Authentication Methods and Security in Videoconferencing Systems TERENA AA-Workshop Malaga, November 2003 Dimitris Daskopoulos GRNET.

Slides:



Advertisements
Similar presentations
Vidmid-vc: Middleware for Video Conferencing Services
Advertisements

H.235 Authentication, Integrity and Encryption Adi Regev Sr. Director Sales Engineering & Customer Support.
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Encrypting Wireless Data with VPN Techniques
Internet Protocol Security (IP Sec)
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
Gatekeepers Gabe Moulton The Ohio State University Internet2 Commons Site Coordinator Training March 22, 2004 Indianapolis, Indiana.
Gatekeepers Soh Hock Heng National University of Singapore Internet2 Commons Site Coordinator Training December 3, 2003 National Univesity of Singapore.
H.323 Gatekeepers Lucent Technologies - elemedia.
H. 323 Chapter 4.
A Presentation on H.323 Deepak Bote. , IM, blog…
Video Conferencing Global Dialing Scheme (GDS) Zeeshan Aamir.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
H.323 Recommended by ITU-T for implementing packet-based multimedia conferencing over LAN that cannot guarantee QoS. Specifying protocols, methods and.
Voice over IP Fundamentals
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
24/08/2005 IP Telephony1 Guided by: Presented by: Dr.S.K.Ghosh Nitesh Jain 05IT6008 M.Tech 1 st year.
VoIP EE 548 Ashish Kapoor. Characteristics – Centralized and Distributed Control H.323 pushes call control functionality to the endpoint, while still.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
ECS and LDAP Karen Krivaa Product Marketing Manager.
SIP Simplified August 2010 By Dale Anderson. SIP Simplified Session Initiation Protocol Core of SIP specifications is documented in IETF RFC 3261 Many.
Voice over IP and IP telephony Network convergence – Telephone and IT – PoE (Power over Ethernet) Mobility and Roaming Telco – Switched -> Packet (IP)
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
SCSC 455 Computer Security Virtual Private Network (VPN)
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Introducing VoIP Networks Chapter 01 Components of a VoIP Network.
VoIP – Security Considerations An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.
H.323: Multimedia Conferencing for Packet Switched Networks Dave Lindbergh Manager, Technical Standards Group PictureTel.
SIP vs H323 Over Wireless networks Presented by Srikar Reddy Yeruva Instructor Chin Chin Chang.
An Introduction to SIP Moshe Sambol Services Research Lab November 18, 1998.
Voice and Data Integration over IP An analytical overview of voice-over-IP Prabhu Sivarja Wichita State University, Wichita, KS Spring 2003.
POLYCOM CONFIDENTIAL Polycom enables Alcatel Instant Video Solution by combining the power Alcatel IP Telephony with Polycom Unified Collaboration Solutions.
VoIP Meeting Requirements 22/03/2006 – Saverio Niccolini and Fabio Vena.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to VoIP Cisco Networking Academy Program.
Scopia & Avaya Integration Update
SCOPIA & AVAYA Integration & RM Updates Reiner Itay / Kevin Pitts Product Managers.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VidMid- VC 12 October 2015 Federated Secure Internet Conferencing Thread Work In Progress.
See: productivity See: passion See: performance MPS Sales Presentation May 2007 Update.
Vidmid VC working group: Scenarios & workplan Egon Verharen, SURFnet.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
What is H.323? H.323 is standard providing a foundation for audio, video, and data communications across IP-based networks, including the Internet.
H.323, IP Multicast Conferencing, And TAPI 3.0 Don Ryan Development Lead Windows Networking And Communications Microsoft Corporation.
5/7/2002 Vidmid-vc: Middleware for Video Conferencing Services Egon Verharen, SURFnet Vidmid-vc chair Middleware Vidmid VC History, Scope, Status, Authentication.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY [1] VOICE OVER INTERNET PROTOCOL SHREETAM MOHANTY ROLL # EC
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
TBE 2710 Chapter 12 Signaling.
Gatekeepers Gabe Moulton The Ohio State University Seventh Annual Digital Video Conference March 31, 2005 Atlanta, Georgia.
1 An H.323 Videoconferencing Service for the German Research and Education Community Jürgen Hornung, Gisela Maiss - DFN Germany May 2003 TNC 2003.
PTCL Training & Development1 H.323 Terminals Client end points on the network IP phones, PCs having own OS Terminals running an H.323 protocols and the.
4 October 2001 Tuning in to H.323 / LDAP security What this presentation is about - RADvision ECS registration control via LDAP - information and configs.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Telepresence Interoperability Protocol (TIP) Overview for IMTC SuperOp 2010 Workshop 1 Allyn Romanow Cisco Telepresence Systems Business Unit (TSBU) 15.
E.S. Cherdyntsev MULTIMEDIA NETWORKS. Enhancing the TCP/IP Protocol Stack to Support Functional Requirements of Distributed Multimedia Applications Chapter.
Presents Fall Forum The H.323 Revolution Presented by Eli Orr October 2002.
Для sales-менеджеров с техническими элементами
WebRTC enabled multimedia conferencing and collaboration solution
Computer Science Department
Overview of H.323-SIP Gateway
Egon Verharen, SURFnet Vidmid-vc chair
VoIP Signaling Protocols Framework
Presentation transcript:

