SIP protocol vulnerability exploit: IP spoofing
Security warning for all VoIP carriers!
If you receive voice traffic from clients via public internet using SIP over UDP protocol (it is default option) - you can be hacked!
Following attacks are possible when a hacker knows your IP address:
How to protect yourself against IP-spoofing attacks?
- If you use IP authentication - make sure that you use complex technical prefix which is unknown to hackers
- Pass VoIP traffic over VPN with encryption
- Use secure transport - run SIP over TLS (SIPS) or at least SIP over TCP. Encrypt RTP (voice traffic) too, using SRTP.
Is it possible to send IP-spoofed packets over public internet?
It is easy to send spoofed IP packets across local network (LAN).
But if you try to send a UDP packet with fake source IP address through your current internet connection, most probably it will be blocked, because internet providers have configured their IP switches correctly.
What happens if some employee inside ISP removes the anti-spoofing filter, connects a small device to the switch and sends IP packet with fake IP address?
Top-level internet carriers are not able to filter source IP addresses, and the packet will be transmitted to destination address via internet. There is a
good article about it written by Cloudflare.
We have managed to contact someone who sells spoofed servers via skype:
and via telegram (at least 4 places where one can rent spoofing-friendly servers, from 160USD/month:
Get consulting or test your softwitch: sales@startrinity.com or skype asv128
Who we are: we are
startrinity.com VoIP software developers, our products are
StarTrinity SIP Tester
and
VoIP Security Test Suite. See our
VoIP security updates