LAWFUL INTERCEPTION OF VOIP - RUDOLF WINSCHUH BUSINESS DEVELOPMENT TRANSACTION SECURITY / TELECOMMUNICATIONS
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Lawful Interception of VoIP Rudolf Winschuh Business Development Transaction Security / Telecommunications
Agenda Company Overview Lawful Interception Definition and Terms Legal Framework Functional Overview LI for VoIP LI solutions for VoIP LI of peer-to-peer VoIP Standards and Regulation Open Issues LI for NGN/IMS Utimaco Safeware AG 2
Company Profile Foundation: 1983 Turnover: 34.8 million in 2004/2005 EBIT: 5.8 million Ownership: Public Company (Frankfurt Prime Standard) Employees: > 250 worldwide Headquarters: Oberursel (near Frankfurt/Main) “Utimaco – the Data Security Company” Utimaco Safeware AG 3
Presence Branch offices Distributors Development centers US/Boston Japan (Details: www.utimaco.com) Israel Egypt JV Hong Kong Saudi Arabia Taiwan Brasil Malaysia Argentina Singapore Chile South Africa Australia Global partners: IBM / Lenovo Cisco Siemens T-Mobile Utimaco Safeware AG Vodafone … 4
Portfolio Utimaco Product Portfolio: Personal Device Security Transaction Security Innovative, trustworthy SafeGuard® Focusing on innovative eBusiness and solutions protect your data against eGovernment solutions on the basis of misuse – on the terminals in private as Utimaco technologies well as public organizations (e-mail security, PKI, PKI-enabled (SafeGuard® Easy, - PrivateDisc, - applications, Hardware Security Module, LANCrypt, - PrivateCrypto, - Advanced Lawful Interception Management Sec., - PDA). System). Hard disk encryption Sign - Verify Virtual disk Encrypt - Decrypt File security PKI - Infrastructure Utimaco Safeware AG Management of Time-Stamping rights Hardware Security PDA protection Modules LI-Management 5
Lawful Interception – Definition and Terms Lawful Interception (LI) Interception of telecommunications for purposes of law enforcement based on laws and other regulations Requirements for telecommunication service providers Law Enforcement Agency (LEA) Interception Related Information (IRI) Information about intercepted communications (e.g. identifiers of participants, times, location information) Call Content (CC) Content of intercepted data (e.g. speech, e-mail, data) Utimaco Safeware AG Handover Interfaces (HI) 6
Legal Framework LI is based on national laws and regulations Implementation is often based on standards National legislation International technical standards SORM CIS Constitution Interception of telecommunications ATIS America (US) Telecommunications laws ETSI Europe Other laws 3GPP Worldwide National regulations Utimaco Safeware AG Organization Technology Data protection 7
Generic Requirements All communication of a target and service must be intercepted Integrity and confidentiality of Information must be ensured Only authorized personnel must be able to use the LI equipment All information must only be accessible to authorized personnel Every use of LI equipment must be logged Intercepted subject must never be able to detect the interception Active interception measures must never influence the telecommunication service Provider only required to provide accessible data Network-intrinsic encryption must be removed Utimaco Safeware AG 8
Functional Overview Utimaco Safeware AG 9
Functions of LI Solutions Administration Function GUI to administrate LI components and interception measures Mediation (Delivery) Function Communication between administration system and access functions Delivery Function (DF) transmits IRI and CC to LEA Access Function Accesses data to be intercepted in telecommunication network Active: Internal Interception Function (IIF) integrated in network node Passive: Probe/Sniffer, filtering to be intercepted communications out of whole network traffic Utimaco Safeware AG 10
Functions of LI Solutions for VoIP Delivery Function IP PSTN Access Function Active/IIF: Signaling Server (e.g. SIP Server) Access Router Session Border Controller Application Server Passive: Utimaco Safeware AG Probes (SIP, H.323, RTP, …) 11
Valuation of LI Solutions for VoIP Pros Cons Active + no additional hardware - security Signaling Server + scales good - IIF integrated in server + minimal effort for provider - performance Access Router + access to all media - correlation of IRI and CC difficult + sometimes only alternative - LI functions at multiple points Session Border Controller + reuse of SBCs - calls to PSTN not covered + easy correlation of IRI and CC - additional hardware Application Server + centralized solution - rerouting could be necessary + easy correlation of IRI and CC - application dependent Passive + very secure - additional hardware Probes + indepent of vendor (in theory) - scaling can become an issue - possibility of packet losses Utimaco Safeware AG 12
LI of peer-to-peer VoIP Signaling- Provider Administration Signaling- Function Server IRI n aling Sig IR I Law Enforcement Delivery Agencies (LEA) User Co Function 2 nte Access-Provider nt IRI Access- Server Delivery CC Function 3 CC Utimaco Safeware AG 13
LI-Standards for VoIP ATIS T1.678 US ETSI WI 00024 Europe Canada, Australia, Asia? 3GPP 33 108 3rd generation mobile network operators CableLabs PacketCable (Broadband) Cable operators ETSI TS 101 671 Originally for PSTN networks Utimaco Safeware AG Possible solution for PSTN and VoIP operators 14
Status of Regulation US Based on CALEA Second order of FCC from 12 May 2006 Interconnected VoIP services Providers must be compliant by 14 May 2007 Europe Different from country to country Germany: Interim solution until ETSI standard is finalized Netherlands: LI of VoIP already active Utimaco Safeware AG 15
Open Issues IRI Forwarding of signalling information e.g. SIP messages vs. Mapping of SIP messages to defined structures CC Some providers cannot access the content Possible ban of business models Application/service specific data Encryption is a hard problem for LEAs Utimaco Safeware AG Blocking of encrypted traffic? 16
LI for NGN/IMS Next Generation Networks (NGNs) standardized by ETSI TISPAN Based on 3GPP approach Core component: IP Multimedia Subsytem (IMS) Goals: Independent of underlying network architectures Services in networks independent of access type (PSTN, mobile, DSL, …) Terminal and user mobility Utimaco Safeware AG Easy deployment of new services 17
TISPAN R1NGN IMS architecture (ES 282 0001) ASF ASF Sh Type 2 Dh Type 1 IWF UPSF SLF Lb Cx ISC Dx IBCF Lc TE Core IMS I/S-CSCF P2 Mi AGCF Other Networks Gm Mk User equipment BGCF P1 P1 Mw Mr Gq’ Mg e2 CLF PSTN / ISDN e2 NASS P-CSCF MRFC MGCF a4 e4 a4 CNGCF Gq’ PDBF a2 a2 SPDF e3 e3 A-RACF Rq SPDF NACF UUAF RACS RACS a1 a1 Re Re Ia Ia Mp Mp Mn Mn Ie Ie Ia Ia a3 a3 CNG e1 e1 ARF e1 e1 AMF RCEF Di Di C-BGF MRFP SGF IP T-MGF L2TF Core Network IP A-MGF ZZ Access Node Edge I-BGF 18 © 2002, Cisco Systems, Inc. All rights reserved. transport
TISPAN R1NGN architecture with IMS LI reference points HI1 AF HI2 LEAF MF HI3 LEMF ASF IRI-IIF ASF Sh Type 2 Dh IRI-IIF Type 1 IWF UPSF SLF Lb Cx ISC Dx IBCF Lc TE Core IMS I/S-CSCF IRI-IIF P2 Mi AGCF IRI-IIF Other Networks Gm Mk User equipment IRI-IIF BGCF P1 P1 Mw Mr Gq’ Mg e2 CLF PSTN / ISDN e2 NASS P-CSCF IRI-IIF MRFC IRI-IIF MGCF IRI-IIF a4 e4 a4 CNGCF Gq’ PDBF a2 a2 SPDF e3 e3 A-RACF Rq SPDF IRI-IIF NACF IRI-IIF UUAF RACS RACS a1 a1 Re Re Ia Ia Mp Mp Mn Mn Ie Ie Ia Ia a3 a3 CNG e1 e1 ARF e1 e1 AMF CC-IIF RCEF Di Di CC-IIF C-BGF MRFP CC-IIF SGF IP T-MGF CC-IIF L2TF Core Network IP A-MGCF CC-IIF ZZ Access Node Edge I-BGF CC-IIF 19 © 2002, Cisco Systems, Inc. All rights reserved. transport
Questions? www.utimaco.com Rudolf Winschuh rudolf.winschuh@aachen.utimaco.de Tel.: + 49 (0)241 1696 248 Utimaco Safeware AG 20
You can also read