FMUSER Wirless Transmit Video And Audio More Easier !

[email protected] WhatsApp +8618078869184
Language

    VoIP security vulnerability and protection

     

    VoIP's earliest application in China is still supplemented in the operator, but now there are many enterprise users have begun to pay attention to the application of VoIP. For emerging small office companies, using the new data networks of the new data network to carry voice, it is more convenient than building a separate voice system, and there is also a function of traditional voice switches such as mobile office. For industry users, because there is a data network connected to each branch node, using IP relay, the interconnection between headquarters and branch nodes can save the high cost of renting long-distance circuitry. Therefore, VoIP technology will have broad applications in enterprise user groups. However, in implementing items or during use, users and equipment supply manufacturers will put energy in how to improve voice quality and fuse with existing data networks, rarely consider the security hazards present in VoIP. As we put important application servers within the protection of firewalls; in fact, in the case of VoIP, voice is also the same as data applications, and it has become a "packet", which will also bear a variety of viruses and Hacker attacks. It is no wonder that some people say: "This is the first time in history, computer viruses can make your phone work properly." How many factors affect VoIP? The first is the problem of the product itself. The most common voice establishment and control signaling of VoIP technology is H.323 and SIP protocols. Although there are several differences between them, it is generally an open protocol system. Equipment manufacturers will have independent components to carry out the IP terminal login registration, Defold and Signaling. These products have a Windows operating operating system, and some are based on Linux or VxWorks. The more open the operating system, the easier it is, the more affected by viruses and malicious attacks. In particular, some devices need to provide web-based management interfaces, there will be opportunities to use Microsoftiis or Apache to provide services, and these applications are installed in the equipment when the product is factory factory, and cannot guarantee the latest version or promise. Certain security vulnerabilities have been made. Secondly, the DOS (Reject Service) attack based on open port. From the method of network attack and the destruction result, DOS is a simple and effective attack method. The attacker sends a quite number of service requests with false addresses to the server, but because the reply address contained is false, the server will wait back the message until all resources are exhausted. VoIP technology has many well-known ports, like 1719, 1720, 5060, etc. There are also some ports that the product itself needs to be used for remote management or private information transmission, in summary, is more than a simple data application. As long as it is an attacker's PC and these application ports in the same network segment, you can get more detailed information by simple scanning tools, such as shared software such as X-Way. A recent security vulnerability is proposed by Niscc (UknationalInfrastructure Co-Ordi-Nation Center), the test results show that many VoIP systems in the market use H.323 protocols exist in H.245, which is easy to be on the 1720 port. Affected by DOS, resulting in unstable or even 痪 ". Once again, the service is stolen, this problem exists in the case of analog phone. As we have received multiple phones on a normal analog phone line, there will be a problem of telephone stealing. Although IP phones can't call through a parallel way, it can also obtain the permissions of the phone by stealing the login password of the user IP phone. When IP phones are first logged in to the system for the first time, you will be prompted to enter the extension number and password of each person; many companies that use VoIP companies in order to facilitate employee remote / mobile office, they will allocate a desktop phone while allocating a virtual IP phone and grant password and dial-up permissions. In this way, even if the employee is traveling or at home, you can use the VPN mode to access the company's LAN, and then run the IP software phone in the computer to answer or call the local call, just like the company in the company. When the password is lost, anyone can log in to the extension number of others with their own soft phone; if the permissions obtained are free to dial domestic or even international long-distance numbers, it will bring huge losses to the company and difficult to find out. Finally, the media stream listening problem. The analog phone has a parallel eavesdropping problem. After enterprise users use a digital telephone, it is difficult to listen through simple means because of the private agreement. But in the VoIP environment, this issue was raised. A typical VoIP call requires the steps of signaling and media streams, and RTP / RTCP is a protocol that transmits voice information on a package-based network. Since the protocol itself is open, even a small media stream can be replayed without the association of the pre-rear information. If someone records all information by Sniffer on the data network and replayed by software, it will cause the trust crisis for employee dialogue communication. At the beginning of this technology, developers expect it as a cheap alternative to traditional long-distance calls, so there is not much in terms of safety; at the same time, VoIP technology is also developing with the development of the entire network market, too many different The existence of manufacturers and products leads to a uniform technical standard; VoIP's foundation or IP network, open system architecture inevitably affected from the network. Maximize the security of VoIP's security has the following: 1. Isolate the network used for voice and data transmission The isolation mentioned here does not refer to physical isolation, but it is recommended to put all IP phones into a separate VLAN, while limiting unrelated PC terminals enter the network segment. The feedback from many evaluators indicates that the division VLAN is the most simple and effective way to protect the IP voice system, which can isolate viruses and simple attacks. At the same time, the QoS settings of the data network will also help improve voice quality. 2. Treat VoIP as an application This also means that we need to adopt a means suitable for protecting important application servers to protect some important ports and applications in the VoIP device, such as using Nortel Network aleton swaping firewalls to effectively resist DOS attacks. The same approach applies to the VoIP system. When two IP terminals are called, once the signaling is established by the signaling service process of the center point, the media stream is only between the two terminals; only when the IP terminal is initiated. When the call needs to enter the PSTN public network through the gateway, the DSP processor resource within the media gateway will be occupied. Therefore, we need to protect the two types of information and ports of signaling and media streams. At the same time, as little reserved as possible, such as a web-based management address, and close the unwanted service process as much as possible. It is necessary to remind H.323 / SIP to experience obstacles when crossing the NAT and firewalls, which is due to the reasons for the agreement itself, but after the "Application Layer GA-TEWAY ALG), This problem can be solved; with the growth of the call, the external media stream proxy server (RTP Media Portal) can be used to support larger VoIP systems. 3. Select the right product and solution At present, the product system architecture of different manufacturers does not have the same, and the operation platform also has more favorable. We cannot assert which operating system is the most secure, but manufacturers need corresponding technical security to let users believe that their respective products have the ability to resist increasing viruses. At the same time, many manufacturers' products also use the management network segment and the user's IP voice network segment to physically isolated mechanism, and expose the port to the outer network as little as possible. The SuCcession 1000 / 1000m launched by the Nortel Network has adopted these design ideas, and the management network segment and the user network segment are physically isolated, and the VxWorks operating system uses the VxWorks operating system to shield the external influence on the system as much as possible. In addition, VoIP security issues and security of data networks are closely related. It is necessary to provide more than just a set of devices, but how to help users improve their security and reliability on existing networks and Some techniques. 4. Encryption of voice data stream There is a member of the H.323 protocol cluster --H.235 (also known as h.secure) is responsible for authentication, data integrity, and media stream encryption. What more practical is that manufacturers will use their own private protocol to ensure the security of VoIP. But even if there is no H.235 or other means, you want to steal an IP phone call is more difficult than stealing an ordinary call because you need to codon algorithm and corresponding software. Even if you get the software and successfully connect to the company's IP voice network segment, it is still possible to nothing. Because the data networks in many companies currently use the 10 / 100m port of the Ethernet switch to the desktop instead of HUB, the information cannot be steaved through the Sniffer. 5. Reasonably develop employee dial-up permissions Some security hazards faced by VoIP are actually a continuation of several problems in the IP network. Only well solved the security problem of the network, and simultaneously with some of the safety certification mechanisms of the product itself, VoIP-based applications can play a role in the enterprise, and become an effective way to solve the needs of the enterprise. Technology area 485 communication protocol program how to write (51 single-chip 485 communication program case) How to use 485 communication agreement (typical circuit instance of traditional photoelectric isolation) MODBUSRTU packet format detailed introduction Eight modbus RTU data frame formats detailed Modbus RTU Communication Protocol Format Detailed Description

