Vous êtes sur la page 1sur 44

CCVP Prep:

Cryptography in Cisco
Unified Communications

BRKCRT-2202

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2

© 2008, Cisco Systems, Inc. All rights reserved. 1


14370_04_2008_c1.scr
What Is Covered by This Session?

ƒ Impossible to cover all topics about voice security in a


two hour session
ƒ Session helps to prepare for current CCVP exam
questions that relate to Cisco Unified Communications
Manager security
ƒ Intended for CCVP candidates lacking security
experience
ƒ Cisco Unified Communications Manager knowledge
is expected

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Agenda

ƒ Threats to Cisco Unified Communications


ƒ Introduction to Cryptography
ƒ Cisco Unified Communications Manager Security
ƒ Summary
ƒQ&A

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 4

© 2008, Cisco Systems, Inc. All rights reserved. 2


14370_04_2008_c1.scr
Threats to
Cisco Unified
Communications

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5

Examples of Threats Targeting


the IP Telephony System
Loss of Privacy Loss of Integrity
Deposit Deposit
$1000 $100

Confidential Information
Customer Bank

Impersonation Denial of Service

Loss
I am Bob, of Dial
send me Tone
I am the PSTN, phone calls.
send me calls.

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6

© 2008, Cisco Systems, Inc. All rights reserved. 3


14370_04_2008_c1.scr
Introduction to
Cryptography

Symmetric vs. Asymmetric Encryption

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Symmetric Encryption
Encryption and Encryption and
Decryption Key Decryption Key

Encrypt Decrypt
$1000 $!@#IQ $1000

ƒ Same (“shared”) key encrypts and decrypts


ƒ Key must be kept secret (sender and receiver)
ƒ Fast
ƒ Algorithms: DES, 3DES, AES, RC4, SEAL, Blowfish, etc.

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8

© 2008, Cisco Systems, Inc. All rights reserved. 4


14370_04_2008_c1.scr
Symmetric Encryption (Cont.)

ƒ Key Management
Different key for each pair of devices
Keys should be changed frequently (hours to weeks)
Same key must be known by both parties

ƒ Usage
Bulk Data Encryption (e-mail, IPsec packets, sRTP, HTTPS, TLS)

ƒ Algorithm Example—AES
Publicly announced by NIST in 2000
Much faster and more efficient than DES/3DES
Used to encrypt signaling (TLS) and media (sRTP)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Asymmetric Encryption
Encryption Decryption
Key Key

Encrypt Decrypt
$1000 %3f7&4 $1000

ƒ Based on key pairs: data encrypted by one key can only be


decrypted by other key
ƒ Each entity owns its pair of keys
ƒ Only one key (decryption key) must be kept secret
ƒ Slow
ƒ Algorithm: RSA
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10

© 2008, Cisco Systems, Inc. All rights reserved. 5


14370_04_2008_c1.scr
Asymmetric Encryption (Cont.)

ƒ Key Management
Different key pair for each entity
Keys can be used for longer periods (months to years)
One key must remain secret (“private key”), the other key must
be known by other entities (“public key”)

ƒ Usage
Low Volume Data (symmetric keys)

ƒ Algorithm Example—RSA
Developed in 1977, public domain since patent expired in 2000

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11

Two Ways to Use


Asymmetric Encryption

ƒ Confidentiality
Sender encrypts data with public key of the receiver
Any sender can generate encrypted message
Senders need to know public key of receiver
Only receiver can decrypt encrypted data
Only receiver knows its corresponding private key
ƒ Authenticity and Integrity
Sender encrypts data with its own private key
Only sender can generate encrypted (signed) message
Only sender knows its private key
All receivers can decrypt encrypted (signed) message
All receivers need to know corresponding public key of sender
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12

© 2008, Cisco Systems, Inc. All rights reserved. 6


14370_04_2008_c1.scr
Introduction to
Cryptography

Hash-Based Message Authentication Codes (HMAC)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Hash Functions
ƒ One-way functions
Message
ƒ Generate fixed-length Data of ~~~~~~~~~~~~~~
Arbitrary ~~~~~~~~~~~~
output (“hash”, “digest” or ~~~~~~~~~~~
Length
“fingerprint”) from arbitrary ~~~~~~~~~~~~~
input data
ƒ Impossible to recover Hash
Function
hashed data from digest
ƒ Collisions (multiple inputs
result in same hash
output) possible
ƒ Fast Fixed-Length
e883aa0b24c09...
ƒ Algorithms: MD5, SHA-1 Hash

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14

© 2008, Cisco Systems, Inc. All rights reserved. 7


14370_04_2008_c1.scr
No Integrity Provided by Pure Hashing
ƒ Only the algorithm has
to be known to create a Data

valid hash—algorithms Confirm


are well known. Order

ƒ Attacker changing the


data can easily create Confirm Hashing
a new hash. Order Algorithm

e8F0s31a...
ƒ Receiver cannot detect Hashing
Algorithm
the manipulation. e8F0s31a...
Same Hash
ƒ For security, a secret e8F0s31a...
Digest?
element has to be added Hash Digest

to the computation.

