Author | Topic |
I Supported Toymods
Location: melbourne.vic.au
Registered: May 2002
|
Any RTP/Firewall Experts?
|
Sun, 16 October 2005 12:11
|
|
Hello All,
I'm trying to write up a research paper in regards to Video conferencing and I was blown out of the water by the IT Security person at my location saying it's impossible to setup a Video Conferencing System on the internal network as there are problems with the RTP protocol where it could exploit the network.
Is this the case? If so does anyone know where I can find such data to support the issue as I can't find it, even on AusCERT.org.au?
Cheers.
|
|
|
Location: Canberra
Registered: August 2003
|
|
|
I supported Toymods Banned User
Location: Brisbane
Registered: May 2002
|
Re: Any RTP/Firewall Experts?
|
Sun, 16 October 2005 23:29
|
|
If video conferencing is to be used behind a secure firewall you shouldnt have to touch the firewall settings at all. All decent video conferencing software should allow you to setup ssh tunneling.
|
|
|
Location: Brisbane
Registered: February 2003
|
Re: Any RTP/Firewall Experts?
|
Mon, 17 October 2005 03:31
|
|
ZZT231 wrote on Sun, 16 October 2005 22:11 | I'm trying to write up a research paper in regards to Video conferencing and I was blown out of the water by the IT Security person at my location saying it's impossible to setup a Video Conferencing System on the internal network as there are problems with the RTP protocol where it could exploit the network.
|
your IT guys have probably said that in fear of the network being swamped by video traffic.
Our early attempts at video-networking from 3 locations was killed off by our ITS because of lame bandwidth arguments.
you could make a hole by setting up an SSH tunnel from internal to an external IP - but the traffic over the internet inside that tunnel would be encrypted, hence any network risks will be at the terminating points only. However, a properly designed LAN should not allow internally-birthed exploits to propagate anyway.
I think your IT security person is grasping at bullshit-coated straws.
Ask them "what particular RTP exploit are they reffering to?" and "is that exploit linked to an application or an non-platform-specific implemention of a particular protocol?".
Apple's iSight video cam and assocaited software (iChat and others) support secure connections over the internet - try comparing the protocols it uses and then search CERT for known holes/exploits of the same.
|
|
|
I Supported Toymods
Location: melbourne.vic.au
Registered: May 2002
|
|
|
Location: Brisbane
Registered: February 2003
|
Re: Any RTP/Firewall Experts?
|
Mon, 17 October 2005 07:35
|
|
From the IT but has been paraphrased for liablity | ...I got a feeling enabling it for the entire workplace would open the organisation to potential attacks from some crafted SIP or H.323 packets
|
this is just a neater way of saying "I vaguely recall reading a slashdot story about using video conferencing to attack a ...".
If they know where the traffic's coming from, who it's going to, then you should be able to impliment some kind of authenticated (not just 'trusted') access.
Sure it's a sane approach to network security (deny everything, allow what you know) but that doesn't preclude learning.
This simple search found a number of references to the exploit - but it seems to be a DoS attack, not door opener.
|
|
|