« Mike Gotta: Microsoft Unifies Its Communication Story | Main | Net Neutrality & The Two-Tiered Internet »

Feb 03, 2006


Bob Wyzykowski

We are creating a business case on the use of skype on our internal network. Two of our concerns are bandwith consumption and security.

What TCP ports does Skype operate on. If the answer is random ports, then how can we control the bandwidth usage?

Security: I see several messages on the Internet stating how vunerable Skype is due to it's peer-to-peer design and subject to man in the middel attacks. Where can I find information that discusses the Pros and the Cons on the use of Skype.

Any informaiton will be helpfull

Irwin Lazar

Bob, Skype uses a variety of ports, the best resource I've found for understanding Skype's behavior is the analysis conducted by the folks at Columbia University's Dept. of Computer Science. You can view their report at http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf

WRT to security, Skype employs encryption and a key exchange mechanism that should make it safe from man in the middle attacks, though there is concern that since skype's implementation is proprietary, there is no way for anyone to independently validate its capabilities. Skype did have an independent analysis performed, which is available at http://www.skype.com/security/

There are numerous pros and cons to the use of skype, I've just completed a report for Burton Group's clients on the topic of skype usage in the enterprise, if you are a client let me know and I'll make sure you get a copy when it is published.


It must be used to our internal network. Very interesting and useful.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name is required. Email address will not be displayed with the comment.)

My Photo



Twitter Tweets

Nemertes Research: Latest Content

Blogs Where I Post

Blog powered by Typepad
Member since 11/2004