     

     

     

     

    List all Question

    Nickname

    Email

    Questions

    Our other product:

    Professional FM Radio Station Equipment Package

     



     

    Hotel IPTV Solution

     


      Enter email  to get a surprise

      fmuser.org

      es.fmuser.org
      it.fmuser.org
      fr.fmuser.org
      de.fmuser.org
      af.fmuser.org ->Afrikaans
      sq.fmuser.org ->Albanian
      ar.fmuser.org ->Arabic
      hy.fmuser.org ->Armenian
      az.fmuser.org ->Azerbaijani
      eu.fmuser.org ->Basque
      be.fmuser.org ->Belarusian
      bg.fmuser.org ->Bulgarian
      ca.fmuser.org ->Catalan
      zh-CN.fmuser.org ->Chinese (Simplified)
      zh-TW.fmuser.org ->Chinese (Traditional)
      hr.fmuser.org ->Croatian
      cs.fmuser.org ->Czech
      da.fmuser.org ->Danish
      nl.fmuser.org ->Dutch
      et.fmuser.org ->Estonian
      tl.fmuser.org ->Filipino
      fi.fmuser.org ->Finnish
      fr.fmuser.org ->French
      gl.fmuser.org ->Galician
      ka.fmuser.org ->Georgian
      de.fmuser.org ->German
      el.fmuser.org ->Greek
      ht.fmuser.org ->Haitian Creole
      iw.fmuser.org ->Hebrew
      hi.fmuser.org ->Hindi
      hu.fmuser.org ->Hungarian
      is.fmuser.org ->Icelandic
      id.fmuser.org ->Indonesian
      ga.fmuser.org ->Irish
      it.fmuser.org ->Italian
      ja.fmuser.org ->Japanese
      ko.fmuser.org ->Korean
      lv.fmuser.org ->Latvian
      lt.fmuser.org ->Lithuanian
      mk.fmuser.org ->Macedonian
      ms.fmuser.org ->Malay
      mt.fmuser.org ->Maltese
      no.fmuser.org ->Norwegian
      fa.fmuser.org ->Persian
      pl.fmuser.org ->Polish
      pt.fmuser.org ->Portuguese
      ro.fmuser.org ->Romanian
      ru.fmuser.org ->Russian
      sr.fmuser.org ->Serbian
      sk.fmuser.org ->Slovak
      sl.fmuser.org ->Slovenian
      es.fmuser.org ->Spanish
      sw.fmuser.org ->Swahili
      sv.fmuser.org ->Swedish
      th.fmuser.org ->Thai
      tr.fmuser.org ->Turkish
      uk.fmuser.org ->Ukrainian
      ur.fmuser.org ->Urdu
      vi.fmuser.org ->Vietnamese
      cy.fmuser.org ->Welsh
      yi.fmuser.org ->Yiddish

       
  •  

    FMUSER Wirless Transmit Video And Audio More Easier !

  • Contact

    Address:
    No.305 Room HuiLan Building No.273 Huanpu Road Guangzhou China 510620

    E-mail:
    [email protected]

    Tel / WhatApps:
    +8618078869184

  • Categories

  • Newsletter

    FIRST OR FULL NAME

    E-mail

  • paypal solution  Western UnionBank OF China
    E-mail:[email protected]   WhatsApp:+8618078869184   Skype:sky198710021 Chat with me
    Copyright 2006-2020 Powered By www.fmuser.org

    Contact Us