T Rec H.235.2 200509 I!!pdf e
T Rec H.235.2 200509 I!!pdf e
ITU-T H.235.2
TELECOMMUNICATION (09/2005)
STANDARDIZATION SECTOR
OF ITU
Summary
This Recommendation describes an optional security profile for deploying digital signatures to
secure the H.225.0 signalling.
In earlier versions of the H.235 subseries, this profile was contained in Annex E/H.235. Appendices
IV, V, VI to H.235.0 show the complete clause, figure, and table mapping between H.235 versions 3
and 4.
Source
ITU-T Recommendation H.235.2 was approved on 13 September 2005 by ITU-T Study Group 16
(2005-2008) under the ITU-T Recommendation A.8 procedure.
Keywords
Authentication, certificate, digital signature, encryption, integrity, key management, multimedia
security, security profile.
NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some
other obligatory language such as "must" and the negative equivalents are used to express requirements. The
use of such words does not suggest that compliance with the Recommendation is required of any party.
© ITU 2006
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the
prior written permission of ITU.
1 Scope
This Recommendation describes an optional security profile for deploying digital signatures to
secure the H.225.0 signalling.
2 References
5 Conventions
In this Recommendation the following conventions are used:
– "shall" indicates a mandatory requirement.
– "should" indicates a suggested but optional course of action.
– "may" indicates an optional course of action rather than a recommendation that something
take place.
The signature security profile may use the voice encryption security profile of H.235.1 for
achieving voice confidentiality if necessary.
Procedures II and III specify how to implement the security services for different scenarios as
hop-by-hop and end-to-end with different security mechanisms such as asymmetric cryptographic
(digital signature) techniques.
While the message integrity service always provides message authentication, the reverse is not
always true. For the authentication-only mode, the integrity assured spans only a certain subset of
message fields. This applies to integrity services realized by asymmetric means (e.g., digital
signatures). Thus, in practice, a combined authentication and integrity service uses the same key
material without introducing a security weakness.
Moreover, all hop-by-hop security information is put into the CryptoSignedToken element. This
information is recomputed at every hop according to procedure II.
End-to-end security information on the other hand (only possible when using the H.323 proxy and
procedure III), basically computes similar information as put in the CryptoSignedToken, but stores
that information in a separate CryptoToken of the message. This information is not changed in
transit. A separate object identifier allows distinguishing between hop-by-hop and end-to-end
CryptoTokens.
Asymmetric techniques using digital signatures may apply on a hop-by-hop and/or also on an
end-to-end basis.
Confidentiality
Access control
Key management certificate allocation certificate allocation
NOTE 3 – The signature security profile has to be supported also by other H.235 entities (e.g., gatekeepers,
gateways and H.235 proxies).
NOTE 4 – Available key usage bits in the certificate could also determine the security service provided by a
terminal (e.g., non-repudiation asserted).
NOTE 1 – The proxy may be a separate network node as shown in Figure 1 or may be collocated with the
functionality of an H.323 entity, e.g., as part of the GK.
NOTE 2 – Depending on the signalled tokenOID, the proxy is able to determine whether the received
CryptoToken is destined for the proxy ("S") or some other recipient ("R").
NOTE 3 – Due to the fact that intermediate entities change signalling message contents on every leg,
end-to-end integrity is not possible.
For true end-to-end authentication across H.323 proxies or intermediate network elements, the
sending endpoint/terminal shall compute a digital signature as follows.
The CryptoH323Token field in each RAS/H.225.0 message shall contain the following fields:
• nestedCryptoToken containing a CryptoToken which itself contains the
cryptoSignedToken containing the following fields:
– tokenOID set to:
• "A", indicating that the hop-by-hop authentication/integrity computation includes
all fields in the RAS/H.225.0 message (see clause 11);
• "B", indicating that the authentication computation includes only a subset of fields
(see clause 10) in the H.225.0 RAS or call signalling message for authentication
only.
• token containing the fields:
– toBeSigned containing the ClearToken field used with the following fields:
• tokenOID set to "R" indicating that ClearToken is being used for authentication-
only/non-repudiation on an end-to-end basis;
NOTE 4 – Which security service is actually being applied depends also on the key usage
bits in the certificate.
• random contains a monotonically increasing sequence number;
• timeStamp optionally for enhanced security only when the terminating end entities
are time synchronized;
• generalID contains the endpoint identifier of the recipient (only in case of unicast).
In case of hop-by-hop this is the identifier of the next hop; in case of end-to-end
this is the far-end endpoint identifier;
• sendersID contains the endpoint sender;
• certificate contains the digital certificate of the sender where type indicates the
certificate type ("V" for MD5-RSA certificates or "W" for SHA1-RSA certificates)
and certificate carries the actual certificate (see clause 14);
10 Authentication-only
Terminals may choose to implement authentication-only (using OID "B"). In this case, the
authenticator is computed just over a subset (ClearToken inside CryptoToken) of the
RAS/H.225.0 message. Authentication-only may be useful for true end-to-end authentication
(see clause 9). The following fields in the ClearToken structure are used as the subset:
• tokenOID: There is a separate token object identifier (tokenOID "B") for
authentication-only implementation.
