Audio networks and their security implications

Presented at May Contain Hackers (MCH2022), July 25, 2022, 11 a.m. (50 minutes)

We will take a cursory look at the protocols that underpin audio over IP from studios to stages and on to broadcast. Focusing on AES67 the you will gain a basic understanding of what it is, how it works and how it is inherently vulnerable to attack. At a high level this talk should be accessible and entertaining to all, although to grasp the more nuanced details a rudimentary knowledge of IP networking and audio digitisation will be helpful. Description: In the professional audio space the heavy and expensive XLR snakes of old have largely been replaced with audio over IP. Operationally this move to audio over IP has provided many benefits, such as being able to use the same equipment for audio as they use for video and lighting rather than special sets of gear for each aspect of a production. However with the increased use of commodity IT hardware in this operational technology (OT) environment comes an increase in attack surface from more software, easier access and less segmentation. As with many places where IT components get re-purposed for OT the administration practices and development practices of the vendors haven’t necessarily caught up with the with the best practices of there IT counterparts. There are some hard problems to solve for audio over IP such as multicast encryption and authentication but also much simpler but more cultural things like updating a working system. It is hoped that by presenting this topic to the broader community of hackers that more talented people get interested in the hard bits, and perhaps we can even reach the folks on the operational technology side to see what measures can be taken to improve the security of existing systems. Outline (50 minutes including Q&A): 1. Some examples of where AES67 is deployed (2 minutes) 2. Run through a typical AES67 install and compare to equivalent analogue set-up (5 minutes) 3. The protocol illustrated (20 minutes) 4. Key observations for a malicious actor (3 minutes) 5. Timing based attack run-through maybe even demo (5 minutes) 6. General round-up and push for improvement in the industry (5 minutes) 7. Q&A

Presenters:

  • pcwizz
    pcwizz is a curious creature. He enjoys learning new things, creating innovative artefacts and furthering the quest of knowledge acquisition. Beyond the terminal he enjoys music, politics and pontificating. Warning: Liable to blather on about trains or whatever else is in his head.

Links:

Similar Presentations: