Jump to content

Skype security: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Rescuing 4 sources and tagging 0 as dead. #IABot (v1.6.5)
m avoid unnec redirect
 
(34 intermediate revisions by 20 users not shown)
Line 1: Line 1:
{{Short description|How the video chat application protects itself from theft, damage, black hats}}{{Skype Limited}}
{{multiple issues|
'''[[Skype]]''' is a [[Voice over Internet Protocol]] (VoIP) system developed by Skype Technologies S.A. It is a [[peer-to-peer]] network where voice calls pass over the Internet rather than through a special-purpose network. Skype users can search for other users and send them messages.<ref>{{cite book|author=Jill Savege Scharff|title=Psychoanalysis Online: Mental Health, Teletherapy, and Training|url=https://books.google.com/books?id=b3WX4V9JCTMC&pg=PA183|year=2013|publisher=Karnac Books|isbn=978-1-78049-154-7|page=183}}</ref>
{{Original research|date=July 2012}}
{{update|date=October 2008}}
}}


Skype reports that it uses 256 [[bit]] Advanced Encryption Standard [[Advanced Encryption Standard|(AES)/ Rijnadel]] encryption to communicate between Skype clients; although when calling a telephone or mobile, the part of the call over the public switched telephone network ([[PSTN]]) is not encrypted.<ref name="doesencrypt">{{cite web |author=<!--not stated--> |date=<!--not stated, Microsoft copyright 2022--> |title=Does Skype use encryption? |url=https://support.skype.com/en/faq/fa31/does-skype-use-encryption |access-date=12 July 2022 |website=Skype Support}}</ref><ref>{{cite web|url=http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf |title=National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information |author=Lynn Hathaway |date=June 2003 |access-date=2008-11-02 |archive-url = https://web.archive.org/web/20080528105849/http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf |archive-date = 2008-05-28}}</ref> User public keys are certified by the Skype server at login with 1536-bit or 2048-bit [[RSA (cryptosystem)|RSA certificates]]. Skype's encryption is inherent in the [[Skype Protocol]] and is transparent to callers. Some private conversations through Skype such as audio calls, text messages, and file sending (image, audio, or video) can make use of [[end-to-end encryption]], but it may have to be manually turned on.<ref>{{Cite web|title=What are Skype Private Conversations? {{!}} Skype Support|url=https://support.skype.com/en/faq/FA34824/what-are-skype-private-conversations|access-date=2022-01-26|website=support.skype.com|language=en}}</ref>
{{Skype Limited}}
'''[[Skype]]''' is a [[Voice over Internet Protocol]] (VoIP) system developed by Skype Technologies S.A. It is a [[peer-to-peer]] network in which voice calls pass over the Internet rather than through a special-purpose network. Skype users can search for other users and send them messages.<ref>{{Cite book|url=https://books.google.co.in/books?id=b3WX4V9JCTMC&pg=PA183&lpg=PA183&dq=Skype+users+can+search+for+other+users+and+send+them+messages.&source=bl&ots=dQdJ8loR5I&sig=K1Z66rCVlhKMDSrgmFbsZQxAceg&hl=en&sa=X&ved=0ahUKEwjD18Gzj-PXAhXMp48KHSNPCt0Q6AEITjAH#v=onepage&q=Skype%20users%20can%20search%20for%20other%20users%20and%20send%20them%20messages.&f=false|title=Psychoanalysis Online: Mental Health, Teletherapy, and Training|last=Scharff|first=Jill Savege|date=2013|publisher=Karnac Books|isbn=9781780491547|language=en}}</ref>{{citation needed|date=July 2014}}

Skype uses 256 [[bit]] [[Advanced Encryption Standard|AES]] to encrypt communication between users, although when calling a telephone or mobile, the part of the call over the [[PSTN]] is not encrypted.<ref>{{cite web|url=https://support.skype.com/en/faq/FA31/does-skype-use-encryption?q=security |title=Does Skype use encryption? |author=Skype Technologies S.A}}</ref><ref>{{cite web|url=http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf |title=National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information |author=Lynn Hathaway |date=June 2003 |format=PDF |accessdate=2008-11-02 |archiveurl = https://web.archive.org/web/20080528105849/http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf |archivedate = 2008-05-28}}</ref> Skype's encryption is inherent in the [[Skype Protocol]] and is transparent to callers. Skype is not considered to be a secure VoIP system as the calls made over the network do not make use of [[end-to-end encryption]], allowing for routine monitoring by Microsoft and by government agencies.<ref>{{cite web|url=https://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data|publisher=The Guardian|title=Microsoft handed the NSA access to encrypted messages}}</ref>


== Security policy ==
== Security policy ==
The company's security policy includes:
The company's security policy states that:

#Usernames are unique.
# Usernames are unique.
#Callers must present a username and password or other authentication credential.
# Callers must present a username and password or another authentication credential.
#Each caller provides the other with proof of identity and privileges whenever a session is established. Each verifies the other’s proof before the session is allowed to carry messages.
# Each caller provides the other with proof of identity and privileges whenever a session is established. Each verifies the other's evidence before the session can carry messages.
#Messages transmitted are encrypted from caller to caller.{{dubious|date=June 2013}} No intermediate node ([[router (computing)|router]]) has access to the meaning of these messages. This claim has been undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URLs embedded in a Skype conversation;<ref>{{cite web|url=http://nakedsecurity.sophos.com/2013/05/22/microsofts-reading-skype-messages/|title=Microsoft is reading Skype messages}}</ref> this could only happen if Microsoft has access to the unencrypted form of these messages.
# Messages transmitted between Skype users (with no PSTN users included) are encrypted from caller to caller.<ref name=doesencrypt/> No intermediate node ([[router (computing)|router]]) has access to the meaning of these messages. This claim was undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URLs embedded in a Skype conversation;<ref>{{cite web|url=http://nakedsecurity.sophos.com/2013/05/22/microsofts-reading-skype-messages/|title=Microsoft is reading Skype messages|date=22 May 2013 }}</ref><ref>{{Cite web |last=Goodin |first=Dan |date=2013-05-20 |title=Think your Skype messages get end-to-end encryption? Think again |url=https://arstechnica.com/information-technology/2013/05/think-your-skype-messages-get-end-to-end-encryption-think-again/ |access-date=2022-07-13 |website=Ars Technica |language=en-us}}</ref> this could only happen if Microsoft has access to the unencrypted form of these messages.


== Implementation and protocols ==
== Implementation and protocols ==


=== Registration ===
=== Registration ===
Skype holds registration information both on the caller's computer and on a Skype server. Skype uses this information to authenticate call recipients and to assure that callers seeking authentication are accessing a Skype server rather than an impostor. Skype uses [[public key encryption]] as defined by [[RSA (algorithm)|RSA]] to accomplish this.
Skype holds registration information both on the caller's computer and on a Skype server. Skype uses this information to authenticate call recipients and assure that callers seeking authentication access a Skype server rather than an impostor. Skype says that it uses [[Public key encryption|public-key encryption]] as defined by [[RSA (algorithm)|RSA]] to accomplish this.


The Skype server has a private key, and distributes that key's public counterpart with every copy of the software. As part of user registration, the user selects a desired username and password. Skype locally generates public and private keys. The private key and a hash of the password are stored on the user's computer.
The Skype server has a private key and distributes that key's public counterpart with every copy of the software. As part of user registration, the user selects a desired username and password. Skype locally generates public and private keys. The private key and a password hash are stored on the user's computer.


