SlideShare a Scribd company logo
1 of 55
Download to read offline
WebRTC security concerns, a real problem?
- WebRTC and security?
- VoIP attacks
- WebRTC new threats
- Protection
- Identity Management
- Questions and answers
Santiago Troncoso
@lauskin
Index
WebRTC and security?
Open system, no proprietary implementations
No plugins!
Multi platform
WebRTC and security?
WebRTC - Features
Multidevice:
● Desktop and laptops
● Tablets and notebooks
● Smartphones
● Mozilla FirefoxOS devices
● Set-top-boxes and WebTVs
More information about
WebRTC is available:
http://www.webrtc.org/home
http://www.quobis.com/
WebRTC and security?
WebRTC - Features
● Corporate:
○ Audio webclients for IMS, NGN, MS Lync, Cisco, etc.
○ Video webclients for conference bridges
○ Click to call (click to video/chat) solutions
○ Contact center solutions
● Residential:
○ OTT services
○ Audio webclients for residential users
○ Webchats
○ Vertical applications (ehealth,...)
○ Extended RCS/Joyn services
More information about
use cases available here:
WebRTC and security?
WebRTC - Use cases
New potential weak elements in the IC networks in terms of
security:
● Web server (and related elements)
● WebRTC gateway
● Laptop/desktop
used as endpoint
WebRTC and security?
WebRTC - Architecture
WebRTC inherits part of the potential VoIP attacks and adds new
threats:
● New network elements to be
hijacked, etc.
● Open communications (new
open ports, etc.)
● Privacy issues through access
to microphones and cams.
RFC Draft:
Security considerations for
RTC-Web
WebRTC and security?
WebRTC - Security efforts
VoIP attacks
A VoIP attack causes an immediate economic damage for the
attacked entity and a direct economic profit to the attacker. This
does not occur with other type of attacks.
Types of VoIP attacks:
● Denial of service
● Fraud
● Illegal interception
● Illegal control
VoIP attacks
Introduction
The aim of an attack of DoS is to degrade the quality of the service
that perceives the user by means of the massive delivery of
messages that require of the use of resources (CPU, BW or
memory) in the attacked system.
Examples: flood of register requests
or calls in a softswitch or switchboard
that can pretend:
● A simple failure of the service.
● Attack for telephone fraud.
● Bugs in terminals
● Viruses
VoIP attacks
Denial of service
Also other "non intentional" attacks should be taking into
account:
● Flood after a power blackout.
● Request for action
● Bugs in terminals.
● Viruses.
http://map.norsecorp.com/
Are you free to receive an attack?
VoIP attacks
Denial of service
An attacker registers in the system with a valid user (discovers the
password, alters an IP, etc.) with the aim to do calls to
international numbers. CFCA estimates 40 Billions USD annually.
● They are not only calls through the VoIP network. It is also included
the control of a SIP proxy (illegal control) to originate illegal calls.
● These attacks cause not only economic losses. Sometimes the
legitimate user has to pay the bill !!.
● In most cases, it is difficult to determine the
responsibility (customer or operator) of the
attacks.
VoIP attacks
Fraud
Because of the IP nature is simpler to capture signalling and
media traffic by potential attackers to obtain information (audio of
the call, other information of the call exchanged, etc.)
Traditional VoIP SIP traffic is opened, especially
dangerous in Wi-Fi and open networks.
WebRTC uses ciphered traffic for
media, so interception could only
be done in the endpoints or media
gateway.
VoIP attacks
Illegal interception
If an attacker achieves the credenciales of an user or an
administrator, he has absolute control:
● Can be used to do calls with high costs: causing losses to the service
provider and/or end customer.
● Hijacked lines can be used to finish calls
of other customers to which the attacker
sells services
● For illegal activities, makes more difficult
the judicial follow-up of the calls.
VoIP attacks
Illegal control
WebRTC new threats
The WebRTC technology is included into a Web internet context.
Under that perspective, we are exposed to the Web technologies
vulnerabilities.
Types of WebRTC threats:
● Access to devices
● WebSocket DDoS
● WebSocket poisoning
● SIPoWS interception
WebRTC new threats
Introduction
HTML and JS script are executed by the browser as a "sandbox"
designed to be isolated from the rest of the computer. However
bugs may exist.
WebRTC API needs to access physical devices which will provide real-
time media information (and files):
THREAT: Web pages access to user's camera and microphone without
permissions.
WebRTC new threats
Access to devices
Users can potentially being recorded with Javascript code
downloaded from a malicious Web Server.
Malicious
