208 International Journal on Advances in Security, vol 4 no 3 & 4, year 2011, http://www.iariajournals.org/security/ 2011, © Copyright by authors, Published under agreement with IARIA - www.iaria.org Advancement Towards Secure Authentication in the Session Initiation Protocol Lars Strand Norwegian Computing Center / University of Oslo Oslo, Norway Email: lars.strand@nr.no Wolfgang Leister Norwegian Computing Center Oslo, Norway Email: wolfgang.leister@nr.no Abstract—The Digest Access Authentication method used in the voice over IP signaling protocol, SIP, is weak. This authen- tication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat to VoIP industry installations and solutions. In this paper, we propose a solution that counters attacks on this wide-spread authentication method. We also propose a two-step migration towards a stronger authentication in SIP. We add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual authentication, is considered stronger and can rely on the same shared password used by the digest authentication. A long-term solution is to replace the authentication scheme in SIP with a security abstraction layer. Two such security frameworks are in- troduced, discussed and evaluated: the Generic Security Services Application Program Interface and the Simple Authentication and Security Layer, which both enable SIP to transparently support and use more secure authentication methods in a unified and generic way. Index Terms—SIP, authentication, Digest Access Authentica- tion, PAKE, SASL. I. I NTRODUCTION Considering the growing market share for Voice over IP (VoIP) technologies, VoIP services need to be stable and secure for the benefit of both users and service providers. Authentication methods are an important part of this and need to be thoroughly examined. We base our current work on a conference article [1], where we analyzed and implemented an attack on the Digest Access Authentication used in the Session Initiation Protocol (SIP) and proposed a correction to mitigate this attack. Since there is a need for better authentication methods in SIP, we add support for a security abstraction layer in SIP [2] and propose a migration strategy towards a secure authentication in SIP [3]. The importance of analyzing and improving the SIP au- thentication methods comes from the fact that there has been a steady increase in the number of VoIP users since 2002, as well as a decrease in the number of PSTN installations [4]. With two billion users worldwide having access to the Internet by the end of 2010 [5], the VoIP growth potential is huge. For example, at the end of 2009, 29.1 % of the private land-line phone market in Norway used VoIP. VoIP is the emerging technology that will eventually take over from the traditional Public Switched Telephone Network (PSTN) [6] due to VoIP’s improved flexibility and function- ality, such as improved sound quality (“HD sound”) using wideband codecs like G.722 [7], instant messaging (IM), presence, mobility support, and secure calls. VoIP also reduces maintenance and administration costs since it brings conver- gence to voice, video and data traffic over the IP infrastructure. Although there exist several competing network protocols that are capable of delivering VoIP, the Session Initiation Protocol (SIP) [8] and the Real-time Transport Protocol (RTP) [9] developed by the IETF have become the de facto industry standard. These two protocols fulfill two different functions – SIP is used for signaling, e.g., responsible for setting up, modifying and tearing down multimedia sessions, while RTP transports the actual media stream (voice). Although the SIP protocol is flexible and rich in functionality [10], several vulnerabilities and security attacks have been found [11]–[13]. Securing a SIP-based VoIP system has proven challenging and the reasons are multi-faceted: The scale and complexity of the SIP protocol specifica- tion, with primary focus on functionality rather than a sound security design [14]. SIP usage of intermediaries, expected communication between nodes with no trust at all, and its user-to-user operation make security far from trivial [8, page 232]. A large number of threats against VoIP systems have been identified [15]. Several security mechanisms for coun- termeasures have been proposed, but no single security mechanism is suited to address all these security threats concerning VoIP and SIP [16], [17]. Since the SIP and RTP protocols share the same infras- tructure as traditional data networks, they also inherit the security problems of data communication. VoIP services have strict requirements to the network performance with respect to Quality of Service since it is a duplex communication with low tolerance for latency, packet loss and saturation. Introducing strong security mechanisms might affect network performance [18]. PSTN is a mature and stable technology providing 99.999% uptime [19], and users will expect VoIP to perform at similar