
categories of WebRTC communication (e.g., a file is sent, audio
call, video call), as well as additional useful information (if we are
able to approximate the size and/or determine the type of a file
that was sent).
4.5.2 Communication Disruption/DOS
Johnston, Yoakum, and Singh (2013) mentioned that enterprise
firewalls allow for WebRTC communication due to false
identification of a message as a response to a request. This
suggests that an attacker can send packets to a client, fooling the
firewall into thinking that these packets are a legitimate part of the
conversation. Due to the UDP nature of WebRTC, IP spoofing is
possible. At this point it might be possible to cause the firewall to
block the legitimate conversation, though more research is still
required [14].
4.5.3 Forceful use of rouge WI-FI network by
leveraging server anti-DOS mechanism
Description: One way of protecting servers from DOS (Denial of
Service) attacks is to maintain a blacklist of IP addresses that
where collaborators in a recent DOS attack. A possible scenario,
is one where an attacker wishes to sway victims to use a malicious
WI-FI network instead of a legitimate WI-FI network that is in the
area. In our scenario, the attacker leverages the anti DOS
mechanism to achieve this by performing the following attack: (1)
attacker connects a device to a legitimate WI-FI. (2) Attacker
attempts to perform a DOS attack on a WebRTC application from
the legitimate WI-FI network. (3) Legitimate WI-FI external IP is
blocked by the server. (4) Attacker creates a rouge WI-FI network
aimed to exploit anyone that connects to it. (5) Clients, being
unable to connect to the WebRTC application due to the IP
blocking, may decide to connect to the rouge network in order to
use the WebRTC application.
Possible outcome: sensitive information theft or privilege
elevation on victim’s devices.
5. WebRTC IN TELECOMMUNICATION
As demonstrated in Section 1, WebRTC has gained popularity
among many applications and is being deployed heavily. The
growing trend has sparked many innovative products. The focus
of this section is inspecting WebRTC as an underlying framework
for telecommunication companies.
5.1 WebRTC-Tele-Model Security Concerns
Implementing a WebRTC gateway network architecture (as
illustrated in Figure 2) where communications are funneled to and
from telecommunication servers means that in practice,
conversations are decrypted, and re-encrypted on these servers—
turning them into valuable targets of attack. Implications may
include the copying of information, as well as interchanging call
participants without peers’consent or knowledge.
5.2 WebRTC-Tele-Model Efficiency Concerns
Assuming there are more peers than servers, two possible
architectures are feasible: (1) communication between peers, ran
by one server alone, and (2) communication between peers, ran by
several company-owned servers before reaching a peer. The
advantage of the second solution is in the fact that it allows
bulking conversations together and compressing their volume. If
performed correctly, this may lower bandwidth throttle and thus
company costs. At this point, it is an open question as to what is
the best approach to take in this case.
5.3 Lawful Interception for WebRTC via IP
Multimedia Subsystem Using 3rd Party
Gateway
Although there are numerous WebRTC communication systems
architectures, it is inevitable that the WebRTC IP Multimedia
Subsystem (IMS) will take over and telcos will have to implement
their WebRTC solutions in this model [15].
IMS is a functional architecture for multimedia service delivery. It
was design by the Third Generation Partnership Project (3GPP)
and later on by TISPAN, the standardization body of European
Telecommunications Standards Institute (ETSI). IMS allows
easier network management, service implementation (billing,
provision, provisioning etc.) and user management
(Authentication, Authorization, and Accounting) [16]. Therefore
implementing WebRTC as IMS architecture will be the most cost-
effective solution for telcoes products [15].
WebRTC IMS standardization is an ongoing process since 2012
conducted by 3GPP [17] and by the ETSI [18], Still there are open
issues considering the IMS implementation and the lawful
interception (LI) customizations. Meanwhile the 3GPP and the
ESTI design the IMS components for WebRTC as:
-WIC (WebRTC IMS Client)
-WWSF (WebRTC Web Server Function)
-WAF (WebRTC Authorization Function)
-eP-CSCF (P-CSCF enhanced for WebRTC)
-eIMS-AGW (IMS Access Gateway enhanced for
WebRTC)
We assume that most of the WebRTC Communication Service
Providers (CSP) will assist a 3rd party WebRTC Gateway
Provider (GWP) to establish the connection with internal and
external WebRTC clients [19], it's still not clear how the
responsibility of WebRTC LI will be divided between the CSP
and the 3rd party GWP.
IMS architecture solves many of the WebRTC standard
requirements among them is lawful interception, which is already
defined for IMS by the 3GPP and ETSI [20] and is globally
accepted. Implementing LI solutions for different WebRTC
architectures will be infeasible for CSPs due to the complexity the
architecture and the lack of standardization of the WebRTC
protocol.
The CSP should provide LI from the point when the commercial
service is established and they shall co-operate immediately with
the Law Enforcement Agency (LEA) and able a provision of
targets to be on real-time basis. The ETSI also stated that the LI
requirements are also relevant to 3rd party CSP, in our case the
GWP.
As we see the WebRTC IMS architecture, the general presence of
responsibilities and information between the CSP and the GWP
should be as the following: the CSP will possess most of the
information related the target's identity and enabled services
where the GWP will be responsible to the delivery of the
communication with other clients. Because WebRTC is
established in RTCP most of the communication provision should
be handled by the GWP, nevertheless it should be agreed in
advance between the CSP, GWP and the LEA [20].
Under the ETSI current design for the WebRTC IMS [18], we
propose the following (see Table 2) allocation of responsibilities
between the CSP and the GWP (Figure 7) on data shared with the
LEA.