WebSever
Malicious
Script
SRTP
WebRTC new threats
Access to devices
Websocket (RFC6445): provides a full-duplex socket between a
browser and a server.
● It's just a TCP socket upgraded from an HTTP handshake.
● Standardized way for the server to send content to the browser
without being solicited by the client.
WebRTC new threats
WebSocket
Websocket allows cross-origin connection. DDoS attacks can be
implemented in a Web-oriented way.
Browser N
Attacked Server
websocket
Malicious
WebSever
Browser 1
websocket
httphttp
Malicious
Script
Malicious
Script
WebRTC new threats
WebSocket DoS & DDoS
Browser 2
Malicious
Script
A malicious script could potentially inject code which is valid in
HTTP poisoning HTTP intermediaries (i.e. HTTP proxy). This is
avoided natively by WS RFC.
ebsocket
WebRTC new threats
WebSocket poisoning attack
SIP traffic can be sent over Websocket: data is sent over a TCP
socket without any encryption. Equivalent to SIP over UDP/TCP.
By default it implements digest authentication, however it has a number
of disadvantages:
● Several security options (like 'qop' for integrity) are optional.
● Vulnerable to man-in-the-middle.
Sending the messages in plain-text is
not a good idea, it can be authenticated
but not privacy and integrity.
WebRTC new threats
SIP over WebSockets (SIPoWS)
Protection
Protection techniques and WebRTC technology protections
Protection techniques
● Access to devices
● WebSocket poisoning
● DoS & DDoS
● SIPoWSS
● Illegal interception WebRTC
● Testing & monitoring
Protection
Introduction
WebRTC standard requires that access to device to be notified to
the user.
A secure environment (https connection) will ask for media access only
once. The browser stores the permissions settings for HTTPS sites which
valid certificates.
A good practise is that
your app includes a
specific device access
permission.
Protection
Access to devices
WebRTC standard requires that access to device to be notified to
the user.
Browser notifies the user that a tab is currently accessing media devices.
With a blinking red spot In Chrome.
Protection
Access to devices
Showing own video to the user helps to be aware that the browser
is accessing cam and micro. It also helps to check if you got your
hair done right ;-)
Applications should prevent the user from automatically clicking
on the permission pop-up.
Protection
Access to devices
Chrome 47 will not allow
getUserMedia without HTTPs!
DECEMBER 2015
From https will not be allowed wss,
so encryption is mandatory.
#moreCrypto
#securityByDefault
Protection
Access to devices
Elevated permissions
- Installation of a plugin
Protection
Access to devices
Standard permissions
- Specific consent
- Contents selection
- Visual notification on screen.
Screensharing: Hard & soft protection.
websocket
http://tools.ietf.org/agenda/80/slides/hybi-2.pdf
Server
<Websocket opening handshake string>
*u0!GDDD&GIO[[[ONx<
[&BM#>;:$MMGGDDDF4xOFDA@E6XU7$&UU<'U<!4U6UY&0OY
X$%CIOCBM#HNXDWBK69E
Protection
WebSocket poisoning protection
SIP/2.0 200 OK
Via: SIP/2.0/WS NO72tU858jVE.invalid;
branch=z9hG4bKFhlN824OuTkQrgQl7FD8t1ejvP080E;
rport=48095;received=46.25.57.69
Browser
SIP traffic can be sent over Secure Websocket: data is sent over a
TLS socket. Equivalent to SIP over TLS.
TLS provides privacy and integrity.
It also provides server authentication, and client authentication if a client
certificate is provided.
If the client certificate is signed by a Trusted Certification Authority (CA)
the real-time communication can have legal value.
Protection
SIP over Secure WS (SIPoWSS)
DoS and DDoS protections are pretty similar to the implemented in
Web Servers. Attacks can be potentially be launched from
thousands of browsers.
Signaling is going to be received via TCP/TLS: WS, WSS, REST APIs, etc
WebRTC Gateways/servers normally will be exposed to Internet listening
on known ports which are very well known (443 and 80).
Typical attack vectors (SYN flood, RESET attack etc) must be stopped as
soon as possible to limit resources exhaustion which causes a denial of
service.
Protection
DoS & DDoS: WebRTC signaling
Click To Call solutions are specially vulnerable to DoS attacks
● Protect your applications
● Control the exposed resources.
● Limit concurrent calls
Protection
DoS & DDoS: Application layer
Web Visitor
Contact Center
TURN server is used to go through traversal NAT networks. It
exposes a place (relayed candidates) where to exchange media
between peers.
It exposes BW, an expensive resource, so it must be
protected with credentials (could be long term).
Control credentials
and ports exposed.
Protection
DoS & DDoS: TURN servers
ICE(RFC5245) allows RTP flows to traverse NAT routers. It finds
the best path for RTP/RTCP traffic.