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Hash-Based Message Authentication


Code or “Keyed Hash”
ƒ Secret key added to provide
authenticity and integrity:
Sender creates hash value from
input data plus locally known key Data

Sender transmits data plus hash Confirm Secret Key


Order
Receiver creates hash from received
data plus locally known key
Locally created hash must match Confirm Hashing
Secret Key
received one Order Algorithm

ƒ Symmetric Key Nature Hashing


bff6f12a0…

Different key for each pair of devices Algorithm


bff6f12a0…
Keys should be changed frequently bff6f12a0… HMAC
(hours to weeks) HMAC Verified
(Authenticated
Same key must be known by Fingerprint)
both parties

ƒ Used for bulk data (IPsec


packets, HTTPS, TLS, sRTP)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16

© 2008, Cisco Systems, Inc. All rights reserved. 8


14370_04_2008_c1.scr
Introduction to
Cryptography

Digital Signatures

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Digital Signatures

ƒ Provide authenticity, integrity and non-repudiation


ƒ Based on asymmetric cryptographic methods
Sender’s private key used as signature-generating key
Sender’s public key used as signature-verification key

ƒ Slower than HMAC


Not used for bulk or real-time traffic
Used for device authentication and exchange
of symmetric keys

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18

© 2008, Cisco Systems, Inc. All rights reserved. 9


14370_04_2008_c1.scr
Digital Signatures (Cont.)
Purchase Order
$100,000

SHA-1 Hash
Untrusted Network

49eD0e3A7c44...
Purchase Order Purchase Order
$100,000 $100,000
RSA Signature
e10d6200aCe...
Encrypt

RSA
SHA-1 Hash
Decrypt
Private Key Public Key
of Signer of Signer 49eD0e3A7c44...
Same Hash Digest?

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19

Introduction to
Cryptography

Public Key Infrastructure (PKI)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20

© 2008, Cisco Systems, Inc. All rights reserved. 10


14370_04_2008_c1.scr
Key Distribution Issues

ƒ Symmetric Keys used by Symmetric Encryption


and HMAC
Frequent key exchange between peers is needed
Confidentiality and authenticity are required for key exchange
Out-of-band exchange does not scale

ƒ Public Keys used by Asymmetric Encryption and


Digital Signatures
Public keys need to be distributed to all devices
Authenticity and integrity are required for key exchange
Out-of-band verification or exchange do not scale

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Symmetric Key Distribution Protected by


Asymmetric Encryption
AES Key AES Key

A RSA RSA B

Public Key Private Key


of User B of User B

ƒ Symmetric key is generated by one peer


ƒ Key is encrypted with the public key of the receiver and sent over
the network
ƒ Only the receiver can decrypt the message by using its private key
ƒ Allows secure automated key distribution of symmetric keys
ƒ Relies on knowledge of public keys of all possible peers
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 22

© 2008, Cisco Systems, Inc. All rights reserved. 11


14370_04_2008_c1.scr
Public Key Distribution in
Asymmetric Cryptography
ƒ All entities have to know public
keys of all other entities.
ƒ If automated key exchange is
used, authenticity and integrity
must be provided to avoid
man-in-the-middle attacks
ƒ Out-of-band verification does Public Key
of User A
not scale
ƒ PKI can be used to solve Public Key
of User B
scalability issues A B

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 23

PKI as a Trusted Third-Party Protocol

ƒ Does not eliminate the need for authenticity and


integrity of public keys (out-of-band verification)
ƒ Solves scalability issues
Uses a hierarchical model by adding a trusted introducer
Authenticity and integrity (out-of-band verification) only required
between trusted introducer and each entity
Authenticity and integrity between entities are then guaranteed
by trusted introducer (no out-of-band verification required)
Trusted introducer will then guarantee authenticity and integrity
of public keys of other entities by use of certificates, signed by
the introducer

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 24

© 2008, Cisco Systems, Inc. All rights reserved. 12


14370_04_2008_c1.scr
PKI—Generating Key Pairs
Trusted
Introducer

Private Key Public Key


of Trusted of Trusted
Introducer Introducer

Public Key Public Key


of User A of User C

Private Key Private Key


A of User A of User C C

ƒ Every entity, including the trusted introducer, needs to generate


its own public and private key pair

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 25

PKI—Distribution of the Public Key


of the Trusted Introducer
Trusted
Introducer

Private Key Public Key


of Trusted of Trusted
Introducer Introducer

Public Key Public Key


of User A of User C

Private Key Public Key Public Key Private Key


A of User A of Trusted of Trusted of User C C
Introducer Introducer

ƒ Each entity obtains the public key of the trusted introducer and
verifies its authenticity and integrity (out-of-band)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 26

© 2008, Cisco Systems, Inc. All rights reserved. 13


14370_04_2008_c1.scr
PKI—Requesting Signed Certificates
Public Key Public Key
of User A Trusted of User C
Introducer

