Loading...

Voice is increasingly being encrypted for transmission over public networks or the Internet. VoIP uses TLS and DTS in order to encrypt the SIP signaling using encrypted SSL-type technologies. With regard to VoIP media, secure RTP is the standard used.

When encrypted, such VoIP is impossible to analyze and troubleshoot.

The Teraquant real-time decryption solution is intended to be permanently deployed in a VoIP network, to provide continuous decryption and submission for analysis for multiple thousands of concurrent calls all in real-time. Upon entering the private keys, multiple VoIP streams can be decrypted and sent clear to the Oracle Palladion/COM/EOM service assurance platform for analysis.

Both signaling and audio can be captured and decrypted.

The system allows entry of all relevant parameters: devices, user agents, keys, etc. as well as monitoring and management of the system–all from a web-based GUI.

Multiple legs of a SIP call with media can be decrypted prior to analysis by Palladion/COM/EOM. Alternatively, the encrypted legs of a SIP call can be decrypted and passed to Palladion/COM/EOM for correlation with the clear legs of the call also analyzed directly by Palladion/COM/EOM.

The solution is carrier-class, robust and fully supported. Teraquant decryption allows multiple thousands of concurrent calls to be decrypted in real-time and fed seamlessly to the Oracle Palladion/COM/EOM service assurance platform.

Why is VoIP Encryption Needed?

The theft of private information is commonplace when linked with Personally Identifiable Information; this can be extremely damaging if the information is misused. Increasingly, cyber criminals will eavesdrop and record voice calls. For example:

  • Client calls with attorneys, looking for informaiton with which to compromise the ethical actions of victims.
  • Eavesdropping on bankers, looking for inside information with which to make investments with known outcomes, or steal account infromaton.
  • Industrial espionage and purloining of trade secrets.
  • Listening in on Doctor and Patient calls, or Doctor to Consultant calls containing confidential medical information.
  • Hijacking telephone calls to commit identity theft.

All things not easily done with the traditional telephone network.

How can we Troubleshoot calls if they are Encrypted?

Network monitoring is commonplace these days. When specifically applied to voice/UC calls, monitoring the network, combined with sophisticated analysis, provides service assurance for your real-time services. Oracle’s Communications Operations MonitorOCOM–formerly known as Palladion and intrroduced by Teraquant in 2008, typically saves service providers 37% of their voice support costs.

Increasingly, customers concerned about their privacy prefer to encrypt their VoIP calls, or this can be a service provided by their service provider. This makes it difficult to troubleshoot and analyze that part of the call that is encrypted.

Teraquant’s Troubleshooting Decryption Add-on to OCOM makes it easy. The Teraquant TLS/SRTP decryption probe continuously monitors all key exchanges and matches that with your pivate key manually entered into the management GUI. All encrypted legs or segments of the SIP call are then automatically correlated into the OCOM message flow.

Metrics and Analysis of the Encryption Mechanism

TLS/SRTP settings read from monitored network.

  • Public Key Certificates
    • privateKey.pem
    • publickey.pem
    • CAList.pem
  • Additional information on the cerfificates
    • CA Signed Certificate
    • Self-signed Certificate
  • Cipher Suites
    • TLS_RSA_WITH_AES_128_CBC_SHA
    • TLS_RSA_WITH_RC4_128_MD5
  • Key Exchange Analytics
    • Key Exchange first seen
    • Key Exchange time interval
    • Key Exchange completed or errored