
> ..deleted
> 
> > Actually, that's been documented rather well. I understand 
> how Skype 
> > works much better than I understand how a Nokia 6230 tied 
> to Cingular 
> > works, network-wise.
> 
> I don't share your understanding.
> 
> We have *one* document on the internals of Skype that was 
> written by a team that had to reverse engineer the 
> information. That's all we have.
> It may be correct, or it may not - again we have no way of 
> knowing for sure.
> 
> GSM moble phones are written to interoperable specifications 
> that have been around for years, and have been implemented by 
> multiple vendors. If you want to know how any part of a GSM 
> network operates, just go and get the specification. It won't 
> be easy to understand (a GSM network is
> complicated) but the information is all available. The same 
> applies to a SIP network or a H.323 network.
> 
> > Nonetheless, you are correct in saying that we have much better 
> > knowledge of the details of GSM cryptography than we do of Skype's.
> > However, what we know about GSM crypto is that it's crap.
> 
> Thanks for proving my point!
> 
> The lack of security in GSM is well known because it was 
> proven by peer review. We have no way of knowing if the 
> security in Skype is crap because it can't be peer reviewed.
>  
> > My point is that the alternative to Skype -- a cell phone 
> -- doesn't 
> > have better security.
> 
> We also have no way of knowing if Skype is better than GSM :)
> 
> ..deleted
> 
> > I don't have the alternative of free software products. My 
> cell phone 
> > is not open software. I have far less knowledge of its 
> internals than 
> > I do of Skype.
> 
> This is due to a lack of research, not a lack of available 
> information.
> 
> > >  - no possible control by a network administrator of the 
> working of 
> > > the software[3].
> > >
> > 
> > Unlike those mobile phones?
> 
> The attributes of a GSM mobile network are well known because 
> they are based on public and interoperable standards. Given 
> sufficient time, anybody or company can create a GSM mobile 
> handset, or base station, and have it work with anybody 
> else's equipment. It might not be technically wonderful, but 
> everyone can find out how it works.
> 
> Skype is a closed standard. We have no idea if the protocol 
> is crappy or not, because it is not open. Obviously Skype has 
> licensed the protocol to other vendors, but also just as 
> obviously these vendors are prohibited from disclosing that 
> information.
> 
> ..deleted
> 
> > I think you're completely missing my point.
> > 
> > The point is that whatever we may not like about Skype, it is not 
> > worse and often better than the alternatives.
> 
> If you are are talking about the user experience, then I 
> agree with you.
> 
> If you are talking about the design of the system, then I 
> cannot agree with you because there is insufficient 
> information to make this evaluation.
>  
> > if you say that you're going to disallow Skype because it's doing 
> > stuff on the network that you don't control, I think that's silly, 
> > because if you ban Skype, they'll use a mobile phone. You have less 
> > knowledge and control on the GSM network, and the cryptography is 
> > known to suck so badly it can be broken in realtime.
> 
> And you know this because the GSM specs have been peer 
> reviewed and found lacking. For all you know, the Skype 
> protocol could be breakable in real-time too, making it just 
> as "crappy".
>  
> > If you're going to ban Skype because it's running on a PC 
> that could 
> > have malware, it ignores software issues on mobile phones 
> and software 
> > issues on other VOIP phones. We are switching our local 
> infrastructure 
> > over to Cisco VOIP phones, which are also at the bottom -- software.
> 
> Again, comparing apples and oranges.
> 
> Software running on a purpose-built appliance such as GSM 
> phone, or a Cisco Phone, or Skype handset for that matter, 
> will usually be more reliable than software running in the 
> wild ecosystem that is a general purpose PC. 
> 
> All of which has nothing to do with how secure Skype is :)
>  
> > If you're going to ban Skype because it's VOIP and VOIP is 
> inherently 
> > less secure than POTS, then that is the best reason I know 
> of to ban 
> > it. The argument has its own problems, but it's a better 
> argument than 
> > many I've heard.
> 
> I also agree this is a sensible argument. Many companies I 
> know of will not use VoIP unless it is over a known secure 
> transport such as IpSec or a private network. I certainly 
> make this clear to companies I do business with.
>  
> ..deleted
> 
> > If you're worried about the security of running Skpye on a 
> PC, it's a 
> > valid complaint, but it's a complaint applicable Gizmo, 
> EyeBeam, etc.
> > The problem isn't a *Skype* problem. it's a problem with 
> running VOIP 
> > on a PC.
> 
> The difference is that those networks are not claiming to be 
> secure and encrypted. Skype is - but they provide no means to 
> verify that claim cryptographically. The same argument 
> applies to any closed source VoIP network.
>  
> ..deleted
> 
> > So I'll repeat my question -- what are the problems with Skype that 
> > are unique to Skype? I have my answers to this question (which I 
> > haven't stated at all). I'm not a Skype fan. But I'm not an enemy, 
> > either. The more I see of it, the more I am willing to tolerate it, 
> > and that in itself makes grumpy because I think they should 
> just hire 
> > some people to come out with an Inside Skype book. Heck, they could 
> > present it at some $1000/day conference and I'd be there in 
> a heartbeat.
> 
> My problem with Skype is very simple. 
> 
> They claim to provide a secure network, but they provide no 
> means to verify that claim. Given that they also claim to be 
> peer to peer, there are reasons to doubt their claim to 
> security. They are using this claim to distinguish their 
> product from competitors, and naive users are believing them. 
> 
> I'll certainly not be trusting their claims of security until 
> I have them verified by peer review. Until then, I'll 
> continue to use Skype (or MSN, or Yahoo or unencrypted SIP or 
> unencrypted H.323) but not for anything that I would not say 
> over the PSTN or cell phone networks.
> 
> History shows that networks developed behind closed doors are 
> very rarely secure, and I strongly suspect that in the end 
> Skype will prove to have some similar flaw. 
> 
>    Craig
> 
> 
> --------------------------------------------------------------
> ---------
>  Craig Southeren          Post Increment ? VoIP Consulting 
> and Software
>  craigs at postincrement.com.au                   
> www.postincrement.com.au
> 
>  Phone:  +61 243654666      ICQ: #86852844
>  Fax:    +61 243656905      MSN: craig_southeren at hotmail.com
>  Mobile: +61 417231046      
> 
>  "It takes a man to suffer ignorance and smile.
>   Be yourself, no matter what they say."   Sting
> 
> 
> 
> 





More information about the Voipsec mailing list