Private Key Public Key


of Trusted of Trusted
Introducer Introducer

Public Key Public Key


of User A of User C

Private Key Public Key Public Key Private Key


A of User A of Trusted of Trusted of User C C
Introducer Introducer

ƒ Each entity submits its public key to the trusted introducer and
requests a certificate
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 27

PKI—Signing Certificates

A
Public Key
of User A Content

Trusted
Introducer
Sign
RSA
Public Key
of User A
Public Key
Trusted of Trusted Signing Public Key of User A
Introducer Key Signed by the
Introducer
Trusted Introducer

Private Key
of Trusted
Introducer

ƒ The trusted introducer verifies the received public key (out-of-band) and
creates a certificate signed with the trusted introducer’s private key

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 28

© 2008, Cisco Systems, Inc. All rights reserved. 14


14370_04_2008_c1.scr
PKI—Providing Entities with
Their Certificates
Trusted
Introducer

Private Key Public Key


of Trusted of Trusted
Introducer Introducer

Trusted Trusted
Introducer Introducer

Public Key Public Key


of User A Public Key Public Key of User C
of User A of User C

Private Key Public Key Public Key Private Key


A of User A of Trusted of Trusted of User C C
Introducer Introducer

ƒ The trusted introducer sends signed certificates to the entities

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29

PKI—Exchange of Public Keys Between


Entities Using Their Signed Certificates

Trusted Trusted
Introducer Introducer

Public Key Public Key Public Key Public Key


of User A of User A of User C of User C

Untrusted Network
Private Key Public Key Public Key Private Key
A of User A of Trusted of Trusted of User C C
Introducer Introducer

ƒ Entities can now exchange their public keys by means of their


signed certificates
ƒ Signature of a received certificate is verified using the public key of
the trusted introducer. This ensures the authenticity and integrity of
the peer’s public key

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 30

© 2008, Cisco Systems, Inc. All rights reserved. 15


14370_04_2008_c1.scr
PKI Entities

Term Function
CA (Certificate The trusted introducer signing certificates of PKI entities
Authority) (PKI users)
PKI Users Devices, users, or applications that want to safely
distribute their public keys
Certificates Digital form (X.509v3) including the identity of a PKI
user, its public key, and a signature (created by the CA)

Self-signed Sometimes entities issue self-signed certificates:


Certificates CA, as the root of a PKI
Entities that are not part of a PKI (not associated with a CA)
but use PKI-enabled applications
Require out-of-band verification

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 31

X.509v3 Certificates

Certificate Format Version Version 3


Certificate Serial Number 12457801
Signature Algorithm Identifier
RSA with SHA-1
for CA
Issuer X.500 Name C = US O = Cisco CN = CA
Start = 04/01/04
Validity Period
Expire = 04/01/09
C = US O = Cisco CN =
Subject X.500 Name
CCMCluster001
Subject Public Key Information 756ECE0C9ADC7140...
Extension(s) (v3)
CA Signature 2C086C7FE0B6E90DA396AB…

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 32

© 2008, Cisco Systems, Inc. All rights reserved. 16


14370_04_2008_c1.scr
Introduction to
Cryptography

PKI Example: SSL in the Internet

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 33

Internet Web Server Certificate

ƒ Used for sensitive web Internet-CA


applications
ƒ The web server has a Private Key of
private and public key Internet-CA

ƒ The web server has a


certificate, usually issued Web Server
by a public Internet-CA
Internet-CA
Public Key of
Web Server
Public Key of
Web Server
Private Key of
Web Server

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 34

© 2008, Cisco Systems, Inc. All rights reserved. 17


14370_04_2008_c1.scr
Internet Web Browser: Embedded
Internet-CA Certificates

ƒ Web browser applications have Internet-CA certificates already


embedded (100+)
ƒ Eliminates the need to download and verify the Internet-CA’s
certificate
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 35

Obtaining Authentic Public Key


of Web Server
Web Browser Web Server
Internet-CA

Public Key of
Internet-CA
Verify
Signature

Internet-CA Internet-CA Public Key of


Web Server
Internet

Public Key of Public Key of Public Key of Private Key of


Web Server Web Server Web Server Web Server

ƒ The server passes its certificate to the client at connection startup


ƒ The client verifies the certificate using the embedded certificate of the
Internet-CA that has issued the certificate of the web server
ƒ The client extracts the public key of the web server from the certificate
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 36

© 2008, Cisco Systems, Inc. All rights reserved. 18


14370_04_2008_c1.scr
Web Server Authentication
Web Browser Web Server

Random String Sign


Challenge
Rj@as94iDg... RSA

Internet Private Key of


Web Server
RSA p2CksD1f3r...
Response
Public Key of
Web Server
Rj@as94iDg...

