EasyManua.ls Logo

AudioCodes Mediant 800 - Configuring Media (SRTP) Security

AudioCodes Mediant 800
1482 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
CHAPTER15 Media
Mediant 800 Gateway & E-SBC | User's Manual
Configuring Media (SRTP) Security
The device supports Secured RTP (SRTP) according to RFC 3711. SRTP is used to encrypt RTP
and RTCP transport for protecting VoIP traffic. SRTP requires a cryptographic key exchange
mechanism to negotiate the keys. To negotiate the keys, the device supports the Session
Description Protocol Security Descriptions (SDES) protocol (according to RFC 4568), or Datagram
Transport Layer Security (DTLS) protocol for SBC calls. For more information on DTLS, see SRTP
using DTLS Protocol. The key exchange is done by adding the 'a=crypto' attribute to the SDP. This
attribute is used (by both sides) to declare the various supported cipher suites and to attach the
encryption key. If negotiation of the encryption data is successful, the call is established.
SRTP supports the following cipher suites (all other suites are ignored):
AES_CM_128_HMAC_SHA1_32
AES_CM_128_HMAC_SHA1_80
ARIA_CM_128_HMAC_SHA1_80
ARIA_CM_192_HMAC_SHA1_80
AES_256_CM_HMAC_SHA1_32 (RFC 6188)
AES_256_CM_HMAC_SHA1_80 (RFC 6188)
When the device is the offering side (SDP offer), it can generate a Master Key Identifier (MKI). You
can configure the MKI size globally (using the SRTPTxPacketMKISize parameter) or per SIP entity
(using the IP Profile parameter, IpProfile_MKISize). The length of the MKI is limited to four bytes. If
the remote side sends a longer MKI, the key is ignored.
Gateway application: The device only initiates the MKI size.
SBC application: The device can forward MKI size transparently for SRTP-to-
SRTP media flows or override the MKI size during negotiation (inbound or outbound
leg).
The key lifetime field is not supported. However, if it is included in the key it is ignored and the call
does not fail. For SBC calls belonging to a specific SIP entity, you can configure the device to
remove the lifetime field in the 'a=crypto' attribute (using the IP Profile parameter, IpProfile_
SBCRemoveCryptoLifetimeInSDP).
For SDES, the keys are sent in the SDP body ('a=crypto') of the SIP message and are typically
secured using SIP over TLS (SIPS). The encryption of the keys is in plain text in the SDP. The
device supports the following session parameters:
UNENCRYPTED_SRTP
UNENCRYPTED_SRTCP
UNAUTHENTICATED_SRTP
Session parameters should be the same for the local and remote sides. When the device is the
offering side, the session parameters are configured by the following parameters - 'Authentication
on Transmitted RTP Packets', 'Encryption on Transmitted RTP Packets, and 'Encryption on
Transmitted RTCP Packets'. When the device is the answering side, the device adjusts these
parameters according to the remote offering. Unsupported session parameters are ignored, and do
not cause a call failure.
Below is an example of crypto attributes usage:
a=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:PsKoMpHlCg+b5X0YLuSvNrImEh/dAe
a=crypto:2 AES_CM_128_HMAC_SHA1_32
inline:IsPtLoGkBf9a+c6XVzRuMqHlDnEiAd
- 189 -

Table of Contents

Other manuals for AudioCodes Mediant 800

Related product manuals