Then a 256-bit [[Advanced Encryption Standard|AES]]-encrypted session is established with the Skype server. The client creates a ''session key'' using its [[random number generator]].
Then a 256-bit [[Advanced Encryption Standard|AES]]-encrypted session is established with the Skype server. The client creates a ''session key'' using its [[random number generator]].


The Skype server verifies that the selected username is unique and that follows Skype's naming rules. The server stores the username and a hash of the hash of the user's password <math>[H(H(P))]</math> in its database.
The Skype server verifies that the selected username is unique and follows Skype's naming rules. The server stores the username and a hash of the user's password [ H ( H ( P ) ) ] {\displaystyle [H(H(P))]} in its database.


The server now forms and signs an identity certificate for the username that binds the username, its verification key and the key identifier.
The server now forms and signs an identity certificate for the username that binds the username, verification key, and key identifier.


=== Peer-to-peer key agreement ===
=== Peer-to-peer key agreement ===
For each call, Skype creates a session with a 256-bit session key. This session exists as long as communication continues and for a fixed time afterward. As part of connecting a call, Skype securely transmits the session key to the call recipient. That session key is then used to encrypt messages in both directions.
For each call, Skype creates a session with a 256-bit session key. This session exists as long as communication continues and for a fixed time afterward. Skype securely transmits the session key to the call recipient as part of connecting a call. That session key is then used to encrypt messages in both directions.

Session cryptography


=== Session cryptography ===
=== Session cryptography ===
All traffic in a session is encrypted using the [[Advanced Encryption Standard|AES]] algorithm running in [[Counter mode|Integer Counter Mode]] (ICM). Skype encrypts the current counter and a [[Salt (cryptography)|salt]] with the session key using the 256 bit AES [[algorithm]]. This returns the key stream, which is then [[XOR]]ed with the message content. This produces encrypted ciphertext, which is then transmitted to the recipient. Skype sessions contain multiple streams. The ICM counter depends on the stream, and the location within the stream.
All traffic in a session is encrypted using the AES algorithm running in [[Counter mode|Integer Counter Mode]] (ICM). Skype encrypts the current counter and salt with the session key using the 256 bit AES [[algorithm]]. This algorithm returns the keystream, then [[XOR|XORed]] with the message content. Skype sessions contain multiple streams. The ICM counter depends on the stream and the location within the stream.


=== Random number generation ===
=== Random number generation ===
Skype uses random numbers for several cryptographic purposes, for instance as a protection against playback attacks, creation of [[RSA (algorithm)|RSA]] key pairs, and creation of [[Advanced Encryption Standard|AES]] key-halves for content encryption. The security of a Skype [[peer-to-peer]] session depends significantly on the quality of the random numbers generated by both ends of the Skype session. Random number generation varies by operating system.<ref>[http://www1.cs.columbia.edu/~salman/skype/skype2.pdf Vanilla Skype an overview of skype clients and protocols]</ref>
Skype uses random numbers for several cryptographic purposes. Purposes include protection against playback attacks, creation of RSA key pairs, and creation of AES key-halves for content encryption. The security of a Skype [[peer-to-peer]] session depends significantly on the quality of the random numbers generated by both ends of the Skype session. Random number generation varies by the operating system.<ref>[http://www1.cs.columbia.edu/~salman/skype/skype2.pdf Vanilla Skype an overview of skype clients and protocols]</ref>


=== Cryptographic primitives ===
=== Cryptographic primitives ===
Skype uses standard cryptographic primitives to achieve its security goals. The cryptographic primitives used in Skype are: the [[Advanced Encryption Standard|AES]] block cipher, the [[RSA (algorithm)|RSA]] public-key cryptosystem, the [[International Organization for Standardization|ISO]] 9796-2 signature padding scheme, the [[SHA-1]] hash function, and the [[RC4]] stream cipher.
Skype uses standard cryptographic primitives to achieve its security goals. The cryptographic primitives used in Skype are the AES block cipher, the RSA public-key cryptosystem, the [[International Organization for Standardization|ISO]] 9796-2 signature padding scheme, the [[SHA-1]] hash function, and the [[RC4]] stream cipher.


=== Key agreement protocol ===
=== Key agreement protocol ===
Key-agreement is achieved using a proprietary, symmetric protocol. To protect against a playback attack, the peers challenge each other with random 64-bit [[Cryptographic nonce|nonces]]. The challenge response is to customize the challenge in a proprietary way and returned it signed with the responder’s private key.
Key-agreement is achieved using a proprietary, symmetric protocol. To protect against a playback attack, the peers challenge each other with random 64-bit [[Cryptographic nonce|nonces]]. The challenge response is to customize the challenge in a proprietary way and returned it signed with the responder's private key.


The peers exchange Identity Certificates and confirm that these certificates are legitimate. Because an Identity Certificate contains a public key, each end can then confirm signatures created by the other peer. Each peer contributes 128 random bits to the 256-bit session key.
The peers exchange Identity Certificates and confirm that these certificates are legitimate. Because an Identity Certificate contains a public key, each end can then confirm signatures created by the other peer. Each peer contributes 128 random bits to the 256-bit session key.


=== Automatic updates ===
=== Automatic updates ===
Another security risk are automatic updates, which '''cannot be disabled''' from version 5.6 on,<ref>{{cite web|url=http://blogs.skype.com/garage/2012/03/skype_56_for_mac.html|title=Skype 5.6 for Mac|deadurl=yes|archiveurl=https://web.archive.org/web/20120406192256/http://blogs.skype.com/garage/2012/03/skype_56_for_mac.html|archivedate=2012-04-06|df=}}</ref><ref>{{cite web | url= http://community.skype.com/t5/Windows/I-want-to-turn-off-automatic-updates/td-p/51134/highlight/true |title=I want to turn off automatic updates}}</ref> both on Mac OS and Windows branches, although in the latter, and only from version 5.9 on, automatic updating can be turned off in certain cases.<ref>{{cite web | url= http://blogs.skype.com/garage/2012/04/skype_59_for_windows.html | title= Skype 5.9 for Windows | deadurl= yes | archiveurl= https://web.archive.org/web/20120414235334/http://blogs.skype.com/garage/2012/04/skype_59_for_windows.html | archivedate= 2012-04-14 | df= }}</ref>
Another security risk are automatic updates, which '''cannot be disabled''' from version 5.6 on,<ref>{{cite web|url=http://blogs.skype.com/garage/2012/03/skype_56_for_mac.html|title=Skype 5.6 for Mac|url-status=dead|archive-url=https://web.archive.org/web/20120406192256/http://blogs.skype.com/garage/2012/03/skype_56_for_mac.html|archive-date=2012-04-06}}</ref><ref>{{cite web | url= http://community.skype.com/t5/Windows/I-want-to-turn-off-automatic-updates/td-p/51134/highlight/true |title=I want to turn off automatic updates}}</ref> both on Mac OS and Windows branches, although in the latter, and only from version 5.9 on, automatic updating can be turned off in certain cases.<ref>{{cite web | url= http://blogs.skype.com/garage/2012/04/skype_59_for_windows.html | title= Skype 5.9 for Windows | url-status= dead | archive-url= https://web.archive.org/web/20120414235334/http://blogs.skype.com/garage/2012/04/skype_59_for_windows.html | archive-date= 2012-04-14 }}</ref>


