Mod06_GL_Sec
Mod06_GL_Sec
20
7-
-0
20
o_
ol
ic
en
Content
_G
do
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
an
rn
1.5 Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 1
FN9850FN10FN_TBAZZZAIMHY
2 TLS and Payload Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.1 Motivation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2 Transport Layer Security (TLS). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.3 Sample connection call flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.4 TLS Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.5 OSV TLS Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.6 TLS Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.6.1 PKi on OpenScape Voice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.6.2 PKI on OpenScape SBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.6.3 Changing the OSV connection to MTLS . . . . . . . . . . . . . . . . . . . . . . . 41
2.7 Multiple PKI Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
20
2.8 Subscriber TLS Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
7-
2.8.1 Enforce TLS for Subscriber. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
-0
20
2.8.2 Publish Certificates to the Phone . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
2 Security
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
01.2018
FN9850FN10FN_TBAZZZAIMHY
Preface
Preface
Content of Module • Following sections describe the Security implementaion. Topics are:
• Securing the SBC (Firewall, Password, etc.)
• Denial of Service (DoS) Mitigation
• TLS secured communication
20
Objectives • All required steps to improve system security.
7-
-0
Prerequisites • Knowledge of OpenScape Solutions.
20
Time • appr. 4 hours (including import of certificates - no generation)
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 3
FN9850FN10FN_TBAZZZAIMHY
Preface
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
4 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Securing the OpenScape Session Border Controller
20
7-
and agents. Community names are essentially passwords. A community name allows a level
-0
of access to MIB data. Access levels are readonly (RO) for data retrieval and read-write (RW)
20
for data modification. Thus an SNMP Manager requires at least two community names or
o_
ol
passwords.
ic
en
The OpenScape Session Border Controller sets by default both the RO and RW community
_G
names to "public". It is very important to change these default values at the time of installation
do
EN
security.
40
88
EN
The SNMP community names are stored in the file /etc/snmp/snmpd.conf, which may not be
edited manually. We have to configure the community names via the graphical GUI.
After logging in to the OpenScape SBC Manager we navigate to „Alarms --> SNMP Configura-
tion“:
SNMP v2c Read-Only Community Name - Its length must be minimum 1 character and may not exceed 32 characters.
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 5
FN9850FN10FN_TBAZZZAIMHY
Password policy
20
#%PAM-1.0
7-
-0
#
20
# This file is autogenerated by pam-config. All changes
o_
# will be overwritten.
ol
# ic
en
# Password-related modules common to all services
_G
#
do
#
_L
EN
pw_iteration_nr=3 pw_iteration_length=180
EN
6 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Password policy
The table below lists and describes each (defaults are in brackets).
Parameter Description
min=N0,N1,N2,N3,N4 This parameter sets the minimum allowed password lengths
for different kinds of passwords and pass phrases. The key-
word disabled can be used to disallow passwords of a given
kind regardless of their length. Each subsequent number is
required to be no larger than the preceding one.
• N0 is used for passwords consisting of characters from one
character class only. The character classes are digits, lowercase
letters, uppercase letters, and other characters. There is also a
special class for non-ASCII characters, which cannot be classi-
20
fied, but are assumed non-digits.
7-
-0
(N0 is not supported on SBC)
20
• N1 is used for passwords consisting of characters from two
o_
character classes, which do not meet the requirements for a
ol
pass phrase.
ic
en
(N1 is not supported on SBC)
_G
low).
rn
is 8.
_L
EN
Default: [min=disabled,disabled,disabled,8,8]
40
88
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 7
FN9850FN10FN_TBAZZZAIMHY
Password policy
Parameter Description
match=N This parameter sets the length of common substring re-
quired to conclude that a password is at least partially based
on information found in a character string, or 0 to disable the
substring search. Note that the password is not rejected if a
weak substring is found; it is instead subjected to the usual
strength requirements with the weak substring removed.
