web statisticsweb stats

Business Phone Systems

Previous Thread
Next Thread
Print Thread
Rate Thread
#582212 12/18/14 11:38 PM
Joined: Sep 2006
Posts: 3,290
Member
*****
OP Offline
Member
*****
Joined: Sep 2006
Posts: 3,290


Arthur P. Bloom
"30 years of faithful service...15 years on hold"

Atcom VoIP Phones
VoIP Demo

Best VoIP Phones Canada


Visit Atcom to get started with your new business VoIP phone system ASAP
Turn up is quick, painless, and can often be done same day.
Let us show you how to do VoIP right, resulting in crystal clear call quality and easy-to-use features that make everyone happy!
Proudly serving Canada from coast to coast.

Joined: Jun 2001
Posts: 3,199
Likes: 2
Administrator
*****
Offline
Administrator
*****
Joined: Jun 2001
Posts: 3,199
Likes: 2
Wow, read it and then googled it, I found the some coding and blue prints on this site.

Joined: Feb 2006
Posts: 1,716
Member
***
Offline
Member
***
Joined: Feb 2006
Posts: 1,716
The information at Protocols.com has been available for 20+ years. The SS7 specification is a CCITT specification that was originally developed by the Bell System and was adopted by the Bell System before the other CCITT members adopted it.

The primary flaw in the SS7 is the "operation keys" used to maintain integrity of the circuit. When the system was first introduced as a "security" measure to keep central offices from going off line, the common term used was the "SS7 Ring." The term meant that ANY CO in the operating company's "ring" of offices could take over the switching load of a CO in trouble. This would insure the integrity of the network and prevent outages like the one in Manhattan after the big CO fire.

From a CO perspective, SS7 is practically bomb proof. BellCore introduced 256 bit encryption and RSA matching keys. The requester has to know the secret key of the provider before the provider will release the operating key. The keys are randomly changed every few seconds, so the possibility of a hacker figuring out a key is nearly impossible. Even if a hacker could happen on a requester key, by the time it was implemented, the operating key would have changed.

The cell companies, however, in an effort to maximize profits and reduce "maintenance bandwidth," opted for the less secure 64 bit one way encryption which does not use paired keys and is actually a wide open playground for a savvy hacker.

Rcaman


Americom, Inc.
Where The Art And Science Of Communications Meet

Link Copied to Clipboard
Forum Statistics
Forums84
Topics94,284
Posts638,772
Members49,765
Most Online5,661
May 23rd, 2018
Popular Topics(Views)
211,461 Shoretel
188,331 CTX100 install
187,093 1a2 system
Newest Members
James D., Nadisale, andreww, gohunt, Darrick
49,765 Registered Users
Top Posters(30 Days)
Toner 23
teleco 5
jc2it 4
dans 3
Who's Online Now
1 members (Carl Navarro), 137 guests, and 304 robots.
Key: Admin, Global Mod, Mod
Contact Us | Sponsored by Atcom: One of the best VoIP Phone Canada Suppliers for your business telephone system!| Terms of Service

Sundance Communications is not affiliated with any of the above manufacturers. Sundance Phone System Forums - VOIP & Cloud Phone Help
©Copyright Sundance Communications 1998-2024
Powered by UBB.threads™ PHP Forum Software 7.7.5