ƒ The client sends challenge with random data to the web server
ƒ The web server uses its private key to sign the data and sends it back to the client
ƒ The client verifies the returned data using the public key of the web server
previously retrieved from the certificate
ƒ If returned data matches the sent data, the web server has the correct private key,
and therefore it is authentic
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 37

Exchange of Symmetric Session Keys


Web Browser Web Server

Generate
Session Keys

ke4P6d23Le... RSA
Session Keys
Internet Private Key of
Web Server
RSA

Session Keys
Public Key of
Web Server

ƒ The client generates symmetric session keys for encryption and HMAC algorithms
to provide session protection
ƒ The client encrypts the keys using the public key of the web server and sends them
to the web server
ƒ The web server (only) can decrypt the session keys using its private key

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 38

© 2008, Cisco Systems, Inc. All rights reserved. 19


14370_04_2008_c1.scr
Session Encryption
Web Browser Web Server
Data from
Browser Data from
Browser
AES

Ss199le4... AES
Session Keys

Session Keys
Internet
Data from
AES
Server

Data from
AES dV46ax7...
Server

ƒ Packets between web server and client can now be authenticated (using HMAC,
such as keyed SHA-1) and encrypted (using symmetric encryption algorithms such
as AES)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 39

Cisco Unified
Communications
Manager Security

PKI Topologies Used in Cisco Unified Communications

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 40

© 2008, Cisco Systems, Inc. All rights reserved. 20


14370_04_2008_c1.scr
PKI Topologies in Cisco Unified
Communications Manager Deployments

ƒ Cisco Unified Communication Manager services


certificates are self-signed: CCM, TFTP and
Certificate Authority Proxy Function (CAPF)
ƒ Manufacturing Installed Certificates (MICs) on
current Cisco Unified models are signed by
Cisco manufacturing CA
ƒ Locally Significant Certificates (LSCs) on 7940,
7960 and current Cisco IP phone models are signed
by CAPF or by an external CA
ƒ Secure SRST Certificate signed by external CA

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 41

Self-Signed Certificates
CCM1 TFTP TFTP
CCM1
Private Key Private Key
of CCM1 of TFTP

Public Key Public Key


of CCM1 of TFTP
Public Key Public Key
of CCM1 of TFTP

CCM2 CAPF CAPF


CCM2
Private Key Private Key
of CCM2 of CAPF

Public Key Public Key


of CCM2 of CAPF
Public Key Public Key
of CCM2 of CAPF

ƒ Each CallManager service has a self-signed certificate


ƒ The TFTP service also has self-signed certificates
ƒ If the CAPF is used (needed for LSC), it also has a self-signed certificate
ƒ All of them act as their own PKI root
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 42

© 2008, Cisco Systems, Inc. All rights reserved. 21


14370_04_2008_c1.scr
Manufacturing Installed
Certificates (MIC)

Cisco CA
Cisco CA
Issue Certificate
Private Key During Production Private Key
of Phone of Cisco CA

Public Key
of Phone
Public Key Cisco CA Public Key
of Phone of Cisco CA

Public Key
of Cisco CA Public Key
of Cisco CA

ƒ Cisco IP phone models with MICs have a public and a private key pair
and MIC for the phone installed
ƒ The certificate of the IP phone is signed by the Cisco manufacturing CA
ƒ Cisco manufacturing CA is the PKI root for all MICs

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 43

Locally Significant Certificates (LSC)


CAPF Acting CAPF Acting
as a CA as a Proxy
CCM1 CCM1 Enterprise CA
CAPF CAPF Enroll

Enroll Enroll

ƒ LSCs can be used on phones with MICs or on Cisco Unified IP Phone


7940 and 7960 models (SCCP only)
ƒ They use LSCs issued either by the CAPF or by an external CA
ƒ The CAPF or external CA is the root for all LSCs
ƒ Cisco Unified Communications Manager 5.0 and 6.0 do not support
an external CA
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 44

© 2008, Cisco Systems, Inc. All rights reserved. 22


14370_04_2008_c1.scr
Multiple PKI Roots in Cisco Unified
Communications Manager Deployments
CCM1 CCM1 TFTP TFTP

Private Key Private Key


of CCM1 of TFTP

Public Key Public Key


of CCM1 of TFTP
Public Key Public Key
of CCM1 of TFTP

Cisco CA MIC LSC CAPF CA


7941 7940

Cisco CA CAPF

Public Key Public Key


of 7941 of 7940

ƒ No single root but multiple independent PKI topologies


ƒ All need to be known and trusted (out-of-band verification)
ƒ Cisco Certificate Trust List (CTL) allows verification of roots
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 45

Cisco Unified
Communications
Manager Security

Cisco Certificate Trust List (CTL)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 46

© 2008, Cisco Systems, Inc. All rights reserved. 23


14370_04_2008_c1.scr
CTL Client Signs CTL
CCM1 CCM1 Signed List of Certificate Issuers
Cisco CTL Cisco CTL Client
Client

Public Key TFTP CCM1


of CCM1

TFTP TFTP
Public Key Public Key
Private Key of TFTP of CCM1
of Cisco
Public Key CTL Client
of TFTP Cisco CA Cisco CA CAPF

CAPF
CAPF
Public Key Public Key Public Key
of Cisco of Cisco of Cisco Public Key
CTL Client CTL Client CTL Client of CAPF
Public Key
of CAPF

