SlideShare a Scribd company logo
1 of 31
INTRODUCTION
• Session Initiation Protocol (SIP) is a Requests For Comments
(RFC) of the Internet Engineering Task Force (IETF)
• First standardized in March 1999 in RFC 2543 (Obsolete)
• A second version in 2002 in RFC 3261
INTRODUCTION
• Today, the session initiation protocol (SIP) is the predominant
protocol for IP Telephony Signalling. This paper addresses IP
Telephony security issues - both current and future – focusing
on SIP.
• We summarize current activities regarding SIP
security, including recent developments in the research
community and standardization efforts within the IETF.
SIP OVERVIEW (1)
• ASCII based, signaling protocol
• Analogous to HTTP messages, SIP is a text base protocol.
• Works independent of the underlying network transmission
protocol and indifferent to media
SIP OVERVIEW (1)
It provides mechanisms to:
• Establish a session
• Maintain a session
• Modify and Terminate a session
• Session Initiation Protocol (SIP) is an application layer protocol, which is
used to establish, maintain and terminate multimedia session.
• These sessions may include voice, video, instant messaging.
SIP Components
System using SIP can be viewed in two Dimensions:
• Client/Server
• Individual Network Elements
SIP Components
 Client : : A client is any network element that sends SIP
requests and receives SIP responses.
 Server: A server is a network element that receives requests
in order to service them and sends back responses to those
requests.
• Example of Servers: Proxies, user agent servers, redirect
servers, and registrars.
SIP Components (2)
Two general categories of SIP are
 User Agent (UA): Resides in every SIP end station
 SIP Servers
SIP Components (2)
User Agent (UA)
Has two roles:
 SIP User Agent Client(UAC): Issues SIP requests.
 SIP User Agent Server (UAS): Receives SIP requests, and
Generates a response that accepts, rejects, or redirects the
request.
SIP Components (2)
SIP Servers
• Proxy Server: The proxy server is an intermediary entity that acts as both a server and a
client for the purpose of making requests on behalf of other clients. A proxy server primarily
plays the role of routing, meaning that its job is to ensure that a request is sent to another
entity closer to the targeted user.
• Redirect Server: Used during session initiation, Determine the address of the called
device, Returns this information to the calling device.
• Registrar Server: A registrar is a server that accepts REGISTER requests and places the
information it receives (the SIP address and associated IP address of the registering device) in
those requests into the location service for the domain it handles.
SIP Functions
Scalability
 Functionality such as proxying, redirection, location, or registration can
reside in different physical servers.
 Distributed functionality allows new processes to be added without
affecting other components.
Interoperability
 An open standard
 Can implement to communicate with other SIP based products
SIP Functions (2)
Mobility
• Supports user mobility by proxying and redirecting requests to a
user’s current location.
• The user can be using a PC at work, PC at home, wireless phone, IP
phone, or regular phone.
• Users must register their current location.
• Proxy servers will forward calls to the user’s current location.
• Example mobility applications include presence and call forking.
RELATED PROTOCOL
SIP
IPv4 / IPv6
TCP UDP
SDP
MGCP RTSP RTCP RTP RSVP
Signaling Gateway control QoS
SIP CAPABILITIES
• Determine location of target points – Support address resolution, name
mapping, call redirection
• Determine media capabilities – SIP uses Session Description Protocol (SDP)
for this
• Determine availability – returns a message why the remote party cannot