The substring search is case-insensitive, and is able to detect
and remove a common substring spelled backwards.
Default: [match=4]
similar=permit|deny This parameter specifies whether a new password can be
20
similar to the old one. The passwords are considered to be
7-
-0
similar when there is a sufficiently long common substring
20
and the new pass-word with the substring removed would be
o_
weak.
ol
ic
en
Default: [similar=deny]
_G
Default: [random=42]
EN
00
words.
40
8 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Password Aging
Parameter Description
pw_iteration_length=N This parameter is the length in N days during which the pass-
word cannot be reused. N is number between 180 and 3650.
However, if the password is changed more than
pw_iterations_nr after a certain password has been used, this
password can be used again.
Default: [pw_iteration_length=180]
20
7-
-0
20
Password aging rules are globally enforced by one of the following methods:
o_
• By accepting the defaults for accounts creation in /etc/login.defs, which indi-
ol
ic
cate the password aging controls (used by useradd) listed in the table below.
en
Additionally, the following command must be executed to require the user to
_G
chage -d 0 <username>
Fe
._
_L
passwd -x 90 -n 1 -w 14 -i 30 <username>
EN
40
In this command:
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 9
FN9850FN10FN_TBAZZZAIMHY
Password Aging
login.defs parameter
Parameter Description
PASS_MAX_DAYS This parameter specifies the maximum number of days a pass-
word may be used.
Default: PASS_MAX_DAYS=90
PASS_MIN_DAYS This parameter specifies the minimum number of days allowed
between password changes.
Default: PASS_MIN_DAYS=1
PASS_WARN_AGE This parameter specifies the number of days’ warning given be-
20
fore a password expires.
7-
Default: PASS_WARN_AGE=7
-0
20
o_
LOGIN_RETRIES Max number of login retries if password is bad.
ol
Default: LOGIN_RETRIES=3
ic
en
LOGIN_TIMEOUT Max time in seconds for login.
_G
Default:LOGIN_TIMEOUT=60
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
10 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Used IP Ports
20
der Controller SIP listening ports be changed to other values which do not conflict with other
7-
provisioned ports. For example, within the port range 65000 to 65535, ports can be configured
-0
20
to:
o_
• 65060 - UDP
ol
• 65060 - TCP ic
en
_G
• 65061 - TLS
do
When the SIP list ports are changed to other values, the OpenScape Session Border Controller
an
rn
will only accept SIP requests received on the new SIP listening ports. This requires all SIP serv-
Fe
ers, OpenScape Branch Proxy Servers, Remote Subscribers and OpenScape Voice network in-
._
terfaces with the OpenScape Session Border Controller be reconfigured to use the assigned
_L
EN
Additionally, it can generally be noted that according to the SIP protocol, the phones send a
EN
REGISTER message with 'Contact' information about their IP address and port number. Net-
40
work endpoints are typically statically provisioned with the same ‘Contact’ information.
88
EN
On the OpenScape Session Border Controller outside access or WAN network, Session Border
Controller sends SIP messages to the IP address / port number provided by the phones or as
statically provisioned for network endpoints.
Usually, these ports are 5060 (for UDP or TCP) or 5061 (for TLS), but can sometimes be config-
ured on the phones.
On the OpenScape Session Border Controller inside core or LAN network, OpenScape Session
Border Controller sends SIP messages to the OpenScape Voice provisioned IP address / port
number which is 5060 (for TCP) or 5061 (for MTLS).