● STUN is used to find out the paths to send the RTP flow.
● ICE, includes a handshake designed to verify that the receiving
element wishes to receive traffic from the sender.
This identifier/password are created by the browser and used during the
ICE negotiation. The scripts running on the browser must send this
identifier to each other. The callee can be sure that
Protection
Interception: ICE
In every WebRTC SDP there is an hexadecimal fingerprint per
media session. It is a hash of the certificates used in the DTLS
negotiation.
This fingerprint binds the media negotiated on the signaling plane, with
the DTLS session which is negotiated on the media plane.
DTLS itself provides encryption and integrity. If the signaling provides
authentication and authorization, then this also applies to the media.
Protection
Interception: DTLS fingerprint
a=fingerprint:sha-256 D1:2C:BE:AD:C4:F6:64:5C:25:16:11:9C:AF:E7:0F: 73:79:36:4E:9C:1E:15:54:39
More info at: https://webrtchacks.com/anatomy-webrtc-sdp/
DTLS-SRTP manage the SRTP key exchange within the RTP flow
before starting media. This is done using DTLS, a version of TLS
based on datagrams (actually DTLS stands for Datagram TLS).
Keys are not exchanged in the SDP protocol. It protects the RTP flow
even if signaling is not encrypted.
It is mandatory on WebRTC, so it will be supported by all WebRTC-
capable browsers.
Protection
Interception: DTLS-SRTP
It is a good practice to test your network with automatic tools to
find vulnerabilities. It is a common practice in many IT fields.
Quobis has developed and collaborates with Bluebox, a node.js-based
tool which allows you to implement common as sophisticated attacks,
even over WS and WSS.
It implements the most common attack vector
you can suffer and it allows you to check your
protections against them.
Protection
Testing your network
It is possible to monitor all the traffic, similar to standard SIP.
Similar to SIP over TLS, if WSS is used (secure Websockets) monitoring
should be done at the edges (most usually in the server).
Additional measures can be applied:
● IP geolocation.
● Access URL.
● Browser info.
● ...
Protection
Monitoring
ID management
By default, WebRTC does not define any authentication method,
so different identity management solutions could be deployed
● Anonymous calls
● Third party companies
● Third party entities
● Telco authentication
● Strong or double-factor
authentication
ID management
Identity management
Makes possible to authenticate
the user identity using a third
party server.
The web server can act as an
authentication verification
service
ID management
Identity management. OAuth2
Makes possible to be sure of the identity using a third
party
ID management
Identity management. OpenID
Application PoC developed by Quobis. Provides a second factor
of authentication including personal ID certificates validation.
ID management
Identity management. IdentityCall
Possible identity certification options
● Identify and certify
elements is the key
for a secure
communication
ID management
Identity management. IdentityCall
Summary
● Legacy VoIP attacks could also be important in WebRTC.
● Access to mic/cam can cause damage.
● Beware of phishing in web servers.
● WebRTC provides security by default (mandatory encryption,
access permissions, etc).
● SBCs and monitoring tools can help.
● Authentication is a must !!!
● #moreCrypto
Summary
What we have learned
Sippo WAC orchestrate all elements on a WebRTC communication
scenario.
Improved Web server that can host and provide advanced features for
WebRTC Sippo Apps.
Sippo Apps had been built on top of SippoJS,
so it can be connected to any WebRTC
gateway to provide a complete
communication experience just by using
a web browser.
Summary
Our offering: Sippo WAC
General overview
Summary
Our offering: Sippo WAC
SippoJS abstraction layer
Summary
Our offering: Sippo WAC
Sippo Web Collaborator is an enterprise-grade WebRTC HTML5
communicator, supporting all most relevant collaboration tools.
Features:
● File transfer
● Desktop sharing
● LDAP integration
● oAuth support
● Chat and group chat
● Mobile applications
Summary
Our offering: Sippo Web Collaborator
Sippo Click To Call is an application designed for enterprise
customer interception.
Features:
● File transfer
● Desktop sharing
● Chat and group chat
● PSTN forking integration
● Full browser support
● CC features: queues, agents
and reporting
● Feedback forms
Summary
Our offering: Sippo Click To Call
Sippo Web Collaborator demo:
https://demo.quobis.com/sippo-2.3
Sippo Click To Call demo:
https://demo.quobis.com/click2call-2.3
Summary
Try it yourself!
See you soon!
Santiago Troncoso
@lauskin
santiago.troncoso@quobis.com
Summary
Any questions?

More Related Content

What's hot

VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Fatih Ozavci
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenFatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesVi Tính Hoàng Nam
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotVi Tính Hoàng Nam
 
Soho routers: swords and shields CyberCamp 2015
Soho routers: swords and shields   CyberCamp 2015Soho routers: swords and shields   CyberCamp 2015
Soho routers: swords and shields CyberCamp 2015Iván Sanz de Castro
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingVi Tính Hoàng Nam
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 

What's hot (18)

SBC: Do I really need it?
SBC: Do I really need it?SBC: Do I really need it?
SBC: Do I really need it?
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Hacking SIP Like a Boss!
Hacking SIP Like a Boss!Hacking SIP Like a Boss!
Hacking SIP Like a Boss!
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
VoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers AwakenVoIP Wars: The Phreakers Awaken
VoIP Wars: The Phreakers Awaken
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Ceh v5 module 21 cryptography
Ceh v5 module 21 cryptographyCeh v5 module 21 cryptography
Ceh v5 module 21 cryptography
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
What is FIDO
What is FIDOWhat is FIDO
What is FIDO
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Soho routers: swords and shields CyberCamp 2015
Soho routers: swords and shields   CyberCamp 2015Soho routers: swords and shields   CyberCamp 2015
Soho routers: swords and shields CyberCamp 2015
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 

Similar to VOIP2DAY 2015: "WebRTC security concerns, a real problem?"

WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...Sandro Gauci
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
 
Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)Quobis
 
The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway stefansayer
 
EPL011-Ioannou
EPL011-IoannouEPL011-Ioannou
EPL011-IoannouVideoguy
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)Wail Hassan
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Open web device as the reference feature phone
Open web device as the reference feature phoneOpen web device as the reference feature phone
Open web device as the reference feature phoneMiguel Schneider
 
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101OWASP
 
Browser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsBrowser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsGünter Obiltschnig
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 

Similar to VOIP2DAY 2015: "WebRTC security concerns, a real problem?" (20)

WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)Webinar WebRTC HTML5 (english)
Webinar WebRTC HTML5 (english)
 
Security_Bootcamp_Intro
Security_Bootcamp_IntroSecurity_Bootcamp_Intro
Security_Bootcamp_Intro
 
The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway The FRAFOS ABC SBC WebRTC gateway
The FRAFOS ABC SBC WebRTC gateway
 
EPL011-Ioannou
EPL011-IoannouEPL011-Ioannou
EPL011-Ioannou
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Module 11 (hacking web servers)
Module 11 (hacking web servers)Module 11 (hacking web servers)
Module 11 (hacking web servers)
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Open web device as the reference feature phone
Open web device as the reference feature phoneOpen web device as the reference feature phone
Open web device as the reference feature phone
 
[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101[Wroclaw #4] WebRTC & security: 101
[Wroclaw #4] WebRTC & security: 101
 
Browser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of ThingsBrowser-based Secure Remote Access for the Internet of Things
Browser-based Secure Remote Access for the Internet of Things
 
DevCon 5 (December 2013) - WebRTC & WebSockets
DevCon 5 (December 2013) - WebRTC & WebSocketsDevCon 5 (December 2013) - WebRTC & WebSockets
DevCon 5 (December 2013) - WebRTC & WebSockets
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 

More from Quobis

[REPORT] Comunicaciones Unificadas y Colaboración (UCC)
[REPORT] Comunicaciones Unificadas   y Colaboración (UCC)[REPORT] Comunicaciones Unificadas   y Colaboración (UCC)
[REPORT] Comunicaciones Unificadas y Colaboración (UCC)Quobis
 
An hour with WebRTC FIC UDC
An hour with WebRTC FIC UDCAn hour with WebRTC FIC UDC
An hour with WebRTC FIC UDCQuobis
 
QUOBIS corporate portfolio
QUOBIS corporate portfolioQUOBIS corporate portfolio
QUOBIS corporate portfolioQuobis
 
Webinar WebRTC y HTML5 (spanish) - Quobis
Webinar WebRTC y HTML5 (spanish) - QuobisWebinar WebRTC y HTML5 (spanish) - Quobis
Webinar WebRTC y HTML5 (spanish) - QuobisQuobis
 
Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Quobis
 
Info secvoip
Info secvoipInfo secvoip
Info secvoipQuobis
 
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...
Kamailio practice Quobis-University of Vigo Laboratory of Commutation  2012-2...Kamailio practice Quobis-University of Vigo Laboratory of Commutation  2012-2...
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...Quobis
 
Webinar seguridad VoIP
Webinar seguridad VoIPWebinar seguridad VoIP
Webinar seguridad VoIPQuobis
 