be contacted
• Establish a session between end points – also support mid call
changes, changes of media characteristics or codec
• Handles termination of calls – transfer of calls
• Permits interaction between devices via signalling messages
SIP CAPABILITIES
• INVITE: Invite a user to join a call
• ACK: Confirm that a client has received a final response to an invite
• BYE: Terminates the call between two of the users on a call
• OPTIONS: Request information on the capabilities of a Server
• CANCEL: Ends a pending Request , but doesn’t end the call
• REGISTER: Provide the map of address resolution that lets the server know the location of the users.
Status Codes
1xxInformational
• 100 Trying
• 180 Ringing (ringing tone
played locally)
• 181 Call is Being
Forwarded
• 182 Queued
• 183 Session progress
2xxSuccess
• 200 ok
3xx Redirection
• 300 Multiple Choices
• 301 Moved Permanently
• 302 Moved Temporarily
• 380 Alternative server
4xxClient error
• 400 Bad Request
• 401 Unauthorized
• 403 Forbidden
• 404 Not Found
• 405 Bad Method
• 415 Unsupported
Content
• 420 Bad Extensions
• 482 Detected
• 486 Busy Here
5xxServer failure
• 500 Server Internal
Error
• 501 Not
Implemented
• 503 Unavailable
• 504 Timeout
6xxGlobal Failure
• 600 Busy Everywhere
• 603 Decline
• 604 Doesn’t Exist
• 606 Not Acceptable
SIP Basic Call Setup
SIP Headers
• Session Initiation Protocol (RFC3261) for call signaling
• Header format is similar to HTTPS
• UDP Port 5060 used (recommended)
• TCP is also allowed (required for SIPS)
• Responsible for connection setup and release:
INVITE, OK, ACK, BYE, CANCEL
• Registration service for mobile user agents: REGISTER
• Uses DNS for routing (RFC3263;)
SIP Headers
• Session Description Protocol (RFC 2327) for parameter exchange
• Body of SIP-Messages
• Looks (a little bit) like sendmail mail queue format
• Contact address (ip address, port #) c=IN IP4 172.16.1.127
• Codec m=audio 7078 RTP/AVP 8 0 2 102 100 97 101
• (Master)Key for SRTP k=clear:geheim
SIP Headers (2)
INVITE sip:09611000038@202.4.97.11 SIP/2.0
Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1---
d8754z-;rport Max-Forwards: 70
Contact: <sip:09611301525@172.16.1.127:6256>
To: <sip:09611000038@202.4.97.11>
From: "09611301525"<sip:09611301525@202.4.97.11>;tag=015ccc4a
Call-ID: NGY1OGQ4NDI0OGMzMTI4MTNhY2M1ZTRkYzVlMDliMDU.
CSeq: 1 INVITE
Allow:
INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, REGISTER, SUBSCRIBE,
INFO
Content-Type: application/sdp
Supported: replaces User-Agent: PortGo v6.8, Build 07112011
Content-Length: 474
Breakdown of Header
INVITE :
message type
Address of called party
SIP version used by caller
Semicolon indicates start of URI parameters
Eg:- user=phone indicates call is for a phone number and not a SIP IP address
INVITE sip:09611000038@202.4.97.11 SIP/2.0
Via:
History of message’s path through network(s)
Helps to prevent looping and ensures replies route back to originator
Indicates the used transport protocol, ip address and port of sender
Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1---
d8754z-;rport
SDP Headers
• Describes components of communication channel under negotiation
• Includes information about :
– Codecs
– Ports
– Streaming protocols
• Usually sent with INVITE and 200 OK in SIP based devices
• Describes how data stream is going to be support via Real Time Transport
Protocol (RTP, RFC 1889)
SIP & SDP Header Analysis
For INVITE sip:09611000038@202.4.97.11 SIP/2.0 details message looks like this:
202.4.100.35:6256 202.4.97.11:5060
INVITE sip:09611000038@202.4.97.11 SIP/2.0
Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1---d8754z-;rport
Max-Forwards: 70
Contact: <sip:09611301525@172.16.1.127:6256>
To: <sip:09611000038@202.4.97.11>
