ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    SIP over the internet

    IT Discussion
    6
    40
    5.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender
      last edited by

      OK so the option is out there...

      Besides @thecreativeone91 does anyone else use it?

      What about encrypting when sending SIP to the endpoints (phones)?

      ? thanksajdotcomT scottalanmillerS 3 Replies Last reply Reply Quote 0
      • ?
        A Former User @Dashrender
        last edited by

        @Dashrender said:

        What about encrypting when sending SIP to the endpoints (phones)?

        You can do that too. CJIS actually required this for police departments even on the LAN.

        1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender @scottalanmiller
          last edited by

          @scottalanmiller said:

          @thecreativeone91 said:

          I personally wouldn't do it without encryption.

          You can do SIP with encryption without any extra equipment. Most PBXs, like FreePBX and Elastix and even 3CX have encryption options built in.

          My mentioning of your not liking extra supplied stuff is a side note, not meaning that you need that stuff to provide encryption.

          1 Reply Last reply Reply Quote 0
          • thanksajdotcomT
            thanksajdotcom @Dashrender
            last edited by thanksajdotcom

            @Dashrender said:

            OK so the option is out there...

            Besides @thecreativeone91 does anyone else use it?

            What about encrypting when sending SIP to the endpoints (phones)?

            If you're going to encrypt and it's a fully hosted PBX, you'd want encryption everywhere. If it's an on-premise, no need to encrypt internal traffic, obviously.

            DashrenderD ? 2 Replies Last reply Reply Quote 0
            • DashrenderD
              Dashrender @thanksajdotcom
              last edited by

              @thanksajdotcom said:

              @Dashrender said:

              OK so the option is out there...

              Besides @thecreativeone91 does anyone else use it?

              What about encrypting when sending SIP to the endpoints (phones)?

              If you're going to encrypt and it's a fully hosted PBX, you'd want encryption everywhere. If it's an on-premise, no need to encrypt internal traffic, obviously.

              That may or may not be true, but for my purposes let's assume my endpoints will connect over the internet.

              scottalanmillerS thanksajdotcomT 2 Replies Last reply Reply Quote 0
              • ?
                A Former User @thanksajdotcom
                last edited by

                @thanksajdotcom said:

                If it's an on-premise, no need to encrypt internal traffic, obviously.

                That depends. If you take Credit card information over the phone or other sensitive information you'll likely still want encryption.

                1 Reply Last reply Reply Quote 2
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said:

                  OK so the option is out there...

                  Besides @thecreativeone91 does anyone else use it?

                  What about encrypting when sending SIP to the endpoints (phones)?

                  This adds a lot of complexity and really depends on the scenario. If you want to send to mobile endpoints it gets difficult - one of the reasons that I'm looking forward to Pertino on smart phones. If you have a static office, using IP locking covers most of the bases.

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @Dashrender
                    last edited by

                    @Dashrender said:

                    That may or may not be true, but for my purposes let's assume my endpoints will connect over the internet.

                    Like anything, it depends on your scenario. What is it you are attempting to protect against?

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender
                      last edited by

                      Eavesdropping.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @Dashrender said:

                        Eavesdropping.

                        If that is an actual concern, then you need to encrypt. In general, that's not a very reasonable concern. If it is a requirement for healthcare or other that goes beyond traditional phones, then you'd need that.

                        Let me ask this.... how have you handled this in the past with traditional phones since those are dramatically easier to eaves drop onto?

                        DashrenderD 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          And if you didn't do it in the past, why do you feel that you should now after introducing SIP which provides a small amount of additional protection against eaves dropping?

                          1 Reply Last reply Reply Quote 0
                          • DashrenderD
                            Dashrender @scottalanmiller
                            last edited by Dashrender

                            @scottalanmiller said:

                            @Dashrender said:

                            Eavesdropping.

                            If that is an actual concern, then you need to encrypt. In general, that's not a very reasonable concern. If it is a requirement for healthcare or other that goes beyond traditional phones, then you'd need that.

                            Let me ask this.... how have you handled this in the past with traditional phones since those are dramatically easier to eaves drop onto?

                            You've eluded to this before when it comes to faxes, how is it so much easier to eaves drop on traditional phone lines vs VOIP traffic?
                            How is VOIP at all more secure than PSTN?

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • thanksajdotcomT
                              thanksajdotcom @Dashrender
                              last edited by

                              @Dashrender said:

                              @thanksajdotcom said:

                              @Dashrender said:

                              OK so the option is out there...

                              Besides @thecreativeone91 does anyone else use it?

                              What about encrypting when sending SIP to the endpoints (phones)?

                              If you're going to encrypt and it's a fully hosted PBX, you'd want encryption everywhere. If it's an on-premise, no need to encrypt internal traffic, obviously.

                              That may or may not be true, but for my purposes let's assume my endpoints will connect over the internet.

                              Which is what I figured. If you're encrypting one but not the other, what's the point of using encryption at all?

                              1 Reply Last reply Reply Quote 0
                              • ?
                                A Former User
                                last edited by A Former User

                                Traditional is only easier with physical access. VoIP depending on the ACLs/Firewall you have potential to gain access anywhere. Granted the NSA is already doing it for landlines and cell phones.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @Dashrender
                                  last edited by

                                  @Dashrender said:

                                  You've eluded to this before when it comes to faxes, how is it so much easier to eaves drop on traditional phone lines vs VOIP traffic?
                                  How is VOIP at all more secure than PSTN?

                                  PSTN is circuit switching rather than packet switching for one. That means that tapping a PSTN path is trivial while guaranteeing the tap on a VoIP path is impossible. The second is that PSTN is so easy that you can go to any wire and without actually tapping it join the conversation bi-directionally using very simple equipment. PSTN is standard and simple. Any hobbyist can tap PSTN with minimal effort. Kids can do it.

                                  Tapping VoIP is certainly doable if you don't encrypt. But the effort might be 10x or 100x more. You can't just "go find a line" and you can't just slap together some electronics and stand by the line to do it. You need serious gear and a lot of know-how and luck that you are getting a line that has the packets on it.

                                  One is truly trivial. One is quite hard.

                                  1 Reply Last reply Reply Quote 1
                                  • scottalanmillerS
                                    scottalanmiller @A Former User
                                    last edited by

                                    @thecreativeone91 said:

                                    Traditional is only easier with physical access. VoIP depending on the ACLs/Firewall you have potential to gain access anywhere. Granted the NSA is already doing it for landlines and cell phones.

                                    That's true, but that's what makes it easier. They are about equal without access. With access PSTN is completely trivial. And getting physical access is super easy since PSTNs have rigid endpoints and are exposed on the poles and external to the building. VoIP has potentially mobile end points and potentially no access externally.

                                    1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller
                                      last edited by

                                      Here is another way to look at it..... ever "accidentally" gotten access to someone's VoIP call? I bet not. Ever "accidentally" gotten connected to a PSTN call that wasn't yours and had access to either listen or possibly even talk? Sure, who hasn't. It's rare. But my point is that it is so easy to tap the PSTN that the phone carriers accidentally tap people into lines with some regularity. There is no protection at all.

                                      JaredBuschJ 1 Reply Last reply Reply Quote 1
                                      • JaredBuschJ
                                        JaredBusch @scottalanmiller
                                        last edited by

                                        As @scottalanmiller states, it is trivial to tap a POTS line.

                                        Anyone can open a box on the outside of your building, or even down the street and clip on to pairs until they find your call.

                                        How will you tap a VoIP call? You have to get on the network between the PBX or phone and the SIP trunk provider. How easy is that to do?

                                        1 Reply Last reply Reply Quote 2
                                        • JaredBuschJ
                                          JaredBusch
                                          last edited by

                                          @Dashrender You have not yet replied with WHY you are trying to protect against eavesdropping.

                                          What is driving this?

                                          DashrenderD 1 Reply Last reply Reply Quote 1
                                          • DashrenderD
                                            Dashrender @JaredBusch
                                            last edited by

                                            @JaredBusch said:

                                            @Dashrender You have not yet replied with WHY you are trying to protect against eavesdropping.

                                            What is driving this?

                                            My personal paranoia.

                                            Without physical access PSTN is not trivial.. .but yes physical access is trivial as long as you re local to the connections, but if you're some hack in China, there is little to no chance they are going to tap your PSTN connection, but they definitely have the ability to try to hack your VOIP connection.

                                            I realize I probably have a completely unfounded fear here, and as someone already said.. we all know that the NSA is already tapping everything.

                                            Another thing - I like privacy for the sake of privacy. Frankly I'm amazed how many people don't.

                                            scottalanmillerS 3 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post