`
`
`
`
`
`The Perfect Reference for the Multitasked SysAdmin
`¢ Discover Why “Measure Twice, Cut Once”Applies to Securing a VoIP
`Infrastructure
`
`¢ Learn How to Secure an Entire VoIP Infrastructure and Defend Against Denial-
`of-Service and Hijacking Attacks
`
`° The Perfect Guideif VolP Engineering is NOT Your Specialty
`
`Thomas Porter
`
`Page 1 of 14
`
`Samsung Exhibit 1032
`
`Page 1 of 14
`
`Samsung Exhibit 1032
`
`
`
`|
`
`
`
`i
`|
`
`:
`i
`
`i
`
`I
`
`Syngress Publishing,Inc., the author(s), and any person or firm involved in the writing,editing, or production (col-
`lectively “Makers”) ofthis book (“the Work”) do not guarantee or warrantthe results to be obtained from the
`Work.
`There is no guarantee of any kind, expressed or implied, regarding the Workorits contents. The Work is sold AS IS
`and WITHOUT WARRANTY.You mayhave otherlegal rights, which vary from state to state,
`In no eventwill Makers beliable to you for damages,including anyloss of profits, lost savings, or other incidental or
`consequential damages arising out from the Work orits contents. Because some states do not allow the exclusion or
`limitation ofliability for consequential or incidental damages, the abovelimitation may not apply to you.
`You should always use reasonable care, including backup and other appropriate precautions, when working with
`computers, networks, data, andfiles.
`
`Syngress Media®, Syngress®,“Career Advancement ThroughSkill Enhancement®,” “Ask the Author UPDATE®,”
`and “Hack Proofing®,”are registered trademarks of Syngress Publishing,Inc. “Syngress: The Definition of a Serious
`Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hackeris to Think Like One™”are trade-
`marks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks orservice
`marksoftheir respective companies.
`KEY
`SERIAL NUMBER
`001
`HJIRTCV764
`002
`PO9873D5FG
`003
`829KM8NJH2
`004
`VTY45Q9PLA
`005
`CVPLQ6WQ23
`006
`VBP96ST5T5
`
`007
`HJJ863WD3E
`008
`2987GVTWMK
`009
`629MP5SDJT
`10
`IMWQ295T6T
`
`PUBLISHED BY
`Syngress Publishing, Inc,
`800 Hingham Street
`Rockland, MA 02370
`
`How to Cheat at VoIP Security
`Copyright © 2007 by Syngress Publishing, Inc. All rights reserved. Printed in the United States ofAmerica, Except
`as permitted under the Copyright Act of 1976, nopart ofthis publication may be reproduced ordistributed in any
`form or by any means, or stored in a database orretrieval system, without the prior written permission of the pub-
`lisher, with the exception that the programlistings may be entered,stored, and executed in a computer systern, but
`they may not be reproduced for publication.
`
`Printed in the United States ofAmerica
`1234567890
`
`ISBN 10: 1-59749-169-1
`ISBN 13: 978-1-59749-169-3
`
`Publisher: Amorette Pedersen
`Acquisitions Editor: Gary Byrne
`Technical Editor: Thomas Porter
`Cover Designer: Michael Kavish
`
`Page Layoutand Art: Patricia Lupicn
`Copy Editors; Adrienne Rebello, Mike
`McGee
`Indexer: Nara Wood
`
`Distributed by O'Reilly Media,Inc. in the United States and Canada.
`Por information onrights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at
`Syngress Publishing; email matt@syngress.com or fax to 781-681-3585.