From: "09611301525"<sip:09611301525@202.4.97.11>;tag=015ccc4a
Call-ID: NGY1OGQ4NDI0OGMzMTI4MTNhY2M1ZTRkYzVlMDliMDU.
CSeq: 1 INVITE
Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, REGISTER, SUBSCRIBE, INFO
Content-Type: application/sdp
Supported: replaces
User-Agent: PortGo v6.8, Build 07112011
Content-Length: 474
v=0
o=- 59935706 59935706 IN IP4 172.16.1.127
s=http://www.portsip.com
c=IN IP4 172.16.1.127
t=0 0
m=audio 21006 RTP/AVP 8 0 3 121 100 9 97 101
a=rtpmap:8 PCMA/8000
a=rtpmap:0 PCMU/8000
a=rtpmap:3 GSM/8000
a=rtpmap:121 G7221/16000
a=rtpmap:100 SPEEX/16000
a=rtpmap:9 G722/8000
a=rtpmap:97 iLBC/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=ptime:20
a=sendrecv
m=video 40180 RTP/AVP 34
a=rtpmap:34 H263/90000
a=fmtp:34 CIF=1 QCIF=1
a=sendrecv
Security Attacks
Signaling Layer Attacks
• SIP Registration Hijacking: Attacker impersonates a valid UA to a
registrar himself as a valid user agent. so attacker can receive calls
for a valid user.
• Impersonating a Server: When an attacker impersonates a remote
server and user agent request are served by the attacker machine.
Security Attacks
Signaling Layer Attacks
• SIP Message Modification: If an attacker launches a man in the
middle attack and modify a message. Then attacker could lead the
caller to connect to malicious system.
• SIP Cancel / SIP BYE attack
• SIP DOS attack: In SIP attacker creates a bogus request that
contained a fake IP address and Via field in the SIP header contains
the identity of the target host.
Security Solutions
Two types of security solutions
End-to End security:
• In SIP end points can ensure end-to-end security to those messages which
proxy does not read, like SDP messages could be protected using S/MIME.
• Media is transferred directly, so end-to-end security is achieved by SRTP.
Hop-by-hop security
• TLS, IPSec.
SIP Security Mechanisms
The SIP standard, as specified in RFC 3261 , includes several security
mechanisms:
• S/MIME: Because SIP is using MIME for message bodies, S/MIME can be
used to send authenticated and encrypted messages between user
agents.
• Digest Authentication: SIP entities sharing a secret (e.g. a password) can
authenticate each other with a challenge-response mechanism.
• TLS & IPSec: Hop-by-hop security for SIP signaling can be achieved either
on the transport layer (TLS) or on the network layer (IP sec).
SIP-Secure over TLS
• SIPS is like HTTPS: Is set on top of
TCP only
• Signaling over sips URI:
sips:user@example.de;transport=tc
p, Demands for TLS along the
(signaling)path.
• Server authentication via Certificate
• Client authentication (mostly) via
username/digest.
• Client authentication via Certificate
possible
• Only Hop by Hop Security
• S/MIME − secure SDP
• Data format based on S/MIME mail.
• Encryption of the SDP portion of the
SIP message
• End-to-End or Hop by Hop allowed:
Tunneled (and S/MIME encrypted)
SDP also allowed
• Supports UDP or TCP: TCP is
recommended because of UDP
fragmentation.
S/MIME − secure SDP
CONCLUSION
 The SIP is such a protocol, which does not have any built-in security.
This makes it more vulnerable to common VoIP attacks. In this
implementation of the SIP security threats and
countermeasures, the SIP secure model is designed to provide
security mechanisms by following the best practices for securing a
SIP based VOIP system.
CONCLUSION
 The intention of this paper has been to present an overview of
important challenges and current activities on SIP security.
 SIP is used to initiate IP Telephony communications. Thus, SIP
security will remain an active and interesting research area in the
near future.
THANK YOU
Muhammad Yeasir Arafat
Systems Engineer
Email: yeasir@dhakacom.com
yeasir08@yahoo.com
Dhakacom Limited
Dhaka, Bangladesh

