ImageVerifierCode 换一换
格式:PDF , 页数:18 ,大小:421.31KB ,
资源ID:797793      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-797793.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T H 460 22-2015 Negotiation of security protocols to protect ITU-T H 225 0 call signalling messages (Study Group 16).pdf)为本站会员(confusegate185)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T H 460 22-2015 Negotiation of security protocols to protect ITU-T H 225 0 call signalling messages (Study Group 16).pdf

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T H.460.22 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2015) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Supplementary services for multimedia Negotiation of security protocols

2、to protect ITU-T H.225.0 call signalling messages Recommendation ITU-T H.460.22 ITU-T H-SERIES RECOMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchroniza

3、tion H.220H.229 Systems aspects H.230H.239 Communication procedures H.240H.259 Coding of moving video H.260H.279 Related systems aspects H.280H.299 Systems and terminal equipment for audiovisual services H.300H.349 Directory services architecture for audiovisual and multimedia services H.350H.359 Qu

4、ality of service architecture for audiovisual and multimedia services H.360H.369 Telepresence H.420H.429 Supplementary services for multimedia H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions, protocols and procedures H.500H.509 Mobility for H-Seri

5、es multimedia systems and services H.510H.519 Mobile multimedia collaboration applications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and services H.540H.549 Mobility interworking procedures H.550H.

6、559 Mobile multimedia collaboration inter-working procedures H.560H.569 BROADBAND, TRIPLE-PLAY AND ADVANCED MULTIMEDIA SERVICES Broadband multimedia services over VDSL H.610H.619 Advanced multimedia services and applications H.620H.629 Ubiquitous sensor network applications and Internet of Things H.

7、640H.649 IPTV MULTIMEDIA SERVICES AND APPLICATIONS FOR IPTV General aspects H.700H.719 IPTV terminal devices H.720H.729 IPTV middleware H.730H.739 IPTV application event handling H.740H.749 IPTV metadata H.750H.759 IPTV multimedia application frameworks H.760H.769 IPTV service discovery up to consum

8、ption H.770H.779 Digital Signage H.780H.789 E-HEALTH MULTIMEDIA SERVICES AND APPLICATIONS Interoperability compliance testing of personal health systems (HRN, PAN, LAN, TAN and WAN) H.820H.859 Multimedia e-health data exchange services H.860H.869 For further details, please refer to the list of ITU-

9、T Recommendations. Rec. ITU-T H.460.22 (04/2015) i Recommendation ITU-T H.460.22 Negotiation of security protocols to protect ITU-T H.225.0 call signalling messages Summary Recommendation ITU-T H.460.22 defines a security negotiation mechanism for ITU-T H.225.0 call signalling. The negotiated securi

10、ty mechanism between two entities is to be applied for ITU-T H.225.0 call signalling messages before initiating a call establishment procedure. Detailed negotiation procedures, which provide the necessary security interoperability among ITU-T H.323 systems, are specified in this Recommendation. The

11、syntax of the security capability parameters in call signalling messages is also specified. This revision includes procedural clarifications and introduces support for ITU-T H.460.18 and ITU-T H.460.19 NAT traversal and negotiating datagram transport layer security (DTLS) for ITU-T H.323 Annex E ove

12、r UDP transport. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T H.460.22 2007-01-13 16 11.1002/1000/9041 1.1 ITU-T H.460.22 (2007) Cor. 1 2008-06-13 16 11.1002/1000/9489 2.0 ITU-T H.460.22 2015-04-29 16 11.1002/1000/12456 _ * To access the Recommendation, type the URL http:

13、/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T H.460.22 (04/2015) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the fie

14、ld of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardiz

15、ing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered

16、 by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate

17、 both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved w

18、hen all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPE

19、RTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted

20、 by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that

21、 this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2015 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec.

22、ITU-T H.460.22 (04/2015) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 2 4 Abbreviations and acronyms 2 5 Conventions 2 6 Negotiation description . 2 6.1 Call establishment security . 3 6.2 Negotiation of security mechanism 3 7 Feature description securityProtocolNegotiation

23、. 7 7.1 tlsSecurityProtocol . 7 7.2 ipsecSecurityProtocol . 8 7.3 dtlsSecurityProtocol . 8 8 NAT traversal considerations . 9 Rec. ITU-T H.460.22 (04/2015) 1 Recommendation ITU-T H.460.22 Negotiation of security protocols to protect ITU-T H.225.0 call signalling messages 1 Scope This Recommendation

24、specifies the security negotiation mechanism for ITU-T H.225.0 call signalling message exchanges. The main goals include the following. 1) Secure selection of the security mechanism. Otherwise, the procedure of negotiation is vulnerable to certain attacks such as malicious manipulation or bidding-do

25、wn attacks. The entire registration, admission and status (RAS) message shall be protected during the negotiation procedure. 2) Involved ITU-T H.323 entities shall determine mutually agreed security protocols without requiring additional round trips. 3) Entities involved in the negotiation procedure

26、 shall be aware of the result of the negotiation, such as success or failure. 4) The negotiation procedure should not cause any additional burden to the involved entities. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text,

27、constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of t

28、he Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T H.225.0 Recommendation ITU-T H.2

29、25.0 (2009), Call signalling protocols and media stream packetization for packet-based multimedia communication systems. ITU-T H.235.6 Recommendation ITU-T H.235.6 (2014), H.323 security: Encryption profile with native ITU-T H.235/H.245 key management. ITU-T H.235.8 Recommendation ITU-T H.235.8 (200

30、5), H.323 security: Key exchange for SRTP using secure signalling channels. ITU-T H.323 Recommendation ITU-T H.323 (2009), Packet-based multimedia communications systems. ITU-T H.460.1 Recommendation ITU-T H.460.1 (2002), Guidelines for the use of the generic extensible framework. ITU-T H.460.17 Rec

31、ommendation ITU-T H.460.17 (2005), Using H.225.0 call signalling connection as transport for H.323 RAS messages. ITU-T H.460.18 Recommendation ITU-T H.460.18 (2013), Traversal of ITU-T H.323 signalling across network address translators and firewalls. IETF RFC 5246 IETF RFC 5246 (2008), The Transpor

32、t Layer Security (TLS) Protocol Version 1.2. IETF RFC 6347 IETF RFC 6347 (2012), Datagram Transport Layer Security Version 1.2. 2 Rec. ITU-T H.460.22 (04/2015) 3 Definitions This Recommendation does not define any terms. 4 Abbreviations and acronyms This Recommendation uses the following abbreviatio

33、ns and acronyms: ACF Admission Confirmation ARJ Admission Reject ARQ Admission Request DTLS Datagram Transport Layer Security FW Firewall GCF Gatekeeper Confirmation GEF Generic Extensible Framework GRQ Gatekeeper Request IPSec Internet Protocol Security LCF Location Confirmation LRJ Location Reject

34、 LRQ Location Request MCU Multipoint Control Unit MiTM Man in The Middle NAT Network Address Translator RAS Registration, Admission and Status RCF Registration Confirmation RRJ Registration Reject RRQ Registration Request SCI Service Control Indication TCP Transmission Control Protocol TLS Transport

35、 Layer Security 5 Conventions In this Recommendation, the following conventions are used: “shall“ indicates a mandatory requirement; “should“ indicates a suggested but optional course of action; “may“ indicates an optional course of action rather than a recommendation that something take place. 6 Ne

36、gotiation description The protection of ITU-T H.225.0 call signalling messages is important for the security of ITU-T H.323 systems. In small networks, network administrators can ensure that all ITU-T H.323 entities use the same security protocol. However, in large networks, such as where endpoints

37、are distributed in different network domains, a calling endpoint may not know in advance the security Rec. ITU-T H.460.22 (04/2015) 3 protocol supported by the called endpoint. Therefore, it is necessary for the two endpoints to negotiate the security mechanism for ITU-T H.225.0 call signalling mess

38、ages before initiating a call establishment procedure. The negotiation of actual security parameters/algorithms is outside the scope of this Recommendation. 6.1 Call establishment security There are a number of important reasons to secure the call signalling channel (i.e., ITU-T H.225.0). When using

39、 ITU-T H.235.6 or ITU-T H.235.8 to encrypt the media packets, the keys are exchanged in the signalling channel. These keys are sent either in the clear and require a secure signalling channel or are susceptible to man in the middle (MiTM) attacks and should be protected by a secure call signalling c

40、hannel. It also provides a very simple way to authenticate the endpoints to each other in direct call signalling mode or for each hop of the call in gatekeeper routed mode. 6.2 Negotiation of security mechanism The generic extensible framework (GEF) feature negotiation mechanism ITU-T H.460.1 is use

41、d during the RAS communication. Whether or not this security negotiation mechanism is supported is negotiated between the endpoint and the gatekeeper. If neither the gatekeeper nor the endpoint supports this mechanism and no other security mechanism is used, the normal ITU-T H.323 procedure will be

42、followed. The security negotiation procedure shall consist of the following steps. 1) The endpoint, where enabled, discovers the gatekeeper. The endpoint shall advertise the securityProtocolNegotiation feature as a supportedFeature in the featureSet field of the gatekeeper request (GRQ). All paramet

43、ers of the securityProtocolNegotiation feature shall be omitted. Where the gatekeeper supports this feature, it shall advertise as a supportedFeature with all parameters omitted in the reply GRQ. The absence of securityProtocolNegotiation feature indicates the gatekeeper does not support this featur

44、e. 2) Where the endpoint has discovered support for this feature or is registering without discovery, the endpoint shall include the securityProtocolNegotiation feature as a supportedFeature in the featureSet field in the registration request (RRQ) message. The parameters associated with the feature

45、 shall indicate all the security protocols supported by the endpoint. Every protocol is assigned a preference value, where a smaller number signifies a higher preference. The gatekeeper stores this information for call establishment purposes. Lightweight RRQs shall only include the securityProtocolN

46、egotiation feature advertisement and omit all parameters. 3) The gatekeeper returns a registration confirmation (RCF) or registration reject (RRJ). The gatekeeper shall indicate whether the negotiation mechanism is supported in the RCF. If this feature is supported, the gatekeeper shall include the

47、securityProtocolNegotiation feature as a supportedFeature in the featureSet field. The absence of securityProtocolNegotiation shall indicate that the gatekeeper does not support this feature. There are no parameters present in the securityProtocolNegotiation feature in the RCF message. 4) The endpoi

48、nt initiates a call. The endpoint shall send an ARQ to the gatekeeper including a securityProtocolNegotiation feature as a supportedFeature in the featureSet field of the admission request (ARQ). All parameters shall be omitted. 5) The next step is determined based on whether the call is routed by t

49、he gatekeeper. a) If direct call model is used, the gatekeeper shall send an ARQ containing the highest priority matching security protocol supported by both endpoints and shall include the stored connnectionAddress of the called endpoint where applicable. The priority field shall be omitted. 4 Rec. ITU-T H.460.22 (04/2015) b) If the gatekeeper-routed call model is used, the gatekeeper shall send an ARQ containing the highest priority matching security protocols that the calling endpoint and gatekee

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1