欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T H 460 22-2015 Negotiation of security protocols to protect ITU-T H 225 0 call signalling messages (Study Group 16).pdf

    • 资源ID:797793       资源大小:421.31KB        全文页数:18页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T H 460 22-2015 Negotiation of security protocols to protect ITU-T H 225 0 call signalling messages (Study Group 16).pdf

    1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T H.460.22 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2015) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Supplementary services for multimedia Negotiation of security protocols

    2、to protect ITU-T H.225.0 call signalling messages Recommendation ITU-T H.460.22 ITU-T H-SERIES RECOMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchroniza

    3、tion H.220H.229 Systems aspects H.230H.239 Communication procedures H.240H.259 Coding of moving video H.260H.279 Related systems aspects H.280H.299 Systems and terminal equipment for audiovisual services H.300H.349 Directory services architecture for audiovisual and multimedia services H.350H.359 Qu

    4、ality of service architecture for audiovisual and multimedia services H.360H.369 Telepresence H.420H.429 Supplementary services for multimedia H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions, protocols and procedures H.500H.509 Mobility for H-Seri

    5、es multimedia systems and services H.510H.519 Mobile multimedia collaboration applications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and services H.540H.549 Mobility interworking procedures H.550H.

    6、559 Mobile multimedia collaboration inter-working procedures H.560H.569 BROADBAND, TRIPLE-PLAY AND ADVANCED MULTIMEDIA SERVICES Broadband multimedia services over VDSL H.610H.619 Advanced multimedia services and applications H.620H.629 Ubiquitous sensor network applications and Internet of Things H.

    7、640H.649 IPTV MULTIMEDIA SERVICES AND APPLICATIONS FOR IPTV General aspects H.700H.719 IPTV terminal devices H.720H.729 IPTV middleware H.730H.739 IPTV application event handling H.740H.749 IPTV metadata H.750H.759 IPTV multimedia application frameworks H.760H.769 IPTV service discovery up to consum

    8、ption H.770H.779 Digital Signage H.780H.789 E-HEALTH MULTIMEDIA SERVICES AND APPLICATIONS Interoperability compliance testing of personal health systems (HRN, PAN, LAN, TAN and WAN) H.820H.859 Multimedia e-health data exchange services H.860H.869 For further details, please refer to the list of ITU-

    9、T Recommendations. Rec. ITU-T H.460.22 (04/2015) i Recommendation ITU-T H.460.22 Negotiation of security protocols to protect ITU-T H.225.0 call signalling messages Summary Recommendation ITU-T H.460.22 defines a security negotiation mechanism for ITU-T H.225.0 call signalling. The negotiated securi

    10、ty mechanism between two entities is to be applied for ITU-T H.225.0 call signalling messages before initiating a call establishment procedure. Detailed negotiation procedures, which provide the necessary security interoperability among ITU-T H.323 systems, are specified in this Recommendation. The

    11、syntax of the security capability parameters in call signalling messages is also specified. This revision includes procedural clarifications and introduces support for ITU-T H.460.18 and ITU-T H.460.19 NAT traversal and negotiating datagram transport layer security (DTLS) for ITU-T H.323 Annex E ove

    12、r UDP transport. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T H.460.22 2007-01-13 16 11.1002/1000/9041 1.1 ITU-T H.460.22 (2007) Cor. 1 2008-06-13 16 11.1002/1000/9489 2.0 ITU-T H.460.22 2015-04-29 16 11.1002/1000/12456 _ * To access the Recommendation, type the URL http:

    13、/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T H.460.22 (04/2015) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the fie

    14、ld of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardiz

    15、ing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered

    16、 by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate

    17、 both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved w

    18、hen all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPE

    19、RTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted

    20、 by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that

    21、 this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2015 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec.

    22、ITU-T H.460.22 (04/2015) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 2 4 Abbreviations and acronyms 2 5 Conventions 2 6 Negotiation description . 2 6.1 Call establishment security . 3 6.2 Negotiation of security mechanism 3 7 Feature description securityProtocolNegotiation

    23、. 7 7.1 tlsSecurityProtocol . 7 7.2 ipsecSecurityProtocol . 8 7.3 dtlsSecurityProtocol . 8 8 NAT traversal considerations . 9 Rec. ITU-T H.460.22 (04/2015) 1 Recommendation ITU-T H.460.22 Negotiation of security protocols to protect ITU-T H.225.0 call signalling messages 1 Scope This Recommendation

    24、specifies the security negotiation mechanism for ITU-T H.225.0 call signalling message exchanges. The main goals include the following. 1) Secure selection of the security mechanism. Otherwise, the procedure of negotiation is vulnerable to certain attacks such as malicious manipulation or bidding-do

    25、wn attacks. The entire registration, admission and status (RAS) message shall be protected during the negotiation procedure. 2) Involved ITU-T H.323 entities shall determine mutually agreed security protocols without requiring additional round trips. 3) Entities involved in the negotiation procedure

    26、 shall be aware of the result of the negotiation, such as success or failure. 4) The negotiation procedure should not cause any additional burden to the involved entities. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text,

    27、constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of t

    28、he Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T H.225.0 Recommendation ITU-T H.2

    29、25.0 (2009), Call signalling protocols and media stream packetization for packet-based multimedia communication systems. ITU-T H.235.6 Recommendation ITU-T H.235.6 (2014), H.323 security: Encryption profile with native ITU-T H.235/H.245 key management. ITU-T H.235.8 Recommendation ITU-T H.235.8 (200

    30、5), H.323 security: Key exchange for SRTP using secure signalling channels. ITU-T H.323 Recommendation ITU-T H.323 (2009), Packet-based multimedia communications systems. ITU-T H.460.1 Recommendation ITU-T H.460.1 (2002), Guidelines for the use of the generic extensible framework. ITU-T H.460.17 Rec

