throbber
Michael Gough
`
`
`
`
`
`The Perfect Reference for the Multitasked SysAdmin
`¢ Discover Why “Measure Twice, Cut Once”Applies to Securing a VoIP
`Infrastructure
`
`¢ Learn How to Secure an Entire VoIP Infrastructure and Defend Against Denial-
`of-Service and Hijacking Attacks
`
`° The Perfect Guideif VolP Engineering is NOT Your Specialty
`
`Thomas Porter
`
`Page 1 of 14
`
`Samsung Exhibit 1032
`
`Page 1 of 14
`
`Samsung Exhibit 1032
`
`

`

`|
`
`
`
`i
`|
`
`:
`i
`
`i
`
`I
`
`Syngress Publishing,Inc., the author(s), and any person or firm involved in the writing,editing, or production (col-
`lectively “Makers”) ofthis book (“the Work”) do not guarantee or warrantthe results to be obtained from the
`Work.
`There is no guarantee of any kind, expressed or implied, regarding the Workorits contents. The Work is sold AS IS
`and WITHOUT WARRANTY.You mayhave otherlegal rights, which vary from state to state,
`In no eventwill Makers beliable to you for damages,including anyloss of profits, lost savings, or other incidental or
`consequential damages arising out from the Work orits contents. Because some states do not allow the exclusion or
`limitation ofliability for consequential or incidental damages, the abovelimitation may not apply to you.
`You should always use reasonable care, including backup and other appropriate precautions, when working with
`computers, networks, data, andfiles.
`
`Syngress Media®, Syngress®,“Career Advancement ThroughSkill Enhancement®,” “Ask the Author UPDATE®,”
`and “Hack Proofing®,”are registered trademarks of Syngress Publishing,Inc. “Syngress: The Definition of a Serious
`Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hackeris to Think Like One™”are trade-
`marks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks orservice
`marksoftheir respective companies.
`KEY
`SERIAL NUMBER
`001
`HJIRTCV764
`002
`PO9873D5FG
`003
`829KM8NJH2
`004
`VTY45Q9PLA
`005
`CVPLQ6WQ23
`006
`VBP96ST5T5
`
`007
`HJJ863WD3E
`008
`2987GVTWMK
`009
`629MP5SDJT
`10
`IMWQ295T6T
`
`PUBLISHED BY
`Syngress Publishing, Inc,
`800 Hingham Street
`Rockland, MA 02370
`
`How to Cheat at VoIP Security
`Copyright © 2007 by Syngress Publishing, Inc. All rights reserved. Printed in the United States ofAmerica, Except
`as permitted under the Copyright Act of 1976, nopart ofthis publication may be reproduced ordistributed in any
`form or by any means, or stored in a database orretrieval system, without the prior written permission of the pub-
`lisher, with the exception that the programlistings may be entered,stored, and executed in a computer systern, but
`they may not be reproduced for publication.
`
`Printed in the United States ofAmerica
`1234567890
`
`ISBN 10: 1-59749-169-1
`ISBN 13: 978-1-59749-169-3
`
`Publisher: Amorette Pedersen
`Acquisitions Editor: Gary Byrne
`Technical Editor: Thomas Porter
`Cover Designer: Michael Kavish
`
`Page Layoutand Art: Patricia Lupicn
`Copy Editors; Adrienne Rebello, Mike
`McGee
`Indexer: Nara Wood
`
`Distributed by O'Reilly Media,Inc. in the United States and Canada.
`Por information onrights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at
`Syngress Publishing; email matt@syngress.com or fax to 781-681-3585.
`
`
`
`Page 2 of 14
`
`Page 2 of 14
`
`

