SlideShare a Scribd company logo
Authentication Methods
and Security
in Videoconferencing Systems
TERENA AA-Workshop Malaga, November 2003



      Dimitris Daskopoulos
      GRNET
Contents
 Videoconferencing   practices
 Problematic  points
 Security standards
 Current techniques in H.323
 Future developments in H.323
Video conferencing worlds
 H.323
 SIP
 MBONE
 other:   VRVS, AG, proprietary VC s/w
The importance of
videoconference security
 identity
 confidentiality
 trust
Current practices
 authentication  assumed,
  but rarely examined
 ad hoc authentication solutions
 point-to-point vs. multi-party call
  practices
Requirements for
videoconferencing security
 endpoint  authentication
 call signaling security
 media encryption
Problematic points
 telephony-world  preconceptions
 people vs. endpoints
 room-based systems
 users vs. executives
 multi-party conferences
 multi-domain conferences
Conferencing:
a three-step process
 endpoint  registration (authentication)
 dialing (authorization)
 media exchange
Protocols involved in H.323
conferencing
 H.225  - RAS (UDP):
  Registration, Admission, Status
 H.225 - Q.931 (TCP):
  Call Signaling (Setup & Termination)
 H.245 (TCP):
  Call Control (Capabilities, Preferences,
  Channel Opening and Flow Control)
 RTP (UDP):
  media streams
Security standards for
videoconferencing:
 H.323   - H.235
   shared   secret - symmetric (Annex D)
   certificates - assymetric (Annex E)

   secure media streams - S/RTP (Annex G)

 SIP
   SSL Digest Authentication
   S/MIME media
Current security options in
H.323
H.235 not widely supported by endpoints.
What options are we left with?
 Identification by IP and alias
 IPSec
 other tricks
Current authentication
techniques in H.323
 point-to-point   conferences (registration)
   IPand alias authentication
   web enhanced methods

 multi-party   conferences (calling)
   generated   target number
   central calling
Security in H.323:
the Gatekeeper
  H.235

  Cisco  MCM: user/password piggy-back
  Radvision ECS: predefined endpoints

  GNU GK: predefined endpoints, Q.931
   signaling filters
Security in H.323:
Gatekeeper backends
  Gatekeeper   APIs (SNMP or proprietary)
    Cisco GKAPI
    Radvision ECS API (SNMP-based H.348?)

  Radius
    Cisco MCM
    GNU GK

  DBMS
    Radvision ECS
    GNU GK

  LDAP
    Radvision ECS
    GNU GK
Security in H.323:
web integration of backends
  web-based   flexible custom interfaces
  SSL enabled

  allow user control of IP and aliases

  allow scheduling and reservation of
   resources (an added benefit)
Current problems in H.323
 securing    registration of multiple aliases
  is difficult
 ad-hoc authentication techniques do not
  accommodate all endpoints
 mobility is hindered
 firewall/NAT traversal is difficult
 media stream protection is lacking
Future developments in
H.323 security
 H.350:
   LDAP authentication
   LDAP endpoint setup

 H.235:
   wider   support in products
   certificate support

   media stream encryption
Links and References
 Internet2   - 2003 fall MM: securing video
 The TERENA IP Telephony Cookbook
 The VIDE VideoConf CookBook
 The VIDE Development Initiative
 Internet2 - Video Middleware (VidMid)
 Internet2 - VC SiteCoordinatorsTraining
 Internet2 - VidMid H.350
 Packetizer   References
Questions ?
The END!

More Related Content

PDF
Asterisk: the future is at REST
PPTX
Building a new ecosystem for interoperable communications
PPT
02 asterisk - the future of telecommunications
PDF
Telephony Service Development on Asterisk Platform
PDF
HKG18-212 - Trusted Firmware M: Introduction
PPTX
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
PPTX
Todo lo lo que necesita saber para implementar FreePBX
PDF
The 12 tasks of Asterisk
Asterisk: the future is at REST
Building a new ecosystem for interoperable communications
02 asterisk - the future of telecommunications
Telephony Service Development on Asterisk Platform
HKG18-212 - Trusted Firmware M: Introduction
Día Neocenter | FreePBX The best & most complete open source & Commercial PBX...
Todo lo lo que necesita saber para implementar FreePBX
The 12 tasks of Asterisk

What's hot (20)

PPTX
The structure is fundamental: IP PBX, telephony cards and tools for high avai...
PDF
SIP (Session Initiation Protocol)
PPT
OST Market - Hybrid Case Histories
PDF
VoIP Business Telephony Solutions Supporting 30-1500 Users
PDF
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
PDF
Using Asterisk in a SIP softswitch
PPT
Developing with VoiceXML Building a Video Conference Application
PDF
BlackHat Hacking - Hacking VoIP.
PDF
Jonny_Martin-Asterisk
PDF
Introduction to SIP(Session Initiation Protocol)
PPTX
No More Fraud, Astricon, Las Vegas 2014
PDF
Indroduction to SIP
PDF
Ip атс grand stream ucm6102 functional overview and testing-eng
PDF
Uptodate IP PBX System
PPT
Asterisk Voip
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PPTX
No More Fraud Cluecon2014
PPT
PDF
Load test of ip pbx asterisk
PPTX
SIP security in IP telephony
The structure is fundamental: IP PBX, telephony cards and tools for high avai...
SIP (Session Initiation Protocol)
OST Market - Hybrid Case Histories
VoIP Business Telephony Solutions Supporting 30-1500 Users
Develop Smart Solutions with Raspberry Pi and EnableX Live Video API
Using Asterisk in a SIP softswitch
Developing with VoiceXML Building a Video Conference Application
BlackHat Hacking - Hacking VoIP.
Jonny_Martin-Asterisk
Introduction to SIP(Session Initiation Protocol)
No More Fraud, Astricon, Las Vegas 2014
Indroduction to SIP
Ip атс grand stream ucm6102 functional overview and testing-eng
Uptodate IP PBX System
Asterisk Voip
How to hack a telecommunication company and stay alive. Sergey Gordeychik
No More Fraud Cluecon2014
Load test of ip pbx asterisk
SIP security in IP telephony
Ad

Similar to Authentication Methods in Videoconferencing Systems (20)

PPT
Download
PPT
Download
PPT
/resources/presentations/200101-amiot1.ppt
PPT
/resources/presentations/200101-amiot1.ppt
PPT
/resources/presentations/200101-amiot1.ppt
PPT
H.323
PPTX
Voip security
PPT
Download
PPT
H.323 protocol
PPT
PPTX
Videoconference
PPT
H.323: Packet Network Protocol
PDF
Raisul Haq Rajib (063435056)
PPT
Lec40 45 video conferencing
PPT
Lec40 41 42_43_44_45 video conferencing
PPT
Lec40 41 42_43_44_45 video conferencing
PPT
H323 Video PPT
PDF
VoIP
PPTX
Presentation of H323 protocol
PPT
Global Multimedia Collaboration System
Download
Download
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt
/resources/presentations/200101-amiot1.ppt
H.323
Voip security
Download
H.323 protocol
Videoconference
H.323: Packet Network Protocol
Raisul Haq Rajib (063435056)
Lec40 45 video conferencing
Lec40 41 42_43_44_45 video conferencing
Lec40 41 42_43_44_45 video conferencing
H323 Video PPT
VoIP
Presentation of H323 protocol
Global Multimedia Collaboration System
Ad

More from Videoguy (20)

