Transcript Document

An Analysis of RTSP Security
By Verve Group:
Ogie Igiekhume
Abhishek Jain
Ramu Denduluri
Agenda
•
•
•
•
•
•
•
Streaming
Streaming Architecture
Streaming Protocols
RTSP Protocol Overview
RTSP Security
Conclusion
Questions
Streaming
• What is Streaming? Streaming is the
process of playing a file while it is still
downloading.
• Streaming technology lets a user view
and hear digitized content - video,
sound and animation -as it is being
downloaded.
Streaming Architecture
Streaming Server
Raw Audio
Raw Video
Compresse
d Audio
Compresse
d Video
Client/Receiver
Video
Decoder
Application
layer
Application
layer- QOS
Control
T ransport
P rot ocol
Transport
Protocol
Internet
Audio
recorder
Streaming Architecture – Contd.
• Raw video and audio data is stored precompressed in the streaming server.
• Upon clients request, data is retrieved and
send over network in packets.
• Packets may be dropped or experience
excessive delay due to congestion.
• To improve the quality- continuous media
distribution services are (eg. Caching )
deployed.
Streaming Architecture – Contd.
• Packets that are successfully delivered
to receiver, first pass through transport
layer and then application layer before
being decoded at video/audio decoder.
• To achieve synchronization, between
audio and video components, media
synchronization mechanism are
required.
Streaming Protocols
• Network layer protocols, which provide
basic network service support such as
addressing. For Internet streaming, IP is
thenetwork protocol used.
• Transport protocols, which provide end-toend transport functions for streaming
applications. Transport protocols include RTP,
RTCP, etc.
Session Control Protocol
• Session-control protocols, which
define messages and procedures to
control the delivery of the multimedia
data during an established session.
Examples of such protocols are RTSP
and Session Initiation Protocol(SIP).
Real Time Session Protocol
• RTSP stands for Real Time Streaming Protocol
• An application level Protocol (default port 554)
• Text based protocol similar to HTTP with more number of
requests.
•
•
•
Provides the control channel
Usable for Live broadcasts / multicast
Usually runs on RTP for stream & TCP for control
Also known as “Network remote control” for multi-media servers.
RTSP Functions
• One of the main functions of RTSP is to
support VCR-like control operations such as
STOP, PAUSE/RESUME, FAST FORWARD
and FAST REWIND.
• RTSP also provides means for choosing
delivery channels (e.g. UDP, multicast UDP,
or TCP) and delivery mechanisms based on
RTP.
• RTSP is also used to establish and control
continuous audio and video streams between
media servers and their clients.
RTSP Operations
• Specifically, RTSP supports the following
operations:
• Media retrieval. The client can request a
presentation description and ask the server to
set up a session to send the requested media
data.
• Adding media to an existing session. The
server or the client can notify each other
about any additional media becoming
available to the established session.
RTSP Methods
Get available methods
OPTIONS
DESCRIBE
CS
Get description of media stream
ANNOUNCE
CS
Announce new session description
SETUP
CS
Create media session(transport
mechanism to be used)
RECORD
CS
Start media recording
PLAY
CS
Start media delivery
PAUSE
CS
Pause media delivery
REDIRECT
CS
Redirection to another server
TEARDOWN
CS
Immediate teardown
SET_PARAMETER
CS
Change server/client parameter
GET_PARAMETER
CS
Read server/client parameter(like PING)
RTSP State Machine
Setup
READY
Setup
Teardown
Play
Pause
Play,Setup
Record
INIT
Pause
Teardown
Teardown
Teardown
RECORDING
Record, Setup
PLAYING
RTSP Security
• Denial Of Service Attack
– Very Common
– Define policies
– Client Identity
• Session Hijacking
– RTSP depends on transport protocols
– Malicious user may use random session id
– Should define large non-sequence session id
• Suspicious Behavior
– Should define security policies
– Reject the requests if violated
RTSP Security – Contd.
• Stream Security
– RTSP depends on transport protocols
– Should use the Security features of those
protocols
• Authentication Mechanisms
– It is very common
– Message Digest
– Use encryption whenever required
• Personal Information
– Encryption must be used.
– Such information should not be shared
RTSP Security – Contd.
• Server Log Information
– Server maintains connection log
– Contains user Information
– It should be not be shared
• DNS Spoofing Attacks
– Less likely
– Should prevent such attacks
• Sensitive Information
– RTSP Message transfer
– Protect Sensitive Information
RTSP Security – Contd.
• Prevent modifying of Paths
–
–
–
–
RTSP URLs
Absolute Paths
File and Path names
Secure from the malicious users
• Firewall Friendly
– Application Level Firewall
– Transport Layer Firewall
– Use the Firewall policies
Conclusion
• RTSP is widely used
– Online tutorials
– Conferences
– Entertainment, etc.
• Security is Key feature
– Follow Security Considerations specified in RFC
• Exploit the security features from Transport
protocols
Questions