== Eavesdropping by design ==
== Eavesdropping by design ==
Chinese, Russian and United States law enforcement agencies have the ability to eavesdrop on Skype conversations, as well as have access to Skype users' geographic locations. In many cases, simple request for information is sufficient, and no court approval is needed. This ability was deliberately added by [[Microsoft]] after they purchased Skype in 2011 for the law enforcement agencies around the world. This is implemented through switching the Skype client for a particular user account from the client-side encryption to the server-side encryption, allowing dissemination of an unencrypted data stream.<ref>[http://www.vedomosti.ru/politics/news/10030771/skype_proslushivayut Russian law enforcement has been granted the ability to eavesdrop on Skype conversations. (In Russian)]</ref><ref>[http://news.softpedia.com/news/Skype-Provided-Backdoor-Access-to-the-NSA-Before-Microsoft-Takeover-NYT-362384.shtml Skype Provided Backdoor Access to the NSA Before Microsoft Takeover]</ref>
Chinese, Russian and United States law enforcement agencies have the ability to eavesdrop on Skype conversations and to have access to Skype users' geographic locations. In many cases, a simple request for information is sufficient, with no court approval needed. This ability was deliberately added by [[Microsoft]] for law enforcement agencies around the world after they purchased Skype in 2011. This is implemented by switching the Skype client for a particular user account from the client-side encryption to the server-side encryption, allowing dissemination of an unencrypted data stream.<ref>{{cite web |url=https://www.vedomosti.ru/politics/articles/2013/03/14/skype_proslushivayut |title=Российским спецслужбам дали возможность прослушивать Skype|language=ru|trans-title=Russian law enforcement has been granted the ability to eavesdrop on Skype conversations |website=Ведомости (Vedomosti)|date=14 March 2013 |author1=Елизавета Серьгина|author2=Алексей Никольский|author3=Александр Силонов|access-date= 25 July 2020}}</ref><ref>{{cite web |url=https://news.softpedia.com/news/Skype-Provided-Backdoor-Access-to-the-NSA-Before-Microsoft-Takeover-NYT-362384.shtml |title=Skype Provided Backdoor Access to the NSA Before Microsoft Takeover (NYT) |website=Softpedia|date=20 June 2013|author=Bogdan Popa}}</ref><ref>{{cite web |url=https://news.softpedia.com/news/Leaked-Documents-Shows-the-NSA-Had-Full-Access-to-Skype-Chats-468691.shtml |title=Leaked Documents Show the NSA Had Full Access to Skype Chats |website=Softpedia|date=31 December 2014 |author=Bogdan Popa}}</ref>
<ref>[http://news.softpedia.com/news/Leaked-Documents-Shows-the-NSA-Had-Full-Access-to-Skype-Chats-468691.shtml Leaked Documents Show the NSA Had Full Access to Skype Chats]</ref>


== Flaws and potential flaws ==
== Actual and potential flaws ==
While Skype encrypts users' sessions, other traffic, including call initiation, can be monitored by unauthorized parties.
While Skype encrypts users' sessions, other traffic, including call initiation, can be monitored by unauthorized parties.


The other side of security is whether Skype imposes risk on its users' computers and networks. In October 2005 a pair of security flaws were discovered and patched. Those flaws made it possible for hackers to run hostile code on computers running vulnerable versions of Skype. The first security bug affected only [[Microsoft Windows]] computers. It allowed the attacker to use a [[buffer overflow]] to crash the system or to force it to execute arbitrary code. The attacker could provide a malformed [[URL]] using the Skype [[URI]] format, and lure the user to request it to execute the attack. The second security bug affected all platforms; it used a [[Dynamic memory allocation|heap]]-based buffer overflow to make the system vulnerable.
The other side of security is whether Skype imposes risk on its users' computers and networks. In October 2005 a pair of security flaws were discovered and patched. Those flaws made it possible for hackers to run hostile code on computers running vulnerable versions of Skype. The first security bug affected only [[Microsoft Windows]] computers. It allowed the attacker to use a [[buffer overflow]] to crash the system or to force it to execute arbitrary code. The attacker could provide a malformed [[URL]] using the Skype [[URI]] format, and lure the user to request it to execute the attack. The second security bug affected all platforms; it used a [[Dynamic memory allocation|heap]]-based buffer overflow to make the system vulnerable.
<!--The Skype code is [[proprietary software|proprietary]] and [[closed source]], and it is not planned to become [[open-source software]], according to one of Skype's co-founders:
{{quotation|"We could do it but only if we re-engineered the way it works and we don't have the time right now."|Niklas Zennström, co-founder of Skype, responding to the Skype security model<ref>{{cite news | url=https://www.theregister.co.uk/2004/06/15/voip_and_skype/page3.html | title=VoIP suffers identity crisis | date=June 15, 2004 | publisher=The Register}}</ref>}}---How is this relevant to security? See below for peer review issue.-->


Issues, including several potentially affecting security, include:
* 13 November 2012, a Russian user published a flaw in Skype security which allowed any non-professional attacker to take over a Skype account knowing only the victim's email using 7 simple steps.<ref>{{cite web|url=http://www.geek.com/articles/geek-pick/skype-accounts-can-be-hacked-with-an-email-address-20121114/ |title=Skype accounts can be hacked with an email address}}</ref><ref>{{cite web|url=http://habrahabr.ru/post/158545/ |title=Уязвимость в skype, позволяющая угнать любой аккаунт}}</ref> This vulnerability was claimed to exist for months, and existed for more than 12 hours since it was published widely.
* Skype code is [[proprietary software|proprietary]] and [[closed source]], and it is not planned to become [[open-source software]], according to Niklas Zennström, co-founder of Skype, who responded in 2004 to questions on the Skype security model saying "We could do it but only if we re-engineered the way it works and we don't have the time right now".<ref>{{cite news | url=https://www.theregister.co.uk/2004/06/15/voip_and_skype/page3.html | title=VoIP suffers identity crisis | date=June 15, 2004 | publisher=The Register}}</ref> If the software source were available [[peer review]] would be able to verify its security.<ref name=pbfd/>
*By default, Skype also records data about calls (but not the message contents) in a "History" file saved on the user's computer. Attackers who gain access to the computer can obtain the file.<ref>[[Simson Garfinkel]] - [[VoIP]] and Skype Security</ref>
* On 13 November 2012 a Russian user published a flaw in Skype security which allowed any non-professional attacker to take over a Skype account knowing only the victim's email in seven simple steps.<ref>{{cite web |url=http://www.geek.com/articles/geek-pick/skype-accounts-can-be-hacked-with-an-email-address-20121114/ |title=Skype accounts can be hacked with an email address |access-date=2012-11-15 |archive-date=2017-10-18 |archive-url=https://web.archive.org/web/20171018183057/https://www.geek.com/geek-pick/skype-accounts-can-be-hacked-with-an-email-address-1528410/ |url-status=dead }}</ref><ref>{{cite web|url=http://habrahabr.ru/post/158545/ |title=Уязвимость в skype, позволяющая угнать любой аккаунт|date=13 November 2012 }}</ref> This vulnerability was claimed to exist for months, and was not corrected until more than 12 hours after it was published widely.
*The fact that Skype records data about calls (but not the message contents) in a "History" file saved on the user's computer. Attackers who gain access to the computer can obtain the file.<ref>[[Simson Garfinkel]] - [[VoIP]] and Skype Security</ref>
* Skype can consume other users' bandwidth. Although this is documented in the license agreement ([[EULA]]), there is no way to tell how much bandwidth is being used in this manner.<ref name=max2006/>
* Skype can consume other users' bandwidth. Although this is documented in the license agreement ([[EULA]]), there is no way to tell how much bandwidth is being used in this manner.<ref name=max2006/>
* There are some 20,000 [[supernode (networking)|supernode]]s out of many millions of users logged on. Skype Guide for network administrators claims that supernodes carry only control traffic up to 10 [[kilobyte|kB]]/s and relays may carry other user data traffic up to 15 kB/s (for one audio conference call). A relay should not normally handle more than one "relayed connection".<ref name=max2006>{{cite web | url=https://www.amazon.com/dp/032140940X/ | title=Skype: The Definitive Guide | first=Harry |last=Max |publisher=Que Publishing |accessdate=2006-08-22}}</ref><ref>
* There are some 20,000 [[supernode (networking)|supernodes]] out of many millions of users logged on. Skype Guide for network administrators claims that supernodes carry only control traffic up to 10 [[kilobyte|kB]]/s and relays may carry other user data traffic up to 15 kB/s (for one audio conference call). A relay should not normally handle more than one "relayed connection".<ref name=max2006>{{cite book | title=Skype: The Definitive Guide | first=Harry |last=Max | year=2006 |publisher=Que Publishing | isbn=032140940X }}</ref><ref>
{{cite web | url=http://kirils.org/skype/stuff/pdf/2006/guide-for-network-admins-30beta.pdf | title=Guide for network admins }}</ref>
{{cite web | url=http://kirils.org/skype/stuff/pdf/2006/guide-for-network-admins-30beta.pdf | title=Guide for network admins }}</ref>

