Search This Blog

Wednesday, June 22, 2005

How much encryption is 'enough' for VoIP?

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
06/22/05
Today's focus: How much encryption is 'enough' for VoIP?

Dear security.world@gmail.com,

In this issue:

* Perception persists that encryption is needed for VoIP
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Concord Communications
Network World Executive Guide: The Evolution of Management
Technologies

Network and systems technologies have an important new role -
helping networked systems live up to new business realities.
With growing and shifting demands, network executives are
balancing business goals with prioritizing IT projects. Read
about the 'Future of Management', 'IT Service Management',
'Managing Security', and 'Best Practices'.
http://www.fattail.com/redir/redirect.asp?CID=107042
_______________________________________________________________
Let's get virtual: How to make virtualization work for you

Analysts agree that having a virtual IT infrastructure helps to
significantly lower costs, respond to business needs faster, and
deliver flexible IT. Find out what makes a virtual
infrastructure work. View now.
http://www.fattail.com/redir/redirect.asp?CID=106943
_______________________________________________________________

Today's focus: How much encryption is 'enough' for VoIP?

By Steve Taylor and Larry Hettick

Whenever the topic of VoIP arises, security continues to be a
burning issue. For some reason there is a perception that VoIP,
whether transmitted over the Internet or not, is inherently
unsecure. For that reason, there likewise seems to be a
perceived need for end-to-end encryption of the conversation.

While we agree that there is doubtlessly a need for an extremely
secure infrastructure when implementing VoIP, we remain a bit
puzzled as to why people think they need to encrypt the content
of the conversation itself.

This is little historical precedence for encrypting telephony.
With the exception of highly secure needs, such as those of the
military and intelligence communities, traditional telephony is
seldom, if ever, encrypted. The entire digital hierarchy is
built on increments of 64K bit/sec DS-0s, each containing one
unencrypted digital telephony conversation using Pulse Code
Modulation. A T-1 (or DS-1) circuit was designed to carry 24
unencrypted phone calls, and a T-3 (or DS-3) was designed to
carry 28 T-1s.

In fact, when we checked with a traditional voice service
provider, we were informed that encryption of voice traffic was
generally not a concern and an issue that customers seldom asked
about.

In fact, we'll argue here that if anything, there is too much
encryption of VoIP traffic. Why? It's easy to encrypt IP traffic
using techniques like IPSec and SSL, so any IP-based traffic -
like VoIP - can be encrypted with minimal effort. In fact, many
free or almost-free VoIP applications even encrypt traffic by
default. Our concern here is that this readily available
encryption makes lawful and appropriate monitoring of traffic
for national security and law enforcement much more difficult
than it should be.

Bottom line: Use encryption where it's important. But don't
assume that encryption is an absolute necessity for a successful
VoIP implementation.

Are you using encryption for your VoIP traffic? Why or why not?
Let us hear from you and we'll summarize the feedback that we
receive.

RELATED EDITORIAL LINKS

Users eye wireless voice/data unification
Network World, 06/20/05
http://www.networkworld.com/news/2005/062005-vowi-fi.html?rl

Entuity adds VoIP, blade server management to software
Network World, 06/20/05
http://www.networkworld.com/news/2005/062005-entuity.html?rl
_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials <http://www.webtorials.com/>, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
<mailto:taylor@webtorials.com>

Larry Hettick an industry veteran with over 20 years of
experience in voice and data. He is currently Vice President
for Wireline Solutions at Current Analysis, the leading
competitive response solutions company. He can be reached at
<mailto:larry@larryhettick.com>
_______________________________________________________________
This newsletter is sponsored by Concord Communications
Network World Executive Guide: The Evolution of Management
Technologies

Network and systems technologies have an important new role -
helping networked systems live up to new business realities.
With growing and shifting demands, network executives are
balancing business goals with prioritizing IT projects. Read
about the 'Future of Management', 'IT Service Management',
'Managing Security', and 'Best Practices'.
http://www.fattail.com/redir/redirect.asp?CID=107042
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
Trends affecting WAN in powerful ways - Webcast Explains

A panel of experts will help you understand the principles of
the Adaptive WAN and how it can help you proactively address the
challenges emerging in your evolving enterprise IT architecture.

http://www.fattail.com/redir/redirect.asp?CID=106944
_______________________________________________________________
FEATURED READER RESOURCE
CALL FOR ENTRIES: 2005 ENTERPRISE ALL-STAR AWARDS

Network World is looking for entries for its inaugural
Enterprise All-Star Awards program. The Enterprise All-Star
Awards will honor user organizations that demonstrate
exceptional use of network technology to further business
objectives. Network World will honor dozens of user
organizations from a wide variety of industries, based on a
technology category. Deadline: July 8. Enter today:
<http://www.networkworld.com/survey/easform.html?net>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments: