[VOIPSEC] VoIP Blocking Filter w/Ettercap

Troy Sherman tsherman at cisco.com
Mon Jul 18 20:56:51 CDT 2005


 In line but shorter.....


Troy Sherman
JAG 1024
Cisco Systems Inc.
Phone   408.902.3091
Cell    408.887.9516
Pager   800.365.4578



MT - This is not true. I have performed this on all manner of  
switches and IOS versions. Can you please specify why a "newer"  
switch would block this?

THS - Some switches now look at CDP (I know, but more difficult, do not
remember the IOS versions) to make sure that they are seeing a CDP packet
from the phone before they allow traffic on that voice vlan. It is baby
steps until some newer features come out in the future. The best one off the
top of my head is on the CatOS on the 6k (8.3.(4) I think), it uses a
command called CDP verify to check this, otherwise traffic is blocked.

MT - You are correct that MITM options are definitely limited once  
DAI is enabled. I would also suggest DHCP anti-spoofing measures on  
top of the arp spoofing measures. I really am just trying to point  
out that there are no options for switch level authentication of VoIP  
endpoints. My other concern is that nowhere in the Cisco SAFE  
blueprint for IP Telephony are these recommended, and many network  
administrators do not configure these features. I believe that  
Arpwatch is recommended, but these would only log arp changes, not  
block them.

THS - This confuses me, do you mean a rouge DHCP server? If so, you have to
have dhcp snooping turned on to make DAI work. When you turn on dhcp
snooping you get 3 things, no port can reply to a dhcp broadcast, you build
the dhcp snooping binding table for DAI and IP source guard, and the dhcp
request CHADDER field is checked to make sure that the mac address in the
dhcp requests matches the mac address in the cam table of the switch. Unless
you have IP source guard with port security, but that is not really a
enterprise feature because of the requirement of the option 82 field in the
dhcp request.

THS - and yes, they are not in SAFE, I did not write SAFE :). I can tell you
that data is data in my world and most of the things we have talked about
are the same for email and even ssh/ssl, and how many companies encrypt all
the email that they send. If I were going to be a bad guy, I would much
rather read someone's email then listen to the voice. I have talked to
companies that have turned all this security on and more for their voice
network (which is data) and yet have done nothing to protect the "other"
data on their network, which is strange to me. A good security policy,
layers, monitoring, all those things are what it takes to make a secure
network. I have found that most attacks are internal, and that most attacks
are allowed because of mis configuration, that is one reason for things like
smartports and such.

MT - For anyone interested, THS has a good presentation on these  
attacks at http://www.cisco.com/networkers/nw04/presos/docs/SEC-2002.pdf

THS - googled me eh? :)





More information about the Voipsec mailing list