Sponsored By

Interop: How Boring is VOIP Security?Interop: How Boring is VOIP Security?

Mark Collier, CTO of SecureLogix and VOIP Security Alliance bigwig, said in today's VOIP security session: "The reality is, it's been pretty boring lately." Not that anyone's objecting, but why haven't the hackers come for VOIP yet?

Eric Krapf

September 18, 2008

3 Min Read
No Jitter logo in a gray background | No Jitter

Mark Collier, CTO of SecureLogix and VOIP Security Alliance bigwig, said in today's VOIP security session: "The reality is, it's been pretty boring lately." Not that anyone's objecting, but why haven't the hackers come for VOIP yet?

Mark Collier, CTO of SecureLogix and VOIP Security Alliance bigwig, said in today's VOIP security session: "The reality is, it's been pretty boring lately." Not that anyone's objecting, but why haven't the hackers come for VOIP yet?My other panelist on the session, Bogdan Materna, CTO of VOIPShield, suggested that the answer lies more with the hackers than the systems. Hackers "are about money, not fun," Bogdan said. "And I don't think they see a lot of money in hacking VOIP."

VOIPShield will give you plenty of ideas for things to worry about, if you're so inclined. They've made a splash this year by releasing IP telephony vulnerability reports (at a high level--no details), a move that, Mark Collier noted, "irritates the vendors. Nortel and Avaya especially don't like that kind of publicity." Indeed, VOIPShield came in for some criticism for their handling of the vulnerability announcements, but today Mark Collier defended them, saying, "What VOIPShield did and continues to do is positive for the industry."

Both CTOs on my panel stressed the message that enterprises need to be aware of security threats relevant to VOIP and include them in their overall vulnerability assessments; VOIP threats may not be something that consume a lot of your time and budget today, but you can't afford to ignore them. For now VOIP may be lower on your risk assessment than other types of threats, but you should be prepared to change that view if VOIP systems start to become more of a target.

They also mentioned the need to be aware of what constitutes effective security and what doesn't, for example VLANs. Early on in the convergence evolution, VLAN separation of voice and data traffic was widely promoted as a security best practice. It may not be a bad thing, but Mark and Bogdan agreed that it's not necessarily that helpful either.

That's because the distinction and division between voice and data channels are breaking down. Any voice traffic that originates on a PC softphone will traverse the data VLAN, and there are now hacking tools for jumping between VLANs.

Mark Collier's bottom line: "You do want to use VLANs, they do provide a function. But do not depend on them as a security function."

In response to a question about encryption, Mark said that you can't rely on the idea of encrypting all voice traffic as a way to secure that traffic. Not only can key management become a serious challenge, but encryption will tend to render ineffective third-party systems that are deployed to manage things like QOS or even security systems like intrusion prevention systems (IPS). Because the packets are encrypted, these systems can't correctly understand what they are and therefore can't do what needs to be done to them.

About the Author

Eric Krapf

Eric Krapf is General Manager and Program Co-Chair for Enterprise Connect, the leading conference/exhibition and online events brand in the enterprise communications industry. He has been Enterprise Connect.s Program Co-Chair for over a decade. He is also publisher of No Jitter, the Enterprise Connect community.s daily news and analysis website.
 

Eric served as editor of No Jitter from its founding in 2007 until taking over as publisher in 2015. From 1996 to 2004, Eric was managing editor of Business Communications Review (BCR) magazine, and from 2004 to 2007, he was the magazine's editor. BCR was a highly respected journal of the business technology and communications industry.
 

Before coming to BCR, he was managing editor and senior editor of America's Network magazine, covering the public telecommunications industry. Prior to working in high-tech journalism, he was a reporter and editor at newspapers in Connecticut and Texas.