ƒ Obtains certificates of all certificate-issuing instances (PKI roots)


ƒ Creates a list (CTL) containing all obtained certificates and signs the list
ƒ Cisco CTL client keys physically stored on a security token
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 47

CTL Download
Cisco CTL Client
Cisco CA
TFTP CCM1

TFTP Public Key


of Phone
Public Key Public Key
of TFTP of CCM1

Private Key
Cisco CA of Phone

Public Key
of Cisco Public Key
CTL Client of Phone

ƒ The CTL is sent to the IP phones over TFTP at boot


ƒ The CTL contains all entities that issue certificates
ƒ The IP phone now knows which issuers are trusted
ƒ Similar to Internet browser embedded Internet-CA certificates
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 48

© 2008, Cisco Systems, Inc. All rights reserved. 24


14370_04_2008_c1.scr
Cisco CTL Client Application
ƒ Cisco CTL client software is used
to create or update the CTL
ƒ The CTL is signed by Cisco CTL
client using the private key from
one of the administrator security
tokens, which are all signed by the
Cisco CA
ƒ The CTL file must be updated only
if Cisco Unified Communications
Manager services or security
tokens change
ƒ The CTL also acts as an
authorization list specifying
which certificates belong to
which function (such as Cisco
Unified Communications
Manager and TFTP) Security Token
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 49

CTL Verification on the IP Phone


Existing CTL on the Phone
Cisco CTL Client Cisco CTL Client

TFTP CCM1 TFTP CCM1

Public Key Public Key New CTL Public Key Public Key
of TFTP of CCM1 of TFTP of CCM1
over TFTP

Cisco CA CCM2 Cisco CA

Public Key Public Key


of Cisco Public Key of Cisco
CTL Client of CCM2 CTL Client

ƒ Every time the IP phone receives a new CTL, it is verified


ƒ New CTL must be signed by one of the authorized security tokens
(listed in the IP phone’s current CTL file)
ƒ If no CTL file is present in phone, new CTL is not verified (initial
deployment or after erasing the CTL from the IP phone)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 50

© 2008, Cisco Systems, Inc. All rights reserved. 25


14370_04_2008_c1.scr
IP Phone Usage of the CTL
ƒ Encrypted Signaling (CallManager Service Certificate)
SCCP or SIP over TLS
Certificate-based two-way authentication between IP phone and Cisco Unified
Communications Manager
IP phone verifies self-signed Cisco Unified Communications Manager certificate
against CTL
ƒ LSC Enrollment (CAPF Certificate)
Protected by TLS
Certificate-based authentication of CAPF to IP phone
IP phone verifies self-signed CAPF certificate against CTL
ƒ Signed IP Phone Configuration Files (TFTP Server Certificate)
TFTP file is signed by private key of TFTP server
IP phone needs to know authentic public key of TFTP server
ƒ Signed CTL File (CTL Client Certificate)
CTL file is signed with private key of a security token
Corresponding public key must be known in current CTL
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 51

Cisco Unified
Communications
Manager Security

Signed Phone Loads

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 52

© 2008, Cisco Systems, Inc. All rights reserved. 26


14370_04_2008_c1.scr
Signed Phone Loads
CTL Binary
Executable
Image.bin.sgn File
Config1.xml.sgn TFTP Server
Config2.xml.sgn
Cisco IP Phone Public Key
Config3.xml.sgn of Cisco
Image Signature

Image.bin.sgn

TFTP

ƒ Authenticated phone images (signed phone loads) introduced


with Cisco CallManager Release 3.3(3)
Image signed by Cisco manufacturing (using a private key)
Current image verifies signature and phone model information of new
image before accepting it (using the corresponding public key embedded
in the verification code of the current image)
Prevents falsification of phone image

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 53

Cisco Unified
Communications
Manager Security

Signed and Encrypted Configuration Files

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 54

© 2008, Cisco Systems, Inc. All rights reserved. 27


14370_04_2008_c1.scr
Signed IP Phone Configuration Files
CTL XML TFTP
TFTP Server Configuration
Image.bin.sgn File
Config1.xml.sgn
Config2.xml.sgn Public Key
Signature of
Config3.xml.sgn of TFTP
TFTP Server

Config2.xml.sgn

TFTP

ƒ Configuration files signed by the TFTP server (using its private key)
ƒ Phone verifies signature before applying configuration (using
corresponding public key from CTL)
ƒ Automatically done for supported IP phones when security mode is
enabled for cluster
ƒ Prevents falsification of phone configuration files
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 55

Encrypted IP Phone Configuration Files


XML
Configuration
TFTP Server Symmetric
Image.bin.sgn File with
Key Used
Config1.xml.sgn Encrypted for
Config2.xml.sgn Content Encryption
Config3.xml.sgn and
Decryption

Config2.xml.sgn

TFTP

ƒ Configuration file encrypted by TFTP server


ƒ Phone decrypts configuration file before applying configuration
ƒ Two ways to manage key used for encryption (symmetric)
TFTP server encrypts the symmetric key using the IP phone’s public
key (for supported phones) and appends it to the configuration file
Manually entered keys used for IP phones that do not support public
and private keys (7905/7912 writeable web; 7940/7960 (SIP only): UI)
ƒ Prevents exposure of sensitive phone configuration settings
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 56

© 2008, Cisco Systems, Inc. All rights reserved. 28


14370_04_2008_c1.scr
Cisco Unified
Communications
Manager Security

Secure Real-time Transport Protocol (sRTP)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 57

sRTP Packet Format


V P X CC M PT Sequence Number
Time Stamp
Synchronization Source (SSRC) Identifier
Contributing Sources (CSRC) Identifier
...
RTP Extension (Optional)

RTP Payload

sRTP MKI—0 Bytes for Voice


SHA-1 Authentication Tag (Truncated Fingerprint)

Encrypted Data Authenticated Data

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 58

© 2008, Cisco Systems, Inc. All rights reserved. 29


14370_04_2008_c1.scr
sRTP Encryption
Voice Voice

AES AES
AES AES

74lizE122U Encrypted Voice 74lizE122U


74lizE122U
A B

ƒ The sender encrypts the RTP payload using the AES algorithm and a
symmetric key
ƒ The receiver uses the same key to decrypt the RTP payload
ƒ Prevents eavesdropping of conversation
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 59

sRTP Authentication
Voice or
Encrypted +
Voice or SHA-1
+ Voice
Encrypted
SHA-1
Voice

SHA-1
SHA-1
32-bit Truncated
Hashes Equal?

s197i
Voice or
s197i Encrypted s197i
Voice
A B

ƒ The sender hashes the RTP payload together using the SHA-1 algorithm and a
symmetric key
ƒ The hash digest is truncated to 32 bits and added to the RTP packet
ƒ The receiver uses the same key for a local computation of the truncated hash and
compares it against the received one
ƒ Prevents falsification of RTP packets
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 60

© 2008, Cisco Systems, Inc. All rights reserved. 30


14370_04_2008_c1.scr
sRTP in Cisco Unified Communications
ƒ Intra-cluster sRTP is supported by
Cisco IP phones using SCCP (since Cisco Unified CallManager 4.0)
Cisco IP phones using SIP (since Cisco Unified Communications Manager 5.0)
MGCP gateways (since Cisco Unified CallManager 4.0)
H.323 gateways (since Cisco Unified Communications Manager 5.0)
ƒ Inter-cluster sRTP is supported since Cisco Unified Communications
Manager 5.0
ƒ sRTP session keys (symmetric keys used for truncated HMAC and AES)
are generated by
Cisco IP phones (SIP)
Cisco Unified Communications Manager
ƒ Symmetric keys are exchanged in signaling messages
Secure signaling is required for key protection
Authenticated and encrypted signaling is mandatory for Cisco IP phones (SCCP and SIP)
when using sRTP
MGCP, H.323, Cisco Unified Communications Manager intra- and inter-cluster signaling are
NOT secured by default
IPsec should be used in these cases to protect keys in signaling messages
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 61

Cisco Unified
Communications
Manager Security

Secure Signaling

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 62

© 2008, Cisco Systems, Inc. All rights reserved. 31


14370_04_2008_c1.scr
Certificate Exchange in TLS
Phone Hello

CallManager Hello
CallManager Certificate

Certificate Request

Phone Certificate

ƒ TLS hellos are used to negotiate attributes of the TLS session (one
or two-way certificate exchange, encryption and HMAC algorithms,
key lengths, etc.)
ƒ Certificates are exchanged
ƒ Certificates are then validated

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 63

Server-to-Phone Authentication
Phone Hello

CallManager Hello
CallManager Certificate

Certificate Request

Phone Certificate

Challenge1

Response1

ƒ The IP phone sends a challenge to the server containing random


data to be signed by the server
ƒ The server signs the random data with its private key and returns the
signed data to the IP phone
ƒ The IP phone verifies the signature using the public key of the server
ƒ Prevents impersonation of server
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 64

© 2008, Cisco Systems, Inc. All rights reserved. 32


14370_04_2008_c1.scr
Phone-to-Server Authentication
Phone Hello

CallManager Hello
CallManager Certificate

Certificate Request

Phone Certificate

Challenge1

Response1

Challenge2

Response2

ƒ The server sends a challenge to the IP phone containing random data to


be signed by the IP phone
ƒ The IP phone signs the random data with its private key and returns the
signed data to the server
ƒ The server verifies the signature using the public key of the IP phone
ƒ Prevents impersonation of IP phone
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 65

TLS SHA-1 and AES Session


Key Exchange
Phone Hello

CallManager Hello
CallManager Certificate

Certificate Request

Phone Certificate

Challenge1

Response1

Challenge2

Response2

Key Exchange

ƒ The IP phone generates session keys for SHA-1 and AES, encrypts them
using the public key of the server and sends the encrypted keys to the server
ƒ The server decrypts the keys
ƒ IP phone and server now share secret keys
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 66

© 2008, Cisco Systems, Inc. All rights reserved. 33


14370_04_2008_c1.scr
Secure Signaling Using TLS

TLS

SHA-1 SCCP SHA-1


AES or SIP AES

ƒ Symmetric keys shared by IP phone and server are used to protect


signaling message (SCCP or SIP) using authenticated and
encrypted TLS packets
ƒ Prevents falsification and eavesdropping of signaling messages

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 67

Cisco Unified
Communications
Manager Security

Secure Conferencing

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 68

© 2008, Cisco Systems, Inc. All rights reserved. 34


14370_04_2008_c1.scr
Secure Conferencing Overview
ƒ Cisco Unified Communications Manager 6.0 introduces secure
conferencing support
ƒ Secure conference bridge configured in Cisco IOS software
ƒ Registers with Cisco Unified Communications Manager using SCCP
over TLS
ƒ TLS authentication includes two-way certificate exchange:
Cisco Unified Communications Manager certificate(s) have to be known by secure
conference bridge (to be able to compare received certificate)
Certificate of CA that issued certificate to secure conference bridge has to be known
in Cisco Unified Communications Manager systems (to be able to verify signature of
received certificate)
Manually added during configuration time

ƒ Supported Cisco Unified IP phones:


7940 and 7960: SCCP only, authenticated conference only
7906, 7911, 7931: SCCP only
794[125], 796[125], 797[015]
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 69

Secure Conferencing
Configuration Procedure
1. Obtain a certificate for the secure conference media resource at
the Cisco IOS router
2. Configure a secure conference media resource in Cisco IOS
software and associate it with the previously obtained certificate
3. Export Cisco Unified Communications Manager certificate(s)
4. Add downloaded Cisco Unified Communications Manager
certificate(s) to Cisco IOS router
5. Export certificate of the CA that issued the certificate to the secure
conference media resource
6. Add downloaded CA certificate(s) to Cisco Unified
Communications Manager server(s)
7. Add and configure the secure conference bridge in Cisco Unified
Communications Manager
8. Optional: Configure a minimum security level for Meet-Me
conferences if desired (default is nonsecure)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 70

© 2008, Cisco Systems, Inc. All rights reserved. 35


14370_04_2008_c1.scr
Cisco Unified
Communications
Manager Security

SIP Digest Authentication

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 71

SIP Digest Authentication


ƒ No TLS support for third-party SIP phones
ƒ No TLS support for Cisco IP phones 7905, 7940 and 7960
when using SIP
ƒ SIP digest authentication can be used with these devices
(and on SIP trunks) for signaling protection
Provides authentication only using HMAC
Based on a client-server model (server challenges client)
Cisco Unified Communications Manager supports both functions on SIP trunks
(send challenges and respond to challenges)
Cisco Unified Communications Manager only supports server function to
IP phones (sends challenges only)
If used with Cisco IP phones, HMAC key is downloaded in TFTP configuration file
Use encrypted configuration files for key protection in TFTP files

ƒ Prevents falsification of SIP signaling messages


BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 72

© 2008, Cisco Systems, Inc. All rights reserved. 36


14370_04_2008_c1.scr
Cisco Unified
Communications
Manager Security

IPSec

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 73

IPsec
ƒ Network layer based security
ƒ Applicable for any sensitive traffic that is not protected
by applications themselves
ƒ Especially important when cryptographic keys are sent in clear
text—like sRTP keys in signaling messages
Server-to-server intra-cluster signaling
Inter-cluster trunk signaling
Signaling to H.323 gateways
Signaling MGCP gateways
ƒ Supported by Cisco Unified Communications Manager 5
ESP only, no AH
Pre-shared keys or X.509 certificates
ƒ Recommended to be used on network infrastructure devices
ƒ Prevents impersonation of IPsec peers
ƒ Prevents falsification and eavesdropping of protected IP packets
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 74

© 2008, Cisco Systems, Inc. All rights reserved. 37


14370_04_2008_c1.scr
IPSec Scenarios in Cisco
Unified Communications
Cisco Unified
Communications Manager ƒ Recommendation:
Use closest-possible
TLS H.323 network infrastructure
IP Phone H.323 device instead of
sRTP Gateway Cisco Unified
Cisco Unified Communications
Communications Manager Manager

TLS MGCP
IP Phone MGCP
sRTP Gateway

Cisco Unified Cisco Unified


Communications Manager Communications Manager
Inter- or intra-cluster

TLS TLS
IP Phone IP Phone
sRTP

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 75

Cisco Unified
Communications
Manager Security

Secure Survivable Remote Site Telephony (SRST)

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 76

© 2008, Cisco Systems, Inc. All rights reserved. 38


14370_04_2008_c1.scr
Secure SRST

TLS
IP Phone

sRTP
Secure
TLS SRST

IP Phone

ƒ Allows Cisco IP phones to use TLS for signaling and sRTP for
media when in SRST mode
ƒ Prevents impersonation of SRST gateway and IP phones
ƒ Prevents falsification and eavesdropping of signaling and
RTP packets