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 11
FN9850FN10FN_TBAZZZAIMHY
Used IP Ports
The IP ports can be changed in the „Network/Net Services“ menu under the „Interface config-
uration“ section. In the responsible realm entry the ports can be changed (recommended for
access side):
20
7-
-0
20
o_
ol
ic
en
_G
12 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Firewall
1.5 Firewall
The OpenScape SBC comes with a preconfigured firewall. Only needed ports are open and in
use. The firewall configuration is located on the „Security“ tab in the „Firewall“ section:
20
7-
-0
20
o_
The firewall rules will be applied per default („Main“ network ID) to all networks‘s/VLAN‘s. A
ol
specific firewall rule can be added by using the „Add“ button and choosing the network ID for
ic
en
which the rules should be applied:
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
A firewall rule can be deleted (excepting the „Main“ rule) with the „Delete“ button. To edit a
existing firewall rule, select the responsible line and click on „Edit“:
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 13
FN9850FN10FN_TBAZZZAIMHY
Firewall
20
7-
-0
20
o_
Allowed / blocked services
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
Grant access (White list) or block access to a host or an entire subnet (for a service)
88
EN
14 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Firewall
Per default, only SIP, TLS, RTP and MGCP are allowed. To enable a service for everybody, just
change the setting for the responsible service from „Block“ to „Allow“.
e.g.: to allow access to the time server for synchronizing the clients located on the WAN,
change the NTP service to „Allow“:
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
To enable a service only for a certain IP or network, a manual firewall entry can be created
._
_L
with the white list by providing the IP / network and port number. e.g. to allow access to the
EN
SBC‘s GUI as well via SSH only from certain IP‘s, the following two entries in the white list will
00
Click „Add“ to create a new entry or mark one and click „Delete“ to remove it
88
EN
A service can be specified either by his port number or the service name (as defined in /etc/
services). Multiple services can be entered comma separated. A port range can be specified
with colon, e.g. 1024:65535. If the Port field is zero, all ports will be allowed / blocked.
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 15
FN9850FN10FN_TBAZZZAIMHY
Firewall
Also the access to the admin interface can be restricted via the firewall settings. As long there
is no entry defined, everybody can access the GUI, linux shell via SSH or execute a file transfer
(SFTP). To restrict the access, add a single ip or a network to the access control list and select
the allowed services:
20
7-
-0
20
o_
ol
ic
In this example, the entire network 10.0.0.0 (class C) has access to all admin services. In addi-
en
tion, the single host 10.1.2.3 has access to the admin GUI. Every other admin traffic will be re-
_G
jected.
do
an
rn
7
Fe
16 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Denial of Service Thresholds
20
7-
-0
Limit of packages / second
20
(1-256000, default 20000)
o_
ol
Lockout time
ic (1-2048, default 60)
en
_G
do
an
rn
Host(s) / network(s)
Fe
to be ignored
._
_L
EN
00
EN
40
During the installation, a large amount of data must be transferred to and from the server
88
from software servers and between nodes of the cluster, etc. In order to not impede this pro-
EN
cess, the threshold for detection of a denial of service attack has been intentionally set at
20,000 messages per second. After installation, this value should be adjusted based on the
OpenScape Session Border Controller WAN configuration, traffic patterns (calls per second),
simultaneous calls and background message traffic in support of subscribe registrations re-
quiring far-end NAT traversal.
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 17
FN9850FN10FN_TBAZZZAIMHY
Denial of Service Mitigation
Typically, no single network IP-Address (for example, single phone or server) will deliver
heavy amounts of packet traffic; however, message concentrators such as an SBC or proxy can
create heavier amounts of packet traffic and need to be taken into account when setting the
rate threshold value and the “white list” of trusted hosts, which is the list of IP addresses that
are exempt from the rate threshold limit:
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
In the example the host 1.23.11.188 can exceed the configured limit of 20000 packages / sec-
Fe
18 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
SIP Message Rate Limiting
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
Two Trust Levels are defined with quarantine intervals on the same page:
40
3600 secs.