    31、ommendation ITU-T H.460.17 (2005), Using H.225.0 call signalling connection as transport for H.323 RAS messages. ITU-T H.460.18 Recommendation ITU-T H.460.18 (2013), Traversal of ITU-T H.323 signalling across network address translators and firewalls. IETF RFC 5246 IETF RFC 5246 (2008), The Transpor

    32、t Layer Security (TLS) Protocol Version 1.2. IETF RFC 6347 IETF RFC 6347 (2012), Datagram Transport Layer Security Version 1.2. 2 Rec. ITU-T H.460.22 (04/2015) 3 Definitions This Recommendation does not define any terms. 4 Abbreviations and acronyms This Recommendation uses the following abbreviatio

    33、ns and acronyms: ACF Admission Confirmation ARJ Admission Reject ARQ Admission Request DTLS Datagram Transport Layer Security FW Firewall GCF Gatekeeper Confirmation GEF Generic Extensible Framework GRQ Gatekeeper Request IPSec Internet Protocol Security LCF Location Confirmation LRJ Location Reject

    34、 LRQ Location Request MCU Multipoint Control Unit MiTM Man in The Middle NAT Network Address Translator RAS Registration, Admission and Status RCF Registration Confirmation RRJ Registration Reject RRQ Registration Request SCI Service Control Indication TCP Transmission Control Protocol TLS Transport

    35、 Layer Security 5 Conventions In this Recommendation, the following conventions are used: “shall“ indicates a mandatory requirement; “should“ indicates a suggested but optional course of action; “may“ indicates an optional course of action rather than a recommendation that something take place. 6 Ne

    36、gotiation description The protection of ITU-T H.225.0 call signalling messages is important for the security of ITU-T H.323 systems. In small networks, network administrators can ensure that all ITU-T H.323 entities use the same security protocol. However, in large networks, such as where endpoints

    37、are distributed in different network domains, a calling endpoint may not know in advance the security Rec. ITU-T H.460.22 (04/2015) 3 protocol supported by the called endpoint. Therefore, it is necessary for the two endpoints to negotiate the security mechanism for ITU-T H.225.0 call signalling mess

    38、ages before initiating a call establishment procedure. The negotiation of actual security parameters/algorithms is outside the scope of this Recommendation. 6.1 Call establishment security There are a number of important reasons to secure the call signalling channel (i.e., ITU-T H.225.0). When using

    39、 ITU-T H.235.6 or ITU-T H.235.8 to encrypt the media packets, the keys are exchanged in the signalling channel. These keys are sent either in the clear and require a secure signalling channel or are susceptible to man in the middle (MiTM) attacks and should be protected by a secure call signalling c

    40、hannel. It also provides a very simple way to authenticate the endpoints to each other in direct call signalling mode or for each hop of the call in gatekeeper routed mode. 6.2 Negotiation of security mechanism The generic extensible framework (GEF) feature negotiation mechanism ITU-T H.460.1 is use

    41、d during the RAS communication. Whether or not this security negotiation mechanism is supported is negotiated between the endpoint and the gatekeeper. If neither the gatekeeper nor the endpoint supports this mechanism and no other security mechanism is used, the normal ITU-T H.323 procedure will be

    42、followed. The security negotiation procedure shall consist of the following steps. 1) The endpoint, where enabled, discovers the gatekeeper. The endpoint shall advertise the securityProtocolNegotiation feature as a supportedFeature in the featureSet field of the gatekeeper request (GRQ). All paramet

    43、ers of the securityProtocolNegotiation feature shall be omitted. Where the gatekeeper supports this feature, it shall advertise as a supportedFeature with all parameters omitted in the reply GRQ. The absence of securityProtocolNegotiation feature indicates the gatekeeper does not support this featur

    44、e. 2) Where the endpoint has discovered support for this feature or is registering without discovery, the endpoint shall include the securityProtocolNegotiation feature as a supportedFeature in the featureSet field in the registration request (RRQ) message. The parameters associated with the feature

    45、 shall indicate all the security protocols supported by the endpoint. Every protocol is assigned a preference value, where a smaller number signifies a higher preference. The gatekeeper stores this information for call establishment purposes. Lightweight RRQs shall only include the securityProtocolN

    46、egotiation feature advertisement and omit all parameters. 3) The gatekeeper returns a registration confirmation (RCF) or registration reject (RRJ). The gatekeeper shall indicate whether the negotiation mechanism is supported in the RCF. If this feature is supported, the gatekeeper shall include the

    47、securityProtocolNegotiation feature as a supportedFeature in the featureSet field. The absence of securityProtocolNegotiation shall indicate that the gatekeeper does not support this feature. There are no parameters present in the securityProtocolNegotiation feature in the RCF message. 4) The endpoi

    48、nt initiates a call. The endpoint shall send an ARQ to the gatekeeper including a securityProtocolNegotiation feature as a supportedFeature in the featureSet field of the admission request (ARQ). All parameters shall be omitted. 5) The next step is determined based on whether the call is routed by t

    49、he gatekeeper. a) If direct call model is used, the gatekeeper shall send an ARQ containing the highest priority matching security protocol supported by both endpoints and shall include the stored connnectionAddress of the called endpoint where applicable. The priority field shall be omitted. 4 Rec. ITU-T H.460.22 (04/2015) b) If the gatekeeper-routed call model is used, the gatekeeper shall send an ARQ containing the highest priority matching security protocols that the calling endpoint and gatekee


    注意事项

    本文(ITU-T H 460 22-2015 Negotiation of security protocols to protect ITU-T H 225 0 call signalling messages (Study Group 16).pdf)为本站会员(confusegate185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开