[Asterisk-Security] Opportunistic encryption
Enzo Michelangeli
enzomich at gmail.com
Fri Jul 21 16:27:46 MST 2006
----- Original Message -----
From: "John Todd" <jtodd at loligo.com>
To: "Asterisk Security Discussion" <asterisk-security at lists.digium.com>
Sent: Saturday, July 22, 2006 1:27 AM
Subject: Re: [Asterisk-Security] Opportunistic encryption
[...]
> 3) "Man in the Middle" mode, where Asterisk creates two separate ZRTP
> legs to different ZRTP clients. While this sounds like a security risk,
> it is actually a fairly desirable situation. Many calls need to be
> recorded, or monitored for DTMF, or inserted into app_conference for group
> discussion. Having each leg of the call encrypted to the Asterisk server
> but not encrypted in an "end-to-end" fashion would be frequent, I suspect.
> The users could still verify that their calls were encrypted to the core,
> and interception would not be possible except on the Asterisk server
> itself.
Why not? AFAIK, in ZRTP a man in the middle is detected through biometric
authentication (the two users at the endpoints compare a common hash while
recognizing each other's voice). Once you break this mechanism with a
(supposedly) trusted MiM, you can't exclude the existence on a _second_ MiM
in the chain.
Also, I wouldn't be so sure about the impregnability of the Asterisk box.
Incidentally, concerns of this type represented an important factor in the
failure of WTLS to be accepted for securing e-commerce transactions on
mobile phones: the WTLS<->SSL gateway was vulnerable to hacking, and
therefore untrusted.
Enzo
More information about the Asterisk-Security
mailing list