• random: The monotonically increasing sequence number.
• timeStamp: The time stamp.
• generalID: The identifier of the recipient (only in case of unicast messages). In case of
hop-by-hop, this is the identifier of the next hop; in case of end-to-end, this is the far-end
endpoint identifier.
• sendersID: The identifier of the sender.
• dhkey: The Diffie-Hellman parameters. This field and subfields are used during Setup to
Connect messages.
The authenticator is computed over the ClearToken inside the EncodedGeneralToken
(i.e., ClearToken) of the token of the cryptoSignedToken. The digital signature shall be
computed over the ASN.1-encoded bitstring of ClearToken. Before computing the digital
signature, the tokenOID in the ClearToken shall be set to {0 0}.
14 Handling of certificates
For verification of digital signatures, the receiving entity must have access to the sender's certificate
that is signed by a recognized certification authority (CA). There are several possibilities as to how
the recipient can access the sender's certificate:
• The certificate is included in the message exchange as described by procedures II and III; in
this case, certificate holds the actual certificate and type holds OID "V" or OID "W".
• The recipient knows the certificate, possibly stored locally from an earlier exchange.
• Instead of including the certificate itself, the sender provides a URL where the certificate
can be found. For this, certificate contains the URL and type is set to OID "P".
• The recipient obtains the certificate through some other means outside the scope of this
Recommendation (e.g., LDAP directory lookup).
Whenever a digital certificate is conveyed in a message, the receiving entity (gatekeeper, endpoint)
shall check the identity of the sender (gatekeeper, endpoint) against the identity of the certificate in
order to prevent man-in-the-middle attacks.
For digitally signed messages sent from the gatekeeper to the endpoint, different possibilities exist
for an endpoint to check the gatekeeper identity:
– If the hostname is available, for example, in the common name attribute of the subject field
or of the subjectAltName field in the certificate, the endpoint may check this hostname
against the gatekeeper identifier. Additionally, the endpoint may use DNS to query the
associated IP address and check it against the gatekeeper's IP address as presented in the
gatekeeper's signed response message.
– For example, the gatekeeper identifier may be constructed by the IP address (represented as
a 4 byte value in network byte order) concatenated with other identifying information of the
gatekeeper identifier, truncated to the maximum length of senders ID field, which carries
the gatekeeper’s identity. The endpoint may additionally check the IP address belonging to
the hostname against the IP address presented in the IP header of the response of the
gatekeeper.
NOTE – This method would not work as expected when Network address translation (NAT)
devices are involved.
– If the hostname is not available in the certificate, the IP address, which would be part of the
certificate (iPAddress subjectAltName), shall be taken directly to perform the checks stated
above.
The H.323 proxy acts in a dual behaviour. On the one hand, the proxy terminates the authentication
and integrity on each of its legs. The proxy actively includes the freshly computed
authentication/integrity information in the outgoing RAS messages in a similar manner as described
in procedure I of H.235.1. On the other hand, the proxy lets the end-to-end security information
pass unmodified. The proxy may, however, verify received certificates and/or digital signatures in
transit.
Below, we illustrate the procedure details for RAS, H.225.0 call signalling and H.245 message
authentication, integrity and non-repudiation.
17 Multicast behaviour
H.225.0 multicast messages such as GRQ or LRQ shall include a CryptoToken according to the
procedures II and III where the generalID is not set. When such messages are sent unicast, then the
message shall include a CryptoToken.
H.235 Authentication
Non-
H.225.0 RAS message signalling Authentication-only and
repudiation
fields integrity
Any cryptoTokens Procedure II/III Procedure II/III Procedure II/III
NOTE – For unicast messages, procedures II or III shall be applied with the security fields in the
CryptoToken used.
H.235
H.225.0 call signalling Authentication- Authentication Non-
signalling
message only and integrity repudiation
fields
Alerting-UUIE, cryptoTokens Procedure II/III Procedure II/III Procedure II/III
CallProceeding-UUIE,
Connect-UUIE, Setup-UUIE,
Facility-UUIE,
Progress-UUIE,
Information-UUIE,
ReleaseComplete-UUIE,
Status-UUIE, StatusInquiry-
UUIE, SetupAcknowledge-
UUIE, Notify-UUIE
Series E Overall network operation, telephone service, service operation and human factors
Series J Cable networks and transmission of television, sound programme and other multimedia signals
Series L Construction, installation and protection of cables and other elements of outside plant
Series Y Global information infrastructure, Internet protocol aspects and next-generation networks
Printed in Switzerland
Geneva, 2006