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 19
FN9850FN10FN_TBAZZZAIMHY
SIP Message Rate Limiting
The Message Rate Limit and Trust Level to each Access (WAN) realm interface (Network Id)
on the Network/Net Services tab:
20
7-
-0
20
o_
ol
ic
en
The Message Rate Limit has predefined set of possible values ranging from 5 msg/sec to 100
_G
msg/sec with a default of 100 seconds. The „Trusted level“ defines then if a device (IP) will be
do
1.8.1 Monitoring
._
_L
EN
The main page (dashboard) of SBC Local GUI contains a Show button for the Denial of Service
00
20 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
SIP Message Rate Limiting
When a source IP is quarantined due to violating the Message Rate Limit on the Access Inter-
face, this source IP will be visible in this Quarantine Table along with the time remaining on
its quarantine.
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
If this table remains open on GUI, it will automatically refresh every 30 seconds.
If user wants to remove source IP from quarantine, the source IP can be selected and then un-
blocked with “Unblock” button. This will set the Quarantine TTL to 0, but will not remove it
from the list.
The Log files (dos.log and dos_quarantine_history.log) also contains this information which
can be found in the directory /var/log/.
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 21
FN9850FN10FN_TBAZZZAIMHY
Unauthorized / Unknown User blocking
20
7-
-0
20
o_
ol
Unauthorized Users ic
en
If a subscriber attempts to Register, but does not provide the right credentials after 3 tries (401
_G
Unauthorized), the user will be quarantined for the specified interval (60-36000 seconds with
do
an
Unknown Users
._
_L
When the OS-SBC receives a 404 Not Found response from OSV for a SIP REGISTER message,
EN
the unauthorized REGISTER message source IP address is quarantined for the specified inter-
00
The only way to check if users are blocked is by checking the log file /var/log/dos.log to see
the quarantine entry for that source IP.
22 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Unauthorized / Unknown User blocking
In addition a checkbox also exists to enable “Process Initial Registration” requests to avoid the
SBC responding with 503 Server Unavailable message to the first REGISTER message:
20
7-
-0
But for security reasons (avoids port scans) it‘s not recommended to enable this option.
20
o_
ol
ic
en
Please note: It‘s safe to enable this option if the
_G
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 23
FN9850FN10FN_TBAZZZAIMHY
Registration Throttling
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
tion attempts with session timer less than the configured minimum interval. Register re-
quests are blocked for the „Minimum registration interval“.
When register throttling is enabled, then separate timer values exist towards the subscribers
for UDP NAT subs and TCP/TLS NAT subscribers.
24 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Restrict access to certain User Agents
20
This can be configured in the „Security“ menu under „Denial of Service Mitigation“:
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
To add a new device enter the „User Agent“ identifier and click on „Add“.
40
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 25
FN9850FN10FN_TBAZZZAIMHY
Restrict access to certain User Agents
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
26 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
TLS and Payload Encryption
20
7-
-0
20
o_
ol
ic SIP
en
_G
do
an
rn
Fe
RTP
._
_L
EN
00
EN
40
88
EN
The payload encryption feature allows an encryption of the audio stream with SRTP „Secure
Realtime Protocol“.
SRTP provides a framework for encryption and message authentication of RTP and RTCP
streams.
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 27
FN9850FN10FN_TBAZZZAIMHY
Transport Layer Security (TLS)
Server-side certificates are used on SIP endpoint devices to establish TLS connections.
OpenScape Voice and OpenScape SBC support TLS with mutual authentication to protect the
SIP signaling stream between.
TLS with mutual authentication should be used if the enterprise security policy requires
strong authentication and/or encryption of the SIP signaling stream between SIP servers.
With mutually authenticated TLS protection of SIP signaling, both interface partners support
the role of a TLS client and TLS server. When using TLS (not mutual TLS) only the client au-
thenticates / verifies the identity of the server. By using mutual TLS (MTLS) both sites will au-
thenticate each other which means the both devices must be able to verify the identity of the
other site.
TLS with mutual authentication (MTLS) is used to protect a SIP signaling interface between
the following devices:
20
• Two OpenScape Voice systems to protect the SIP or SIP-Q inter-
7-
-0
face.
