ECMA TR 100-2009 Next Generation Corporate Networks (NGCN) - Security of Session-based Communications (1st Edition)《下一代企业网络(NGCN) 基于会话的通信的安全性 第1版》.pdf
《ECMA TR 100-2009 Next Generation Corporate Networks (NGCN) - Security of Session-based Communications (1st Edition)《下一代企业网络(NGCN) 基于会话的通信的安全性 第1版》.pdf》由会员分享,可在线阅读,更多相关《ECMA TR 100-2009 Next Generation Corporate Networks (NGCN) - Security of Session-based Communications (1st Edition)《下一代企业网络(NGCN) 基于会话的通信的安全性 第1版》.pdf(34页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberECMA TR/12:2009Ecma International 2009ECMA TR/100 1stEdition / December 2009 Next Generation Corporate Networks (NGCN) - Security of Session-based Communications COPYRIGHT PROTECTED DOCUMENT Ecma International 2009 Ecma International 2009 i Contents Page 1 Scope 1 2 References . 1 3
2、 Terms and definitions . 3 3.1 External definitions . 3 3.2 Other definitions 4 4 Abbreviations . 4 5 Background 5 6 General principles . 5 6.1 Threats and counter-measures 5 6.2 Threats to session level security . 6 6.3 Authorisation . 7 6.4 Security and mobile users 8 6.5 Security and NGN 8 6.6 Se
3、curity and software status . 8 6.7 Call recording and audit . 8 7 Signalling security . 9 7.1 Security of access to session level services . 9 7.2 Securing a SIP signalling hop 10 7.2.1 TLS for securing SIP signalling . 10 7.2.2 IPsec for security SIP signalling 10 7.2.3 The role of SIP digest authe
4、ntication 11 7.3 Ensuring that all SIP signalling hops are secured . 11 7.4 End-to-end signalling security . 12 7.4.1 End-to-end security using S/MIME 12 7.4.2 Near end-to-end security using SIP Identity . 13 7.5 Authenticated identity delivery 14 7.5.1 P-Asserted-Identity (PAI) 14 7.5.2 Authenticat
5、ed Identity Body (AIB) . 14 7.5.3 SIP Identity . 15 7.5.4 Authenticated response identity 16 7.6 NGN considerations 16 7.7 Public Switched Telephony Network (PSTN) interworking . 18 8 Media security 18 8.1 SRTP . 18 8.2 Key management for SRTP 19 8.2.1 Key management on the signalling path 19 8.2.2
6、Key management on the media path . 20 8.3 Authentication . 21 8.3.1 Authentication with key management on the signalling path 22 8.3.2 Authentication with DTLS-SRTP 22 8.3.3 Authentication with ZRTP . 23 8.4 Media recording . 23 8.5 NGN considerations 24 9 Use of certificates 24 10 User interface co
7、nsiderations 25 11 Summary of requirements, recommendations and standardisation gaps 25 11.1 Requirements on NGNs 25 ii Ecma International 200911.2 Recommendations on enterprise networks 26 11.3 Standardisation gaps 26 Ecma International 2009 iii Introduction This Ecma Technical Report is one of a s
8、eries of Ecma publications that explore IP-based enterprise communication involving Corporate telecommunication Networks (CNs) (also known as enterprise networks) and in particular Next Generation Corporate Networks (NGCN). The series particularly focuses on inter-domain communication, including com
9、munication between parts of the same enterprise, between enterprises and between enterprises and carriers. This particular Ecma Technical Report discusses issues related to the security of session-based communications and builds upon concepts introduced in ECMA TR/95. This Technical Report is based
10、upon the practical experience of Ecma member companies and the results of their active and continuous participation in the work of ISO/IEC JTC1, ITU-T, ETSI, IETF and other international and national standardization bodies. It represents a pragmatic and widely based consensus. In particular, Ecma ac
11、knowledges valuable input from experts in ETSI TISPAN. This Ecma Technical Report has been adopted by the General Assembly of December 2009. iv Ecma International 2009DISCLAIMER This document and possible translations of it may be copied and furnished to others, and derivative works that comment on
12、or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document it
13、self may not be modified in any way, including by removing the copyright notice or references to Ecma International, except as needed for the purpose of developing any document or deliverable produced by Ecma International (in which case the rules applied to copyrights must be followed) or as requir
14、ed to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by Ecma International or its successors or assigns. This document and the information contained herein is provided on an “AS IS“ basis and ECMA INTERNATIONAL DISCLAIMS AL
15、L WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Ecma International 2009 1Next Generation Corporate Networks (NGC
16、N) - Security of Session-based Communications 1 Scope This Ecma Technical Report is one of a series of publications that provides an overview of IP-based enterprise communication involving Corporate telecommunication Networks (CNs) (also known as enterprise networks) and in particular Next Generatio
17、n Corporate Networks (NGCN). The series particularly focuses on session level communication based on the Session Initiation Protocol (SIP) 4, with an emphasis on inter-domain communication. This includes communication between parts of the same enterprise (on dedicated infrastructures and/or hosted),
18、 between enterprises and between enterprises and public networks. Particular consideration is given to Next Generation Networks (NGN) as public networks and as providers of hosted enterprise capabilities. Key technical issues are investigated, current standardisation work and gaps in this area are i
19、dentified, and a number of requirements and recommendations are stated. Among other uses, this series of publications can act as a reference for other standardisation bodies working in this field, including ETSI TISPAN, 3GPP, IETF and ITU-T. This particular Technical Report discusses security of ses
20、sion-based communications. It uses terminology and concepts developed in ECMA TR/95 1. It identifies a number of requirements impacting NGN standardisation and makes a number of recommendations concerning deployment of enterprise networks. Also a number of standardisation gaps are identified. Both s
21、ignalling security and media security are considered. The scope of this Technical Report is limited to communications with a real-time element, including but not limited to voice, video, real-time text, instant messaging and combinations of these (multi-media). The non-real-time streaming of media i
22、s not considered. For media, only security of transport (e.g., securing the Real-time Transport Protocol, RTP 6) is considered, and higher level security measures (e.g., digital rights management) are not considered. Peer-to-peer signalling between SIP user agents (without involving SIP intermediari
23、es) is not considered. Detailed considerations for lawful interception are outside the scope of this Technical Report, although general considerations for call recording and audit are discussed. 2 References For dated references, only the edition cited applies. For undated references, the latest edi
24、tion of the referenced document (including any amendments) applies. 1 ECMA TR/95, Next Generation Corporate Networks (NGCN) - General 2 ECMA TR/96, Next Generation Corporate Networks (NGCN) - Identification and Routing 3 ECMA TR/101, Next Generation Corporate Networks (NGCN) - Emergency Calls 4 IETF
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMATR1002009NEXTGENERATIONCORPORATENETWORKSNGCNSECURITYOFSESSIONBASEDCOMMUNICATIONS1STEDITION 下一代 企业

链接地址:http://www.mydoc123.com/p-704853.html