¿Cómo está cambiando la industria del call center?
¿Cómo está cambiando la industria del call center?¿Cómo está cambiando la industria del call center?
¿Cómo está cambiando la industria del call center?Quobis
 
Presentacion vtdm
Presentacion vtdmPresentacion vtdm
Presentacion vtdmQuobis
 
Presentation MultipleTalk
Presentation MultipleTalkPresentation MultipleTalk
Presentation MultipleTalkQuobis
 
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGN
Quobis webinar  Siete avances clave en la operabilidad de redes VoIP y NGNQuobis webinar  Siete avances clave en la operabilidad de redes VoIP y NGN
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGNQuobis
 
Presentation TalkStorage
Presentation TalkStoragePresentation TalkStorage
Presentation TalkStorageQuobis
 
Presentation VoiceInstant
Presentation VoiceInstantPresentation VoiceInstant
Presentation VoiceInstantQuobis
 
Quobis portfolio corporativo
Quobis portfolio corporativoQuobis portfolio corporativo
Quobis portfolio corporativoQuobis
 
Quobis profile english 2010
Quobis profile english 2010Quobis profile english 2010
Quobis profile english 2010Quobis
 
Perfil Quobis
Perfil QuobisPerfil Quobis
Perfil QuobisQuobis
 
Grupo Exportación Tic Galicia
Grupo Exportación Tic GaliciaGrupo Exportación Tic Galicia
Grupo Exportación Tic GaliciaQuobis
 
Corporative Profile 2010
Corporative Profile 2010Corporative Profile 2010
Corporative Profile 2010Quobis
 
“Pode a Ibéria ser um mercado único para uma start-up?”
“Pode a Ibéria ser um mercado único para uma start-up?”“Pode a Ibéria ser um mercado único para uma start-up?”
“Pode a Ibéria ser um mercado único para uma start-up?”Quobis
 

More from Quobis (20)

[REPORT] Comunicaciones Unificadas y Colaboración (UCC)
[REPORT] Comunicaciones Unificadas   y Colaboración (UCC)[REPORT] Comunicaciones Unificadas   y Colaboración (UCC)
[REPORT] Comunicaciones Unificadas y Colaboración (UCC)
 
An hour with WebRTC FIC UDC
An hour with WebRTC FIC UDCAn hour with WebRTC FIC UDC
An hour with WebRTC FIC UDC
 
QUOBIS corporate portfolio
QUOBIS corporate portfolioQUOBIS corporate portfolio
QUOBIS corporate portfolio
 
Webinar WebRTC y HTML5 (spanish) - Quobis
Webinar WebRTC y HTML5 (spanish) - QuobisWebinar WebRTC y HTML5 (spanish) - Quobis
Webinar WebRTC y HTML5 (spanish) - Quobis
 
Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011Presentacion kamailio uvigo_09262011
Presentacion kamailio uvigo_09262011
 
Info secvoip
Info secvoipInfo secvoip
Info secvoip
 
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...
Kamailio practice Quobis-University of Vigo Laboratory of Commutation  2012-2...Kamailio practice Quobis-University of Vigo Laboratory of Commutation  2012-2...
Kamailio practice Quobis-University of Vigo Laboratory of Commutation 2012-2...
 
Webinar seguridad VoIP
Webinar seguridad VoIPWebinar seguridad VoIP
Webinar seguridad VoIP
 
¿Cómo está cambiando la industria del call center?
¿Cómo está cambiando la industria del call center?¿Cómo está cambiando la industria del call center?
¿Cómo está cambiando la industria del call center?
 
Presentacion vtdm
Presentacion vtdmPresentacion vtdm
Presentacion vtdm
 
Presentation MultipleTalk
Presentation MultipleTalkPresentation MultipleTalk
Presentation MultipleTalk
 
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGN
Quobis webinar  Siete avances clave en la operabilidad de redes VoIP y NGNQuobis webinar  Siete avances clave en la operabilidad de redes VoIP y NGN
Quobis webinar Siete avances clave en la operabilidad de redes VoIP y NGN
 
Presentation TalkStorage
Presentation TalkStoragePresentation TalkStorage
Presentation TalkStorage
 
Presentation VoiceInstant
Presentation VoiceInstantPresentation VoiceInstant
Presentation VoiceInstant
 
Quobis portfolio corporativo
Quobis portfolio corporativoQuobis portfolio corporativo
Quobis portfolio corporativo
 
Quobis profile english 2010
Quobis profile english 2010Quobis profile english 2010
Quobis profile english 2010
 
Perfil Quobis
Perfil QuobisPerfil Quobis
Perfil Quobis
 
Grupo Exportación Tic Galicia
Grupo Exportación Tic GaliciaGrupo Exportación Tic Galicia
Grupo Exportación Tic Galicia
 
Corporative Profile 2010
Corporative Profile 2010Corporative Profile 2010
Corporative Profile 2010
 
“Pode a Ibéria ser um mercado único para uma start-up?”
“Pode a Ibéria ser um mercado único para uma start-up?”“Pode a Ibéria ser um mercado único para uma start-up?”
“Pode a Ibéria ser um mercado único para uma start-up?”
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

VOIP2DAY 2015: "WebRTC security concerns, a real problem?"