20
• OpenScape Voice and the OpenScape 4000 to protect the SIP-Q in-
o_
ol
terface.
ic
en
• OpenScape Voice and a third-party trusted host or peer server that
_G
naling stream
40
28 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Transport Layer Security (TLS)
The OpenScape Voice server responds to the keep-alive message when it is received. If the SIP
endpoint fails to receive the response within five seconds, it repeats the keep-alive message.
If a response is still not received after the number of attempts indicated by the specific phone
device, the SIP endpoint considers the TLS connection to be failed, then establishes a new TLS
connection.
To allow the Unify SIP endpoints that support rapid recovery of TLS connections (e.g. with OS
4000), OpenScape Voice includes a server version in its response to the SIP REGISTER mes-
sage. The following conditions must be present:
• The SIP signaling manager must be provisioned to include the
server version in its response to the SIP REGISTER messages. Refer
to the OpenScape Voice Configuration Manual: Volume 2, Config-
uration and Administration Using CMP and Assistant Plug-Ins.
20
• The SIP REGISTER message from a SIP endpoint must be received
7-
on a TLS connection. The OpenScape Voice server does not provide
-0
20
the server version when the SIP REGISTER message is received on
o_
UDP or TCP without TLS.
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 29
FN9850FN10FN_TBAZZZAIMHY
Sample connection call flow
Client Hello
Server Hello
Server Certificate
20
Client Key Exchange
7-
-0
20
Change Chiper Spec
o_
ol
Client Server
Finished
ic
(SIP Endpoint) (OpenScape Voice
en
_G
Finished
rn
Fe
30 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Sample connection call flow
20
cation.
7-
-0
At this point, the handshake is complete and the application protocol is enabled, with content
20
type of 23. Application messages exchanged between client and server will be encrypted.
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 31
FN9850FN10FN_TBAZZZAIMHY
TLS Certificates
Chain Certificate
Depth hierarchy
0 root CA
20
7-
-0
20
server CA OpenScape Voice OpenScape SBC
o_
1 (optional) Client Certificate Server Certificate
ol
ic
en
_G
do
an
The Issuing CA, or Root CA certificates are located on the peers of the OpenScape Voice serv-
00
er. Similarly, the equivalent CA certificate is also located on the OpenScape Voice server.
EN
40
The OpenScape Voice server as well the OpenScape SBC accepts certificates in PEM format
88
only. If another format is used —for example, PKCS#12— a conversion to PEM format is re-
EN
quired before the certificate can be used. The conversion to PEM format can be completed us-
ing the openssl command line utility.
In environments where a separate PKI is required, all certificates must be signed by this CA
32 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
OSV TLS Certificates
The required X.509 certificates can be provided from the customer or created with recom-
20
7-
mended tools.
-0
20
o_
Please note: Customers with a PKI in place can use
ol
their own PKI tool to create the TLS certificates.
ic
en
Those customers need only to install the certificate
_G
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 33
FN9850FN10FN_TBAZZZAIMHY
OSV TLS Certificates
/usr/local/ssl/
20
7-
-0
20
o_
Diffie-Hellman Key
ol
ic
en
_G
By default, OpenScape Voice PKI scenarios are single CAs with only one common Selfsigned X509 certificate,
40
For distribution of root.pem to the phones, ensure that the privat key part has been removed !
34 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
20
- Root Certificate: root.pem
7-
- X509 Certificate: server.pem
-0
20
- X509 Certificate: client.pem
o_
- DiffiHellman Keyfile: dh2048.pem
ol
• OpenScape SBC ic
en
- Root Certificate: root.pem
_G
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 35
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
20
7-
-0
20
2: Copy the new files content to the OSV-PKI files login as srx user on OSV:
o_
$ cd /tmp/pki
ol
ic
cat kv300_n1_s.pem >/usr/local/ssl/private/server.pem
en
cat kv300_n1_c.pem >/usr/local/ssl/private/client.pem
_G
cd /usr/local/ssl/dh_keys
an
rn
cp -p dh1048.pem dh2048.pem
Fe
3: Change srx parameter via StartCli Expert Mode for new dh key
EN
srxctrl 3 0
srxctrl 4 0
srxctrl 0 3
srxctrl 0 4
36 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
20
7-
-0
20
o_
The certificate and the key must be imported into the SBC‘s certificate store as followed:
ol
ic
en
1: Transfer the SBC‘s certificate files to the PC which has access to the
_G
2: On the SBC local GUI navigate to the „Security“ menu under „Gen-
an
section
._
_L
:
EN
00
EN
40
88
EN
rootca
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 37
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
x509
20
5: In the „Key Files“ section, click on „Browse“, select the
7-
-0
ossbc_privatekey.pem file and upload the file to the SBC with „Up-
20
load“:
o_
ol
ic
en
pem files on local PC
_G
do
an
rn
Fe
key
._
_L
EN
00
The certificate key should appear then in the „Key Files“ list.
EN
38 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
If a new profile is created, enter a profile name and select the Cer-
tificate service „SIP-TLS“. Then select the server certificate, CA and
key uploaded in the previous step:
20
7-
-0
20
o_
the new files will be selected automatically
ol
ic
en
_G
•
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 39
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
20
7-
-0
20
o_
ol
ic means mtls
en
_G
do
an
rn
Fe
Please Note: The port 5161 means MTLS on Node 1, on SBC GUI we can choose
._
40 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 41
FN9850FN10FN_TBAZZZAIMHY
TLS Provisioning
Check the System status on the „Operation & Maintenance“ tab if the connection could be es-
tablished again.
20
7-
Simplex system
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
If the OSV connection cannot be established, the HiqLogAlert.log under /log on the Open-
Scape Voice can be used to identify the reason for.
42 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Multiple PKI Environment
Example:
C-SBC is connected to three dif-
ferent endpoint which belong
to different CAs.
20
Profiles, which are used in the
7-
relevant remote endpoint con-
-0
20
figuration.
o_
ol
ic
en
_G
do
an
rn
Fe
Different TLS profiles can be used for endpoints, by selecting in the „Remote Location domain
._
_L
Defines the used TLS mode: Select the certificate profile Enables „Keep-Alive“
- Server Authentication for the certificates to be used messages for this
- Mutual authentication for this endpoint. endpoint
- Client mode only
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 43
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
44 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
20
7-
TLS need the Default ROOT CERTIFICATE of the
-0
SBC, or the ROOT CERTIFICATE from the certificate
20
profile bound to the subscriber.
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 45
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
46 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
Change the Transport Protocol now on the Endpoints on Administrator Menu System SIP
interface. The TLS Communication will be provided on Port 5061 from the SIP Signaling Man-
ager.
20
7-
-0
20
o_
ol
ic
en
_G
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 47
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
The Payload Encryption can be enabled via Administrator Menu System Security.
20
Calls if no encrypted connection could be established.
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
48 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 49
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
After a couple of minutes, check the imported Certificate. Select the option „Selected Entry“
to display detailed information.
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
And last enable the SIP Server Certificate Validation under Administrator Menu Security
and Policies Certificates Authentication Policy by settings the policy to „Full“. This forces
the phone to verify the server certificate and the identity. A connection can only be estab-
lished if the server’s certificate matches with the certificate stored on the phone.
50 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
Or directly with the DLS on the „Certificate Policy“ tab under the „Security Settings“ menu by
setting the „SIP Server Authentication Policy“ to „Full“:
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
Security 51
FN9850FN10FN_TBAZZZAIMHY
Subscriber TLS Configuration
20
7-
-0
20
o_
ol
ic
en
_G
do
an
rn
Fe
._
_L
EN
00
EN
40
88
EN
52 Security 01.2018
© Unify Software and Solutions GmbH & Co. KG 2018 All rights reserved
FN9850FN10FN_TBAZZZAIMHY