[VOIPSEC] An issue of trust?
Zmolek, Andrew (Andy)
zmolek at avaya.com
Fri Jun 16 16:02:36 CDT 2006
Yes, CALEA solutions for SIP exist today and are presumably implemented
by all the major carriers (often via SBCs). That wasn't the point of my
post, but from a CALEA point-of-view, it doesn't matter if the SIP
protocol itself isn't friendly to its aims so long as there's a point at
which the desired information can be accessed.
/\\//\Y/\ Andy Zmolek | zmolek at avaya.com | 303-538-6040
GCS Security Technology Development | Avaya, Inc.
-----Original Message-----
From: Voipsec-bounces at voipsa.org [mailto:Voipsec-bounces at voipsa.org] On
Behalf Of Andre Fucs de Miranda
Sent: Friday, June 16, 2006 2:55 PM
To: voipsec at voipsa.org
Subject: Re: [VOIPSEC] An issue of trust?
Andrew,
I thought that CALEA could already be achieved in SIP environments using
all the major SBCs and Carrier Class VoIP switches. Am I wrong?
Respectfully,
--
Andre Fucs
http://www.fucs.org/portugues/
---- Mensagem Original ----
From: "Zmolek, Andrew \(Andy\)"
To: "Tyler Johnson" , Ron_Cramer at cargill.com, Voipsec at voipsa.org
Sent: Sex, Junho 16, 2006 3:40 pm
Subject: Re: [VOIPSEC] An issue of trust?
> CALEA doesn't break E2E security, so long as you're encrypting with
> technology not under the control of a service provider (or SP
> equivalent) who must comply with it. Federal policy doesn't prevent
> E2E security today, but it's laughable to think it's worthwhile to
> expect changes to US regulations that mandate E2E security unless
> you're willing to extend CALEA to cover all P2P technology as well.
>
> There are plenty of good E2E security solutions that can be put in
> place by end-users or businesses that are carrier-independent, but
> none of them has that critical mass of implementation yet and
> interoperability between most of these solutions are poor candidates
> for widespread use because of two simple problems:
>
> 1. Key management: so many different ways to provide keys, but the
> most interoperable of these methods have point-to-point dependencies
> (like sdescriptions over TLS for SIP) or require the prior existence
> of a global PKI solution for all endpoints (and end-users) to leverage
> (like many of the MIKEY variants).
>
> 2. Offer management: namely, how do I determine whether my device can
> communicate with yours in a secure and interoperable way? The most
> obvious way to do this in SIP would be with multi-part SDP offers, but
> it doesn't take much testing to determine that a lot of today's
> clients break when presented with a multi-part message. So we end up
> having to look at SDP extensions or headers as a compromise that may
> or may not work properly for backwards compatibility, but don't blow
> up the client at least.
>
> BTW, ZRTP bypasses some of the key management problems but does so by
> hiding signaling in the media (which creates a host of other interop
> problems to solve which make offer management more complex). And yes,
> the H.235.x family of security protocols does offer a few solutions as
> well for the H.323 family but the applicability of those protocols
> varies a lot and most of the H.235.x protocols are implemented by a
> few vendors in ways that often don't lend them to interoperability.
>
> Moreover, the IETF prides itself on a history of not supporting
> wiretapping through its standards, so don't expect the SIP community
> to engineer this kind of support at the protocol level any time soon.
> And just in the key management realm, they've still got 11 candidates
> in play after 5+ years of work in this area, with no clear consensus
> in sight despite general agreement that the problem needs to be solved
> quickly.
>
> Bottom line: no one entity with leverage in this area has enough
> political might to break up this logjam, so expect the impasse on this
> encryption/wiretapping issue to hang around until the balance of power
> changes in a big way. That may or may not happen in my lifetime. In
> the mean time, one should expect balkanization to be the overall rule
> with multiple peering communities built along each of the major usage
> profiles (large enterprise, small-to-midsize carrier-oriented
> communities, PC-oriented consumers, etc.), each with their own
> dominant solution based on their own priorities.