* Skype's file-transfer function does not integrate with any [[antivirus software|antivirus products]], although Skype claims to have tested its product against antivirus "Shield" products.<ref name=max2006/>
* Skype's file-transfer function does not integrate with any [[antivirus software|antivirus products]], although Skype claims to have tested its product against antivirus "Shield" products.<ref name=max2006/>
* Skype does not document all communication activities. This lack of clarity as to content means that systems administrators cannot be sure what it is doing. (The combination of an invited and a reverse-engineered study taken together suggest Skype is not doing anything hostile){{citation needed|date=January 2013}}. Skype can be easily blocked by [[Firewall (computing)|firewalls]].<ref name=max2006/>
* Skype does not document all communication activities. This lack of clarity as to content means that systems administrators cannot be sure what it is doing. (The combination of an invited and a reverse-engineered study taken together suggest Skype is not doing anything hostile){{citation needed|date=January 2013}}. Skype can be easily blocked by [[Firewall (computing)|firewalls]].<ref name=max2006/>
* Skype consumes network bandwidth, even when idle (even for non-supernodes, e.g., for [[NAT traversal]]). For example, if there were only 3 Skype users in the world and 2 were communicating, the 3rd computer would be taxed to support the application, even if not using Skype at the time. The large number of Skype computers means that this activity is diffuse, it can lead to performance issues on standby Skype users, and presents a conduit for security breaches.<ref>This is similar to the type of granted access that the [[SETI]] download applications presented.</ref><ref name=pbfd>{{cite web | url=https://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up.pdf | title=Silver Needle in the Skype | first1=Philippe |last1=Biondi |first2=Fabrice |last2=DESCLAUX | publisher=blackhat | accessdate=2006-03-02 }}</ref>
* Skype consumes network bandwidth, even when idle (even for non-supernodes, e.g., for [[NAT traversal]]). For example, if there were only 3 Skype users in the world and 2 were communicating, the 3rd computer would be taxed to support the application, even if not using Skype at the time. The large number of Skype computers means that this activity is diffuse, it can lead to performance issues on standby Skype users, and presents a conduit for security breaches.<ref>This is similar to the type of granted access that the [[SETI]] download applications presented.</ref><ref name=pbfd>{{cite web | url=https://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up.pdf | title=Silver Needle in the Skype | first1=Philippe |last1=Biondi |first2=Fabrice |last2=DESCLAUX | publisher=blackhat | access-date=2006-03-02 }}</ref>
* Skype implicitly trusts any message stream that obeys its protocols<ref name=pbfd/>
* Skype implicitly trusts any message stream that obeys its protocols<ref name=pbfd/>
* Skype does not prohibit a parallel Skype-like network<ref name=pbfd/>
* Skype does not prohibit a parallel Skype-like network<ref name=pbfd/>
* Skype makes it hard to enforce a corporate security policy<!--how?--><ref name=pbfd/>
* Lack of [[peer review]] prohibits external security code verification.<ref name=pbfd/>
* Skype prior to version 3.0.0.216 created a file called 1.com in the temp directory which was capable of reading all BIOS data from a PC.<ref>
* Skype prior to version 3.0.0.216 created a file called 1.com in the temp directory which was capable of reading all BIOS data from a PC.<ref>
pagetable.com » Blog Archive » [http://www.pagetable.com/?p=27 Skype Reads Your BIOS and Motherboard Serial Number]</ref> According to Skype this was used to identify computers and provide [[Digital Rights Management|DRM]] protection for plug-ins. They later removed this file, but it isn't known whether the BIOS-reading behavior was removed.<ref>
pagetable.com » Blog Archive » [http://www.pagetable.com/?p=27 Skype Reads Your BIOS and Motherboard Serial Number]</ref> According to Skype this was used to identify computers and provide [[Digital rights management|DRM]] protection for plug-ins. They later removed this file, but it is not known whether the BIOS-reading behavior was removed.<ref>
Skype Security Blog - [http://share.skype.com/sites/security/2007/02/skype_extras_plugin_manager.html Skype Extras plug-in manager] {{webarchive|url=https://web.archive.org/web/20081019182955/http://share.skype.com/sites/security/2007/02/skype_extras_plugin_manager.html |date=2008-10-19 }}</ref><ref>
Skype Security Blog - [http://share.skype.com/sites/security/2007/02/skype_extras_plugin_manager.html Skype Extras plug-in manager] {{webarchive|url=https://web.archive.org/web/20081019182955/http://share.skype.com/sites/security/2007/02/skype_extras_plugin_manager.html |date=2008-10-19 }}</ref><ref>
The Register » [https://www.theregister.co.uk/2007/02/11/skype_bios_snoop/ Skype snoop agent reads mobo serial numbers]</ref>
The Register » [https://www.theregister.co.uk/2007/02/11/skype_bios_snoop/ Skype snoop agent reads mobo serial numbers]</ref>
* The URI handler that checks URLs for verification of certain file extensions and file formats uses case sensitive comparison techniques and doesn't check all potential file formats.<ref>{{cite web | url=http://www.gnucitizen.org/blog/vulnerabilities-in-skype| title=Vulnerabilities in Skype | access-date=2008-01-17 }}</ref><ref>{{cite web|last=Claburn |first=Thomas |url=http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=205901683 |title=Skype Addresses Cross-Zone Scripting Vulnerability - Security |publisher=InformationWeek |access-date=2010-06-09}}</ref>

* While Skype does encrypt most of its communications, unencrypted packets containing advertisements are pulled from several places, exposing a [[cross-site scripting]] vulnerability. These ads can easily be hijacked and replaced with malicious data.<ref>{{cite web|url=https://support.skype.com/en/faq/FA34649/protecting-your-online-safety-security-and-privacy |title=Skype File URI Security Bypass Code Execution Vulnerability |publisher=Skype.com |access-date=2010-06-09}}</ref>
* The URI handler that checks URLs for verification of certain file extensions and file formats uses case sensitive comparison techniques and doesn’t check all potential file formats.<ref>{{cite web | url=http://www.gnucitizen.org/blog/vulnerabilities-in-skype| title=Vulnerabilities in Skype | accessdate=2008-01-17 }}</ref><ref>{{cite web|last=Claburn |first=Thomas |url=http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=205901683 |title=Skype Addresses Cross-Zone Scripting Vulnerability - Security |publisher=InformationWeek |date= |accessdate=2010-06-09}}</ref>
* The privacy of Skype traffic may have limits. Although Skype encrypts communication between users, a Skype spokesman did not deny the company's ability to intercept communication. On the question of whether Skype could listen in on their users' communication, Kurt Sauer, head of the security division of Skype, replied evasively: "We provide a secure means of communication. I will not say if we are listening in or not."<ref>
* While Skype does encrypt most of its communications, packets containing advertisements are unencrypted which are pulled from several places, exposing a [[cross-site scripting]] vulnerability. These ads can easily be hijacked and replaced with malicious data.<ref>{{cite web|url=https://support.skype.com/en/faq/FA34649/protecting-your-online-safety-security-and-privacy |title=Skype File URI Security Bypass Code Execution Vulnerability |publisher=Skype.com |date= |accessdate=2010-06-09}}</ref>
ZDNet: [http://www.zdnet.de/mobile/voip/0,39029944,39151472-1,00.htm ''Interview with Kurt Sauer „Telefonieren übers Internet: Wie sicher ist Skype wirklich?“''], February 13, 2007</ref> In China text is filtered according to government requirements. This suggests that Skype has the capacity to eavesdrop on connections.<ref>guli.com: [http://www.gulli.com/news/auch-skype-blockt-jetzt-2006-04-19/ ''Textfilter in China''], 19. April 2006</ref> One of Skype's minority owners, [[eBay]], has divulged user information to the U.S. government.<ref>{{cite web|url=http://www.heise.de/newsticker/meldung/25199/ |title=heise online - eBays neue Richtlinien in der Kritik |publisher=Heise.de |access-date=2010-06-09}}</ref><ref>{{cite web|url=http://www.intern.de/news/neue--meldungen/--200711232857.html |title=Skype-Gespräche unantastbar? |publisher=intern.de |date=2007-11-23 |access-date=2010-06-09}}</ref>
* The privacy of Skype traffic may have limits. Although Skype encrypts communication between users, a Skype spokesman did not deny the company's ability to intercept the communication. On the question of whether Skype could listen in on their users' communication, Kurt Sauer, head of the security division of Skype, replied evasively: "We provide a secure means of communication. I will not say if we are listening in or not."<ref>
ZDNet: [http://www.zdnet.de/mobile/voip/0,39029944,39151472-1,00.htm ''Interview with Kurt Sauer „Telefonieren übers Internet: Wie sicher ist Skype wirklich?“''], February 13, 2007</ref> In China text is filtered according to government requirements. This suggests that Skype has the capacity to eavesdrop on connections.<ref>guli.com: [http://www.gulli.com/news/auch-skype-blockt-jetzt-2006-04-19/ ''Textfilter in China''], 19. April 2006</ref> One of Skype's minority owners, [[eBay]], has divulged user information to the U.S. government.<ref>{{cite web|url=http://www.heise.de/newsticker/meldung/25199/ |title=heise online - eBays neue Richtlinien in der Kritik |publisher=Heise.de |date= |accessdate=2010-06-09}}</ref><ref>{{cite web|url=http://www.intern.de/news/neue--meldungen/--200711232857.html |title=Skype-Gespräche unantastbar? |publisher=intern.de |date=2007-11-23 |accessdate=2010-06-09}}</ref>

* Security researchers Biondi and Desclaux have speculated that Skype may have a [[Backdoor (computing)|back door]], since Skype sends traffic even when it is turned off and because Skype has taken extreme measures to obfuscate their traffic and functioning of their program.<ref>{{cite web
* Security researchers Biondi and Desclaux have speculated that Skype may have a [[Backdoor (computing)|back door]], since Skype sends traffic even when it is turned off and because Skype has taken extreme measures to obfuscate their traffic and functioning of their program.<ref>{{cite web
| author=Biondi P., Desclaux F
| author=Biondi P., Desclaux F
Line 89: Line 81:
| publisher=EADS Corporate Research Center
| publisher=EADS Corporate Research Center
| date=2–3 March 2006
| date=2–3 March 2006
| accessdate=26 January 2009
| access-date=26 January 2009
}}</ref>
}}</ref> Several media sources have reported that at a meeting about the "Lawful interception of IP based services" held on 25 June 2008, high-ranking but not named officials at the Austrian interior ministry said that they could listen in on Skype conversations without problems. Austrian public broadcasting service [[Österreichischer Rundfunk|ORF]], citing minutes from the meeting, have reported that "the Austrian police are able to listen in on Skype connections".<ref>{{cite web
* Several media sources have reported that at a meeting about the "Lawful interception of IP based services" held on 25 June 2008, high-ranking but unnamed officials at the Austrian interior ministry said that they could listen in on Skype conversations without problems. Austrian public broadcasting service [[Österreichischer Rundfunk|ORF]], citing minutes from the meeting, have reported that "the Austrian police are able to listen in on Skype connections".<ref>{{cite web
|last = Sokolov
|last = Sokolov
|first = David AJ
|first = David AJ
Line 97: Line 90:
|publisher = Heise Security UK
|publisher = Heise Security UK
|date = 24 July 2008
|date = 24 July 2008
|accessdate = 26 January 2009
|access-date = 26 January 2009
|deadurl = yes
|url-status = dead
|archiveurl = https://web.archive.org/web/20100713002734/http://www.h-online.com/security/news/item/Speculation-over-back-door-in-Skype-736607.html
|archive-url = https://web.archive.org/web/20100713002734/http://www.h-online.com/security/news/item/Speculation-over-back-door-in-Skype-736607.html
|archivedate = 13 July 2010
|archive-date = 13 July 2010
|df =
}}</ref><ref>{{cite web
}}</ref><ref>{{cite web
| last=Leyde
| last=Leyde
Line 109: Line 101:
| publisher=The Register UK
| publisher=The Register UK
| date=24 July 2008
| date=24 July 2008
| accessdate=29 January 2009
| access-date=29 January 2009
}}</ref> Skype declined to comment on the reports.<ref>{{cite web
}}</ref> Skype declined to comment on the reports.<ref>{{cite web
| last=Vilde
| last=Vilde
Line 117: Line 109:
| publisher=Ohmproject
| publisher=Ohmproject
| date=27 July 2008
| date=27 July 2008
| accessdate=29 January 2009
| access-date=29 January 2009
}}</ref>
}}</ref>
* The Skype client for Linux has been observed accessing the Firefox profile folder during execution.<ref>{{cite web

* The Skype client for Linux has been observed accessing Firefox profile folder during execution.<ref>{{cite web
| url = http://yro.slashdot.org/story/07/08/26/1312256/Skype-Linux-Reads-Password-and-Firefox-Profile
| url = http://yro.slashdot.org/story/07/08/26/1312256/Skype-Linux-Reads-Password-and-Firefox-Profile
| title = Skype Linux Reads Password and Firefox Profile - Slashdot
| title = Skype Linux Reads Password and Firefox Profile - Slashdot
| date = August 26, 2007
| date = August 26, 2007
}}</ref> This folder contains all the saved passwords in plain text if no master password is used, it also contains user's browsing history. Access to this file was confirmed by tracing system calls made by the Skype binary during execution.<ref>{{cite web|url=http://forum.skype.com/index.php?showtopic=95261 |title=Skype 1.4.0.99 reads /etc/ passwd and firefox profile! - Skype Community |date=August 25, 2007 |deadurl=unfit |archiveurl=https://web.archive.org/web/20111013133800/http://forum.skype.com/index.php?showtopic=95261 |archivedate=October 13, 2011 }}</ref>
}}</ref> This folder contains all the saved passwords in plain text if no master password is used, it also contains the user's browsing history. Access to this file was confirmed by tracing system calls made by the Skype binary during execution.<ref>{{cite web|url=http://forum.skype.com/index.php?showtopic=95261 |title=Skype 1.4.0.99 reads /etc/ passwd and firefox profile! - Skype Community |date=August 25, 2007 |url-status=unfit |archive-url=https://web.archive.org/web/20111013133800/http://forum.skype.com/index.php?showtopic=95261 |archive-date=October 13, 2011 }}</ref>
* The Skype client for Mac has been observed accessing protected information in the system Address Book even when integration with the Address Book (on by default) is disabled in the Skype preferences. Users may see a warning about Skype.app attempting to access protected information in the address book under certain conditions, e.g. launching Skype while syncing with a mobile device.

* The Skype client for Mac has been observed accessing protected information in the system Address Book even when integration with the Address Book (on by default) is disabled in the Skype preferences. Users may see a warning about Skype.app attempting to access protected information in address book under certain conditions, e.g. launching Skype while syncing with a mobile device. Skype has no legitimate reason to access the Address Book if the integration is not enabled. Further, the extent of the integration is to add all cards from the Address Book to the list of Skype contacts along with their phone numbers, which can be accomplished without accessing any protected information (neither the name nor numbers on cards are protected) and thus the attempt to access information beyond the scope of the integration, regardless of whether or not that integration is enabled, raises deeper questions as to possible spying on users.
* Skype has no legitimate reason to access the Address Book if the integration is not enabled. Further, the extent of the integration is to add all cards from the Address Book to the list of Skype contacts along with their phone numbers, which can be accomplished without accessing any protected information (neither the name nor numbers on cards are protected) and thus the attempt to access information beyond the scope of the integration, regardless of whether or not that integration is enabled, raises deeper questions as to possible spying on users.
* The United States [[Federal Communications Commission]] (FCC) has interpreted the [[Communications Assistance for Law Enforcement Act]] (CALEA) as requiring digital phone networks to allow [[wiretapping]] if authorized by an FBI warrant, in the same way as other phone services. In February 2009 Skype said that, not being a telephone company owning phone lines, it is exempt from CALEA and similar laws which regulate US phone companies, and in fact it is not clear whether Skype could support wiretapping even if it wanted to.<ref name=voipnews>{{cite web|url=http://www.voip-news.com/feature/skype-secrecy-attack-022409 |title=Skype Secrecy Under Attack Again |publisher=VoIP News |date=2009-02-24 |accessdate=2010-10-10}}</ref> According to the [[ACLU]], the Act is inconsistent with the original intent of the [[Fourth Amendment to the U.S. Constitution]];<ref name="ACLU 1999">{{cite web|url=https://www.aclu.org/privacy/spying/15440pub19980301.html|title=Big Brother in the Wires: Wiretapping in the Digital Age|publisher=[[ACLU]]|accessdate=23 March 2009}}</ref> more recently, the ACLU has expressed the concern that the FCC interpretation of the Act is incorrect.<ref name="ACLU/FCC">{{cite web|url=https://www.aclu.org/privacy/gen/20223res20050912.html|title=CALEA feature page|publisher=[[ACLU]]|accessdate=23 March 2009}}</ref><ref name="techdirt1">{{cite web|url=http://www.techdirt.com/articles/20080918/0208152302.shtml |title=German Authorities Raiding Homes To Find Skype Tapping Whistleblower |publisher=Techdirt |date=18 September 2008 |accessdate=31 March 2009}}</ref>
* The United States [[Federal Communications Commission]] (FCC) has interpreted the [[Communications Assistance for Law Enforcement Act]] (CALEA) as requiring digital phone networks to allow [[wiretapping]] if authorized by an FBI warrant, in the same way as other phone services.
* In February 2009 Skype said that, not being a telephone company owning phone lines, it was exempt from CALEA and similar laws which regulate US phone companies. It is also not clear whether wiretapping of Skype communications is technically possible.<ref name="voipnews">{{cite web |url=http://www.voip-news.com/feature/skype-secrecy-attack-022409 |title=Skype Secrecy Under Attack Again |publisher=VoIP News |date=2009-02-24 |access-date=2010-10-10 |archive-date=2012-07-22 |archive-url=https://web.archive.org/web/20120722124315/http://www.voip-news.com/feature/skype-secrecy-attack-022409/ |url-status=dead }}</ref> According to the [[ACLU]], the Act is inconsistent with the original intent of the [[Fourth Amendment to the U.S. Constitution]];<ref name="ACLU 1999">{{cite web|url=https://www.aclu.org/privacy/spying/15440pub19980301.html|title=Big Brother in the Wires: Wiretapping in the Digital Age|publisher=[[ACLU]]|access-date=23 March 2009}}</ref> more recently, the ACLU has expressed the concern that the FCC interpretation of the Act is incorrect.<ref name="ACLU/FCC">{{cite web|url=https://www.aclu.org/privacy/gen/20223res20050912.html|title=CALEA feature page|publisher=[[ACLU]]|access-date=23 March 2009}}</ref><ref name="techdirt1">{{cite web|url=http://www.techdirt.com/articles/20080918/0208152302.shtml |title=German Authorities Raiding Homes To Find Skype Tapping Whistleblower |publisher=Techdirt |date=18 September 2008 |access-date=31 March 2009}}</ref>


== References ==
== References ==

Latest revision as of 02:30, 18 August 2024

Skype is a Voice over Internet Protocol (VoIP) system developed by Skype Technologies S.A. It is a peer-to-peer network where voice calls pass over the Internet rather than through a special-purpose network. Skype users can search for other users and send them messages.[1]

Skype reports that it uses 256 bit Advanced Encryption Standard (AES)/ Rijnadel encryption to communicate between Skype clients; although when calling a telephone or mobile, the part of the call over the public switched telephone network (PSTN) is not encrypted.[2][3] User public keys are certified by the Skype server at login with 1536-bit or 2048-bit RSA certificates. Skype's encryption is inherent in the Skype Protocol and is transparent to callers. Some private conversations through Skype such as audio calls, text messages, and file sending (image, audio, or video) can make use of end-to-end encryption, but it may have to be manually turned on.[4]

Security policy

[edit]

The company's security policy states that:

  1. Usernames are unique.
  2. Callers must present a username and password or another authentication credential.
  3. Each caller provides the other with proof of identity and privileges whenever a session is established. Each verifies the other's evidence before the session can carry messages.
  4. Messages transmitted between Skype users (with no PSTN users included) are encrypted from caller to caller.[2] No intermediate node (router) has access to the meaning of these messages. This claim was undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URLs embedded in a Skype conversation;[5][6] this could only happen if Microsoft has access to the unencrypted form of these messages.

Implementation and protocols

[edit]

Registration

[edit]

Skype holds registration information both on the caller's computer and on a Skype server. Skype uses this information to authenticate call recipients and assure that callers seeking authentication access a Skype server rather than an impostor. Skype says that it uses public-key encryption as defined by RSA to accomplish this.

The Skype server has a private key and distributes that key's public counterpart with every copy of the software. As part of user registration, the user selects a desired username and password. Skype locally generates public and private keys. The private key and a password hash are stored on the user's computer.

Then a 256-bit AES-encrypted session is established with the Skype server. The client creates a session key using its random number generator.

The Skype server verifies that the selected username is unique and follows Skype's naming rules. The server stores the username and a hash of the user's password [ H ( H ( P ) ) ] {\displaystyle [H(H(P))]} in its database.

The server now forms and signs an identity certificate for the username that binds the username, verification key, and key identifier.

Peer-to-peer key agreement

[edit]

For each call, Skype creates a session with a 256-bit session key. This session exists as long as communication continues and for a fixed time afterward. Skype securely transmits the session key to the call recipient as part of connecting a call. That session key is then used to encrypt messages in both directions.

Session cryptography

Session cryptography

[edit]

All traffic in a session is encrypted using the AES algorithm running in Integer Counter Mode (ICM). Skype encrypts the current counter and salt with the session key using the 256 bit AES algorithm. This algorithm returns the keystream, then XORed with the message content. Skype sessions contain multiple streams. The ICM counter depends on the stream and the location within the stream.

Random number generation

[edit]

Skype uses random numbers for several cryptographic purposes. Purposes include protection against playback attacks, creation of RSA key pairs, and creation of AES key-halves for content encryption. The security of a Skype peer-to-peer session depends significantly on the quality of the random numbers generated by both ends of the Skype session. Random number generation varies by the operating system.[7]

Cryptographic primitives

[edit]

Skype uses standard cryptographic primitives to achieve its security goals. The cryptographic primitives used in Skype are the AES block cipher, the RSA public-key cryptosystem, the ISO 9796-2 signature padding scheme, the SHA-1 hash function, and the RC4 stream cipher.

Key agreement protocol

[edit]

Key-agreement is achieved using a proprietary, symmetric protocol. To protect against a playback attack, the peers challenge each other with random 64-bit nonces. The challenge response is to customize the challenge in a proprietary way and returned it signed with the responder's private key.

The peers exchange Identity Certificates and confirm that these certificates are legitimate. Because an Identity Certificate contains a public key, each end can then confirm signatures created by the other peer. Each peer contributes 128 random bits to the 256-bit session key.

Automatic updates

[edit]

Another security risk are automatic updates, which cannot be disabled from version 5.6 on,[8][9] both on Mac OS and Windows branches, although in the latter, and only from version 5.9 on, automatic updating can be turned off in certain cases.[10]

Eavesdropping by design

[edit]

Chinese, Russian and United States law enforcement agencies have the ability to eavesdrop on Skype conversations and to have access to Skype users' geographic locations. In many cases, a simple request for information is sufficient, with no court approval needed. This ability was deliberately added by Microsoft for law enforcement agencies around the world after they purchased Skype in 2011. This is implemented by switching the Skype client for a particular user account from the client-side encryption to the server-side encryption, allowing dissemination of an unencrypted data stream.[11][12][13]

Actual and potential flaws

[edit]

While Skype encrypts users' sessions, other traffic, including call initiation, can be monitored by unauthorized parties.

The other side of security is whether Skype imposes risk on its users' computers and networks. In October 2005 a pair of security flaws were discovered and patched. Those flaws made it possible for hackers to run hostile code on computers running vulnerable versions of Skype. The first security bug affected only Microsoft Windows computers. It allowed the attacker to use a buffer overflow to crash the system or to force it to execute arbitrary code. The attacker could provide a malformed URL using the Skype URI format, and lure the user to request it to execute the attack. The second security bug affected all platforms; it used a heap-based buffer overflow to make the system vulnerable.

Issues, including several potentially affecting security, include:

  • Skype code is proprietary and closed source, and it is not planned to become open-source software, according to Niklas Zennström, co-founder of Skype, who responded in 2004 to questions on the Skype security model saying "We could do it but only if we re-engineered the way it works and we don't have the time right now".[14] If the software source were available peer review would be able to verify its security.[15]
  • On 13 November 2012 a Russian user published a flaw in Skype security which allowed any non-professional attacker to take over a Skype account knowing only the victim's email in seven simple steps.[16][17] This vulnerability was claimed to exist for months, and was not corrected until more than 12 hours after it was published widely.
  • The fact that Skype records data about calls (but not the message contents) in a "History" file saved on the user's computer. Attackers who gain access to the computer can obtain the file.[18]
  • Skype can consume other users' bandwidth. Although this is documented in the license agreement (EULA), there is no way to tell how much bandwidth is being used in this manner.[19]
  • There are some 20,000 supernodes out of many millions of users logged on. Skype Guide for network administrators claims that supernodes carry only control traffic up to 10 kB/s and relays may carry other user data traffic up to 15 kB/s (for one audio conference call). A relay should not normally handle more than one "relayed connection".[19][20]
  • Skype's file-transfer function does not integrate with any antivirus products, although Skype claims to have tested its product against antivirus "Shield" products.[19]
  • Skype does not document all communication activities. This lack of clarity as to content means that systems administrators cannot be sure what it is doing. (The combination of an invited and a reverse-engineered study taken together suggest Skype is not doing anything hostile)[citation needed]. Skype can be easily blocked by firewalls.[19]
  • Skype consumes network bandwidth, even when idle (even for non-supernodes, e.g., for NAT traversal). For example, if there were only 3 Skype users in the world and 2 were communicating, the 3rd computer would be taxed to support the application, even if not using Skype at the time. The large number of Skype computers means that this activity is diffuse, it can lead to performance issues on standby Skype users, and presents a conduit for security breaches.[21][15]
  • Skype implicitly trusts any message stream that obeys its protocols[15]
  • Skype does not prohibit a parallel Skype-like network[15]
  • Skype prior to version 3.0.0.216 created a file called 1.com in the temp directory which was capable of reading all BIOS data from a PC.[22] According to Skype this was used to identify computers and provide DRM protection for plug-ins. They later removed this file, but it is not known whether the BIOS-reading behavior was removed.[23][24]
  • The URI handler that checks URLs for verification of certain file extensions and file formats uses case sensitive comparison techniques and doesn't check all potential file formats.[25][26]
  • While Skype does encrypt most of its communications, unencrypted packets containing advertisements are pulled from several places, exposing a cross-site scripting vulnerability. These ads can easily be hijacked and replaced with malicious data.[27]
  • The privacy of Skype traffic may have limits. Although Skype encrypts communication between users, a Skype spokesman did not deny the company's ability to intercept communication. On the question of whether Skype could listen in on their users' communication, Kurt Sauer, head of the security division of Skype, replied evasively: "We provide a secure means of communication. I will not say if we are listening in or not."[28] In China text is filtered according to government requirements. This suggests that Skype has the capacity to eavesdrop on connections.[29] One of Skype's minority owners, eBay, has divulged user information to the U.S. government.[30][31]
  • Security researchers Biondi and Desclaux have speculated that Skype may have a back door, since Skype sends traffic even when it is turned off and because Skype has taken extreme measures to obfuscate their traffic and functioning of their program.[32]
  • Several media sources have reported that at a meeting about the "Lawful interception of IP based services" held on 25 June 2008, high-ranking but unnamed officials at the Austrian interior ministry said that they could listen in on Skype conversations without problems. Austrian public broadcasting service ORF, citing minutes from the meeting, have reported that "the Austrian police are able to listen in on Skype connections".[33][34] Skype declined to comment on the reports.[35]
  • The Skype client for Linux has been observed accessing the Firefox profile folder during execution.[36] This folder contains all the saved passwords in plain text if no master password is used, it also contains the user's browsing history. Access to this file was confirmed by tracing system calls made by the Skype binary during execution.[37]
  • The Skype client for Mac has been observed accessing protected information in the system Address Book even when integration with the Address Book (on by default) is disabled in the Skype preferences. Users may see a warning about Skype.app attempting to access protected information in the address book under certain conditions, e.g. launching Skype while syncing with a mobile device.
  • Skype has no legitimate reason to access the Address Book if the integration is not enabled. Further, the extent of the integration is to add all cards from the Address Book to the list of Skype contacts along with their phone numbers, which can be accomplished without accessing any protected information (neither the name nor numbers on cards are protected) and thus the attempt to access information beyond the scope of the integration, regardless of whether or not that integration is enabled, raises deeper questions as to possible spying on users.
  • The United States Federal Communications Commission (FCC) has interpreted the Communications Assistance for Law Enforcement Act (CALEA) as requiring digital phone networks to allow wiretapping if authorized by an FBI warrant, in the same way as other phone services.
  • In February 2009 Skype said that, not being a telephone company owning phone lines, it was exempt from CALEA and similar laws which regulate US phone companies. It is also not clear whether wiretapping of Skype communications is technically possible.[38] According to the ACLU, the Act is inconsistent with the original intent of the Fourth Amendment to the U.S. Constitution;[39] more recently, the ACLU has expressed the concern that the FCC interpretation of the Act is incorrect.[40][41]

References

[edit]
  1. ^ Jill Savege Scharff (2013). Psychoanalysis Online: Mental Health, Teletherapy, and Training. Karnac Books. p. 183. ISBN 978-1-78049-154-7.
  2. ^ a b "Does Skype use encryption?". Skype Support. Retrieved 12 July 2022.
  3. ^ Lynn Hathaway (June 2003). "National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information" (PDF). Archived from the original (PDF) on 2008-05-28. Retrieved 2008-11-02.
  4. ^ "What are Skype Private Conversations? | Skype Support". support.skype.com. Retrieved 2022-01-26.
  5. ^ "Microsoft is reading Skype messages". 22 May 2013.
  6. ^ Goodin, Dan (2013-05-20). "Think your Skype messages get end-to-end encryption? Think again". Ars Technica. Retrieved 2022-07-13.
  7. ^ Vanilla Skype an overview of skype clients and protocols
  8. ^ "Skype 5.6 for Mac". Archived from the original on 2012-04-06.
  9. ^ "I want to turn off automatic updates".
  10. ^ "Skype 5.9 for Windows". Archived from the original on 2012-04-14.
  11. ^ Елизавета Серьгина; Алексей Никольский; Александр Силонов (14 March 2013). "Российским спецслужбам дали возможность прослушивать Skype" [Russian law enforcement has been granted the ability to eavesdrop on Skype conversations]. Ведомости (Vedomosti) (in Russian). Retrieved 25 July 2020.
  12. ^ Bogdan Popa (20 June 2013). "Skype Provided Backdoor Access to the NSA Before Microsoft Takeover (NYT)". Softpedia.
  13. ^ Bogdan Popa (31 December 2014). "Leaked Documents Show the NSA Had Full Access to Skype Chats". Softpedia.
  14. ^ "VoIP suffers identity crisis". The Register. June 15, 2004.
  15. ^ a b c d Biondi, Philippe; DESCLAUX, Fabrice. "Silver Needle in the Skype" (PDF). blackhat. Retrieved 2006-03-02.
  16. ^ "Skype accounts can be hacked with an email address". Archived from the original on 2017-10-18. Retrieved 2012-11-15.
  17. ^ "Уязвимость в skype, позволяющая угнать любой аккаунт". 13 November 2012.
  18. ^ Simson Garfinkel - VoIP and Skype Security
  19. ^ a b c d Max, Harry (2006). Skype: The Definitive Guide. Que Publishing. ISBN 032140940X.
  20. ^ "Guide for network admins" (PDF).
  21. ^ This is similar to the type of granted access that the SETI download applications presented.
  22. ^ pagetable.com » Blog Archive » Skype Reads Your BIOS and Motherboard Serial Number
  23. ^ Skype Security Blog - Skype Extras plug-in manager Archived 2008-10-19 at the Wayback Machine
  24. ^ The Register » Skype snoop agent reads mobo serial numbers
  25. ^ "Vulnerabilities in Skype". Retrieved 2008-01-17.
  26. ^ Claburn, Thomas. "Skype Addresses Cross-Zone Scripting Vulnerability - Security". InformationWeek. Retrieved 2010-06-09.
  27. ^ "Skype File URI Security Bypass Code Execution Vulnerability". Skype.com. Retrieved 2010-06-09.
  28. ^ ZDNet: Interview with Kurt Sauer „Telefonieren übers Internet: Wie sicher ist Skype wirklich?“, February 13, 2007
  29. ^ guli.com: Textfilter in China, 19. April 2006
  30. ^ "heise online - eBays neue Richtlinien in der Kritik". Heise.de. Retrieved 2010-06-09.
  31. ^ "Skype-Gespräche unantastbar?". intern.de. 2007-11-23. Retrieved 2010-06-09.
  32. ^ Biondi P., Desclaux F (2–3 March 2006). "Silver Needle in the Skype" (PDF). EADS Corporate Research Center. Retrieved 26 January 2009.
  33. ^ Sokolov, David AJ (24 July 2008). "Speculation over back door in Skype". Heise Security UK. Archived from the original on 13 July 2010. Retrieved 26 January 2009.
  34. ^ Leyde, John (24 July 2008). "Austrian official fuels Skype backdoor rumours". The Register UK. Retrieved 29 January 2009.
  35. ^ Vilde, Boris (27 July 2008). "Skype Has Back Door for Cops' Eavesdropping". Ohmproject. Retrieved 29 January 2009.
  36. ^ "Skype Linux Reads Password and Firefox Profile - Slashdot". August 26, 2007.
  37. ^ "Skype 1.4.0.99 reads /etc/ passwd and firefox profile! - Skype Community". August 25, 2007. Archived from the original on October 13, 2011.{{cite web}}: CS1 maint: unfit URL (link)
  38. ^ "Skype Secrecy Under Attack Again". VoIP News. 2009-02-24. Archived from the original on 2012-07-22. Retrieved 2010-10-10.
  39. ^ "Big Brother in the Wires: Wiretapping in the Digital Age". ACLU. Retrieved 23 March 2009.
  40. ^ "CALEA feature page". ACLU. Retrieved 23 March 2009.
  41. ^ "German Authorities Raiding Homes To Find Skype Tapping Whistleblower". Techdirt. 18 September 2008. Retrieved 31 March 2009.
[edit]