Skype security

Last updated

Skype is a Voice over Internet Protocol (VoIP) system developed by Skype Technologies S.A. It is a peer-to-peer network where voice calls pass over the Internet rather than through a special-purpose network. Skype users can search for other users and send them messages. [1]

Contents

Skype reports that it uses 256 bit Advanced Encryption Standard (AES)/ Rijnadel encryption to communicate between Skype clients; although when calling a telephone or mobile, the part of the call over the public switched telephone network (PSTN) is not encrypted. [2] [3] User public keys are certified by the Skype server at login with 1536-bit or 2048-bit RSA certificates. Skype's encryption is inherent in the Skype Protocol and is transparent to callers. Some private conversations through Skype such as audio calls, text messages, and file sending (image, audio, or video) can make use of end-to-end encryption, but it may have to be manually turned on. [4]

Security policy

The company's security policy states that:

  1. Usernames are unique.
  2. Callers must present a username and password or another authentication credential.
  3. Each caller provides the other with proof of identity and privileges whenever a session is established. Each verifies the other's evidence before the session can carry messages.
  4. Messages transmitted between Skype users (with no PSTN users included) are encrypted from caller to caller. [2] No intermediate node (router) has access to the meaning of these messages. This claim was undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URLs embedded in a Skype conversation; [5] [6] this could only happen if Microsoft has access to the unencrypted form of these messages.

Implementation and protocols

Registration

Skype holds registration information both on the caller's computer and on a Skype server. Skype uses this information to authenticate call recipients and assure that callers seeking authentication access a Skype server rather than an impostor. Skype says that it uses public-key encryption as defined by RSA to accomplish this.

The Skype server has a private key and distributes that key's public counterpart with every copy of the software. As part of user registration, the user selects a desired username and password. Skype locally generates public and private keys. The private key and a password hash are stored on the user's computer.

Then a 256-bit AES-encrypted session is established with the Skype server. The client creates a session key using its random number generator.

The Skype server verifies that the selected username is unique and follows Skype's naming rules. The server stores the username and a hash of the user's password [ H ( H ( P ) ) ] {\displaystyle [H(H(P))]} in its database.

The server now forms and signs an identity certificate for the username that binds the username, verification key, and key identifier.

Peer-to-peer key agreement

For each call, Skype creates a session with a 256-bit session key. This session exists as long as communication continues and for a fixed time afterward. Skype securely transmits the session key to the call recipient as part of connecting a call. That session key is then used to encrypt messages in both directions.

Session cryptography

Session cryptography

All traffic in a session is encrypted using the AES algorithm running in Integer Counter Mode (ICM). Skype encrypts the current counter and salt with the session key using the 256 bit AES algorithm. This algorithm returns the keystream, then XORed with the message content. Skype sessions contain multiple streams. The ICM counter depends on the stream and the location within the stream.

Random number generation

Skype uses random numbers for several cryptographic purposes. Purposes include protection against playback attacks, creation of RSA key pairs, and creation of AES key-halves for content encryption. The security of a Skype peer-to-peer session depends significantly on the quality of the random numbers generated by both ends of the Skype session. Random number generation varies by the operating system. [7]

Cryptographic primitives

Skype uses standard cryptographic primitives to achieve its security goals. The cryptographic primitives used in Skype are the AES block cipher, the RSA public-key cryptosystem, the ISO 9796-2 signature padding scheme, the SHA-1 hash function, and the RC4 stream cipher.

Key agreement protocol

Key-agreement is achieved using a proprietary, symmetric protocol. To protect against a playback attack, the peers challenge each other with random 64-bit nonces. The challenge response is to customize the challenge in a proprietary way and returned it signed with the responder's private key.

The peers exchange Identity Certificates and confirm that these certificates are legitimate. Because an Identity Certificate contains a public key, each end can then confirm signatures created by the other peer. Each peer contributes 128 random bits to the 256-bit session key.

Automatic updates

Another security risk are automatic updates, which cannot be disabled from version 5.6 on, [8] [9] both on Mac OS and Windows branches, although in the latter, and only from version 5.9 on, automatic updating can be turned off in certain cases. [10]

Eavesdropping by design

Chinese, Russian and United States law enforcement agencies have the ability to eavesdrop on Skype conversations and to have access to Skype users' geographic locations. In many cases, a simple request for information is sufficient, with no court approval needed. This ability was deliberately added by Microsoft for law enforcement agencies around the world after they purchased Skype in 2011. This is implemented by switching the Skype client for a particular user account from the client-side encryption to the server-side encryption, allowing dissemination of an unencrypted data stream. [11] [12] [13]

Actual and potential flaws

While Skype encrypts users' sessions, other traffic, including call initiation, can be monitored by unauthorized parties.

The other side of security is whether Skype imposes risk on its users' computers and networks. In October 2005 a pair of security flaws were discovered and patched. Those flaws made it possible for hackers to run hostile code on computers running vulnerable versions of Skype. The first security bug affected only Microsoft Windows computers. It allowed the attacker to use a buffer overflow to crash the system or to force it to execute arbitrary code. The attacker could provide a malformed URL using the Skype URI format, and lure the user to request it to execute the attack. The second security bug affected all platforms; it used a heap-based buffer overflow to make the system vulnerable.

Issues, including several potentially affecting security, include:

Related Research Articles

Kerberos is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

<span class="mw-page-title-main">Email client</span> Computer program used to access and manage a users email

An email client, email reader or, more formally, message user agent (MUA) or mail user agent is a computer program used to access and manage a user's email.

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

<span class="mw-page-title-main">Skype</span> Telecommunications software service/application

Skype is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, debit-based calls to landline and mobile telephones, and other features. Skype is available on various desktop, mobile, and video game console platforms.

FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers.

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity as well as authenticate itself to the connecting entity by declaring the type of information needed for authentication as well as syntax. It is the most important layer of protection needed for secure communication within computer networks.

The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

<span class="mw-page-title-main">Internet security</span> Branch of computer security

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748, which made RFC 2284 obsolete, and is updated by RFC 5247. EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users. NTLM is the successor to the authentication protocol in Microsoft LAN Manager (LANMAN), an older Microsoft product. The NTLM protocol suite is implemented in a Security Support Provider, which combines the LAN Manager authentication protocol, NTLMv1, NTLMv2 and NTLM2 Session protocols in a single package. Whether these protocols are used or can be used on a system which is governed by Group Policy settings, for which different versions of Windows have different default settings.

Zfone is software for secure voice communication over the Internet (VoIP), using the ZRTP protocol. It is created by Phil Zimmermann, the creator of the PGP encryption software. Zfone works on top of existing SIP- and RTP-programs, but should work with any SIP- and RTP-compliant VoIP-program.

In computer science, session hijacking, sometimes also known as cookie hijacking, is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many websites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer. After successfully stealing appropriate session cookies an adversary might use the Pass the Cookie technique to perform session hijacking. Cookie hijacking is commonly used against client authentication on the internet. Modern web browsers use cookie protection mechanisms to protect the web from being attacked.

This is a comparison of voice over IP (VoIP) software used to conduct telephone-like voice conversations across Internet Protocol (IP) based networks. For residential markets, voice over IP phone service is often cheaper than traditional public switched telephone network (PSTN) service and can remove geographic restrictions to telephone numbers, e.g., have a PSTN phone number in a New York area code ring in Tokyo.

Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used to prevent unauthorized access to data storage.

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

The Skype protocol is a proprietary Internet telephony network used by Skype. The protocol's specifications have not been made publicly available by Skype and official applications using the protocol are closed-source.

References

  1. Jill Savege Scharff (2013). Psychoanalysis Online: Mental Health, Teletherapy, and Training. Karnac Books. p. 183. ISBN   978-1-78049-154-7.
  2. 1 2 "Does Skype use encryption?". Skype Support. Retrieved 12 July 2022.
  3. Lynn Hathaway (June 2003). "National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information" (PDF). Archived from the original (PDF) on 2008-05-28. Retrieved 2008-11-02.
  4. "What are Skype Private Conversations? | Skype Support". support.skype.com. Retrieved 2022-01-26.
  5. "Microsoft is reading Skype messages". 22 May 2013.
  6. Goodin, Dan (2013-05-20). "Think your Skype messages get end-to-end encryption? Think again". Ars Technica. Retrieved 2022-07-13.
  7. Vanilla Skype an overview of skype clients and protocols
  8. "Skype 5.6 for Mac". Archived from the original on 2012-04-06.
  9. "I want to turn off automatic updates".
  10. "Skype 5.9 for Windows". Archived from the original on 2012-04-14.
  11. Елизавета Серьгина; Алексей Никольский; Александр Силонов (14 March 2013). "Российским спецслужбам дали возможность прослушивать Skype" [Russian law enforcement has been granted the ability to eavesdrop on Skype conversations]. Ведомости (Vedomosti) (in Russian). Retrieved 25 July 2020.
  12. Bogdan Popa (20 June 2013). "Skype Provided Backdoor Access to the NSA Before Microsoft Takeover (NYT)". Softpedia.
  13. Bogdan Popa (31 December 2014). "Leaked Documents Show the NSA Had Full Access to Skype Chats". Softpedia.
  14. "VoIP suffers identity crisis". The Register. June 15, 2004.
  15. 1 2 3 4 Biondi, Philippe; DESCLAUX, Fabrice. "Silver Needle in the Skype" (PDF). blackhat. Retrieved 2006-03-02.
  16. "Skype accounts can be hacked with an email address". Archived from the original on 2017-10-18. Retrieved 2012-11-15.
  17. "Уязвимость в skype, позволяющая угнать любой аккаунт". 13 November 2012.
  18. Simson Garfinkel - VoIP and Skype Security
  19. 1 2 3 4 Max, Harry (2006). Skype: The Definitive Guide. Que Publishing. ISBN   032140940X.
  20. "Guide for network admins" (PDF).
  21. This is similar to the type of granted access that the SETI download applications presented.
  22. pagetable.com » Blog Archive » Skype Reads Your BIOS and Motherboard Serial Number
  23. Skype Security Blog - Skype Extras plug-in manager Archived 2008-10-19 at the Wayback Machine
  24. The Register » Skype snoop agent reads mobo serial numbers
  25. "Vulnerabilities in Skype" . Retrieved 2008-01-17.
  26. Claburn, Thomas. "Skype Addresses Cross-Zone Scripting Vulnerability - Security". InformationWeek. Retrieved 2010-06-09.
  27. "Skype File URI Security Bypass Code Execution Vulnerability". Skype.com. Retrieved 2010-06-09.
  28. ZDNet: Interview with Kurt Sauer „Telefonieren übers Internet: Wie sicher ist Skype wirklich?“, February 13, 2007
  29. guli.com: Textfilter in China, 19. April 2006
  30. "heise online - eBays neue Richtlinien in der Kritik". Heise.de. Retrieved 2010-06-09.
  31. "Skype-Gespräche unantastbar?". intern.de. 2007-11-23. Retrieved 2010-06-09.
  32. Biondi P., Desclaux F (2–3 March 2006). "Silver Needle in the Skype" (PDF). EADS Corporate Research Center. Retrieved 26 January 2009.
  33. Sokolov, David AJ (24 July 2008). "Speculation over back door in Skype". Heise Security UK. Archived from the original on 13 July 2010. Retrieved 26 January 2009.
  34. Leyde, John (24 July 2008). "Austrian official fuels Skype backdoor rumours". The Register UK. Retrieved 29 January 2009.
  35. Vilde, Boris (27 July 2008). "Skype Has Back Door for Cops' Eavesdropping". Ohmproject. Retrieved 29 January 2009.
  36. "Skype Linux Reads Password and Firefox Profile - Slashdot". August 26, 2007.
  37. "Skype 1.4.0.99 reads /etc/ passwd and firefox profile! - Skype Community". August 25, 2007. Archived from the original on October 13, 2011.{{cite web}}: CS1 maint: unfit URL (link)
  38. "Skype Secrecy Under Attack Again". VoIP News. 2009-02-24. Archived from the original on 2012-07-22. Retrieved 2010-10-10.
  39. "Big Brother in the Wires: Wiretapping in the Digital Age". ACLU . Retrieved 23 March 2009.
  40. "CALEA feature page". ACLU . Retrieved 23 March 2009.
  41. "German Authorities Raiding Homes To Find Skype Tapping Whistleblower". Techdirt. 18 September 2008. Retrieved 31 March 2009.