|
|
Skype is a great way to communicate. But CSOs should know that it also brings auditing and monitoring challenges.
By Simson Garfinkel
Skype is a high-quality encrypted Internet telephony system that allows
for the exchange of files, interconnects with the public switched
telephone system and easily tunnels through firewalls. You may not have
heard of Skype, but there are 9 million Skype users, so chances are
some of your employees have. Skype provides a cheap way to communicate,
but CSOs should know that the system's security is impossible to audit,
and the vendor refuses to disclose details on security features. If
secure communications are important to your business, read on.
Depending on your organization, Skype is either a wonderful tool for
communication or a problem technology that must be policed, controlled
and, if possible, eliminated from your systems.
One year after Skype launched, it had more than 9.5 million users, with
more than 1.5 million connections per day and 500,000 people connected
at any given time. |
Skype was released last year by the
creators of Kazaa, the popular file-trading system. Like Kazaa, Skype
is based on fire- wall-busting peer-to-peer technology. When you first
start running Skype, it scans the Internet looking for a Skype
"supernode." Supernodes are other people running the Skype program who
aren't screened by firewalls. These users can consequently both receive
and initiate connections across the Net. An unknown number of
supernodes link to other supernodes; eventually, the chain reaches back
to the Skype servers, wherever they happen to be. Supernodes also
facilitate connections back to Skype users who are behind firewalls and
Network Address Translation boxes.
But despite their similarities,
Skype does not come with Kazaa's baggage. Unlike Kazaa, Skype is not
advertiser-supported and does not come with adware or spyware. Instead,
Skype's creators make money by operating the bridge between the Skype
network and the other telephone networks. With the SkypeOut service, a
Skype user can place calls to ordinary landlines or cell phones
throughout the world for just a few pennies per minute from their
computers. SkypeIn, a corresponding service that will be released this
summer, will allow Skype users to receive phone calls from the
telephone network.
Skype gives the appearance of a secure communications channel, but it might not provide any security at all. |
Every Skype user has a unique Skype
user name and password. You provide the user name and password when you
log in; the network then verifies that your password matches the
password that you provided when you signed up. Once you've logged in,
you can initiate a call through your desktop to any other Skype user.
You don't need to know where he is; he just has to be logged in to
Skype somewhere on the Internet.
Unlike AOL Instant Messenger,
there's no problem with being logged in to Skype in more than one
location. Each location will ring if someone tries to call you. Thus,
Skype is a lot friendlier to people like me who work from multiple
computers. And while it's primarily designed for voice communications,
Skype will also let you send instant text messages and files. Most
people I know who use Skype keep a very short contact list of other
Skype users and block incoming voice and text messages from everyone
else.
Unlike Vonage and other
voice-over-IP systems, Skype is not based on session-initiated protocol
or any other Internet standard. Skype uses a protocol that's both
proprietary and secret. The company claims that all Skype
communications are encrypted with a 256-bit advanced encryption standard and that keys are exchanged using the RSA encryption algorithm. I've looked at Skype's packets, and I can verify
that they are in fact encrypted, but there's really no way to know how
secure it is without considerable documentation and cooperation from
the company.
These facts combine to make Skype an
emerging problem for many CSOs. For organizations—such as investment
companies—that are required by law to monitor communications between
their employees and their customers, Skype is an untappable voice
gateway. It's also largely unstoppable, because Skype can tunnel
through, over or around most kinds of firewalls. And for
organizations—such as hospitals—that are required by law to provide for
secure communications between employees and customers, Skype gives the
appearance of a secure communications channel, but it might not provide
any security at all.
On the other hand, if neither
monitoring nor secrecy of voice communications is a legal requirement
for your organization, another perfectly reasonable approach is to
embrace Skype and its peer-to-peer voice technology. Skype is certainly
more secure than most cell phones, which have their encryption
disabled, or landlines that don't have any encryption at all. Sure,
there is a chance that your Skype conversation is going through another
person's computer, and there's a chance that they've managed to crack
Skype's algorithm and are listening in on everything you say. Even
though there is certainly the potential for abuse, in most cases the
actual chance of abuse is small.
Another important aspect of security
is availability—that is, making sure that systems and backup systems
are always available to serve your users' needs. And availability is
where Skype really shines. No matter where you are, if you have some
kind of connectivity to the Internet, you can use Skype to communicate
with others. This is a huge benefit to the mobile worker, because you
can just sit down in some cybercaf� anywhere in the world, take out
your laptop, and—wham!—you are in direct communication. (On the other
hand, if Skype's creators decide to pull the plug on the company's
servers, every Skype user on the planet will be suddenly dead in the
water—unless, of course, an enterprising hacker can figure out how to patch the Skype executable so that it uses a different set of servers on the Internet.)
Because it's peer-to-peer, you can
use Skype to exchange large files without worrying about any
server-based restrictions. Although the protocol doesn't seem to
recover gracefully from interrupted transmissions (it restarts the
transfer in the middle of the file), it's completely reasonable to use
Skype to send 100MB files from one end of the planet to the other.
Skype's servers will do the user name/ password authentication, but the data packets will go directly from one user's computer to the other's—possibly passing through a Skype user or two.
The fact that Skype's user
name/password combinations are validated by central servers gives Skype
another big advantage over e-mail: authentication. The vast majority of
e-mail on the Internet is sent without authentication. As a result,
when you get a piece of e-mail, you never can be sure that the address
listed on the message is where it was really sent from. But since every
Skype user is validated before being allowed to join the network, you
can have reasonable trust in the identities that flash through the
Skype application. Such authentication helps build the business justification for Skype.
Two negatives are operating against
Skype. The first is the fact that the Skype client running on your
computer can and will relay calls between other network users without
your knowledge. That can pose a problem on networks that have only a
little bit of Internet connectivity. It makes sense that Skype would
detect how much bandwidth you have for this kind of third-party
altruism. But alas, the algorithm that Skype uses to determine how much
of this relaying it is allowed to engage in is proprietary, so we can't
know for sure.
The other drawback is that bad guys
can, of course, use Skype to send worms and viruses. Obviously, the
first thing to do is to block files transmitted by anyone you don't
know. A better approach would be to integrate Skype with your
computer's antivirus system so that all incoming files are
automatically scanned. That's not currently a Skype feature, but it
might be by the time you read this.
Probably the most important thing
about Skype, however, is not the program's functionality today, but
something much deeper about the whole Skype process. One year after
Skype launched, it had more than 9.5 million users worldwide, with more
than 1.5 million connections per day and, on average, 500,000 people
connected at any given time. The software is available for Windows, Mac
OS X, Linux and Pocket PC. The software has the capability of
automatically updating and upgrading itself, allowing it to acquire new
features at any time—potentially without the permission of the user.
The software uses a secret protocol; all communications are encrypted.
And Skype Technologies does its engineering in Tallinn, Estonia, has
some business operations in London and registers its website in
Amsterdam.
If I were going to write an
information warfare thriller with a theme based on Invasion of the Body
Snatchers, this is certainly where I would start.
Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He can be reached via e-mail at machineshop@cxo.com.
ILLUSTRATION BY ANASTASIA VASILAKIS
Most Recent Responses:
Read Skype's EULA and Privacy statment and you will understand the author's comments.
Keith
CISSP
Print
I think what the
author is trying to say is once a user has clicked "update" to allow
Skype to update itself, any code can be run by the program itself,
whether you wanted it to or not. You don't know what is upgraded and
you can't see it on the wire due to the encryption.It can even run code that will upgrade the app to never ask for that notification again. I
believe that is why he chose that moment to mention the location of
Skype development and operations, to drive home the fact that they may
not be held to the same "user notification" obligations that other
countries force.
Michael
Print
As of March 28, 2005, I have seen more than 2.3 million Skype users
online simultaneously. This is a killer app. SMEs are bringing their
inter-office calls across countries down to zero!
Arvind Agarwalla
Director
FACT Software Int'l Pte Ltd
Email
Print
Skype doesn't update itself, so I'm not sure why this article says it
does. We've got several users using Skype and if there are updates
(this happened with their published vulns, too), the users get a notice
recommending that they update. But there isn't anything installed
automatically.I
guess I don't understand where that suggestion comes from? Maybe the
writer's never gone through the upgrade notification process but was
talking about it anyway. We do the installs centrally and that way the
users don't need to ever have Administrator rights.
Larry
CISSP
Print
Skype's simultaenous user has exceeded 1.2M and increasing everyday.
It's a bi-edge sword to the enterprise management, closer to real time
enterprise, to save money, and privacy, while lost of control its
sovereignty of cyber space. Currently, it's hard to block or even
detect skype usage in the network traffic.
Richard
CISSP
Email
Print
|