`
`
`
`Page 2 of 14
`
`Page 2 of 14
`
`
`
`
`
`Contents
`
`Chapter 1 Introduction to VoIP Security. .......-.0006 1
`Introduction 6... een es 2
`The Switch Leaves the Basement ©. 0... eee eee eee 4
`What Is VoIP? 0.0... nes 6
`VoIP Benefits 00.0.0 00 tee eet eee ees 6
`VoIP Protocols . 6... eee ees 8
`VoIP Isn’t Just Another Data Protocol ..-. 0.60 + sss sees 9
`Security Issues 1n Converged Networks ..... 0.6.52 +- 005 11
`VoIP Threats... cee et eee es 14
`A New Security Model... 0. ce eens 15
`Summary...0 eee es 16
`Chapter 2 The Hardware Infrastructure ..... 0.6... 00a 19
`Introduction 6... ee tts 20
`Traditional PBX Systems .... 0... ee eee ees21
`PBX Lines 2.0 ee ee ee 22
`PBX Trunks 2.00.es 24
`PBX Features oc. 0 ce ee eens 25
`PBX Adjunct Servers... 00.00 eee e eee eens 28
`Voice Messaging «6.66. ee ee eens28
`Interactive Voice Response Servers
`.. 0.6.0 eee ee29
`Wireless PBX Solutions... 00.626 ee eee30
`Other PBX Solutions .... 60... es 30
`PBX Alternatives
`.. 00.0 cee eee ees30
`VoIP Telephony and Infrastructure... 6.6.2 ee ee eee31
`Media Server$S 0. ee eee 31
`Interactive Media Service: Media Servers ....-...-- 32
`Call or Resource Control: Media Servers ........-. 32
`Media GatewayS 6... cece eens 33
`Firewalls and Application-Layer Gateways ........- 34
`Application Proxies... 6 ev eee teeters34
`Endpoints (User Agents) ©... 60-0. e eee eee35
`IP Switches and Routers... 0... eee eee38
`Wireless Infrastructure 6.6 eee ee38
`Wireless Encryption: WEP ..............-..+. 38
`
`i
`|
`|
`|
`
`Page 3 of 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 14
`
`
`
`xii
`
`Contents
`
`\
`|
`|
`
`
`}
`L
`
`|
`
`Wireless Encryption: WPA2 ..............020..39
`Authentication: 802.1k 2.00.00. 000 0000.00 cece40
`Power-Supply Infrastructure... 0.00.00. eee41
`Power-over-Ethernet (IEEE 802.3af)
`............,41
`UPS eee eee eee e ees42
`Energy and Heat Budget Considerations ..........43
`Summary... cece cee cence en aes44
`Chapter 3 Architectures .........00.0 00. cceeeeeuuee 45
`Introduction 6... cece eter eee 46
`PSTN: WhatIs It, and How Does It Work? ............. 46
`PSTN:Outside Plant 2.2... cee eee eee 46
`PSTN:Signal Transmission .......... 00.00.0000 ee 49
`T1 Transmission: Digital Time Division Multiplexing 49
`PSTN;Switching and Signaling .....00..0..00.00... 35
`The Intelligent Network (IN), Private
`Integrated Services, ISDN, and QSIG ............, 56
`ITU-T Signaling System Number 7 (SS7) ......... 57
`PSTN:Operational and Regulatory Issues .......0..., 61
`PS'PN Call Flow... eee 61
`PSTN Protocol Security... . cece cece eee eee 64
`SS7 and Other ITU-T Signaling Security ........... 64
`ISUP and QSIG Security .. 20... 0.0 cee, 66
`The H.323 Protocol Specification
`................... 67
`The Primary H.323 VolP-Related Protocols ............ 68
`H.225/Q.931 Call Signaling ..................... 71
`H.245 Call Control Messages ........0...0.......75
`Real-Time Transport Protocol ................00..77
`H.235 Security Mechanisms ........0. 000.00 eee eae 78
`Understanding SIP oo. ee eee 82
`Overview of SIP 1. eee eee 83
`RFC 2543 / RFC 3261... . eee eee 84
`SIP and Mbone ...... 0.0.0. cece cece eee eee uee 85
`OS) 85
`SIP Functions and Features .......0....00..0..0.00.. 87
`User Location .. 0... ee eee eee 88
`UserAvailability 60.0... ee,88
`User Capabilities 22.0... eee,88
`Session Setup . 0... eee eee eee89
`
`|
`| |
`|
`|
`
`
`
`
`Page 4 of 14
`
`Page 4 of 14
`
`
`
`
`
`Contents
`
`xiii
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Session Management... 06 tee ete89
