SlideShare a Scribd company logo
1 of 71
Download to read offline
WebRTC & Video Delivery
what could possibly go
wrong?
An Application Security talk at CommCon 2023
by Sandro Gauci, Enable Security
Welcome!
Purpose: convince you that WebRTC + Video Delivery infra/apps
need security testing
Yes .. even if the technology is said to be secure
On WebRTC security
WebRTC, unlike VoIP, comes with modern security features
Signaling has to happen on a secure transport layer (i.e. HTTPS)
media is encrypted using SRTP
keys exchanged over DTLS
On Video Delivery
Fragmented so hard to make blanket statements
SRT = Secure Reliable Transport
WISH (WHIP) is built on top of WebRTC, thus inherits its security
features
After this talk
using secure technology is a great starting point
secure communications require more than just using secure
technologies
... or having Secure in the protocol's name
Who am I to talk about this?
Sandro Gauci, from Malta 🇲‍🇹
- living in Bavaria 🇩🇪
accused of releasing SIPVicious OSS on weak VoIP systems on the
intertubes
leading Enable Security
We specialize on RTC security, focused on security testing
How do we figure out what
we need to worry about?
Threat modelling to the
rescue!
Threat modelling requires
us to understand the attack
surface
WebRTC infrastructure
Attack Surface components
still WIP as we learn more about each component
not extremely complex but complex enough
split into 4 areas:
Media - SRTP / DTLS (and data channels)
NAT traversal - ICE / STUN / TURN
Signalling - no standard signalling so hard to nail
Gateway
Attacking the Media
Message processing
Media servers need to process each incoming message
includes SRTP, SRTCP, DTLS and STUN
each protocol is complex, especially DTLS
third-party libraries required especially for DTLS e.g. OpenSSL
comes with a history of vulnerabilities; some of which apply
CVE-2022-0778
Denial of Service vulnerability in OpenSSL
exploited through a specially crafted X.509 certificate
when parsed, causes an infinite loop while parsing an elliptic curve
key
in WebRTC client certificates are parsed by the media server to
check the fingerprint presented in the SDP
to prevent man-in-the-middle attacks
it is an important security feature but also an attack vector
Further explanation
Blog post and video demonstration against a WebRTC demo -
RTPEngine with vulnerable OpenSSL:
https://www.rtcsec.com/article/exploiting-cve-2022-0778-in-openssl-vs-
webrtc-platforms/
RTP Proxy vulnerabilities
In some cases, the WebRTC media server is also an RTP proxy
used in VoIP environments
This means that some VoIP media vulnerabilities are also found in
WebRTC environments
We describe two vulnerabilities: RTP Inject and RTP Bleed
A very quick introduction to
RTP Inject
RTP Inject versus SRTP
streams
the media server might behave in an undefined way when receiving
RTP or SRTP on an ongoing stream
surprisingly, we saw instances where malicious unencrypted RTP
streams get encrypted by the media server
thus an attacker can send unencrypted RTP which is delivered, in
full security to the other party
either way, when vulnerable, this almost always (at least) leads to
denial of service
A very quick introduction to
RTP Bleed
Attacking
Confidentiality/Integrity of
DTLS/SRTP
private key (which was published) reuse as in the case of Slack
usage of weak ciphers - typical vulnerabilities associated with TLS
interesting research area for cryptographers (professionals and
amateurs alike!)
RTP Flood
and yes, SRTP too
not to be confused with RTP Inject/Bleed!
both recording and transcoding systems may be affected
what is RTP Flood?
Why is RTP flood dangerous
Attackers can send packets at high rates, large RTP payloads
Some recording systems will happily store that media filling up
storage space (disk, buckets etc)
We have seen gigabytes being stored in a few seconds
Some transcoding systems might not cope with the data, taking
precious resources
Attacking NAT traversal
Focus on TURN relay abuse
Background on TURN relay abuse
TURN servers are meant to relay data - often SRTP between parties
that cannot reach each other directly
Seems obvious that attackers may abuse TURN servers to reach
anything else including
internal network IP addresses
local services (i.e. on 127.0.0.1 or ::1)
external services
Sometimes, these internal services require no authentication and
assume trust based on IP
e.g. AWS instance metadata service (169.254.169.254)
Background on TURN relay abuse
We developed a toolset called stunner to abuse this behavior
(and more)
Allowed us to discover this vulnerability in various WebRTC
platforms:
Slack
8x8
Vendor X
Signal's infrastructure
our customers
Introduction to the TURN relay abuse demo
We have configured the web server to block Internet access to
/secret
Only internal IP addresses are allowed to view this location
The TURN server is also configured to block any internal IP
addresses, including localhost
If one uses the TURN server as a relay for their web browser
(stunner supports this) to access 127.0.0.1/secret, the
TURN server blocks that
0:00 / 1:05
Brief note on Gateway attacks
Sometimes - from a WebRTC platform - you can call out or in
through the traditional phone system
e.g. Google Meet / Jitsi might have this functionality for a web
conference
That interaction between the WebRTC platform and external
systems might open up security vulnerabilities
Examples that come to mind:
toll fraud
injection of special SIP headers
Interesting attack vector but too specific to cover in this talk
Not to be forgotten!
Attacking Signalling
This is how you initiate calls, tear them down and various other
important functionality outside of media
WebRTC does not define a signalling protocol (other than the use
of SDP)
SIP or XMPP over HTTP or Websocket is somewhat common
In such cases, the systems might inherit security vulnerabilities
from SIP/XMPP/etc
A lot of proprietary protocols reinvent the wheel - thus some
vulnerabilities are also reinvented
The equivalent of the SIP INVITE flood DoS vulnerability can often
be found in other signalling protocols
Specific attacks on
signalling
Hard to give generic examples for WebRTC infrastructure due to it
having no defined signalling protocol
What about Video Delivery?
We started looking at SRT - Secure Reliable Transport
Too complex to learn, let alone build a proper attack surface
mindmap for this talk
Also not very related to WebRTC
Something else is much more related ...
Hello WHIP! or is it WISH?
WISH = WebRTC Ingest Signaling over HTTPS
WHIP = WebRTC-HTTP ingestion protocol
We focused on WISH/WHIP which is still very new but is/will be a
standard signalling protocol for WebRTC signalling just for media
ingestion
How does its attack surface look like?
Attack surface for
WISH/WHIP
Inherits all the WebRTC potential security issues
Removed the gateway element; seems irrelevant
All the previous generic attack surface for signalling still mostly
applies
Also identified a few potential and specific attacks
Limited attack surface
The draft for WISH explains that certain things that are normally
allowed in WebRTC are not allowed in WISH
Examples
no SDP renegotiation is supported = DoS on reneg will not be
relevant
SDP offer - sendonly
SDP answer - recvonly
and some other restrictions
Great for security because they reduce the attack surface
SDP is still there, still complex
Complexity is the enemy of security
Potential issues in WISH
implementations
Warning
The above is theoretical because we did not properly test any
implementations
Potential issues in WISH
implementations
access control issues (or IDOR) on the resource location
DoS with ICE restarts
POST flooding
traditional HTTP-style attacks; since it is HTTP specific
Access control issues on the resource location
POST /whip/endpoint HTTP/1.1
Host: whip.example.com
Content-Type: application/sdp
Content-Length: 1326
v=0
...
HTTP/1.1 201 Created
ETag: "xyzzy"
Content-Type: application/sdp
Content-Length: 1400
Location: https://whip.example.com/resource/id
v=0
...
Resource location security
if there is no authentication and proper authorization ..
if attackers can guess the resource location ...
then they may send DELETE requests to all ongoing sessions and
tear them down
Flooding with PATCH requests
PATCH /resource/id HTTP/1.1
Host: whip.example.com
If-Match: "*"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 54
a=ice-ufrag:ysXw
a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k
HTTP/1.1 200 OK
ETag: "abccd"
Content-Type: application/trickle-ice-sdpfrag
Content-Length: 102
a=ice-lite
a=ice-ufrag:289b31b754eaa438
a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
Flooding with POST
requests
POST /whip/endpoint HTTP/1.1
Host: whip.example.com
Content-Type: application/sdp
Content-Length: 1326
v=0
o=- 5228595038118931041 2 IN IP4 127.0.0.1
s=-...
Flooding with POST
requests
SDP may be very small or very large; different effects on the target
This tends to be resource intensive functionality
Concluding
Gratitude
Alfred Farrugia who assisted greatly with the contents and
resources
Dan Jenkins and the CommCon team for organising this event
Our customers who keep it interesting for us 😄
Anyone who is contributing to RTC security!
Key take aways
Even if WebRTC is considered the most secure VoIP, there are
attack vectors
This also includes the web attack surface which is very familiar to
many security professionals
But also
RTC specific vulnerabilities (more interesting to us)
Vulnerabilities inherited from older applications/protocols
What to do?
Stay informed - we do our bit at
At various stages of developing WebRTC and Video Delivery
solutions ...
Test Test Test!
https://rtcsec.com/subscribe
https://www.rtcsec.com/tags/webrtc-security/
Contact us
https://www.enablesecurity.com
sandro@enablesecurity.com

More Related Content

What's hot

Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT OperationsSplunk
 
Integrating Fiware Orion, Keyrock and Wilma
Integrating Fiware Orion, Keyrock and WilmaIntegrating Fiware Orion, Keyrock and Wilma
Integrating Fiware Orion, Keyrock and WilmaDalton Valadares
 
Real-Time Text and WebRTC @ Kamailio World 2023
Real-Time Text and WebRTC @ Kamailio World 2023Real-Time Text and WebRTC @ Kamailio World 2023
Real-Time Text and WebRTC @ Kamailio World 2023Lorenzo Miniero
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxabenyeung1
 
Containerizing your Security Operations Center
Containerizing your Security Operations CenterContainerizing your Security Operations Center
Containerizing your Security Operations CenterJimmy Mesta
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingHossein Yavari
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreStormpath
 
Unity and WebSockets
Unity and WebSocketsUnity and WebSockets
Unity and WebSocketsJosh Glover
 
JSON Logger Baltimore Meetup
JSON Logger Baltimore MeetupJSON Logger Baltimore Meetup
JSON Logger Baltimore MeetupManjuKumara GH
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016Matthew Dunwoody
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injectionJawhar Ali
 
rtpengine - Media Relaying and Beyond
rtpengine - Media Relaying and Beyondrtpengine - Media Relaying and Beyond
rtpengine - Media Relaying and BeyondAndreas Granig
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with SplunkSplunk
 
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...Netgate
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 

What's hot (20)

Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Integrating Fiware Orion, Keyrock and Wilma
Integrating Fiware Orion, Keyrock and WilmaIntegrating Fiware Orion, Keyrock and Wilma
Integrating Fiware Orion, Keyrock and Wilma
 
Real-Time Text and WebRTC @ Kamailio World 2023
Real-Time Text and WebRTC @ Kamailio World 2023Real-Time Text and WebRTC @ Kamailio World 2023
Real-Time Text and WebRTC @ Kamailio World 2023
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
 
Containerizing your Security Operations Center
Containerizing your Security Operations CenterContainerizing your Security Operations Center
Containerizing your Security Operations Center
 
SIPREC RTPEngine Media Forking
SIPREC RTPEngine Media ForkingSIPREC RTPEngine Media Forking
SIPREC RTPEngine Media Forking
 
Token Authentication in ASP.NET Core
Token Authentication in ASP.NET CoreToken Authentication in ASP.NET Core
Token Authentication in ASP.NET Core
 
Unity and WebSockets
Unity and WebSocketsUnity and WebSockets
Unity and WebSockets
 
JSON Logger Baltimore Meetup
JSON Logger Baltimore MeetupJSON Logger Baltimore Meetup
JSON Logger Baltimore Meetup
 
No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016No Easy Breach DerbyCon 2016
No Easy Breach DerbyCon 2016
 
seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
rtpengine - Media Relaying and Beyond
rtpengine - Media Relaying and Beyondrtpengine - Media Relaying and Beyond
rtpengine - Media Relaying and Beyond
 
IPSec VPN Basics
IPSec VPN BasicsIPSec VPN Basics
IPSec VPN Basics
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
CCDE Experience
CCDE ExperienceCCDE Experience
CCDE Experience
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with Splunk
 
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
Squid, SquidGuard, and Lightsquid on pfSense 2.3 & 2.4 - pfSense Hangout Janu...
 
Syslog
SyslogSyslog
Syslog
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 

Similar to CommCon 2023 - WebRTC & Video Delivery application security - what could possibly go wrong?

Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view IPv6 Conference
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...ir. Carmelo Zaccone
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?VOIP2DAY
 
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...Alan Quayle
 
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo server
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo serverTools for offensive RTC Security: introducing SIPVicious PRO and the demo server
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo serverSandro Gauci
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutionseroglu
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
WebRTC Infrastructure Design
WebRTC Infrastructure DesignWebRTC Infrastructure Design
WebRTC Infrastructure DesignNeeraj Chandra
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network securityRishabh Mehan
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tooltleroy0928
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...JPCERT Coordination Center
 
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningCA API Management
 

Similar to CommCon 2023 - WebRTC & Video Delivery application security - what could possibly go wrong? (20)

Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view Zaccone Carmelo - IPv6 and security from a user’s point of view
Zaccone Carmelo - IPv6 and security from a user’s point of view
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
Future Internet Week - IPv6 the way forward: IPv6 and security from a user’s ...
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?WebRTC Security Concerns, a real problem?
WebRTC Security Concerns, a real problem?
 
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...
Tools for Offensive RTC security. Introducing SIPVicious PRO and the demo ser...
 
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo server
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo serverTools for offensive RTC Security: introducing SIPVicious PRO and the demo server
Tools for offensive RTC Security: introducing SIPVicious PRO and the demo server
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
WebRTC Infrastructure Design
WebRTC Infrastructure DesignWebRTC Infrastructure Design
WebRTC Infrastructure Design
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Brst – Border Router Security Tool
Brst – Border Router Security ToolBrst – Border Router Security Tool
Brst – Border Router Security Tool
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Blug talk
Blug talkBlug talk
Blug talk
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
 
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And Hardening
 

More from Sandro Gauci

TADSummit 2022 - How to bring your own RTC platform down
TADSummit 2022 - How to bring your own RTC platform downTADSummit 2022 - How to bring your own RTC platform down
TADSummit 2022 - How to bring your own RTC platform downSandro Gauci
 
The OpenSIPS security audit - OpenSIPS Summit - Sandro Gauci
The OpenSIPS security audit - OpenSIPS Summit - Sandro GauciThe OpenSIPS security audit - OpenSIPS Summit - Sandro Gauci
The OpenSIPS security audit - OpenSIPS Summit - Sandro GauciSandro Gauci
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionSandro Gauci
 
The various ways your RTC may be crushed
The various ways your RTC may be crushedThe various ways your RTC may be crushed
The various ways your RTC may be crushedSandro Gauci
 
A tale of two RTC fuzzing approaches
A tale of two RTC fuzzing approachesA tale of two RTC fuzzing approaches
A tale of two RTC fuzzing approachesSandro Gauci
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And ExploitationSandro Gauci
 
Scanning The Intertubes For Voip
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For VoipSandro Gauci
 
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...Sandro Gauci
 

More from Sandro Gauci (8)

TADSummit 2022 - How to bring your own RTC platform down
TADSummit 2022 - How to bring your own RTC platform downTADSummit 2022 - How to bring your own RTC platform down
TADSummit 2022 - How to bring your own RTC platform down
 
The OpenSIPS security audit - OpenSIPS Summit - Sandro Gauci
The OpenSIPS security audit - OpenSIPS Summit - Sandro GauciThe OpenSIPS security audit - OpenSIPS Summit - Sandro Gauci
The OpenSIPS security audit - OpenSIPS Summit - Sandro Gauci
 
Bounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC editionBounty bout 0x01 - WebRTC edition
Bounty bout 0x01 - WebRTC edition
 
The various ways your RTC may be crushed
The various ways your RTC may be crushedThe various ways your RTC may be crushed
The various ways your RTC may be crushed
 
A tale of two RTC fuzzing approaches
A tale of two RTC fuzzing approachesA tale of two RTC fuzzing approaches
A tale of two RTC fuzzing approaches
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And Exploitation
 
Scanning The Intertubes For Voip
Scanning The Intertubes For VoipScanning The Intertubes For Voip
Scanning The Intertubes For Voip
 
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...
Troopers09: The Truth about Web Application Firewalls: What the vendors do NO...
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 

Recently uploaded (20)

Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 

CommCon 2023 - WebRTC & Video Delivery application security - what could possibly go wrong?

  • 1. WebRTC & Video Delivery what could possibly go wrong? An Application Security talk at CommCon 2023 by Sandro Gauci, Enable Security
  • 2. Welcome! Purpose: convince you that WebRTC + Video Delivery infra/apps need security testing Yes .. even if the technology is said to be secure
  • 3. On WebRTC security WebRTC, unlike VoIP, comes with modern security features Signaling has to happen on a secure transport layer (i.e. HTTPS) media is encrypted using SRTP keys exchanged over DTLS
  • 4. On Video Delivery Fragmented so hard to make blanket statements SRT = Secure Reliable Transport WISH (WHIP) is built on top of WebRTC, thus inherits its security features
  • 5. After this talk using secure technology is a great starting point secure communications require more than just using secure technologies ... or having Secure in the protocol's name
  • 6. Who am I to talk about this? Sandro Gauci, from Malta 🇲‍🇹 - living in Bavaria 🇩🇪 accused of releasing SIPVicious OSS on weak VoIP systems on the intertubes leading Enable Security We specialize on RTC security, focused on security testing
  • 7. How do we figure out what we need to worry about?
  • 8. Threat modelling to the rescue!
  • 9.
  • 10. Threat modelling requires us to understand the attack surface
  • 11.
  • 13.
  • 14. still WIP as we learn more about each component not extremely complex but complex enough split into 4 areas: Media - SRTP / DTLS (and data channels) NAT traversal - ICE / STUN / TURN Signalling - no standard signalling so hard to nail Gateway
  • 16.
  • 17. Message processing Media servers need to process each incoming message includes SRTP, SRTCP, DTLS and STUN each protocol is complex, especially DTLS third-party libraries required especially for DTLS e.g. OpenSSL comes with a history of vulnerabilities; some of which apply
  • 18. CVE-2022-0778 Denial of Service vulnerability in OpenSSL exploited through a specially crafted X.509 certificate when parsed, causes an infinite loop while parsing an elliptic curve key in WebRTC client certificates are parsed by the media server to check the fingerprint presented in the SDP to prevent man-in-the-middle attacks it is an important security feature but also an attack vector
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Further explanation Blog post and video demonstration against a WebRTC demo - RTPEngine with vulnerable OpenSSL: https://www.rtcsec.com/article/exploiting-cve-2022-0778-in-openssl-vs- webrtc-platforms/
  • 24.
  • 25. RTP Proxy vulnerabilities In some cases, the WebRTC media server is also an RTP proxy used in VoIP environments This means that some VoIP media vulnerabilities are also found in WebRTC environments We describe two vulnerabilities: RTP Inject and RTP Bleed
  • 26. A very quick introduction to RTP Inject
  • 27.
  • 28.
  • 29.
  • 30. RTP Inject versus SRTP streams the media server might behave in an undefined way when receiving RTP or SRTP on an ongoing stream surprisingly, we saw instances where malicious unencrypted RTP streams get encrypted by the media server thus an attacker can send unencrypted RTP which is delivered, in full security to the other party either way, when vulnerable, this almost always (at least) leads to denial of service
  • 31. A very quick introduction to RTP Bleed
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Attacking Confidentiality/Integrity of DTLS/SRTP private key (which was published) reuse as in the case of Slack usage of weak ciphers - typical vulnerabilities associated with TLS interesting research area for cryptographers (professionals and amateurs alike!)
  • 37. RTP Flood and yes, SRTP too not to be confused with RTP Inject/Bleed! both recording and transcoding systems may be affected what is RTP Flood?
  • 38.
  • 39.
  • 40. Why is RTP flood dangerous Attackers can send packets at high rates, large RTP payloads Some recording systems will happily store that media filling up storage space (disk, buckets etc) We have seen gigabytes being stored in a few seconds Some transcoding systems might not cope with the data, taking precious resources
  • 42.
  • 43. Focus on TURN relay abuse
  • 44. Background on TURN relay abuse TURN servers are meant to relay data - often SRTP between parties that cannot reach each other directly Seems obvious that attackers may abuse TURN servers to reach anything else including internal network IP addresses local services (i.e. on 127.0.0.1 or ::1) external services Sometimes, these internal services require no authentication and assume trust based on IP e.g. AWS instance metadata service (169.254.169.254)
  • 45. Background on TURN relay abuse We developed a toolset called stunner to abuse this behavior (and more) Allowed us to discover this vulnerability in various WebRTC platforms: Slack 8x8 Vendor X Signal's infrastructure our customers
  • 46. Introduction to the TURN relay abuse demo We have configured the web server to block Internet access to /secret Only internal IP addresses are allowed to view this location The TURN server is also configured to block any internal IP addresses, including localhost If one uses the TURN server as a relay for their web browser (stunner supports this) to access 127.0.0.1/secret, the TURN server blocks that
  • 48.
  • 49. Brief note on Gateway attacks Sometimes - from a WebRTC platform - you can call out or in through the traditional phone system e.g. Google Meet / Jitsi might have this functionality for a web conference That interaction between the WebRTC platform and external systems might open up security vulnerabilities Examples that come to mind: toll fraud injection of special SIP headers Interesting attack vector but too specific to cover in this talk Not to be forgotten!
  • 50. Attacking Signalling This is how you initiate calls, tear them down and various other important functionality outside of media WebRTC does not define a signalling protocol (other than the use of SDP) SIP or XMPP over HTTP or Websocket is somewhat common In such cases, the systems might inherit security vulnerabilities from SIP/XMPP/etc A lot of proprietary protocols reinvent the wheel - thus some vulnerabilities are also reinvented The equivalent of the SIP INVITE flood DoS vulnerability can often be found in other signalling protocols
  • 51.
  • 52. Specific attacks on signalling Hard to give generic examples for WebRTC infrastructure due to it having no defined signalling protocol
  • 53. What about Video Delivery? We started looking at SRT - Secure Reliable Transport Too complex to learn, let alone build a proper attack surface mindmap for this talk Also not very related to WebRTC Something else is much more related ...
  • 54. Hello WHIP! or is it WISH? WISH = WebRTC Ingest Signaling over HTTPS WHIP = WebRTC-HTTP ingestion protocol We focused on WISH/WHIP which is still very new but is/will be a standard signalling protocol for WebRTC signalling just for media ingestion How does its attack surface look like?
  • 55.
  • 56. Attack surface for WISH/WHIP Inherits all the WebRTC potential security issues Removed the gateway element; seems irrelevant All the previous generic attack surface for signalling still mostly applies Also identified a few potential and specific attacks
  • 57.
  • 58. Limited attack surface The draft for WISH explains that certain things that are normally allowed in WebRTC are not allowed in WISH Examples no SDP renegotiation is supported = DoS on reneg will not be relevant SDP offer - sendonly SDP answer - recvonly and some other restrictions Great for security because they reduce the attack surface SDP is still there, still complex Complexity is the enemy of security
  • 59. Potential issues in WISH implementations
  • 60. Warning The above is theoretical because we did not properly test any implementations
  • 61. Potential issues in WISH implementations access control issues (or IDOR) on the resource location DoS with ICE restarts POST flooding traditional HTTP-style attacks; since it is HTTP specific
  • 62. Access control issues on the resource location POST /whip/endpoint HTTP/1.1 Host: whip.example.com Content-Type: application/sdp Content-Length: 1326 v=0 ... HTTP/1.1 201 Created ETag: "xyzzy" Content-Type: application/sdp Content-Length: 1400 Location: https://whip.example.com/resource/id v=0 ...
  • 63. Resource location security if there is no authentication and proper authorization .. if attackers can guess the resource location ... then they may send DELETE requests to all ongoing sessions and tear them down
  • 64. Flooding with PATCH requests PATCH /resource/id HTTP/1.1 Host: whip.example.com If-Match: "*" Content-Type: application/trickle-ice-sdpfrag Content-Length: 54 a=ice-ufrag:ysXw a=ice-pwd:vw5LmwG4y/e6dPP/zAP9Gp5k HTTP/1.1 200 OK ETag: "abccd" Content-Type: application/trickle-ice-sdpfrag Content-Length: 102 a=ice-lite a=ice-ufrag:289b31b754eaa438 a=ice-pwd:0b66f472495ef0ccac7bda653ab6be49ea13114472a5d10a
  • 65. Flooding with POST requests POST /whip/endpoint HTTP/1.1 Host: whip.example.com Content-Type: application/sdp Content-Length: 1326 v=0 o=- 5228595038118931041 2 IN IP4 127.0.0.1 s=-...
  • 66. Flooding with POST requests SDP may be very small or very large; different effects on the target This tends to be resource intensive functionality
  • 68. Gratitude Alfred Farrugia who assisted greatly with the contents and resources Dan Jenkins and the CommCon team for organising this event Our customers who keep it interesting for us 😄 Anyone who is contributing to RTC security!
  • 69. Key take aways Even if WebRTC is considered the most secure VoIP, there are attack vectors This also includes the web attack surface which is very familiar to many security professionals But also RTC specific vulnerabilities (more interesting to us) Vulnerabilities inherited from older applications/protocols
  • 70. What to do? Stay informed - we do our bit at At various stages of developing WebRTC and Video Delivery solutions ... Test Test Test! https://rtcsec.com/subscribe https://www.rtcsec.com/tags/webrtc-security/