Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP
نویسندگان
چکیده
Voice calls are still one of the most common use cases for smartphones. Often, sensitive personal information but also confidential business information is shared. End-to-end security is required to protect against wiretapping of voice calls. For such real-time communication, the ZRTP key-agreement protocol has been proposed. By verbally comparing a small number of on-screen characters or words, called Short Authentication Strings, the participants can be sure that no one is wiretapping the call. Since 2011, ZRTP is an IETF standard implemented in several VoIP clients. In this paper, we analyzed attacks on real-world VoIP systems, in particular those implementing the ZRTP standard. We evaluate the protocol compliance, error handling, and user interfaces of the most common ZRTP-capable VoIP clients. Our extensive analysis uncovered a critical vulnerability that allows wiretapping even though Short Authentication Strings are compared correctly. We discuss shortcomings in the clients’ error handling and design of security indicators potentially leading to insecure connections.
منابع مشابه
Security Issues in VoIP Telecommunication Networks
As VoIP telecommunication networks are becoming popular, more and more VoIP calls are being madeto accomplish security critical activities, e.g., E911 services, phone banking. However, the security ram-ifications of using VoIP have not been fully recognized, and there exists a substantial gap in the under-standing of the potential impact of VoIP exploits on the VoIP users. In this c...
متن کامل“Detecting Man in the Middle Attacks on Ephemeral Diffie-Hellman without Relying on a Public Key Infrastructure in Real-Time Communications”
With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...
متن کاملThe Impact of Security on VoIP Call Quality
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no secur...
متن کاملSecurity and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a VoIP connection. It uses Diffie-Hellman (DH) key exchange to agree upon a session key, which is inherently vulnerable to active Man-in-the-Middle (MitM) attacks. Therefore ZRTP introduces some proven methods to detect such attac...
متن کاملPoster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments
Recently, several mobile applications were released that claim to provide secure Voice-over-IP communications. Most of these, e.g., Redphone by Open WhisperSystems or Silent Phone by Silent Circle, are utilizing ZRTP [4] to establish session keys for end-to-end security. ZRTP was designed to achieve key exchange without trusted third parties or certificate infrastructure, while providing a way ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- PoPETs
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017