PDF
Energy-Aware Wireless Video Streaming
PDF
Microsoft PowerPoint - WirelessCluster_Pres
PDF
Proxy Cache Management for Fine-Grained Scalable Video Streaming
PDF
Adobe
PDF
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
PDF
Instant video streaming
PDF
Video Streaming over Bluetooth: A Survey
PDF
Video Streaming
PDF
Reaching a Broader Audience
PDF
Considerations for Creating Streamed Video Content over 3G ...
PDF
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
PDF
Impact of FEC Overhead on Scalable Video Streaming
PDF
Application Brief
PDF
Video Streaming Services – Stage 1
PDF
Streaming Video into Second Life
PDF
Flash Live Video Streaming Software
PDF
Videoconference Streaming Solutions Cookbook
PDF
Streaming Video Formaten
PDF
iPhone Live Video Streaming Software
PDF
Glow: Video streaming training guide - Firefox
Energy-Aware Wireless Video Streaming
Microsoft PowerPoint - WirelessCluster_Pres
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Adobe
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Instant video streaming
Video Streaming over Bluetooth: A Survey
Video Streaming
Reaching a Broader Audience
Considerations for Creating Streamed Video Content over 3G ...
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
Impact of FEC Overhead on Scalable Video Streaming
Application Brief
Video Streaming Services – Stage 1
Streaming Video into Second Life
Flash Live Video Streaming Software
Videoconference Streaming Solutions Cookbook
Streaming Video Formaten
iPhone Live Video Streaming Software
Glow: Video streaming training guide - Firefox

Authentication Methods in Videoconferencing Systems

  • 1. Authentication Methods and Security in Videoconferencing Systems TERENA AA-Workshop Malaga, November 2003 Dimitris Daskopoulos GRNET
  • 2. Contents  Videoconferencing practices  Problematic points  Security standards  Current techniques in H.323  Future developments in H.323
  • 3. Video conferencing worlds  H.323  SIP  MBONE  other: VRVS, AG, proprietary VC s/w
  • 4. The importance of videoconference security  identity  confidentiality  trust
  • 5. Current practices  authentication assumed, but rarely examined  ad hoc authentication solutions  point-to-point vs. multi-party call practices
  • 6. Requirements for videoconferencing security  endpoint authentication  call signaling security  media encryption
  • 7. Problematic points  telephony-world preconceptions  people vs. endpoints  room-based systems  users vs. executives  multi-party conferences  multi-domain conferences
  • 8. Conferencing: a three-step process  endpoint registration (authentication)  dialing (authorization)  media exchange
  • 9. Protocols involved in H.323 conferencing  H.225 - RAS (UDP): Registration, Admission, Status  H.225 - Q.931 (TCP): Call Signaling (Setup & Termination)  H.245 (TCP): Call Control (Capabilities, Preferences, Channel Opening and Flow Control)  RTP (UDP): media streams
  • 10. Security standards for videoconferencing:  H.323 - H.235  shared secret - symmetric (Annex D)  certificates - assymetric (Annex E)  secure media streams - S/RTP (Annex G)  SIP  SSL Digest Authentication  S/MIME media
  • 11. Current security options in H.323 H.235 not widely supported by endpoints. What options are we left with?  Identification by IP and alias  IPSec  other tricks
  • 12. Current authentication techniques in H.323  point-to-point conferences (registration)  IPand alias authentication  web enhanced methods  multi-party conferences (calling)  generated target number  central calling
  • 13. Security in H.323: the Gatekeeper  H.235  Cisco MCM: user/password piggy-back  Radvision ECS: predefined endpoints  GNU GK: predefined endpoints, Q.931 signaling filters
  • 14. Security in H.323: Gatekeeper backends  Gatekeeper APIs (SNMP or proprietary)  Cisco GKAPI  Radvision ECS API (SNMP-based H.348?)  Radius  Cisco MCM  GNU GK  DBMS  Radvision ECS  GNU GK  LDAP  Radvision ECS  GNU GK
  • 15. Security in H.323: web integration of backends  web-based flexible custom interfaces  SSL enabled  allow user control of IP and aliases  allow scheduling and reservation of resources (an added benefit)
  • 16. Current problems in H.323  securing registration of multiple aliases is difficult  ad-hoc authentication techniques do not accommodate all endpoints  mobility is hindered  firewall/NAT traversal is difficult  media stream protection is lacking
  • 17. Future developments in H.323 security  H.350:  LDAP authentication  LDAP endpoint setup  H.235:  wider support in products  certificate support  media stream encryption
  • 18. Links and References  Internet2 - 2003 fall MM: securing video  The TERENA IP Telephony Cookbook  The VIDE VideoConf CookBook  The VIDE Development Initiative  Internet2 - Video Middleware (VidMid)  Internet2 - VC SiteCoordinatorsTraining  Internet2 - VidMid H.350  Packetizer References