Authentication Methods and Security in Videoconferencing Systems TERENA AA-Workshop Malaga, November 2003 Dimitris Daskopoulos GRNET

Contents  Videoconferencing practices  Problematic points  Security standards  Current techniques in H.323  Future developments in H.323

Video conferencing worlds  H.323  SIP  MBONE  other: VRVS, AG, proprietary VC s/w

The importance of videoconference security  identity  confidentiality  trust

Current practices  authentication assumed, but rarely examined  ad hoc authentication solutions  point-to-point vs. multi-party call practices

Requirements for videoconferencing security  endpoint authentication  call signaling security  media encryption

Problematic points  telephony-world preconceptions  people vs. endpoints  room-based systems  users vs. executives  multi-party conferences  multi-domain conferences

Conferencing: a three-step process  endpoint registration (authentication)  dialing (authorization)  media exchange

Protocols involved in H.323 conferencing  H RAS (UDP): Registration, Admission, Status  H Q.931 (TCP): Call Signaling (Setup & Termination)  H.245 (TCP): Call Control (Capabilities, Preferences, Channel Opening and Flow Control)  RTP (UDP): media streams

Security standards for videoconferencing:  H H.235  shared secret - symmetric (Annex D)  certificates - assymetric (Annex E)  secure media streams - S/RTP (Annex G)  SIP  SSL Digest Authentication  S/MIME media

Current security options in H.323 H.235 not widely supported by endpoints. What options are we left with?  Identification by IP and alias  IPSec  other tricks

Current authentication techniques in H.323  point-to-point conferences (registration)  IP and alias authentication  web enhanced methods  multi-party conferences (calling)  generated target number  central calling

Security in H.323: the Gatekeeper  H.235  Cisco MCM: user/password piggy-back  Radvision ECS: predefined endpoints  GNU GK: predefined endpoints, Q.931 signaling filters

Security in H.323: Gatekeeper backends  Gatekeeper APIs (SNMP or proprietary)  Cisco GKAPI  Radvision ECS API (SNMP-based H.348?)  Radius  Cisco MCM  GNU GK  DBMS  Radvision ECS  GNU GK  LDAP  Radvision ECS  GNU GK

Security in H.323: web integration of backends  web-based flexible custom interfaces  SSL enabled  allow user control of IP and aliases  allow scheduling and reservation of resources (an added benefit)

Current problems in H.323  securing registration of multiple aliases is difficult  ad-hoc authentication techniques do not accommodate all endpoints  mobility is hindered  firewall/NAT traversal is difficult  media stream protection is lacking

Future developments in H.323 security  H.350:  LDAP authentication  LDAP endpoint setup  H.235:  wider support in products  certificate support  media stream encryption

Links and References  Internet fall MM: securing video Internet fall MM: securing video  The TERENA IP Telephony CookbookIP Telephony Cookbook  The VIDE VideoConf CookBook  The VIDE Development Initiative The VIDE Development Initiative  Internet2 - Video Middleware (VidMid)  Internet2 - VC SiteCoordinatorsTrainingSiteCoordinatorsTraining  Internet2 - VidMid H.350 Internet2 - VidMid H.350  Packetizer References Packetizer References

Questions ?

The END!