Subscribe via feed.

How dangerous is Skype?

Posted by deepquest on March 7, 2007 – 5:06 am

Understanding Skype’s basic architecture
Skype is a peer-to-peer (P2P) application, meaning that users connect to one another directly and not through a central server for communication. Skype initially uses Internet-based servers to authenticate users when they log in and to track their status, but when a “chat” or instant message, “voice call” or “file transfer” is initiated, the parties involved in the communication do so in a P2P direct connection. If one or both of the users are behind a typical corporate Network Address Translation (NAT) firewall, the communication can be relayed through a Supernode because a direct P2P can’t be established behind a NAT. In the case of a file transfer, you will see a message indicating your transfer is being relayed.

One of security professionals’ primary concerns about Skype are it’s so easy for a Skype client to find a way around a secure corporate firewall configuration. Skype does this by using ports 80 and 443, which are open in most firewalls to allow Web browsing. In addition, Skype may reroute traffic if the initial port assigned during the Skype installation isn’t available. This makes blocking Skype at a firewall more difficult since the ports Skype uses can change as needed.

Skype also encrypts each communication with a unique AES 25-bit encryption key, meaning each communication will use a different key each time you communicate, making eavesdropping communications almost impossible.

One more thing to keep in mind about Skype security is its Supernodes, which route Skype traffic. A Supernode is a computer with a specific configuration that must have a direct connection to the Internet and can’t be behind a firewall using NAT. And they must have a “real” public routable IP address. Beyond those restrictions, these Supernodes can be any Skype user computer that meets the minimum hardware and configuration requirements.

There’s a lot more you can learn about Skype’s security architecture.
Now that you have an understanding of how Skype works, we can look at whether it’s dangerous. There are a lot of misconceptions floating around about Skype. Here are the five most common:

Skype uses a lot of bandwidth on a network.
Any computer can be a Supernode.
Skype is like any other IM application and susceptible to IM worms and viruses.
Skype is hard to stop on my network.
Skype is encrypted so I cannot archive IM messages.

more from Computer World

Tags:
This post is under “Security” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.