SHARE



ABOUT THE AUTHOR


Matt Brunk
Matt Brunk has worked in past roles as director of IT for a multisite health care firm; president of Telecomworx,...
Read Full Bio >>
SHARE



Matt Brunk | June 11, 2009 |

 
   

Un-Secure IP/SIP Voice Calls

Un-Secure IP/SIP Voice Calls Imagine getting proprietary or personal information from the IP/SIP telephone calls and then having a field day with the information.

Imagine getting proprietary or personal information from the IP/SIP telephone calls and then having a field day with the information.

Of course I'd be the one troubleshooting our latest SIP trunk issue. Previously, I had hopes that I could point to the carrier since I have my trusty VQM (Voice Quality Monitoring) in place. A few weeks prior, we experienced our first disconnect during a call with a customer, then a few days later call quality seemed to come and go. VQM helped me isolate the call in this case, but oddly enough, the call sounded like a satellite call with lots of background white noise as in the days of old. So I questioned why the call quality showed up as "excellent." This led us down the path to first check the router configuration (last year for 4 months we did not have QoS turned on). Even after testing again and again, call quality didn't return to the same consistency.The good folks at ADTRAN found this strange. The support engineer had me run a packet trace using WireShark (formerly Ethereal) and in 15 minutes he pegged the issue with my test calls from the packet sniff as likely a codec issue on the carrier side. The problem was isolated on the inbound side coming from the carrier to our IP-PBX. Evidence in hand I called the carrier, but their reply the next day even after I forwarded the calls (packet trace--"the evidence") was they could find no issue in their network. No surprise. There's another issue besides getting this SIP carrier to provide service.

WireShark (a free application) is a great snooping tool that sniffs packets and provides an onboard playback of those IP/SIP voice calls that you captured. I heard the conversations from the packet trace and am able to take those telephone call recordings and do with them whatever I deem; and this opens up Pandora's box of legal issues. Using one test call from the trace; I used GoldWave to convert it to an audio file here. It also means IT/ITC must maintain personnel as "trusted" advisors and it goes without saying that knowing what employees view on the web is one thing but knowing what they talk about can cause untold damage. Sensitivity is key and the legal concerns with security over voice tampering; information mining and other devious activities are probably in for a lot of challenges and test cases.

Now to get a packet trace you only need a hub or a mirrored port in a switch, a laptop and WireShark. Imagine getting proprietary or personal information from the IP/SIP telephone calls and then having a field day with the information. It's not normally the way I think but after thinking about it, it seems that now we have virtual wiretaps and because I can and I know others that have; sniffing the public Internet is pretty easy. What kind of information is being mined from packet traces?

Voice encryption is good but normally it's only working between IP-PBXs or gateways, so any public IP/SIP call is best defined as "unsecure voice." Maybe the new telephone stickers for our phones should read "WARNING--your calls maybe subject to monitoring for quality control purposes but the calls themselves are UNSECURE." Employees and more importantly executives need to be aware of the inherent security risks. Breaking into your office hurts but perhaps not as much as what leaks out, causing irreparable damages to the enterprise.Imagine getting proprietary or personal information from the IP/SIP telephone calls and then having a field day with the information.





COMMENTS



Enterprise Connect Orlando 2017
March 27-30 | Orlando, FL
Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Special Offer - Save $200 Off Advance Rates

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

April 5, 2017

Its no secret that the cloud offers significant benefits to enterprises - including cost reduction, scalability, higher efficiency, and more flexibility. If your phone system and contact center are

March 22, 2017

As today's competitive business environments push workforces into overdrive, many enterprises are seeking ways of streamlining workflows while optimizing productivity, business agility, and speed.

March 8, 2017

Enterprise IT's ability to innovate is critical to the success of the business -- 80% of CIOs agree. But the CIO role has never been more challenging than it is today, with rising operational respo

March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.