S 2.374 Scope of VoIP encryption

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Head of IT

If an attacker is able to gain access to an internal network at a suitable location, he/she can log all network communication in the LAN. If the VoIP data is not encrypted, the attacker will be able to read all information. For example, he/she could determine who has called whom and for how long by evaluating the signalling information. An attacker could also analyse the messages exchanged using the media transport protocol and listen in on the telephone calls this way. For this reason, consideration should be given to encrypting the VoIP user data. However, encryption must be supported by all telecommunication systems involved in this case.

When considering whether to encrypt communication over VoIP, it often makes sense to distinguish between internal and external communication.

For VoIP telephone calls in the LAN, you may consider doing without encryption. In this case, it must be ensured that an attacker from outside is not able to access this information using an insecure section of the network such as a WLAN. It may make sense, though, to use encryption to protect internal telephone calls from being accessed by insiders. In this case, possible solutions include operating the VoIP terminal devices as VPN end points or using an encrypted media transport protocol such as SRTP.

If all VoIP devices used support encrypted signalling protocols, it is recommended to use encryption. Through the use of encryption, an attacker can be prevented from reading passwords and logging in to the SIP registrar as a different user, for example.

If packets containing VoIP information leave the secure LAN, they must be protected using an appropriate method. One or more of the following methods can be selected to protect the VoIP communication:

If a call to a telephone subscriber is made using a public telephone network, the connection between the VoIP terminal device and the gateway used between the IP network and the public line-switching network can be protected, when necessary, using VPNs or encrypting signalisation and media transport protocols. Since only a few telephones designed for line switching networks provide such protection mechanisms and the ability to use these mechanisms depends on who is being called, the use of encryption between the VoIP gateway and the person being called is often unrealistic.

When encrypted communication, for example with external communication partners, is impossible, the users must be informed of this and made aware of the risks involved. Confidential conversations should not be conducted on the telephone when encryption is not used.

When purchasing VoIP components, it must be ensured that these components support encrypting signalisation and media transport protocols such as TLS and SRTP, for example (see S 2.375 Selection of suitable VoIP systems).

Review questions: