Skype Network Administrator’s Guide Skype 3.0 Beta 4
2006-10-31 Document version 2.0 Beta
What is in this Guide?
What is this Guide?................................................................................................................ 2
Who should reads this guide?................................................................................................ 2
How to read this guide........................................................................................................... 2
Important legal information .................................................................................................... 3
Copyright............................................................................................................................... 3
Trademarks ........................................................................................................................... 3
Disclaimer.............................................................................................................................. 3
What is in this Guide?............................................................................................................ 4
Overview ............................................................................................................................... 5
Description of Skype Services............................................................................................... 5
Other information................................................................................................................... 6
INTRODUCTION
What Every IT Manager Should Know................................................................................... 7
HOW SKYPE WORKS
Skype P2P Architecture......................................................................................................... 8
Intelligent Routing with Supernodes ...................................................................................... 8
Skype Supernodes and Relay Hosts............................................................................... 9
Skype Client / Supernode Relationship ......................................................................... 10
Skype Global Index..............................................................................................................10
Firewall and NAT-Device Traversal...................................................................................... 11
Skype Network Resource Consumption .............................................................................. 11
Bandwidth Indicator....................................................................................................... 11
SKYPE SECURITY MODEL
Skype User Authentication .................................................................................................. 13
How are Skype Sessions Established?................................................................................ 14
How Is Encryption Handled?................................................................................................ 15
Security & File Transfers (Viruses, Trojan Horses, etc.) ...................................................... 16
Anti-Virus Shields and Real-time Scanning................................................................... 17
Privacy and Sharing Contact Details.................................................................................... 19
An Example - Sharing Contact Details........................................................................... 19
Blocking Other Skype Users.......................................................................................... 20
Preventing “spam” and “spit” ......................................................................................... 21
How to Prevent Phishing............................................................................................... 21
Where Does Skype Store Data?.......................................................................................... 22
Files, Folders, & Application Data Locations........................................................................ 23
Passwords........................................................................................................................... 24
Adware and Spyware........................................................................................................... 24
Skype Security Evaluation................................................................................................... 25
Skype Security FAQ............................................................................................................. 25
Is “Hole Punching” a Security Issue?............................................................................. 25
How Secure is the Skype telephony connection?.......................................................... 26
Are Skype Users at Risk of Trojan Viruses and Other Threats?.................................... 27
DEPLOYING SKYPE IN THE ENTERPRISE
First things first.................................................................................................................... 29
General Guidelines........................................................................................................ 29
How to Determine if your Network is Skype-Friendly?................................................... 30
Verifying the Authenticity of the Skype Installer for Windows ........................................ 30
Problems with a Digital Signature.................................................................................. 31
Skype Client Notifications for New Versions and Updates............................................. 32
Enterprise-wide Installation and Setting Policies.................................................................. 33
Policies................................................................................................................................ 33
Setting Up Group Policies.................................................................................................... 34
Configurable Policies...........................................................................................................34
Registry Keys ............................................................................................................ 36