  • 1. WebRTC security concerns, a real problem?
  • 2. - WebRTC and security? - VoIP attacks - WebRTC new threats - Protection - Identity Management - Questions and answers Santiago Troncoso @lauskin Index
  • 4. Open system, no proprietary implementations No plugins! Multi platform WebRTC and security? WebRTC - Features
  • 5. Multidevice: ● Desktop and laptops ● Tablets and notebooks ● Smartphones ● Mozilla FirefoxOS devices ● Set-top-boxes and WebTVs More information about WebRTC is available: http://www.webrtc.org/home http://www.quobis.com/ WebRTC and security? WebRTC - Features
  • 6. ● Corporate: ○ Audio webclients for IMS, NGN, MS Lync, Cisco, etc. ○ Video webclients for conference bridges ○ Click to call (click to video/chat) solutions ○ Contact center solutions ● Residential: ○ OTT services ○ Audio webclients for residential users ○ Webchats ○ Vertical applications (ehealth,...) ○ Extended RCS/Joyn services More information about use cases available here: WebRTC and security? WebRTC - Use cases
  • 7. New potential weak elements in the IC networks in terms of security: ● Web server (and related elements) ● WebRTC gateway ● Laptop/desktop used as endpoint WebRTC and security? WebRTC - Architecture
  • 8. WebRTC inherits part of the potential VoIP attacks and adds new threats: ● New network elements to be hijacked, etc. ● Open communications (new open ports, etc.) ● Privacy issues through access to microphones and cams. RFC Draft: Security considerations for RTC-Web WebRTC and security? WebRTC - Security efforts
  • 10. A VoIP attack causes an immediate economic damage for the attacked entity and a direct economic profit to the attacker. This does not occur with other type of attacks. Types of VoIP attacks: ● Denial of service ● Fraud ● Illegal interception ● Illegal control VoIP attacks Introduction
  • 11. The aim of an attack of DoS is to degrade the quality of the service that perceives the user by means of the massive delivery of messages that require of the use of resources (CPU, BW or memory) in the attacked system. Examples: flood of register requests or calls in a softswitch or switchboard that can pretend: ● A simple failure of the service. ● Attack for telephone fraud. ● Bugs in terminals ● Viruses VoIP attacks Denial of service
  • 12. Also other "non intentional" attacks should be taking into account: ● Flood after a power blackout. ● Request for action ● Bugs in terminals. ● Viruses. http://map.norsecorp.com/ Are you free to receive an attack? VoIP attacks Denial of service
  • 13. An attacker registers in the system with a valid user (discovers the password, alters an IP, etc.) with the aim to do calls to international numbers. CFCA estimates 40 Billions USD annually. ● They are not only calls through the VoIP network. It is also included the control of a SIP proxy (illegal control) to originate illegal calls. ● These attacks cause not only economic losses. Sometimes the legitimate user has to pay the bill !!. ● In most cases, it is difficult to determine the responsibility (customer or operator) of the attacks. VoIP attacks Fraud
  • 14. Because of the IP nature is simpler to capture signalling and media traffic by potential attackers to obtain information (audio of the call, other information of the call exchanged, etc.) Traditional VoIP SIP traffic is opened, especially dangerous in Wi-Fi and open networks. WebRTC uses ciphered traffic for media, so interception could only be done in the endpoints or media gateway. VoIP attacks Illegal interception
  • 15. If an attacker achieves the credenciales of an user or an administrator, he has absolute control: ● Can be used to do calls with high costs: causing losses to the service provider and/or end customer. ● Hijacked lines can be used to finish calls of other customers to which the attacker sells services ● For illegal activities, makes more difficult the judicial follow-up of the calls. VoIP attacks Illegal control
  • 17. The WebRTC technology is included into a Web internet context. Under that perspective, we are exposed to the Web technologies vulnerabilities. Types of WebRTC threats: ● Access to devices ● WebSocket DDoS ● WebSocket poisoning ● SIPoWS interception WebRTC new threats Introduction
  • 18. HTML and JS script are executed by the browser as a "sandbox" designed to be isolated from the rest of the computer. However bugs may exist. WebRTC API needs to access physical devices which will provide real- time media information (and files): THREAT: Web pages access to user's camera and microphone without permissions. WebRTC new threats Access to devices
  • 19. Users can potentially being recorded with Javascript code downloaded from a malicious Web Server. Malicious WebSever Malicious Script SRTP WebRTC new threats Access to devices
