I have to assess the security threat of using generic password (12345) for our IP Phones. Apart from making calls on someone elses phone, which the can do anyway using the current setup, is there any major security concerns I should be aware of when setting basic generic passwords?
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
VOIP Security
Collapse
X
-
-
Originally posted by DGK View PostI have to assess the security threat of using generic password (12345) for our IP Phones. Apart from making calls on someone elses phone, which the can do anyway using the current setup, is there any major security concerns I should be aware of when setting basic generic passwords? -
-
Originally posted by DGK View PostIn other words you don't know.
Thanks anyway.
Once you have the IP Address, RTP & RTCP port numbers it's possible to flood your network with rogue RTP packets and jam voice communication.
Very few VOIP phones actually filter out RTP packets that come from IP addresses other than those authorised during the SIP hand-shaking.
Have fun!Comment
-
Originally posted by Churchill View PostGiven access to your VOIP phone you will be able to check the configuration of the phone. Its IP address and its Port numbers (RTP & RTCP).
Once you have the IP Address, RTP & RTCP port numbers it's possible to flood your network with rogue RTP packets and jam voice communication.
Very few VOIP phones actually filter out RTP packets that come from IP addresses other than those authorised during the SIP hand-shaking.
Have fun!
You're inside the network anyway if this your intention, even with a login there is nothing stopping you going up to someone's desk and seeing what their IP address is, then plugging your device in and flooding on UDP 16384 - 32768.
Then again you could have port security +/or using CDP to detect the attached device is a phone mitigating any risk there, also assuming your QOS is done properly (Markings, limit traffic, police scavenger etc) to stop any rogue devices consuming all yer bandwidth
;-)Hang on - there is actually a place called Cheddar?? - cailin maith
Any forum is a collection of assorted weirdos, cranks and pervs - Board Game Geek
That will be a simply fab time to catch up for a beer. - Tay
Have you ever seen somebody lick the chutney spoon in an Indian Restaurant and put it back ? - CyberghoulComment
-
Originally posted by snaw View PostNot quite.
You're inside the network anyway if this your intention, even with a login there is nothing stopping you going up to someone's desk and seeing what their IP address is, then plugging your device in and flooding on UDP 16384 - 32768.
Then again you could have port security +/or using CDP to detect the attached device is a phone mitigating any risk there, also assuming your QOS is done properly (Markings, limit traffic, police scavenger etc) to stop any rogue devices consuming all yer bandwidth
;-)
Most IP Phones will ignore UDP packets unless the RTP header is defined.Comment
-
It's not the phones that are important. It's the UDP chewing up your bandwidth, or a UDP attack on your call manager/voice gateway. Something along those lines I'd be worried about.Hang on - there is actually a place called Cheddar?? - cailin maith
Any forum is a collection of assorted weirdos, cranks and pervs - Board Game Geek
That will be a simply fab time to catch up for a beer. - Tay
Have you ever seen somebody lick the chutney spoon in an Indian Restaurant and put it back ? - CyberghoulComment
-
Originally posted by snaw View PostIt's not the phones that are important. It's the UDP chewing up your bandwidth, or a UDP attack on your call manager/voice gateway. Something along those lines I'd be worried about.
You'd really want something to flood the jitter buffer to be really destructive. And that isn't gonna happen unless the RTP header is valid...Comment
-
Originally posted by Churchill View PostHow about a series of G711 packets being transmitted with the phrase "**** You too!" on the relevant ports?
You'd really want something to flood the jitter buffer to be really destructive. And that isn't gonna happen unless the RTP header is valid...
In terms of damage done by using VOIP, the CODEC doesn't really matter. Most likely you'll not actually be trying to set up a call, you're just hijacking the voice vlan for either DOS type attacks, or maybe just trying to capture traffic so you could replay a conversation. Either way you're relying on physiacl access.
The RTP header validity doesn't matter to a router, if it comes in on the relevant UDP port with a valid destination then it'll forwarded (Remember most likely not trying to set up an actual call when there's an attack). The jitter buffer is dynamic, and yes you could potentially flood it and impact general voice - but that's kind of what I'm saying anyway (By product of chewing your bandwidth up, maxing out your router resources etc) - not really relevant to the phones themselves. If your QOS is done properly then the packets won't get as far as the jitter buffer since they'll be getting dropped before they reach that stage.Hang on - there is actually a place called Cheddar?? - cailin maith
Any forum is a collection of assorted weirdos, cranks and pervs - Board Game Geek
That will be a simply fab time to catch up for a beer. - Tay
Have you ever seen somebody lick the chutney spoon in an Indian Restaurant and put it back ? - CyberghoulComment
-
Originally posted by snaw View PostAre you just cherry picking VOIP phrases out of a wiki or something?
In terms of damage done by using VOIP, the CODEC doesn't really matter. Most likely you'll not actually be trying to set up a call, you're just hijacking the voice vlan for either DOS type attacks, or maybe just trying to capture traffic so you could replay a conversation. Either way you're relying on physiacl access.
The RTP header validity doesn't matter to a router, if it comes in on the relevant UDP port with a valid destination then it'll forwarded (Remember most likely not trying to set up an actual call when there's an attack). The jitter buffer is dynamic, and yes you could potentially flood it and impact general voice - but that's kind of what I'm saying anyway (By product of chewing your bandwidth up, maxing out your router resources etc) - not really relevant to the phones themselves. If your QOS is done properly then the packets won't get as far as the jitter buffer since they'll be getting dropped before they reach that stage.
In your posts you're mentioning a complete DOS of the network. I'm answering the original posters questions by detailing what can be done to selectively target the VoIP functionality on a network.
With regards to QOS, not many "rendering" devices (Phones) actually utilise RTCP correctly, as mentioned in my previous posts. I also mention G711 (I could've mentioned G729 or any number of other CODECS but I think you'll find that G729 and G711 are the most common) because it's possible to inject audio into an already established SIP session.
Are you being deliberately antagonistic?Last edited by Churchill; 16 May 2008, 08:52.Comment
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Secondary NI threshold sinking to £5,000: a limited company director’s explainer Dec 24 09:51
- Reeves sets Spring Statement 2025 for March 26th Dec 23 09:18
- Spot the hidden contractor Dec 20 10:43
- Accounting for Contractors Dec 19 15:30
- Chartered Accountants with MarchMutual Dec 19 15:05
- Chartered Accountants with March Mutual Dec 19 15:05
- Chartered Accountants Dec 19 15:05
- Unfairly barred from contracting? Petrofac just paid the price Dec 19 09:43
- An IR35 case law look back: contractor must-knows for 2025-26 Dec 18 09:30
- A contractor’s Autumn Budget financial review Dec 17 10:59
Comment