`SIP URIs 2... es eee eee 89
`SIP Architecture 2... es 90
`SIP Components... 6... eee tenes90
`User Agents 20... cee eee ene90
`SIP Server occ ene 91
`Stateful versus Stateless 2.6... c eee ee ee 92
`Location Service... ee tees 92
`Chent/Server versus Peer-to-Peer Architecture ........ 93
`Chent/Server oo 0c te ee eee 93
`Peer to Peer oc c es 94
`SIP Requests and Responses «6... 0. e eee eee cee94
`Protocols Used with SIP 2.0... ete ee 97
`UDP voc ee ees 97
`Transport Layer Security ©... eee eee 98
`Other Protocols Used by SIP 0... eee es 99
`Understanding SIP’s Architecture... 6.6... e ees 102
`SIP Registration 6... eee ee eens 102
`Requests through Proxy Servers... 6.65.20. 5s 103
`Requests through Redirect Servers ........----. 103
`Peer to Peer 0c tee 104
`Instant Messaging and SIMPLE «20.6... eee eee ees 105
`Instant Messaging 6... ee eens 106
`SIMPLE ....... 000 ee et te ees 107
`Summary oo. ee ee eee es 109
`Chapter 4 Support Protocols .....-.5+- ++ eeer eee ees 111
`Introduction 2... ee ee ees 112
`DNS occ ne ee eres 112
`DNS Architecture... ee ees 143
`Fully Qualified Domain Name .......-.++ +++: 114
`DNSClient Operation 2... ee eee 115
`DNSServer Operation 6... 0... eee eee 116
`Security Implications for DNS... 6.6.6 ees 117
`TETP occ ccc ene ee eee 118
`TETP Security Concerns... crete eee ee 118
`TFTP File Transfer Operation .... 2.5.56. ..405- 119
`Security Implications forTFTP .. 0.0.0... e eee 119
`FATT occ cette eee ene 120
`HTTP Protocol... 0.2 ee eee 121
`
`|
`
`|
`
`Page 5 of 14
`
`
`
`Page 5 of 14
`
`
`
`xiv
`
`Contents
`
`
`
`HTTP Client Request ...........0.......... 121
`HTTP Server Response ..................... 122
`Security Implications for HTTP ................. 122
`SNMP oo. teeter eee ee eee. 123
`SNMPArchitecture... 0.0... eee eee 124
`SNMP Operation... 0.0... eee, 124
`SNMPArchitecture... 0... ee eee 125
`DHCP oo. cece eee 126
`DHCP Protocol 0... cece ee, 126
`DHCPOperation... 6... eee, 127
`Security Implications for DHCP ................. 128
`RSVP ccc cere cece ee. 129
`RSVP Protocol... 0.0... eee eee 130
`RSVP Operation ..... 0.0.00. eee 130
`Security Implications for RSVP ..........,........ 131
`a 132
`SDP Specifications
`. 6... eee eee. 132
`SDP Operation... 2.2... eee. 133
`Security Implications for SDP ......0000....,...., 134
`Skinny 2. cece cree eee. 135
`Skinny Specifications»... 0.000. e cee v cece eee. 135
`Skinny Operation .... 0.0.0.0... 000000000... 135
`Security Implications for Skinny ................, 136
`SUMUMALY oe eee cece eee, 138
`Chapter 5 Threats to VoIP Communications Systems .. 141
`Introduction 20... cece eee ee ee. 142
`Denial-of-Service or VoIP Service Disruption ........., 142
`Call Hijacking and Interception. .................... 148
`ARP Spoofing oo... 0. cece eee ee. 151
`H..323-Specific Attacks... 6... cece cece. 155
`SIP-Specific Attacks... 0.6... ee cee eee 156
`SUMMALY cece eee eee. 157
`Chapter 6 Confirm User Identity................... 159
`Introduction 6... ccc cece eee, 160
`802.1x and 802.111 (WPA2)
`....00.0. eee, 163
`802.1x/EAP Authentication ....................., 164
`Supplicant (Peer)... eee. 164
`Authenticator 20... eee eeee. 164
`
`
`
`
`Page 6 of 14
`
`Page 6 of 14
`
`
`
`
`
`Contents
`
`XV
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Authentication Server... 0c eee 164
`EAP Authentication Types
`. 66-6 ee eee es 167
`EAP-TLS (occ ee 169
`EAP-PEAP 2.0. cc ees 171
`EAP-TTLS 00000 c cee ees 171
`PEAPv1/EAP-GTC oo... ees 171