  • 20. Websocket (RFC6445): provides a full-duplex socket between a browser and a server. ● It's just a TCP socket upgraded from an HTTP handshake. ● Standardized way for the server to send content to the browser without being solicited by the client. WebRTC new threats WebSocket
  • 21. Websocket allows cross-origin connection. DDoS attacks can be implemented in a Web-oriented way. Browser N Attacked Server websocket Malicious WebSever Browser 1 websocket httphttp Malicious Script Malicious Script WebRTC new threats WebSocket DoS & DDoS Browser 2 Malicious Script
  • 22. A malicious script could potentially inject code which is valid in HTTP poisoning HTTP intermediaries (i.e. HTTP proxy). This is avoided natively by WS RFC. ebsocket WebRTC new threats WebSocket poisoning attack
  • 23. SIP traffic can be sent over Websocket: data is sent over a TCP socket without any encryption. Equivalent to SIP over UDP/TCP. By default it implements digest authentication, however it has a number of disadvantages: ● Several security options (like 'qop' for integrity) are optional. ● Vulnerable to man-in-the-middle. Sending the messages in plain-text is not a good idea, it can be authenticated but not privacy and integrity. WebRTC new threats SIP over WebSockets (SIPoWS)
  • 25. Protection techniques and WebRTC technology protections Protection techniques ● Access to devices ● WebSocket poisoning ● DoS & DDoS ● SIPoWSS ● Illegal interception WebRTC ● Testing & monitoring Protection Introduction
  • 26. WebRTC standard requires that access to device to be notified to the user. A secure environment (https connection) will ask for media access only once. The browser stores the permissions settings for HTTPS sites which valid certificates. A good practise is that your app includes a specific device access permission. Protection Access to devices
  • 27. WebRTC standard requires that access to device to be notified to the user. Browser notifies the user that a tab is currently accessing media devices. With a blinking red spot In Chrome. Protection Access to devices
  • 28. Showing own video to the user helps to be aware that the browser is accessing cam and micro. It also helps to check if you got your hair done right ;-) Applications should prevent the user from automatically clicking on the permission pop-up. Protection Access to devices
  • 29. Chrome 47 will not allow getUserMedia without HTTPs! DECEMBER 2015 From https will not be allowed wss, so encryption is mandatory. #moreCrypto #securityByDefault Protection Access to devices
  • 30. Elevated permissions - Installation of a plugin Protection Access to devices Standard permissions - Specific consent - Contents selection - Visual notification on screen. Screensharing: Hard & soft protection.
  • 31. websocket http://tools.ietf.org/agenda/80/slides/hybi-2.pdf Server <Websocket opening handshake string> *u0!GDDD&GIO[[[ONx< [&BM#>;:$MMGGDDDF4xOFDA@E6XU7$&UU<'U<!4U6UY&0OY X$%CIOCBM#HNXDWBK69E Protection WebSocket poisoning protection SIP/2.0 200 OK Via: SIP/2.0/WS NO72tU858jVE.invalid; branch=z9hG4bKFhlN824OuTkQrgQl7FD8t1ejvP080E; rport=48095;received=46.25.57.69 Browser
  • 32. SIP traffic can be sent over Secure Websocket: data is sent over a TLS socket. Equivalent to SIP over TLS. TLS provides privacy and integrity. It also provides server authentication, and client authentication if a client certificate is provided. If the client certificate is signed by a Trusted Certification Authority (CA) the real-time communication can have legal value. Protection SIP over Secure WS (SIPoWSS)
  • 33. DoS and DDoS protections are pretty similar to the implemented in Web Servers. Attacks can be potentially be launched from thousands of browsers. Signaling is going to be received via TCP/TLS: WS, WSS, REST APIs, etc WebRTC Gateways/servers normally will be exposed to Internet listening on known ports which are very well known (443 and 80). Typical attack vectors (SYN flood, RESET attack etc) must be stopped as soon as possible to limit resources exhaustion which causes a denial of service. Protection DoS & DDoS: WebRTC signaling
  • 34. Click To Call solutions are specially vulnerable to DoS attacks ● Protect your applications ● Control the exposed resources. ● Limit concurrent calls Protection DoS & DDoS: Application layer Web Visitor Contact Center
  • 35. TURN server is used to go through traversal NAT networks. It exposes a place (relayed candidates) where to exchange media between peers. It exposes BW, an expensive resource, so it must be protected with credentials (could be long term). Control credentials and ports exposed. Protection DoS & DDoS: TURN servers
  • 36. ICE(RFC5245) allows RTP flows to traverse NAT routers. It finds the best path for RTP/RTCP traffic. ● STUN is used to find out the paths to send the RTP flow. ● ICE, includes a handshake designed to verify that the receiving element wishes to receive traffic from the sender. This identifier/password are created by the browser and used during the ICE negotiation. The scripts running on the browser must send this identifier to each other. The callee can be sure that Protection Interception: ICE
  • 37. In every WebRTC SDP there is an hexadecimal fingerprint per media session. It is a hash of the certificates used in the DTLS negotiation. This fingerprint binds the media negotiated on the signaling plane, with the DTLS session which is negotiated on the media plane. DTLS itself provides encryption and integrity. If the signaling provides authentication and authorization, then this also applies to the media. Protection Interception: DTLS fingerprint a=fingerprint:sha-256 D1:2C:BE:AD:C4:F6:64:5C:25:16:11:9C:AF:E7:0F: 73:79:36:4E:9C:1E:15:54:39 More info at: https://webrtchacks.com/anatomy-webrtc-sdp/
  • 38. DTLS-SRTP manage the SRTP key exchange within the RTP flow before starting media. This is done using DTLS, a version of TLS based on datagrams (actually DTLS stands for Datagram TLS). Keys are not exchanged in the SDP protocol. It protects the RTP flow even if signaling is not encrypted. It is mandatory on WebRTC, so it will be supported by all WebRTC- capable browsers. Protection Interception: DTLS-SRTP
  • 39. It is a good practice to test your network with automatic tools to find vulnerabilities. It is a common practice in many IT fields. Quobis has developed and collaborates with Bluebox, a node.js-based tool which allows you to implement common as sophisticated attacks, even over WS and WSS. It implements the most common attack vector you can suffer and it allows you to check your protections against them. Protection Testing your network
  • 40. It is possible to monitor all the traffic, similar to standard SIP. Similar to SIP over TLS, if WSS is used (secure Websockets) monitoring should be done at the edges (most usually in the server). Additional measures can be applied: ● IP geolocation. ● Access URL. ● Browser info. ● ... Protection Monitoring
  • 42. By default, WebRTC does not define any authentication method, so different identity management solutions could be deployed ● Anonymous calls ● Third party companies ● Third party entities ● Telco authentication ● Strong or double-factor authentication ID management Identity management
  • 43. Makes possible to authenticate the user identity using a third party server. The web server can act as an authentication verification service ID management Identity management. OAuth2
  • 44. Makes possible to be sure of the identity using a third party ID management Identity management. OpenID
  • 45. Application PoC developed by Quobis. Provides a second factor of authentication including personal ID certificates validation. ID management Identity management. IdentityCall
  • 46. Possible identity certification options ● Identify and certify elements is the key for a secure communication ID management Identity management. IdentityCall
  • 48. ● Legacy VoIP attacks could also be important in WebRTC. ● Access to mic/cam can cause damage. ● Beware of phishing in web servers. ● WebRTC provides security by default (mandatory encryption, access permissions, etc). ● SBCs and monitoring tools can help. ● Authentication is a must !!! ● #moreCrypto Summary What we have learned
  • 49. Sippo WAC orchestrate all elements on a WebRTC communication scenario. Improved Web server that can host and provide advanced features for WebRTC Sippo Apps. Sippo Apps had been built on top of SippoJS, so it can be connected to any WebRTC gateway to provide a complete communication experience just by using a web browser. Summary Our offering: Sippo WAC
  • 52. Sippo Web Collaborator is an enterprise-grade WebRTC HTML5 communicator, supporting all most relevant collaboration tools. Features: ● File transfer ● Desktop sharing ● LDAP integration ● oAuth support ● Chat and group chat ● Mobile applications Summary Our offering: Sippo Web Collaborator
  • 53. Sippo Click To Call is an application designed for enterprise customer interception. Features: ● File transfer ● Desktop sharing ● Chat and group chat ● PSTN forking integration ● Full browser support ● CC features: queues, agents and reporting ● Feedback forms Summary Our offering: Sippo Click To Call
  • 54. Sippo Web Collaborator demo: https://demo.quobis.com/sippo-2.3 Sippo Click To Call demo: https://demo.quobis.com/click2call-2.3 Summary Try it yourself!
  • 55. See you soon! Santiago Troncoso @lauskin santiago.troncoso@quobis.com Summary Any questions?