More Related Content

What's hot

IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewNarasimham Settipalli
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunkingorionnow
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)KHNOG
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overviewJohn Downing
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismKent Loh
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationWaldir R. Pires Jr
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocolMichal Hrncirik
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSridhar Kumar N
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)Hamidreza Bolhasani
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session FlowKent Loh
 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li Inmhaviv
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basicsMustafa Golam
 

What's hot (20)

IP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overviewIP Multimedia Subsystem architecture overview
IP Multimedia Subsystem architecture overview
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
SIP Trunking
SIP TrunkingSIP Trunking
SIP Trunking
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)SIP (Session Initiation Protocol)
SIP (Session Initiation Protocol)
 
SIP Trunking overview
SIP Trunking overviewSIP Trunking overview
SIP Trunking overview
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS Mechanism
 
IMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentationIMS IP multimedia subsystem presentation
IMS IP multimedia subsystem presentation
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
IMS presentation
IMS presentationIMS presentation
IMS presentation
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Sip
SipSip
Sip
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role playSIP: Call Id, Cseq, Via-branch, From & To-tag role play
SIP: Call Id, Cseq, Via-branch, From & To-tag role play
 
CS-Core Mobile Network (General)
CS-Core Mobile Network (General)CS-Core Mobile Network (General)
CS-Core Mobile Network (General)
 
IMS Session Flow
IMS Session FlowIMS Session Flow
IMS Session Flow
 
Indroduction to SIP
Indroduction to SIPIndroduction to SIP
Indroduction to SIP
 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li In
 
Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 

Viewers also liked

Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)William Lee
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
Clear Voice Training
Clear Voice Training Clear Voice Training
Clear Voice Training dxsolomon
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceEr. Shiva K. Shrestha
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIPMahmoud Abudaqa
 
UC Ref Group Mar09
UC Ref Group Mar09UC Ref Group Mar09
UC Ref Group Mar09UCUOM
 
Site Partner Training
Site Partner TrainingSite Partner Training
Site Partner TrainingUCUOM
 
Welcome to Participants
Welcome to ParticipantsWelcome to Participants
Welcome to ParticipantsUCUOM
 
Exchange 2010 August Update
Exchange 2010 August UpdateExchange 2010 August Update
Exchange 2010 August UpdateUCUOM
 
Deploying a Green IP Telephony Network
Deploying a Green IP Telephony NetworkDeploying a Green IP Telephony Network
Deploying a Green IP Telephony Networkdigitallibrary
 
UC Launch
UC LaunchUC Launch
UC LaunchUCUOM
 
Introduction to IP Telephony
Introduction to IP TelephonyIntroduction to IP Telephony
Introduction to IP TelephonyVideoguy
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deploymentdigitallibrary
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise NetworkDan York
 
Docfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisDocfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisRashid Khan
 

Viewers also liked (19)

Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)Introduction to SIP(Session Initiation Protocol)
Introduction to SIP(Session Initiation Protocol)
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
SIP - The Basics
SIP - The BasicsSIP - The Basics
SIP - The Basics
 
Clear Voice Training
Clear Voice Training Clear Voice Training
Clear Voice Training
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
Elastix, TLS, SRTP y OpenVPN
Elastix, TLS, SRTP y OpenVPNElastix, TLS, SRTP y OpenVPN
Elastix, TLS, SRTP y OpenVPN
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
 
UC Ref Group Mar09
UC Ref Group Mar09UC Ref Group Mar09
UC Ref Group Mar09
 
Site Partner Training
Site Partner TrainingSite Partner Training
Site Partner Training
 
Welcome to Participants
Welcome to ParticipantsWelcome to Participants
Welcome to Participants
 
Exchange 2010 August Update
Exchange 2010 August UpdateExchange 2010 August Update
Exchange 2010 August Update
 
Deploying a Green IP Telephony Network
Deploying a Green IP Telephony NetworkDeploying a Green IP Telephony Network
Deploying a Green IP Telephony Network
 
UC Launch
UC LaunchUC Launch
UC Launch
 
Introduction to IP Telephony
Introduction to IP TelephonyIntroduction to IP Telephony
Introduction to IP Telephony
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deployment
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?
 
IPv6 and SIP - Myth or Reality?
IPv6 and SIP - Myth or Reality?IPv6 and SIP - Myth or Reality?
IPv6 and SIP - Myth or Reality?
 
Docfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysisDocfoc.com ngn - signaling &amp;amp; protocol analysis
Docfoc.com ngn - signaling &amp;amp; protocol analysis
 

Similar to SIP security in IP telephony

1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]William Giba
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P OverviewMayank Vora
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...ALTANAI BISHT
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocolkshitijmehta23
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1Carl Ford
 
Sip & its application
Sip & its applicationSip & its application
Sip & its applicationPoulami Pal
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacksEditor IJCATR
 
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxXMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxGSCWU
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPSean Flores
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSYatish Bathla
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 

Similar to SIP security in IP telephony (20)

1 VoIP Overview[1]
1 VoIP Overview[1]1 VoIP Overview[1]
1 VoIP Overview[1]
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
1 Vo I P Overview
1  Vo I P  Overview1  Vo I P  Overview
1 Vo I P Overview
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
 