`

`
`
`Contents
`
`Chapter 1 Introduction to VoIP Security. .......-.0006 1
`Introduction 6... een es 2
`The Switch Leaves the Basement ©. 0... eee eee eee 4
`What Is VoIP? 0.0... nes 6
`VoIP Benefits 00.0.0 00 tee eet eee ees 6
`VoIP Protocols . 6... eee ees 8
`VoIP Isn’t Just Another Data Protocol ..-. 0.60 + sss sees 9
`Security Issues 1n Converged Networks ..... 0.6.52 +- 005 11
`VoIP Threats... cee et eee es 14
`A New Security Model... 0. ce eens 15
`Summary...0 eee es 16
`Chapter 2 The Hardware Infrastructure ..... 0.6... 00a 19
`Introduction 6... ee tts 20
`Traditional PBX Systems .... 0... ee eee ees21
`PBX Lines 2.0 ee ee ee 22
`PBX Trunks 2.00.es 24
`PBX Features oc. 0 ce ee eens 25
`PBX Adjunct Servers... 00.00 eee e eee eens 28
`Voice Messaging «6.66. ee ee eens28
`Interactive Voice Response Servers
`.. 0.6.0 eee ee29
`Wireless PBX Solutions... 00.626 ee eee30
`Other PBX Solutions .... 60... es 30
`PBX Alternatives
`.. 00.0 cee eee ees30
`VoIP Telephony and Infrastructure... 6.6.2 ee ee eee31
`Media Server$S 0. ee eee 31
`Interactive Media Service: Media Servers ....-...-- 32
`Call or Resource Control: Media Servers ........-. 32
`Media GatewayS 6... cece eens 33
`Firewalls and Application-Layer Gateways ........- 34
`Application Proxies... 6 ev eee teeters34
`Endpoints (User Agents) ©... 60-0. e eee eee35
`IP Switches and Routers... 0... eee eee38
`Wireless Infrastructure 6.6 eee ee38
`Wireless Encryption: WEP ..............-..+. 38
`
`i
`|
`|
`|
`
`Page 3 of 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 14
`
`

`

`xii
`
`Contents
`
`\
`|
`|
`
`
`}
`L
`
`|
`
`Wireless Encryption: WPA2 ..............020..39
`Authentication: 802.1k 2.00.00. 000 0000.00 cece40
`Power-Supply Infrastructure... 0.00.00. eee41
`Power-over-Ethernet (IEEE 802.3af)
`............,41
`UPS eee eee eee e ees42
`Energy and Heat Budget Considerations ..........43
`Summary... cece cee cence en aes44
`Chapter 3 Architectures .........00.0 00. cceeeeeuuee 45
`Introduction 6... cece eter eee 46
`PSTN: WhatIs It, and How Does It Work? ............. 46
`PSTN:Outside Plant 2.2... cee eee eee 46
`PSTN:Signal Transmission .......... 00.00.0000 ee 49
`T1 Transmission: Digital Time Division Multiplexing 49
`PSTN;Switching and Signaling .....00..0..00.00... 35
`The Intelligent Network (IN), Private
`Integrated Services, ISDN, and QSIG ............, 56
`ITU-T Signaling System Number 7 (SS7) ......... 57
`PSTN:Operational and Regulatory Issues .......0..., 61
`PS'PN Call Flow... eee 61
`PSTN Protocol Security... . cece cece eee eee 64
`SS7 and Other ITU-T Signaling Security ........... 64
`ISUP and QSIG Security .. 20... 0.0 cee, 66
`The H.323 Protocol Specification
`................... 67
`The Primary H.323 VolP-Related Protocols ............ 68
`H.225/Q.931 Call Signaling ..................... 71
`H.245 Call Control Messages ........0...0.......75
`Real-Time Transport Protocol ................00..77
`H.235 Security Mechanisms ........0. 000.00 eee eae 78
`Understanding SIP oo. ee eee 82
`Overview of SIP 1. eee eee 83
`RFC 2543 / RFC 3261... . eee eee 84
`SIP and Mbone ...... 0.0.0. cece cece eee eee uee 85
`OS) 85
`SIP Functions and Features .......0....00..0..0.00.. 87
`User Location .. 0... ee eee eee 88
`UserAvailability 60.0... ee,88
`User Capabilities 22.0... eee,88
`Session Setup . 0... eee eee eee89
`
`|
`| |
`|
`|
`
`
`
`
`Page 4 of 14
`
`Page 4 of 14
`
`

`

`
`
`Contents
`
`xiii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Session Management... 06 tee ete89
`SIP URIs 2... es eee eee 89
`SIP Architecture 2... es 90
`SIP Components... 6... eee tenes90
`User Agents 20... cee eee ene90
`SIP Server occ ene 91
`Stateful versus Stateless 2.6... c eee ee ee 92
`Location Service... ee tees 92
`Chent/Server versus Peer-to-Peer Architecture ........ 93
`Chent/Server oo 0c te ee eee 93
`Peer to Peer oc c es 94
`SIP Requests and Responses «6... 0. e eee eee cee94
`Protocols Used with SIP 2.0... ete ee 97
`UDP voc ee ees 97
`Transport Layer Security ©... eee eee 98
`Other Protocols Used by SIP 0... eee es 99
`Understanding SIP’s Architecture... 6.6... e ees 102
`SIP Registration 6... eee ee eens 102
`Requests through Proxy Servers... 6.65.20. 5s 103
`Requests through Redirect Servers ........----. 103
`Peer to Peer 0c tee 104
`Instant Messaging and SIMPLE «20.6... eee eee ees 105
`Instant Messaging 6... ee eens 106
`SIMPLE ....... 000 ee et te ees 107
`Summary oo. ee ee eee es 109
`Chapter 4 Support Protocols .....-.5+- ++ eeer eee ees 111
`Introduction 2... ee ee ees 112
`DNS occ ne ee eres 112
`DNS Architecture... ee ees 143
`Fully Qualified Domain Name .......-.++ +++: 114
`DNSClient Operation 2... ee eee 115
`DNSServer Operation 6... 0... eee eee 116
`Security Implications for DNS... 6.6.6 ees 117
`TETP occ ccc ene ee eee 118
`TETP Security Concerns... crete eee ee 118
`TFTP File Transfer Operation .... 2.5.56. ..405- 119
`Security Implications forTFTP .. 0.0.0... e eee 119
`FATT occ cette eee ene 120
`HTTP Protocol... 0.2 ee eee 121
`
`|
`
`|
`
`Page 5 of 14
`
`
`
`Page 5 of 14
`
`

`

`xiv
`
`Contents
`
`
`
`HTTP Client Request ...........0.......... 121
`HTTP Server Response ..................... 122
`Security Implications for HTTP ................. 122
`SNMP oo. teeter eee ee eee. 123
`SNMPArchitecture... 0.0... eee eee 124
`SNMP Operation... 0.0... eee, 124
`SNMPArchitecture... 0... ee eee 125
`DHCP oo. cece eee 126
`DHCP Protocol 0... cece ee, 126
`DHCPOperation... 6... eee, 127
`Security Implications for DHCP ................. 128
`RSVP ccc cere cece ee. 129
`RSVP Protocol... 0.0... eee eee 130
`RSVP Operation ..... 0.0.00. eee 130
`Security Implications for RSVP ..........,........ 131
`a 132
`SDP Specifications
`. 6... eee eee. 132
`SDP Operation... 2.2... eee. 133
`Security Implications for SDP ......0000....,...., 134
`Skinny 2. cece cree eee. 135
`Skinny Specifications»... 0.000. e cee v cece eee. 135
`Skinny Operation .... 0.0.0.0... 000000000... 135
`Security Implications for Skinny ................, 136
`SUMUMALY oe eee cece eee, 138
`Chapter 5 Threats to VoIP Communications Systems .. 141
`Introduction 20... cece eee ee ee. 142
`Denial-of-Service or VoIP Service Disruption ........., 142
`Call Hijacking and Interception. .................... 148
`ARP Spoofing oo... 0. cece eee ee. 151
`H..323-Specific Attacks... 6... cece cece. 155
`SIP-Specific Attacks... 0.6... ee cee eee 156
`SUMMALY cece eee eee. 157
`Chapter 6 Confirm User Identity................... 159
`Introduction 6... ccc cece eee, 160
`802.1x and 802.111 (WPA2)
`....00.0. eee, 163
`802.1x/EAP Authentication ....................., 164
`Supplicant (Peer)... eee. 164
`Authenticator 20... eee eeee. 164
`
`
`
`
`Page 6 of 14
`
`Page 6 of 14
`
`

`

`
`
`Contents
`
`XV
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Authentication Server... 0c eee 164
`EAP Authentication Types
`. 66-6 ee eee es 167
`EAP-TLS (occ ee 169
`EAP-PEAP 2.0. cc ees 171
`EAP-TTLS 00000 c cee ees 171
`PEAPv1/EAP-GTC oo... ees 171
`EAP-FAST 0.0000 eee eee 171
`LEAP oo. ccc ec eee eens 172
`EAP-MD-5 2... 0 cc eee eee 172
`Inner Authentication Types
`.. 6... eee 173
`Public Key Infrastructure... 6.0. ee 175
`Public Key Cryptography Concepts ........-.----. 176
`Architectural Model and PKI Entities .......-5....-. 178
`Basic Certificate Fields... 02 ee 180
`Certificate Revocation List 2.1.06. eee ees 181
`Certification Path . 20... ee es 181
`Minor Authentication Methods ......0. 0.0 ee {82
`MAC Tools ....... 00 tee eee eee eae 182
`MACAuthentication 0.0.0.0... 000 eee eee 183
`ARP Spoofing 0... 06600. e eee ete 183
`Port Security oe ee eee 183
`Summary oo. eee ee ees 183
`Chapter 7 Active Security Monitoring ............+. 185
`Introduction ..0. eee 186
`Network Intrusion Detection Systems ......-..-.-..00. 187
`NIDS Defined 0.0.0.0 eee tees 187
`Components . 00.06. ee ets 188
`Types cee ee een tenes 189
`Placement .....0.0 00 ee eee ees 191
`Important NIDS Features... 66.06 eee eee es 194
`Maintenance... eee eee 194
`Alerting 2.0.00 c eee eee 194
`Logging 2.0600 ee eee 194
`Extensibility 6.0... ee eee 194
`Response... eee eects 194
`Limitations 0.00. ce ee eee 195
`Honcypots and Honeynets ....- 6 eee eee eee 195
`Host-Based Intrusion Detection Systems .......-....-. 196
`
`|
`
`|
`
`|
`
`Page 7 of 14
`
`Page 7 of 14
`
`

`

`
`
`
`
`Contents
`
`
`
`Page 8 of 14
`
`|
`|
`|
`
`:
`
`|
`
`|
`
`Logging 0. eee eee ee eens 197
`Syslog oo. e eee eee ee ene 197
`
`SNMP 0... coe ccc ce eee eee e ees 199
`
`
`What Is a Penetration/Vulnerability Test? ........0.00.0. 200
`Methodology 1.0... 0... cece eee 201
`
`Discovery 00... eee ee201
`
`Scamming 6. eee eens 202
`
`Vulnerability Assessment 2.2.0... 0.0.0 203
`
`Exploitation 6.0... ccc eee eee 203
`
`Reporting oc. eee cece eee eens203
`
`SUMMALY ee eee es 205
`
`
`Chapter 8 Logically Segregate NetworkTraffic....... 207
`Introduction 2... ee cee eee tees 208
`
`VLANS oo eect ene ey 209
`
`
`VLAN Security o. 0. ee eee
`eee 212
`VLANsand Softphones. 1... 0.0.00... 020 ee 212
`
`QoSand Traffic Shaping 2... eee eee 214
`
`NATand IP Addressing 2.0.0... 0002.00.eeee eee 215
`
`How Does NAT Work? ... 0.0.0 ee eee 216
`
`
`NAT Has Three Common Modes of Operation .
`.
`. .218
`NATand Encryption ...............000 0000 221
`
`NATas a Topology Shield .......0.....0.. 00005 225
`
`Firewalls 00. eee eee 225
`
`
`A Bit of Firewall History ..... 000.000... eee eee 226
`Shallow Packet Inspection... 0.0.0.0. .0 0c eves 226
`
`Stateful Inspection ... 0.0... 00.0 cee ee eee 227
`
`Medium-Depth Packet Inspection .............. 227
`
`Deep Packet Inspection ..............0-0 ee eee228
`
`VoIP-Aware Firewalls... 0... eee 229
`
`H.323 Firewall Issues 10... 0... eee230
`
`
`SIP Firewall Issues... 000 eee231
`
`Bypassing Firewalls and NAT ................. 232
`Access Control Lists 2... 0.0 ee 235
`
`Summary... eee eters237
`
`
`Chapter 9 IETF Encryption Solutions for VoIP ........ 239
`Introduction 26.... ee nee 240
`
`Suites from the IETF 2.1... ee eee 240
`S/MIME: Message Authentication 2.2... 0. eee een 241
`
`
`
`Page 8 of 14
`
`

`

`Contents
`
`xvii
`
`S/MIME Messages ......-- 2.00 ee trees244
`Sender Agent 0... 0... 00ers244
`Receiver Agent 2.0.0... ee eee ee ees244
`E-mail Address... 00.00 ete 244
`TLS: Key Exchange andSignaling Packet Security .......244
`Certificate and Key Exchange ©... 6... seven eens245
`SRTP: Voice/Video Packet Security ...--. 6.25.2 ee. 247
`Multimedia Internet Keying .... 666-00. ee eee ees 248
`Session Description Protocol Security Descriptions .
`.
`.
`.248
`Providing Confidentiality... 0. eee eee 248
`Message Authentications ©. 00... cee eee 249
`Replay Protection ©... 2k eee eee eee eee250
`Summary . 00.000 ete ee eee251
`Chapter 10 Skype Security... 2.66. e reece eee 253
`SECUrity 6. ete es 254
`Blocking Skype oo... 0 ccc eens 257
`Firewalls 00.0 ee eens 257
`Downloads 0.0.00. cece eee eee 257
`Software Inventory and Administration ..........258
`Firewalls... 0. cc ee eee nes 258
`Proxy Servers... cee eee ees260
`Embedded Skype... 0. cece cee tee eee 260
`A Word about Security 2.0.6... eee ee ee260
`Chapter 11 Skype Firewall and Network Setup....... 263
`A Word about Network Address Translation and Firewalls . .264
`Home Users .....- 00 cc eet266
`Small to Medium-Sized Businesses ............--..266
`Large Corporations . 0... e eee eee267
`What You Need to Know
`About ConfiguringYour Network Devices ..........-.269
`Home Users or Businesses
`Using a DSL/Cable Router and No Firewall ........269
`Small to Large Company Firewall Users ..........-. 269
`TCP and UDP Primer 2.0.0... 0022 eee 269
`NATvs.a Firewall
`o 0.0.00 cee ee 270
`Ports Required for Skype
`.. 0-0 perc eee ee eee 271
`Home Users or Businesses
`Using a DSL/Cable Router and No Firewall ........271
`
`|
`|
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/
`
`|
`
`Page 9 of 14
`
`
`
`Page 9 of 14
`
`

`

`xviii
`
`Contents
`
`
`|
`/
`|
`|
`a
`
`Small to Large Company Firewall Users ............ 271
`Skype’s Shared.xml file ....... 0.0 000.0...0 0 cae, 273
`Microsoft Windows Active Directory .............. 273
`Using Proxy Servers and Skype ........0............276
`Wireless Communications .................. 000,277
`Display Technical Call Information .............278
`Small to Large Companies
`.....00... 00.0000,282
`How to Block Skype in the Enterprise ............... 282
`Endnote . 0... ccc cece cee cence een nees 283
`Appendix A Validate Existing Security Infrastructure
`285
`Introduction 20... cece eee ee nens 286
`Security Policies and Processes 2.0.0.0 00. c ce eee, 287
`Physical Security... 0. eee cence eee 297
`Perimeter Protection .. 0.0.0 0.0.0. cece eee eee 300
`Closed-Circuit Video Cameras ...........00... 300
`Token System oo... cece eee e eee eee300
`Wire Closets... 0. cece eee eens301
`Server Hardening .. 00.2.0 .000.000000 0c eee 301
`Eliminate Unnecessary Services .....00.0.. 00.000,302
`Logging ok eee eens 303
`Permission Tightening .......... 0.0.0.0 ..0 cae304
`Additional Linux Security Fweaks
`.....0.0.0....., 306
`Activation of Internal Security Controls ............308
`Security Patching and Service Packs ...............312
`Supporting Services... 0... ee eee ee eee ees 313
`DNS and DHCP Servers 2.00.00, 0... c eee 313
`LDAP and RADIUSServers .....0 00... .0.004. 315
`NTP eee ee ee INS
`SNMP vice eee eee teen 316
`SSH and Telnet 0... ee 317
`Unified Network Management ............. 0.00005. 317
`Sample VoIP Security Policy ......0.... 000.0000, 318
`Purpose . 6... eeeeee eens 319
`Policy 200. cece rete eens 319
`Physical Security... cece cece as 319
`VLANS ooo eee eee BY
`Softphones 6... 6... cee eee cence 319
`
`
`
`Page 10 of 14
`
`Page 10 of 14
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Encryption 2... 0. tts 319
`Layer 2 Access Controls... 2-0 seers320
`SUMMALY oe ee eee321
`Appendix B The IP Multimedia Subsystem:
`True Converged Communications .......---.+2+-55- 323
`Introduction 2... 0. ee ees 324
`IMS Security Architecture 0... eee ee 325
`IMSSecurity Issues 0. eee 328
`SIP Security Vulnerabilities 0.0.0.0... eee ees 329
`Registration Hijacking ©... ....- 00.0000 ee ee 329
`IP Spoofing/Call Fraud... 6... ee ee 29
`Weakness of Digest Authentication ..........-.. 329
`INVITE Flooding .. 0... cee eee eee 329
`BYE Denial of Service... 0. cee eee ee ee 30
`RIP Flooding 2.0... eee eee 330
`Spamover Internet Telephony (SPIT) ........... 330
`Early IMS Security Issues... 02s 330
`Full IMS Security Issues
`2. ...0....00002---.2-- 331
`SUMIMALy oe eee eee 332
`Related Resources 6... ce eee ee 332
`Appendix C Regulatory Compliance ...........-..5. 333
`Introduction 0.0.00.ct ee nes 334
`SOX: Sarbanes-Oxley Act... . ce 86
`SOX Regulatory Basics... 62.0 eee 36
`Direct from the Regulations ...............5.. 336
`What a SOX Consultant Will Tell You ........... 338
`SOX Compliance and Enforcement ...........-0-, 341
`Certification 6. eee 341
`Enforcement Process and Penalties... ..........65 342
`GLBA: Gramm-Leach-Bliley Act 0.0... eee eee 342
`GLBA Regulatory Basics 2.0... ee eee343
`Direct from the Regulations . 0.0... ee ee 343
`What a Financial Regulator or
`GLBA Consultant Will Tell You ...........0..00. 347
`GLBA Compliance and Enforcement ..........+... 349
`No Certification... 00 eee 350
`Enforcement Process and Penalties..............
`
`
`
`
`Page 11 of 14
`
`Page 11 of 14
`
`

`

`xX
`
`Contents
`
`HIPAA: Health Insurance
`Portability and Accountability Act ...................351
`HIPAA Regulatory Basics .......00.0...00..000.. 351
`Direct from the Regulations .................. 351
`What a HIPAA Consultant Will Tell You ......... 358
`HIPAA Compliance and Enforcement .............359
`No Certification... 0... cece 359
`Enforcement Process and Penalties.............. 359
`CALEA: Communications Assistance
`for Law Enforcement Act 2.00.00... ccc cece cue euae 360
`CALEA Regulatory Basics... . 0. eee ee 363
`Direct from the Regulations ..........,.......364
`What a CALEA Consultant Will TellYou......... 375
`CALEA Compliance and Enforcement............. 376
`Certification 6.6... eee ene 376
`Enforcement Process and Penalties.............. 377
`E911: Enhanced 911 and Related Regulations .......... 377
`E911 Regulatory Basics 2.0.0... 0. 0000. ce 378
`Direct from the Regulations .....0...0...000... 378
`What an E911 Consultant Will Tell You ........., 382
`E911 Compliance and Enforcement ..........,..., 383
`Self-Certification .. 0... cc eee eee 383
`Enforcement Process and Penalties.............. 383
`EU and EU MemberStates’
`eCommunications Regulations ..................... 384
`EU Regulatory Basics»... ee 385
`Direct from the Regulations ....0..0..........385
`What an EU Data Privacy Consultant Will Tell You .389
`EU Compliance and Enforcement ......,......... 390
`No Certification... 0... ee eee ee ee390
`Enforcernent Process and Penalties.............. 390
`SUMMALy ee ce eee eee t eee vae390
`
`
`
`Page 12 of 14
`
`Page 12 of 14
`
`