`EAP-FAST 0.0000 eee eee 171
`LEAP oo. ccc ec eee eens 172
`EAP-MD-5 2... 0 cc eee eee 172
`Inner Authentication Types
`.. 6... eee 173
`Public Key Infrastructure... 6.0. ee 175
`Public Key Cryptography Concepts ........-.----. 176
`Architectural Model and PKI Entities .......-5....-. 178
`Basic Certificate Fields... 02 ee 180
`Certificate Revocation List 2.1.06. eee ees 181
`Certification Path . 20... ee es 181
`Minor Authentication Methods ......0. 0.0 ee {82
`MAC Tools ....... 00 tee eee eee eae 182
`MACAuthentication 0.0.0.0... 000 eee eee 183
`ARP Spoofing 0... 06600. e eee ete 183
`Port Security oe ee eee 183
`Summary oo. eee ee ees 183
`Chapter 7 Active Security Monitoring ............+. 185
`Introduction ..0. eee 186
`Network Intrusion Detection Systems ......-..-.-..00. 187
`NIDS Defined 0.0.0.0 eee tees 187
`Components . 00.06. ee ets 188
`Types cee ee een tenes 189
`Placement .....0.0 00 ee eee ees 191
`Important NIDS Features... 66.06 eee eee es 194
`Maintenance... eee eee 194
`Alerting 2.0.00 c eee eee 194
`Logging 2.0600 ee eee 194
`Extensibility 6.0... ee eee 194
`Response... eee eects 194
`Limitations 0.00. ce ee eee 195
`Honcypots and Honeynets ....- 6 eee eee eee 195
`Host-Based Intrusion Detection Systems .......-....-. 196
`
`|
`
`|
`
`|
`
`Page 7 of 14
`
`Page 7 of 14
`
`
`
`
`
`
`
`Contents
`
`
`
`Page 8 of 14
`
`|
`|
`|
`
`:
`
`|
`
`|
`
`Logging 0. eee eee ee eens 197
`Syslog oo. e eee eee ee ene 197
`
`SNMP 0... coe ccc ce eee eee e ees 199
`
`
`What Is a Penetration/Vulnerability Test? ........0.00.0. 200
`Methodology 1.0... 0... cece eee 201
`
`Discovery 00... eee ee201
`
`Scamming 6. eee eens 202
`
`Vulnerability Assessment 2.2.0... 0.0.0 203
`
`Exploitation 6.0... ccc eee eee 203
`
`Reporting oc. eee cece eee eens203
`
`SUMMALY ee eee es 205
`
`
`Chapter 8 Logically Segregate NetworkTraffic....... 207
`Introduction 2... ee cee eee tees 208
`
`VLANS oo eect ene ey 209
`
`
`VLAN Security o. 0. ee eee
`eee 212
`VLANsand Softphones. 1... 0.0.00... 020 ee 212
`
`QoSand Traffic Shaping 2... eee eee 214
`
`NATand IP Addressing 2.0.0... 0002.00.eeee eee 215
`
`How Does NAT Work? ... 0.0.0 ee eee 216
`
`
`NAT Has Three Common Modes of Operation .
`.
`. .218
`NATand Encryption ...............000 0000 221
`
`NATas a Topology Shield .......0.....0.. 00005 225
`
`Firewalls 00. eee eee 225
`
`
`A Bit of Firewall History ..... 000.000... eee eee 226
`Shallow Packet Inspection... 0.0.0.0. .0 0c eves 226
`
`Stateful Inspection ... 0.0... 00.0 cee ee eee 227
`
`Medium-Depth Packet Inspection .............. 227
`
`Deep Packet Inspection ..............0-0 ee eee228
`
`VoIP-Aware Firewalls... 0... eee 229
`
`H.323 Firewall Issues 10... 0... eee230
`
`
`SIP Firewall Issues... 000 eee231
`
`Bypassing Firewalls and NAT ................. 232
`Access Control Lists 2... 0.0 ee 235
`
`Summary... eee eters237
`
`
`Chapter 9 IETF Encryption Solutions for VoIP ........ 239
`Introduction 26.... ee nee 240
`
`Suites from the IETF 2.1... ee eee 240
`S/MIME: Message Authentication 2.2... 0. eee een 241
`
`
`
`Page 8 of 14
`
`
`
`Contents
`
`xvii
`
`S/MIME Messages ......-- 2.00 ee trees244
`Sender Agent 0... 0... 00ers244
`Receiver Agent 2.0.0... ee eee ee ees244
`E-mail Address... 00.00 ete 244
`TLS: Key Exchange andSignaling Packet Security .......244
`Certificate and Key Exchange ©... 6... seven eens245
`SRTP: Voice/Video Packet Security ...--. 6.25.2 ee. 247
`Multimedia Internet Keying .... 666-00. ee eee ees 248
`Session Description Protocol Security Descriptions .
`.
`.
`.248
`Providing Confidentiality... 0. eee eee 248
`Message Authentications ©. 00... cee eee 249
`Replay Protection ©... 2k eee eee eee eee250
`Summary . 00.000 ete ee eee251
`Chapter 10 Skype Security... 2.66. e reece eee 253
`SECUrity 6. ete es 254
`Blocking Skype oo... 0 ccc eens 257
`Firewalls 00.0 ee eens 257
`Downloads 0.0.00. cece eee eee 257
`Software Inventory and Administration ..........258
`Firewalls... 0. cc ee eee nes 258
`Proxy Servers... cee eee ees260
`Embedded Skype... 0. cece cee tee eee 260
`A Word about Security 2.0.6... eee ee ee260
`Chapter 11 Skype Firewall and Network Setup....... 263
`A Word about Network Address Translation and Firewalls . .264
`Home Users .....- 00 cc eet266
`Small to Medium-Sized Businesses ............--..266
`Large Corporations . 0... e eee eee267
`What You Need to Know
`About ConfiguringYour Network Devices ..........-.269
`Home Users or Businesses
`Using a DSL/Cable Router and No Firewall ........269
`Small to Large Company Firewall Users ..........-. 269
`TCP and UDP Primer 2.0.0... 0022 eee 269
`NATvs.a Firewall
`o 0.0.00 cee ee 270
`Ports Required for Skype
`.. 0-0 perc eee ee eee 271
`Home Users or Businesses
`Using a DSL/Cable Router and No Firewall ........271
`
`|
`|
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`/
`
`|
`
`Page 9 of 14
`
`
`
`Page 9 of 14
`
`
`
`xviii
`
`Contents
`
`
`|
`/
`|
`|
`a
`
`Small to Large Company Firewall Users ............ 271
`Skype’s Shared.xml file ....... 0.0 000.0...0 0 cae, 273
`Microsoft Windows Active Directory .............. 273
`Using Proxy Servers and Skype ........0............276
`Wireless Communications .................. 000,277
`Display Technical Call Information .............278
`Small to Large Companies
`.....00... 00.0000,282
`How to Block Skype in the Enterprise ............... 282
`Endnote . 0... ccc cece cee cence een nees 283
`Appendix A Validate Existing Security Infrastructure
`285
`Introduction 20... cece eee ee nens 286
`Security Policies and Processes 2.0.0.0 00. c ce eee, 287
`Physical Security... 0. eee cence eee 297
`Perimeter Protection .. 0.0.0 0.0.0. cece eee eee 300
`Closed-Circuit Video Cameras ...........00... 300
`Token System oo... cece eee e eee eee300
`Wire Closets... 0. cece eee eens301
`Server Hardening .. 00.2.0 .000.000000 0c eee 301
`Eliminate Unnecessary Services .....00.0.. 00.000,302
`Logging ok eee eens 303
`Permission Tightening .......... 0.0.0.0 ..0 cae304
`Additional Linux Security Fweaks
`.....0.0.0....., 306
`Activation of Internal Security Controls ............308
`Security Patching and Service Packs ...............312
`Supporting Services... 0... ee eee ee eee ees 313
`DNS and DHCP Servers 2.00.00, 0... c eee 313
`LDAP and RADIUSServers .....0 00... .0.004. 315
`NTP eee ee ee INS
`SNMP vice eee eee teen 316
`SSH and Telnet 0... ee 317
`Unified Network Management ............. 0.00005. 317
`Sample VoIP Security Policy ......0.... 000.0000, 318
`Purpose . 6... eeeeee eens 319
`Policy 200. cece rete eens 319
`Physical Security... cece cece as 319
`VLANS ooo eee eee BY
`Softphones 6... 6... cee eee cence 319
`
`
`
`Page 10 of 14
`
`Page 10 of 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Encryption 2... 0. tts 319
`Layer 2 Access Controls... 2-0 seers320
`SUMMALY oe ee eee321
`Appendix B The IP Multimedia Subsystem:
`True Converged Communications .......---.+2+-55- 323
`Introduction 2... 0. ee ees 324
`IMS Security Architecture 0... eee ee 325
`IMSSecurity Issues 0. eee 328
`SIP Security Vulnerabilities 0.0.0.0... eee ees 329
`Registration Hijacking ©... ....- 00.0000 ee ee 329
`IP Spoofing/Call Fraud... 6... ee ee 29
`Weakness of Digest Authentication ..........-.. 329
`INVITE Flooding .. 0... cee eee eee 329
`BYE Denial of Service... 0. cee eee ee ee 30
`RIP Flooding 2.0... eee eee 330
`Spamover Internet Telephony (SPIT) ........... 330
`Early IMS Security Issues... 02s 330
`Full IMS Security Issues
`2. ...0....00002---.2-- 331
`SUMIMALy oe eee eee 332
`Related Resources 6... ce eee ee 332
`Appendix C Regulatory Compliance ...........-..5. 333
`Introduction 0.0.00.ct ee nes 334
`SOX: Sarbanes-Oxley Act... . ce 86
`SOX Regulatory Basics... 62.0 eee 36
`Direct from the Regulations ...............5.. 336
`What a SOX Consultant Will Tell You ........... 338
`SOX Compliance and Enforcement ...........-0-, 341
`Certification 6. eee 341
`Enforcement Process and Penalties... ..........65 342
`GLBA: Gramm-Leach-Bliley Act 0.0... eee eee 342
`GLBA Regulatory Basics 2.0... ee eee343
`Direct from the Regulations . 0.0... ee ee 343
`What a Financial Regulator or
`GLBA Consultant Will Tell You ...........0..00. 347
`GLBA Compliance and Enforcement ..........+... 349
`No Certification... 00 eee 350
`Enforcement Process and Penalties..............
`
`
`
`
`Page 11 of 14
`
`Page 11 of 14
`
`
`
`xX
`
`Contents
`
`HIPAA: Health Insurance
`Portability and Accountability Act ...................351
`HIPAA Regulatory Basics .......00.0...00..000.. 351
`Direct from the Regulations .................. 351
`What a HIPAA Consultant Will Tell You ......... 358
`HIPAA Compliance and Enforcement .............359
`No Certification... 0... cece 359
`Enforcement Process and Penalties.............. 359
`CALEA: Communications Assistance
`for Law Enforcement Act 2.00.00... ccc cece cue euae 360
`CALEA Regulatory Basics... . 0. eee ee 363
`Direct from the Regulations ..........,.......364
`What a CALEA Consultant Will TellYou......... 375
`CALEA Compliance and Enforcement............. 376
`Certification 6.6... eee ene 376
`Enforcement Process and Penalties.............. 377
`E911: Enhanced 911 and Related Regulations .......... 377
`E911 Regulatory Basics 2.0.0... 0. 0000. ce 378
`Direct from the Regulations .....0...0...000... 378
`What an E911 Consultant Will Tell You ........., 382
`E911 Compliance and Enforcement ..........,..., 383
`Self-Certification .. 0... cc eee eee 383
`Enforcement Process and Penalties.............. 383
`EU and EU MemberStates’
`eCommunications Regulations ..................... 384
`EU Regulatory Basics»... ee 385
`Direct from the Regulations ....0..0..........385
`What an EU Data Privacy Consultant Will Tell You .389
`EU Compliance and Enforcement ......,......... 390
`No Certification... 0... ee eee ee ee390
`Enforcernent Process and Penalties.............. 390
`SUMMALy ee ce eee eee t eee vae390
`
`
`
`Page 12 of 14
`
`Page 12 of 14
`
`
`
`
`
`Oud
`Micr
`with
`Jabb
`XM
`infal
`dard
`worl
`seve
`tele
`phe
`the
`tak!
`Vi
`Ma
`yo!
`alll
`thi
`‘
`atl
`ol
`
`he
`he
`pa
`al
`e
`i
`5
`I
`I
`
`|
`
`36
`
`Chapter 2 ¢ The HardwareInfrastructure
`
`
`
`IM Clients
`Instant messaging is perhaps the dominant means ofreal-time communication on the
`Internet today. IM’s roots can be traced back to the Internet Relay Chat (IRC) networks,
`which introduced the chat room concept but did nottrack online presence and never
`reached the popularity of IM.Just as IM is the next logical step from IRLC, voice chat is the
`next leap from text-based chat. Most of today’s most popular IM clients have included voice
`functionality, including AOL's Instant Messenger,Yahoo! Messenger, and MSN Messenger.
`Skype took the opposite approach and created a chatclient that focuses on voice as the star
`and text chat as an afterthought. Even Google jumped aboard the IM bandwagon,releasing
`Google Talk. Let’s take a look at these clients to sce what makes them similar, and what
`makes them different.
`AIM, AOL’ IM service, surely wasn’t the first on the scene, but it has the largest base of
`users. Initially AIM waslimited to users of the AOL Internetservice, but eventually it was
`opened up to the Internet as a whole. With the addition of a proprietary voice capability in
`late 1999,AOL was a VoIP pioneerofsorts. (although voice chat was first available through
`Mirablis’s ICQ). Yahoo! Chat jumped aboard the voice bandwagonsoonafter, and Google's
`more recent client has included voice from the beginning. In 2005,Yahoo announced inter-
`operability with Google and MSN (whoalso has a voice chat plug-in for messenger thatis
`also used with its Live Communication Server product). In addition, Microsoft’s popular
`
`
`
`
`
`
`
`I |
`
`|
`
`|
`
`|||i
`
`
`
`Page 13 of 14
`
`Page 13 of 14
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The Hardware Infrastructure e Chapter 2
`
`37
`
`Outlook e-mail client (and entire Office suite in the case of LCS) can be linked to
`Microsoft Messenger. Also worth mentioning is the Lotus Domino IM client that competes
`with Microsoft LCS in the enterprise instant messaging (and presence) space, as well as
`Jabber, which can be usedto tie together both public and private IM services using the
`‘MPP protocol.
`Google Talk is the newest comer to the IM game. Though Google Talk is still in its
`infancy, it stands to succeed due largely to a philosophical stand point, embracing open stan-
`dards over proprietary voice chat. Google Talk aims to connect many different voice net-
`works overa series of peering arrangements, allowing users to minimize their need to run
`several IM clients. Like Skype, Google seeks to bridge traditional phonecalls with Internet
`telephony, promising to federate with SIP networks that provide access to an ordinary tele-
`phonedial tone, Google recently released a library called libjingle to programmers,allowing
`them to hack new functionality into Google Talk. It will be interesting to see where Google
`takes Google Talk in the future.
`‘
`
`Video Clients
`Most of us can probably think back and recall seeing episodes of The Jetsons when we were
`younger, Or pictures of the AT&T PicturePhone from the 1964 World’s Fair. Movies have
`all but promised these devices to be a staple of every day life in the future. And for decades,
`the video conference has been pushed by enterprises seeking to save money on travel
`(though investments in video conferencing equipment tend to sit around gathering dust).
`Live video on the Internet has its adherents, and today we see yet another wave of marketing
`aimed at the business use of video. So, will video finally take off around VoIP just like audio,
`or is there something different going on here?
`The video phone has been tomorrow’s next big technology for 50 years but the issue
`has been more sociological than technological. Certainly, popular instant messaging clients
`have included video chat capabilities for some time now,althougheach client typically sup-
`ports only video between other users of the same client or messaging network. And
`although it always gives me a kick to see someone else announcing that they've solved the
`gap with technology, the point is well taken that video is here to stay in VoIP systems—even
`if it doesn’t get as much use as VoIP.
`Thelatest on the video bandwagonis the Skype 2.0 release, At only 15 frames per
`second and 40 to 75 kbps upload and download, Skype Video works well on a standard
`home DSL line orbetter. Other popular IM clients with video include Microsoft's
`Messenger and Yahoo Instant Messenger. AIM now offers video as well.
`H.323-based IP videoconferencing systems have been available in hardware and software
`from many sources for almost a decadeat this point, so there’s no shortage of vendors in this
`space. And SIP video phonesare available from many of these same vendors and from startup
`companies in the SIP space.
`
`
`
`ii
`i
`
`
`
`Page 14 of 14
`
`Page 14 of 14
`
`