1
Scope
2 References
3 Terms and definitions
4 Symbols and abbreviations
5 Conventions
6 System introduction
6.1 Summary
6.2 Authentication
6.2.1 Certificates
6.3 Call establishment security
6.4 Call control (H.245) security
6.5 Media stream privacy
6.6 Trusted elements
6.6.1 Key escrow
6.7 Non-repudiation
7 Connection establishment procedures
7.1 Introduction
8 H.245 signalling and procedures
8.1 Secure H.245 channel operation
8.2 Unsecured H.245 channel operation
8.3 Capability exchange
8.4 Master role
8.5 Logical channel signalling
9 Multipoint procedures
9.1 Authentication
9.2 Privacy
10 Authentication signalling and procedures
10.1 Introduction
10.2 Diffie-Hellman with optional
authentication
10.3 Subscription-based authentication
10.3.1 Introduction
10.3.2 Password with symmetric encryption
10.3.3 Password with hashing
10.3.4 Certificate-based with signatures
10.3.5 Usage of shared secret and passwords
11 Media stream encryption procedures
11.1 Media session keys
11.2 Media anti-spamming
11.2.1 List of Object Identifiers
12 Security error recovery
13 Asymmetric Authentication and Key Exchange Using Elliptic Curve
CryptoSystems
13.1 Key management
13.2 Digital signature
Annex A – H.235 ASN.1
Annex B – H.323 specific topics
B.1 Background
B.2 Signalling and procedures
B.2.1 Revision 1 compatibility
B.3 RTP/RTCP issues
B.4 RAS signalling/procedures for
authentication
B.4.1 Introduction
B.4.2 Endpoint-gatekeeper authentication (non-subscription-based)
B.4.3 Endpoint-gatekeeper authentication (subscription-based)
B.5 Non-terminal interactions
B.5.1 Gateway
Annex C – H.324 specific topics
Annex D – Baseline security profile
D.1 Introduction
D.2 Specification conventions
D.3 Scope
D.4 Abbreviations
D.5 Normative references
D.6 Baseline security profile
D.6.1 Overview
D.6.2 Authentication and Integrity
D.6.3 H.323 requirements
D.6.4 Direct-routed scenario
D.6.5 Back-end-Service Support
D.6.6 H.235 Version 1 compatibility
D.6.7 Multicast behaviour
D.7 Voice Encryption Security Profile
D.7.1 Key management
D.7.2 Key update and synchronization
D.7.3 Triple-DES in outer CBC mode
D.8 Lawful Interception
D.9 List of secured signalling
messages
D.9.1 H.225.0 RAS
D.9.2 H.225.0 call signalling
D.9.3 H.245 call control
D.10 Usage of sendersID and generalID
D.11 List of Object Identifiers
D.12 Bibliography
Annex E – Signature profile
E.1 Overview
E.2 Specification conventions
E.3 H.323 requirements
E.4 Security services
E.5 Digital signatures with
public/private key pairs details (Procedure II)
E.6 Multipoint conferencing procedures
E.7 End-to-end authentication
(Procedure III)
E.8 Authentication-only
E.9 Authentication and Integrity
E.10 Computation of the digital
signature
E.11 Verification of the digital
signature
E.12 Handling of certificates
E.13 Usage illustration for Procedure
II
E.13.1 RAS message authentication, integrity and non-repudiation
E.13.2 RAS authentication only
E.13.3 H.225.0 message authentication, integrity and non-repudiation
E.13.4 H.245 message authentication and integrity
E.14 H.235 Version 1 compatibility
E.15 Multicast behaviour
E.16 List of secure signalling messages
E.16.1 H.225.0 RAS
E.16.2 H.225.0 call signalling
E.17 Usage of sendersID and generalID
E.18 List of Object Identifiers
Appendix I – H.323 implementation details
I.1 Ciphertext padding methods
I.2 New keys
I.3 H.323 trusted elements
I.4 Implementation examples
I.4.1 Tokens
I.4.2 Token usage in H.323 systems
I.4.3 H.235 random value usage in H.323 systems
I.4.4 Password
I.4.5 IPSEC
I.4.6 Back-end service support
Appendix II – H.324 implementation details
Appendix III – Other H-series implementation details
Appendix IV – Bibliography