Session initiation protocol
Session initiation protocolSession initiation protocol
Session initiation protocol
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
Apple Facetime Protocol
Apple Facetime ProtocolApple Facetime Protocol
Apple Facetime Protocol
 
Sip summary
Sip summarySip summary
Sip summary
 
Sinnreich Henry Johnston Alan Pt 1
Sinnreich Henry Johnston Alan   Pt 1Sinnreich Henry Johnston Alan   Pt 1
Sinnreich Henry Johnston Alan Pt 1
 
Sip & its application
Sip & its applicationSip & its application
Sip & its application
 
What is session initiation protocol
What is session initiation protocolWhat is session initiation protocol
What is session initiation protocol
 
VOIP
VOIPVOIP
VOIP
 
Review of SIP based DoS attacks
Review of SIP based DoS attacksReview of SIP based DoS attacks
Review of SIP based DoS attacks
 
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptxXMPP and SIP Presence Protocols for Messaging and Session Control.pptx
XMPP and SIP Presence Protocols for Messaging and Session Control.pptx
 
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIPAN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
AN OVERVIEW OF VOICE OVER INTERNET PROTOCOL (VOIP
 
MULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKSMULTIMEDIA SERVICES OVER IP NETWORKS
MULTIMEDIA SERVICES OVER IP NETWORKS
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
Sip Paper
Sip PaperSip Paper
Sip Paper
 

More from PaloSanto Solutions

Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...PaloSanto Solutions
 
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?PaloSanto Solutions
 
Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...PaloSanto Solutions
 
Queuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasQueuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasPaloSanto Solutions
 
La evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasLa evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasPaloSanto Solutions
 
Integrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXIntegrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXPaloSanto Solutions
 
Usando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTUsando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTPaloSanto Solutions
 
Todo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXTodo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXPaloSanto Solutions
 
Gestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSGestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSPaloSanto Solutions
 
Escalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPEscalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPPaloSanto Solutions
 
Elastix unified communications server cookbook
Elastix unified communications server cookbookElastix unified communications server cookbook
Elastix unified communications server cookbookPaloSanto Solutions
 
Seguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoSeguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoPaloSanto Solutions
 
Dynamic calls with Text To Speech
Dynamic calls with Text To SpeechDynamic calls with Text To Speech
Dynamic calls with Text To SpeechPaloSanto Solutions
 
Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)PaloSanto Solutions
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsPaloSanto Solutions
 
Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia PaloSanto Solutions
 
Módulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixMódulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixPaloSanto Solutions
 

More from PaloSanto Solutions (20)

Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
Tres componentes fundamentales de un buen PBX IP: seguridad, alta disponibili...
 
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
Voip y Big Data, ¿Cómo aplicar analytics a la VoIP?
 
Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...Innovative technology for universal communication designed to involve the (he...
Innovative technology for universal communication designed to involve the (he...
 
Queuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadasQueuemetrics esencial, de la implementación a reportes avanzadas
Queuemetrics esencial, de la implementación a reportes avanzadas
 
La evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadasLa evolución de la telefonía IP a comunicaciones unificadas
La evolución de la telefonía IP a comunicaciones unificadas
 
WebRTC … ¡vamos a discar!
WebRTC … ¡vamos a discar!WebRTC … ¡vamos a discar!
WebRTC … ¡vamos a discar!
 
Integrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyXIntegrando encuestas automáticas con iSurveyX
Integrando encuestas automáticas con iSurveyX
 
Usando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MTUsando el módulo PIKE en Elastix MT
Usando el módulo PIKE en Elastix MT
 
Todo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBXTodo lo lo que necesita saber para implementar FreePBX
Todo lo lo que necesita saber para implementar FreePBX
 
Gestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMSGestión de la Información de Desempeño con OpenNMS
Gestión de la Información de Desempeño con OpenNMS
 
Escalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIPEscalado y balanceo de carga de sistemas SIP
Escalado y balanceo de carga de sistemas SIP
 
Elastix unified communications server cookbook
Elastix unified communications server cookbookElastix unified communications server cookbook
Elastix unified communications server cookbook
 
Seguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detalladoSeguridad en Asterisk: Un acercamiento detallado
Seguridad en Asterisk: Un acercamiento detallado
 
Dynamic calls with Text To Speech
Dynamic calls with Text To SpeechDynamic calls with Text To Speech
Dynamic calls with Text To Speech
 
Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)Proceso de migración de telefonía tradicional a Elastix (Caso)
Proceso de migración de telefonía tradicional a Elastix (Caso)
 
Building a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communicationsBuilding a new ecosystem for interoperable communications
Building a new ecosystem for interoperable communications
 
Asterisk: the future is at REST
Asterisk: the future is at RESTAsterisk: the future is at REST
Asterisk: the future is at REST
 
Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia Presentacion Hardware Elastix 2015 - Colombia
Presentacion Hardware Elastix 2015 - Colombia
 
Voicemail Avanzado
Voicemail AvanzadoVoicemail Avanzado
Voicemail Avanzado
 
Módulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de ElastixMódulo de Alta Disponibilidad de Elastix
Módulo de Alta Disponibilidad de Elastix
 

Recently uploaded

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Recently uploaded (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

SIP security in IP telephony

  • 1.
  • 2. INTRODUCTION • Session Initiation Protocol (SIP) is a Requests For Comments (RFC) of the Internet Engineering Task Force (IETF) • First standardized in March 1999 in RFC 2543 (Obsolete) • A second version in 2002 in RFC 3261
  • 3. INTRODUCTION • Today, the session initiation protocol (SIP) is the predominant protocol for IP Telephony Signalling. This paper addresses IP Telephony security issues - both current and future – focusing on SIP. • We summarize current activities regarding SIP security, including recent developments in the research community and standardization efforts within the IETF.
  • 4. SIP OVERVIEW (1) • ASCII based, signaling protocol • Analogous to HTTP messages, SIP is a text base protocol. • Works independent of the underlying network transmission protocol and indifferent to media
  • 5. SIP OVERVIEW (1) It provides mechanisms to: • Establish a session • Maintain a session • Modify and Terminate a session • Session Initiation Protocol (SIP) is an application layer protocol, which is used to establish, maintain and terminate multimedia session. • These sessions may include voice, video, instant messaging.
  • 6. SIP Components System using SIP can be viewed in two Dimensions: • Client/Server • Individual Network Elements
  • 7. SIP Components  Client : : A client is any network element that sends SIP requests and receives SIP responses.  Server: A server is a network element that receives requests in order to service them and sends back responses to those requests. • Example of Servers: Proxies, user agent servers, redirect servers, and registrars.
  • 8. SIP Components (2) Two general categories of SIP are  User Agent (UA): Resides in every SIP end station  SIP Servers
  • 9. SIP Components (2) User Agent (UA) Has two roles:  SIP User Agent Client(UAC): Issues SIP requests.  SIP User Agent Server (UAS): Receives SIP requests, and Generates a response that accepts, rejects, or redirects the request.
  • 10. SIP Components (2) SIP Servers • Proxy Server: The proxy server is an intermediary entity that acts as both a server and a client for the purpose of making requests on behalf of other clients. A proxy server primarily plays the role of routing, meaning that its job is to ensure that a request is sent to another entity closer to the targeted user. • Redirect Server: Used during session initiation, Determine the address of the called device, Returns this information to the calling device. • Registrar Server: A registrar is a server that accepts REGISTER requests and places the information it receives (the SIP address and associated IP address of the registering device) in those requests into the location service for the domain it handles.
  • 11. SIP Functions Scalability  Functionality such as proxying, redirection, location, or registration can reside in different physical servers.  Distributed functionality allows new processes to be added without affecting other components. Interoperability  An open standard  Can implement to communicate with other SIP based products
  • 12. SIP Functions (2) Mobility • Supports user mobility by proxying and redirecting requests to a user’s current location. • The user can be using a PC at work, PC at home, wireless phone, IP phone, or regular phone. • Users must register their current location. • Proxy servers will forward calls to the user’s current location. • Example mobility applications include presence and call forking.
  • 13. RELATED PROTOCOL SIP IPv4 / IPv6 TCP UDP SDP MGCP RTSP RTCP RTP RSVP Signaling Gateway control QoS
  • 14. SIP CAPABILITIES • Determine location of target points – Support address resolution, name mapping, call redirection • Determine media capabilities – SIP uses Session Description Protocol (SDP) for this • Determine availability – returns a message why the remote party cannot be contacted • Establish a session between end points – also support mid call changes, changes of media characteristics or codec • Handles termination of calls – transfer of calls • Permits interaction between devices via signalling messages
  • 15. SIP CAPABILITIES • INVITE: Invite a user to join a call • ACK: Confirm that a client has received a final response to an invite • BYE: Terminates the call between two of the users on a call • OPTIONS: Request information on the capabilities of a Server • CANCEL: Ends a pending Request , but doesn’t end the call • REGISTER: Provide the map of address resolution that lets the server know the location of the users.
  • 16. Status Codes 1xxInformational • 100 Trying • 180 Ringing (ringing tone played locally) • 181 Call is Being Forwarded • 182 Queued • 183 Session progress 2xxSuccess • 200 ok 3xx Redirection • 300 Multiple Choices • 301 Moved Permanently • 302 Moved Temporarily • 380 Alternative server 4xxClient error • 400 Bad Request • 401 Unauthorized • 403 Forbidden • 404 Not Found • 405 Bad Method • 415 Unsupported Content • 420 Bad Extensions • 482 Detected • 486 Busy Here 5xxServer failure • 500 Server Internal Error • 501 Not Implemented • 503 Unavailable • 504 Timeout 6xxGlobal Failure • 600 Busy Everywhere • 603 Decline • 604 Doesn’t Exist • 606 Not Acceptable
  • 17. SIP Basic Call Setup
  • 18. SIP Headers • Session Initiation Protocol (RFC3261) for call signaling • Header format is similar to HTTPS • UDP Port 5060 used (recommended) • TCP is also allowed (required for SIPS) • Responsible for connection setup and release: INVITE, OK, ACK, BYE, CANCEL • Registration service for mobile user agents: REGISTER • Uses DNS for routing (RFC3263;)
  • 19. SIP Headers • Session Description Protocol (RFC 2327) for parameter exchange • Body of SIP-Messages • Looks (a little bit) like sendmail mail queue format • Contact address (ip address, port #) c=IN IP4 172.16.1.127 • Codec m=audio 7078 RTP/AVP 8 0 2 102 100 97 101 • (Master)Key for SRTP k=clear:geheim
  • 20. SIP Headers (2) INVITE sip:09611000038@202.4.97.11 SIP/2.0 Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1--- d8754z-;rport Max-Forwards: 70 Contact: <sip:09611301525@172.16.1.127:6256> To: <sip:09611000038@202.4.97.11> From: "09611301525"<sip:09611301525@202.4.97.11>;tag=015ccc4a Call-ID: NGY1OGQ4NDI0OGMzMTI4MTNhY2M1ZTRkYzVlMDliMDU. CSeq: 1 INVITE Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, REGISTER, SUBSCRIBE, INFO Content-Type: application/sdp Supported: replaces User-Agent: PortGo v6.8, Build 07112011 Content-Length: 474
  • 21. Breakdown of Header INVITE : message type Address of called party SIP version used by caller Semicolon indicates start of URI parameters Eg:- user=phone indicates call is for a phone number and not a SIP IP address INVITE sip:09611000038@202.4.97.11 SIP/2.0 Via: History of message’s path through network(s) Helps to prevent looping and ensures replies route back to originator Indicates the used transport protocol, ip address and port of sender Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1--- d8754z-;rport
  • 22. SDP Headers • Describes components of communication channel under negotiation • Includes information about : – Codecs – Ports – Streaming protocols • Usually sent with INVITE and 200 OK in SIP based devices • Describes how data stream is going to be support via Real Time Transport Protocol (RTP, RFC 1889)