>
> /\\//\Y/\ Andy Zmolek | zmolek at avaya.com | 303-538-6040
> Senior Manager, Security Planning & Strategy
> GCS Security Technology Development | Avaya, Inc.
>
>
> -----Original Message-----
> From: Voipsec-bounces at voipsa.org [mailto:Voipsec-bounces at voipsa.org]
> On Behalf Of Tyler Johnson
> Sent: Thursday, June 15, 2006 6:35 PM
> To: Ron_Cramer at cargill.com; Voipsec at voipsa.org
> Subject: Re: [VOIPSEC] An issue of trust?
>
> You can't. That's why you have to implement security at the
> application layer. That means end to end encryption of media an
> signaling. However, US regulations for CALEA break that. If you do hop
> to hop security you really don't have any assurance of security beyond
> the next hop unless you are in a limited federation, but that doesn't
> scale to the whole Internet.
>
> I think the bottom line is to work to get coherent policy implemented
> at the federal level in the U.S.
>
> The other possibility is to think about a new protocol that is
> designed with security from the ground up, with wiretap in mind. H.325
> offers an opportunity here, I think. I don't think it's going to work
> to reverse engineer this into SIP or H.323.
>
>
> ----- Original Message -----
> From:
> To:
> Sent: Thursday, June 15, 2006 6:46 PM
> Subject: Re: [VOIPSEC] An issue of trust?
>
>
>> It appears I should clarify my question in regards to a Telecom
> Service
>> Provider
>> vs an Internet Service Provider.
>>
>> Based on my experience, many enterprises would choose to trust
>> telecom
>
>> service providers
>> to keep data traffic private on a traditional layer 2 service such as
>> frame relay or voice services on POTS. And, would choose not to
>> trust Internet based communication, but to mitigate the Internet
>> based risk with firewalls, encryption tunnels,
> etc.
>>
>> Part of the logic used to differentiate between these two choices was
> that
>> the traditional layer 2
>> services provided separation between the virtual private networks of
> the
>> many customers serviced
>> by the Telecom Provider. Since the packets are being forwarded at
> layer 2
>> the Telecom Provider
>> had no awareness of anything related to the Internet Protocol. This
> also
>> meant that the
>> Telecom Service Providers customers could not use IP based attacks
> against
>> the carrier infrastructure.
>>
>> As Telecom Service Providers move to offer IP-ware services - MPLS,
> VoIP
>> or whatever
>> the Telecom Service Providers are vulnerable to IP based attacks. I
> know
>> there
>> are many papers that state MPLS *can* be deployed with the same level
> of
>> security
>> as a layer 2 service, but how can I *trust* the Telecom Service
> Provider
>> will invest
>> the effort to operate a secure MPLS network. Or, VoIP, or whatever?
>>
>> Thanks and regards,
>>
>> Ron
>>
>>
>>
>> -----Original Message-----
>> From: Cramer, Ron - Ron_Cramer at cargill.com
>> Sent: Thursday, June 15, 2006 1:19 PM
>> To: 'Voipsec at voipsa.org'
>> Subject: An issue of trust?
>>
>>
>> The issue of trust for your Telecom service provider, either
>> traditional or VoIP based seems to be a fundamental component for
>> secure communications.
>>
>> Can anyone identify an industry standard that an Enterprise can use
>> to establish trust with a Telecom vendor? Something with well
>> established decision criteria, not just a high level guide to
>> performing a risk assessment.
>>
>> Thanks in advance,
>>
>> Ron
>>
>> _______________________________________________
>> Voipsec mailing list
>> Voipsec at voipsa.org
>> http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
>>
>
>
> _______________________________________________
> Voipsec mailing list
> Voipsec at voipsa.org
> http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
>
>
> _______________________________________________
> Voipsec mailing list
> Voipsec at voipsa.org
> http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
>
_______________________________________________
Voipsec mailing list
Voipsec at voipsa.org
http://voipsa.org/mailman/listinfo/voipsec_voipsa.org
More information about the Voipsec
mailing list