- This topic has 3 replies, 1 voice, and was last updated 17 years, 10 months ago by Abdul.
24th December 2003 at 10:25 #25935AbdulGuest
I was windering what information an ISP can find out in a voice packet. Can they determine the length of call? As well can they determine the number being called.24th December 2003 at 17:16 #25936hwykingGuest
The only thing they can do is block the ports designated for VOIP. so basically they can provide you with bandwidth and allow allow most of the ports for ftp,http…etc, but block the port that h323 or SIP uses to pass calls.
Good luck26th December 2003 at 06:21 #25937DanGuest
Any point in the middle (between your two endpoints) of your VOIP “conversation” is able to go promiscuous on the network and capture (or quantify) an IP communication stream between you and another endpoint somewhere on the Internet. Unencrypted VOIP traffic will have an easily recognizable packet signature, as does every type of IP traffic. SIP and H323 use special call setup packets, which, when sent unencrypted, will clearly indicate the number dialed. Subtracting the timestamp of the Call-start packet from the timestamp of the Call-stop packet would allow someone in the middle to determine the length of the call.
This is all highly improbable, but still technically possible. Most IP networks I have come across are managed just well enough to stay running – snooping/eavesdropping is generally only done by legitimate authorities and hackers who find unsecured points in ISP networks.
Using IP VPN to encrypt VOIP traffic obfuscates the data stream a little bit, but since RTC traffic is incredibly chatty, it will still be easy to distinguish from other packet types (predictable packet sizes and frequency heading in both directions.)
IP VPN can protect all of the original packet headers (source and destination IP Address, S & D port/protocol, Type of Service, and most importantly, the data stream, including called number!) from prying eyes.
Design of an IPVPN will dictate how ‘secure’ the data stream is (encryption key length, key re-negotiation frequency, etc.) – so if money were no object, an intercepted stream, encrypted or not, would be suceptible to “eavesdropping” – it is just unlikely that eavesdropping would occur in real-time. Re-assembly and/or decryption+re-assembly could be a monumental task, but not impossible…29th January 2004 at 19:34 #25938AbdulGuest
Is it possible for someone to find if you are running voice even if you have a VPN setup. Or will it depend on the type of encryption or vpn. Please help