  • 23. SIP & SDP Header Analysis For INVITE sip:09611000038@202.4.97.11 SIP/2.0 details message looks like this: 202.4.100.35:6256 202.4.97.11:5060 INVITE sip:09611000038@202.4.97.11 SIP/2.0 Via: SIP/2.0/UDP 172.16.1.127:6256;branch=z9hG4bK-d8754z-64630900441c9d08-1---d8754z-;rport Max-Forwards: 70 Contact: <sip:09611301525@172.16.1.127:6256> To: <sip:09611000038@202.4.97.11> From: "09611301525"<sip:09611301525@202.4.97.11>;tag=015ccc4a Call-ID: NGY1OGQ4NDI0OGMzMTI4MTNhY2M1ZTRkYzVlMDliMDU. CSeq: 1 INVITE Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, REGISTER, SUBSCRIBE, INFO Content-Type: application/sdp Supported: replaces User-Agent: PortGo v6.8, Build 07112011 Content-Length: 474 v=0 o=- 59935706 59935706 IN IP4 172.16.1.127 s=http://www.portsip.com c=IN IP4 172.16.1.127 t=0 0 m=audio 21006 RTP/AVP 8 0 3 121 100 9 97 101 a=rtpmap:8 PCMA/8000 a=rtpmap:0 PCMU/8000 a=rtpmap:3 GSM/8000 a=rtpmap:121 G7221/16000 a=rtpmap:100 SPEEX/16000 a=rtpmap:9 G722/8000 a=rtpmap:97 iLBC/8000 a=rtpmap:101 telephone-event/8000 a=fmtp:101 0-15 a=ptime:20 a=sendrecv m=video 40180 RTP/AVP 34 a=rtpmap:34 H263/90000 a=fmtp:34 CIF=1 QCIF=1 a=sendrecv
  • 24. Security Attacks Signaling Layer Attacks • SIP Registration Hijacking: Attacker impersonates a valid UA to a registrar himself as a valid user agent. so attacker can receive calls for a valid user. • Impersonating a Server: When an attacker impersonates a remote server and user agent request are served by the attacker machine.
  • 25. Security Attacks Signaling Layer Attacks • SIP Message Modification: If an attacker launches a man in the middle attack and modify a message. Then attacker could lead the caller to connect to malicious system. • SIP Cancel / SIP BYE attack • SIP DOS attack: In SIP attacker creates a bogus request that contained a fake IP address and Via field in the SIP header contains the identity of the target host.
  • 26. Security Solutions Two types of security solutions End-to End security: • In SIP end points can ensure end-to-end security to those messages which proxy does not read, like SDP messages could be protected using S/MIME. • Media is transferred directly, so end-to-end security is achieved by SRTP. Hop-by-hop security • TLS, IPSec.
  • 27. SIP Security Mechanisms The SIP standard, as specified in RFC 3261 , includes several security mechanisms: • S/MIME: Because SIP is using MIME for message bodies, S/MIME can be used to send authenticated and encrypted messages between user agents. • Digest Authentication: SIP entities sharing a secret (e.g. a password) can authenticate each other with a challenge-response mechanism. • TLS & IPSec: Hop-by-hop security for SIP signaling can be achieved either on the transport layer (TLS) or on the network layer (IP sec).
  • 28. SIP-Secure over TLS • SIPS is like HTTPS: Is set on top of TCP only • Signaling over sips URI: sips:user@example.de;transport=tc p, Demands for TLS along the (signaling)path. • Server authentication via Certificate • Client authentication (mostly) via username/digest. • Client authentication via Certificate possible • Only Hop by Hop Security • S/MIME − secure SDP • Data format based on S/MIME mail. • Encryption of the SDP portion of the SIP message • End-to-End or Hop by Hop allowed: Tunneled (and S/MIME encrypted) SDP also allowed • Supports UDP or TCP: TCP is recommended because of UDP fragmentation. S/MIME − secure SDP
  • 29. CONCLUSION  The SIP is such a protocol, which does not have any built-in security. This makes it more vulnerable to common VoIP attacks. In this implementation of the SIP security threats and countermeasures, the SIP secure model is designed to provide security mechanisms by following the best practices for securing a SIP based VOIP system.
  • 30. CONCLUSION  The intention of this paper has been to present an overview of important challenges and current activities on SIP security.  SIP is used to initiate IP Telephony communications. Thus, SIP security will remain an active and interesting research area in the near future.
  • 31. THANK YOU Muhammad Yeasir Arafat Systems Engineer Email: yeasir@dhakacom.com yeasir08@yahoo.com Dhakacom Limited Dhaka, Bangladesh