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 77

PKI Topology with Secure SRST


Certificate Trust List (CTL)
CA
Cisco CA CAPF TFTP CCM

SRST Certificate
MIC LSC

SRST
IP Phone

ƒ Phones have certificates (MIC and/or LSC) and CTL


ƒ The SRST gateway obtains a certificate from any (external) CA

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 78

© 2008, Cisco Systems, Inc. All rights reserved. 39


14370_04_2008_c1.scr
Trust Requirements with Secure SRST
ƒ IP phones must be able to verify Secure SRST gateway certificate
(issued by any external CA)
Secure SRST gateway certificate is not verified by its signature (using public key
of issueing CA)
Secure SRST gateway certificate is obtained by Cisco Unified Communications
Manager at configuration time (using the credential service at the gateway)
Manual verification is requested at configuration time
Cisco Unified Communications Manager adds received (and manually verified)
certificate to phone configuration files

ƒ Secure SRST gateway must be able to verify IP phone certificates


IP phone certificates are signed by either CAPF (LSC) or Cisco Manufacturing
CA (MIC)
CAPF and Cisco Manufacturing CA certificates are added manually to
Secure SRST gateway

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 79

Secure SRST—Certificate Import: Cisco


Unified Communications Manager

ƒ Imports certificate from the Secure SRST gateway over the network
ƒ Manual certificate fingerprint verification required
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 80

© 2008, Cisco Systems, Inc. All rights reserved. 40


14370_04_2008_c1.scr
Secure SRST—Certificate Import:
Secure SRST Gateway
srst(config)#crypto pki trustpoint CAPF ƒ Certificates of entities that
srst(ca-trustpoint)# enrollment terminal signed phone certificates
srst(ca-trustpoint)# revocation-check none (CAPF, Cisco Manufacturing
srst(ca-trustpoint)#exit CAs) are added manually
srst(config)#crypto pki authenticate CAPF

Enter the base 64 encoded CA certificate.


End with a blank line or the word "quit" on a line by itself
(paste the certificate)
:
quit
Certificate has the following attributes:
Fingerprint MD5: F7E150EA 5E6E3AC5 615FC696 66415C9F
Fingerprint SHA1: 1BE2B503 DC72EE28 0C0F6B18 798236D8 D3B18BE6
% Do you accept this certificate? [yes/no]: y
Trustpoint CA certificate accepted.
% Certificate successfully imported
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 81

Certificate Usage in Secure SRST


TFTP
SRST Certificate

Obtained from Gateway


Configuration Credentials Service during Configuration
SRST
Certificate
File and added to IP Phone Configuration Files

Compare
SRST Certificate Manually
Certificates Entered
SRST Certificate SRST
TLS Two-way CAPF Certificate
Certificate Exchange
MIC Cisco CA
signed by LSC signed by CAPF Certificates
Check
Cisco CA Certificate’s
or
IP Phone Signature
LSC MIC signed by Cisco CA
signed by
CAPF

ƒ IP phone verifies received SRST gateway certificate against the one in its
configuration file
ƒ SRST gateway checks received IP phone certificate’s signature using
public key of issuer (Cisco CA or CAPF)
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 82

© 2008, Cisco Systems, Inc. All rights reserved. 41


14370_04_2008_c1.scr
Summary

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 83

Summary
ƒ Threats to Cisco Unified Communications
Loss of privacy
Loss of integrity
Impersonation
Denial of service
ƒ Cryptography
Symmetric and asymmetric encryption
HMACs
Digital signatures
PKI
ƒ Cisco Unified Communications Manager security features
PKI-enabled, certificate-based solution; CTL in IP phones
Signed phone loads, signed and encrypted configuration files
sRTP and secure signaling
SIP digest authentication
IPsec
Secure SRST
BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 84

© 2008, Cisco Systems, Inc. All rights reserved. 42


14370_04_2008_c1.scr
Q and A

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 85

Recommended Reading

ƒ Continue your Cisco Live


learning experience with further
reading from Cisco Press
ƒ Check the Recommended
Reading flyer for suggested
books

Available Onsite at the Cisco Company Store


BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 86

© 2008, Cisco Systems, Inc. All rights reserved. 43


14370_04_2008_c1.scr
Complete Your Online
Session Evaluation
ƒ Give us your feedback and you could win Don’t forget to activate
fabulous prizes. Winners announced daily. your Cisco Live virtual
account for access to
ƒ Receive 20 Passport points for each session all session material
evaluation you complete. on-demand and return
for our live virtual event
ƒ Complete your session evaluation online now in October 2008.
(open a browser through our wireless network Go to the Collaboration
to access our portal) or visit one of the Internet Zone in World of
stations throughout the Convention Center. Solutions or visit
www.cisco-live.com.

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 87

BRKCRT-2202
14370_04_2008_c1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 88

© 2008, Cisco Systems, Inc. All rights reserved. 44


14370_04_2008_c1.scr

Vous aimerez peut-être aussi