Are there any inherent security problems with UDP?

Are there any inherent security problems with UDP? If so, how can you resolve them?
When it comes to UDP and security, it all depends on the UDP service that is running on a port and how secure the service is. The service could be vulnerable to hacking if the service has an exploit or a bug in it that allows remote access, overflow, etc. Securing UDP communication represents a number of special challenges beyond those of TCP communication, in that streaming protocols require additional communication ports. Most firewalls cannot efficiently manage and maintain network security with UDP traffic.

The implementation of most common e-conferencing solutions require the use of dynamic ports for User Datagram Protocol (UDP)-based audio and video streaming and Transmission Control Protocol (TCP)-based call control. Firewalls implemented as perimeter protection typically block UDP, the transport mechanism for multicast packets. Because of the connectionless nature of UDP, it is almost impossible to define a reasonable firewall policy that allows some UDP communications and blocks others. Many of the protocols that are implemented over UDP are easily exploitable.

Since, typical packet filtering firewalls don't support dynamic port filtering, it's always a good idea to use application-specific proxies that enable secure UDP streaming. Though some vendors are marketing H.323 firewall solutions, they are not sufficient for many environments. The other solution is to use Firewall Tunneling whereby the conferencing sever is placed behind the firewalls at both corporate and remote locations and relies on tunneling for access into network.


Next Steps

Learn how a new QUIC protocol is improving Web apps

This was last published in August 2004

Dig Deeper on Network security

Unified Communications
Mobile Computing
Data Center