`

`
`
`Oud
`Micr
`with
`Jabb
`XM
`infal
`dard
`worl
`seve
`tele
`phe
`the
`tak!
`Vi
`Ma
`yo!
`alll
`thi
`‘
`atl
`ol
`
`he
`he
`pa
`al
`e
`i
`5
`I
`I
`
`|
`
`36
`
`Chapter 2 ¢ The HardwareInfrastructure
`
`
`
`IM Clients
`Instant messaging is perhaps the dominant means ofreal-time communication on the
`Internet today. IM’s roots can be traced back to the Internet Relay Chat (IRC) networks,
`which introduced the chat room concept but did nottrack online presence and never
`reached the popularity of IM.Just as IM is the next logical step from IRLC, voice chat is the
`next leap from text-based chat. Most of today’s most popular IM clients have included voice
`functionality, including AOL's Instant Messenger,Yahoo! Messenger, and MSN Messenger.
`Skype took the opposite approach and created a chatclient that focuses on voice as the star
`and text chat as an afterthought. Even Google jumped aboard the IM bandwagon,releasing
`Google Talk. Let’s take a look at these clients to sce what makes them similar, and what
`makes them different.
`AIM, AOL’ IM service, surely wasn’t the first on the scene, but it has the largest base of
`users. Initially AIM waslimited to users of the AOL Internetservice, but eventually it was
`opened up to the Internet as a whole. With the addition of a proprietary voice capability in
`late 1999,AOL was a VoIP pioneerofsorts. (although voice chat was first available through
`Mirablis’s ICQ). Yahoo! Chat jumped aboard the voice bandwagonsoonafter, and Google's
`more recent client has included voice from the beginning. In 2005,Yahoo announced inter-
`operability with Google and MSN (whoalso has a voice chat plug-in for messenger thatis
`also used with its Live Communication Server product). In addition, Microsoft’s popular
`
`
`
`
`
`
`
`I |
`
`|
`
`|
`
`|||i
`
`
`
`Page 13 of 14
`
`Page 13 of 14
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`The Hardware Infrastructure e Chapter 2
`
`37
`
`Outlook e-mail client (and entire Office suite in the case of LCS) can be linked to
`Microsoft Messenger. Also worth mentioning is the Lotus Domino IM client that competes
`with Microsoft LCS in the enterprise instant messaging (and presence) space, as well as
`Jabber, which can be usedto tie together both public and private IM services using the
`‘MPP protocol.
`Google Talk is the newest comer to the IM game. Though Google Talk is still in its
`infancy, it stands to succeed due largely to a philosophical stand point, embracing open stan-
`dards over proprietary voice chat. Google Talk aims to connect many different voice net-
`works overa series of peering arrangements, allowing users to minimize their need to run
`several IM clients. Like Skype, Google seeks to bridge traditional phonecalls with Internet
`telephony, promising to federate with SIP networks that provide access to an ordinary tele-
`phonedial tone, Google recently released a library called libjingle to programmers,allowing
`them to hack new functionality into Google Talk. It will be interesting to see where Google
`takes Google Talk in the future.
`‘
`
`Video Clients
`Most of us can probably think back and recall seeing episodes of The Jetsons when we were
`younger, Or pictures of the AT&T PicturePhone from the 1964 World’s Fair. Movies have
`all but promised these devices to be a staple of every day life in the future. And for decades,
`the video conference has been pushed by enterprises seeking to save money on travel
`(though investments in video conferencing equipment tend to sit around gathering dust).
`Live video on the Internet has its adherents, and today we see yet another wave of marketing
`aimed at the business use of video. So, will video finally take off around VoIP just like audio,
`or is there something different going on here?
`The video phone has been tomorrow’s next big technology for 50 years but the issue
`has been more sociological than technological. Certainly, popular instant messaging clients
`have included video chat capabilities for some time now,althougheach client typically sup-
`ports only video between other users of the same client or messaging network. And
`although it always gives me a kick to see someone else announcing that they've solved the
`gap with technology, the point is well taken that video is here to stay in VoIP systems—even
`if it doesn’t get as much use as VoIP.
`Thelatest on the video bandwagonis the Skype 2.0 release, At only 15 frames per
`second and 40 to 75 kbps upload and download, Skype Video works well on a standard
`home DSL line orbetter. Other popular IM clients with video include Microsoft's
`Messenger and Yahoo Instant Messenger. AIM now offers video as well.
`H.323-based IP videoconferencing systems have been available in hardware and software
`from many sources for almost a decadeat this point, so there’s no shortage of vendors in this
`space. And SIP video phonesare available from many of these same vendors and from startup
`companies in the SIP space.
`
`
`
`ii
`i
`
`
`
`Page 14 of 14
`
`Page 14 of 14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket