|
|
Joined: Sep 2006
Posts: 3,290
Member
|
Member
Joined: Sep 2006
Posts: 3,290 |
Arthur P. Bloom "30 years of faithful service...15 years on hold"
|
|
|
Visit Atcom to get started with your new business VoIP phone system ASAP
Turn up is quick, painless, and can often be done same day.
Let us show you how to do VoIP right, resulting in crystal clear call quality and easy-to-use features that make everyone happy!
Proudly serving Canada from coast to coast.
|
|
|
Joined: Jun 2001
Posts: 3,199 Likes: 2
Administrator
|
Administrator
Joined: Jun 2001
Posts: 3,199 Likes: 2 |
Wow, read it and then googled it, I found the some coding and blue prints on this site.
|
|
|
|
Joined: Feb 2006
Posts: 1,716
Member
|
Member
Joined: Feb 2006
Posts: 1,716 |
The information at Protocols.com has been available for 20+ years. The SS7 specification is a CCITT specification that was originally developed by the Bell System and was adopted by the Bell System before the other CCITT members adopted it.
The primary flaw in the SS7 is the "operation keys" used to maintain integrity of the circuit. When the system was first introduced as a "security" measure to keep central offices from going off line, the common term used was the "SS7 Ring." The term meant that ANY CO in the operating company's "ring" of offices could take over the switching load of a CO in trouble. This would insure the integrity of the network and prevent outages like the one in Manhattan after the big CO fire.
From a CO perspective, SS7 is practically bomb proof. BellCore introduced 256 bit encryption and RSA matching keys. The requester has to know the secret key of the provider before the provider will release the operating key. The keys are randomly changed every few seconds, so the possibility of a hacker figuring out a key is nearly impossible. Even if a hacker could happen on a requester key, by the time it was implemented, the operating key would have changed.
The cell companies, however, in an effort to maximize profits and reduce "maintenance bandwidth," opted for the less secure 64 bit one way encryption which does not use paired keys and is actually a wide open playground for a savvy hacker.
Rcaman
Americom, Inc. Where The Art And Science Of Communications Meet
|
|
|
Forums84
Topics94,525
Posts640,011
Members49,852
|
Most Online5,661 May 23rd, 2018
|
|
|
|
|