
Skype Network Administrator’s Guide Skype 3.0 Beta 25
2006-10-31 Document version 2.0 Beta
Skype Security Evaluation
Skype.com contains resources for network administrators and more detailed information on
Skype security. Go to www.skype.com/security for specific security-related information
including Skype Security Bulletins, contact email addresses, and PGP keys for verifying
digital signatures.
This link also includes Skype security evaluation report by Tom Berson of Anagram
Laboratories. This report presents:
• An in-depth review of the security framework that is incorporated into Skype products
• A description of the protective mechanisms that are in use throughout the Skype
infrastructure
• The general security policy that defines the basis for all designs within Skype’s
operational framework
Skype Security FAQ
Increasingly, companies are leveraging the benefits of Skype to enhance customer support
activities by:
• Enabling customers to contact the company’s call center via the Skype client,
• Utilizing Skype’s Call Forwarding capability, and
• Forwarding calls to a PSTN number ending at your company’s call center switch.
While Skype was originally designed as a consumer application that offers a private
communication channel among Skype users, as enterprises incorporate Skype into their
mission-critical operations, certain questions about security of customer communications
naturally arise.
Here are some of these questions and their respective answers:
Is “Hole Punching” a Security Issue?
No. One of the difficulties that plagues many VoIP solutions is that the call is unable to
pass across network boundaries. This problem may arise due to the presence of network
address translation (NAT) equipment at the network’s boundary, or the result of restrictive
rules put in place on a firewall at the network edge.
To allow users the greatest possible flexibility, Skype has implemented a robust set of
NAT traversal techniques in its software, allowing Skype frequently to be able to operate
in situations where traditional VoIP telephony would fail.
It is common in most home and office networks today to use network address translation to
allow easier administration of the network without requiring each network to obtain its
own block of scarce network addresses.
An effective way to set up P2P communications between two computers hosted on private
networks—ones behind NAT devices—is to use a technique called “hole punching”. This
technique is widely used by application software communicating using UDP packets and
can also be used to establish connections using the more reliable TCP protocol.
Comentarios a estos manuales