Content

Page tree

Transport Layer Security (TLS) provides mechanisms to secure your phone traffic. Typically it is used to protect your SIP and HTTP connections from eavesdropping and tampering.

 



TLS handshake overview

Initially, when a client wants to establish a secure connection to a server, some parameters are negotiated, this phase is called the handshake procedure. One of these parameters is the supported cipher suites defining the encryption algorithms required to encrypt the traffic. In a next step, the server sends a digital certificate that contains its public encryption key, the trusted certificate authority (issuer) and a signature of the certificate.

The client may reject the connection if the identity of the server or the issuer is unknown. Usually, the client has a list of trusted server certificates and a list of trusted certificate authorities (CA). If the server certificate is considered trusted or if the identification from the server is signed by one of these CAs, the client typically permits the connection and delivers a random number encrypted with the server's public key to the server. As only the server can decrypt this number with its private key, it is used as the session key to encrypt and decrypt the traffic.

Optionally the server can "ask" the client for the certificate. In that case the client must send a TLS certificate. Now the server can authenticate or deny the request based on the client certificate.

If the identification from the server is signed by one of these CAs, the client typically permits the connection and delivers a random number encrypted with the server's public key to the server. As only the server can decrypt this number with its private key, it is used as the session key to encrypt and decrypt the traffic.


Your phone acts as a TLS client in various cases:

  • SIP connections with TLS as transport protocol
  • Provisioning requests
  • Action URL HTTPs requests
  • HTTPS requests to an URL triggered by function keys
  • Minibrowser applications served by an HTTPS server
  • LDAP server providing the business contacts


When TLS is used a mutual authentication of the client and the server can be performed by the phone and the server.



Setting-Up the phone for TLS

The built-in certificate

Every Snom phone (except the old 3xx series) is produced with a built-in TLS certificate on board.

Every device certificate is issued by the Snom Certification Authority. The built-in certificate contains the the device MAC address into the DN x.509 attribute.

Thanks to the built-in certificate, a server using the TLS protocol can:

  • verify the issuer of the certificate, checking the certificate signature against the Snom CA: in other words the server can make sure that the request comes from a Snom phone
  • verify the DN of the client certificate, checking the MAC within the offered certificate and the requested resource. The server can authorise the specific device to the resource

Uploading the Phone Certificate

In fact, no special configuration is required. Every out-of-the-box Snom phone has a certificate built-in to the firmware along with its private key. You can retrieve this certificate by pointing your browser to your phone's web interface via secure HTTP (HTTPS). Usually you will have to confirm that you trust this identification since your browser could not identify your phone. After confirming, your connection to the web interface will be encrypted.

You can also specify your own client certificate in the webserver_cert setting. In this case, make sure you are provisioning the certificate and the key in a trusted environment, see below how to provision a custom certificate.



Authentication of the devices

The TLS server can be configured to check the client identity via the TLS authentication: as described into the previous section, during the TLS handshake, the server asks the client for the certificate. The Snom phone will send the built-in certificate, now the server can check the issuer of the client certificate and permit or deny the request.

Since device MAC address is mentioned into the built-in certificate CN, the web server can also authorize or deny the request based on the requested URL and the presented client certificate.


In order to configure the client authentication, you will need to import the Snom Certification Authority certificates into your TLS server.


IMPORTANT

Starting with fw 8.9.3.60 and 10.1.x we support the SHA-2 algorithm, new phone models are already equipped with a SHA-2 built-in certificate. In case you are using devices with SHA-2 certificate you will need to import also the Snom SHA-2 CA public certificate.

Phone modelSupported Hash algorithmBuilt-in certificate
Snom 300SHA-1SHA-1
Snom 320
Snom 370
Snom MP
Snom PA1
Snom PA1+SHA-1, SHA2SHA-2
Snom SP800SHA-1, SHA2SHA-2
Snom D120SHA-1, SHA2SHA-2
Snom D140SHA-1, SHA2SHA-2
Snom D150SHA-1, SHA2SHA-2
Snom D305SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D315SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D335SHA-1, SHA2SHA-2
Snom D345SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D375SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D385SHA-1, SHA2SHA-2
Snom 720SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom 760SHA-1, SHA-2 (fw >= 8.9.3.60)SHA-1
Snom 710 / D710SHA-1, SHA-2 (fw >= 8.9.3.60)SHA-1
Snom D712SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D713SHA-1, SHA2SHA-2
Snom 715 / D715SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D717SHA-1, SHA2SHA-2
Snom D725SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D735SHA-1, SHA2SHA-2
Snom D745SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D765SHA-1, SHA2 (fw >= 8.9.3.60)SHA-1
Snom D785SHA-1, SHA2SHA-2
Snom D812SHA-1, SHA2SHA-2
Snom D815WSHA-1, SHA2SHA-2
Snom D862SHA-1, SHA2SHA-2
Snom D865SHA-1, SHA2SHA-2

Warning

The devices:

  • Snom 300,
    Snom 320,
    Snom 370,
    Snom PA1 &
    Snom MP

are manufactured with a shared Snom certificate, so the built-in certificate per device is not unique and the MAC address is not mentioned in the CN.
Unfortunately, these devices cannot be upgraded with a unique SHA 1 or 2 certificate. Therefore, these devices can only use SRAPS for forwarding but not for provisioning.

Upgrade to SHA-2

Depending on the device and the firmware used, with the exception of the devices mentioned above, all Snom deskphones with a unique SHA 1 certificate can be upgraded to a unique SHA 2 certificate using SRAPS to fully benefit from SRAPS.

Upgrading a native SHA 1 device to SHA 2 requires a device specific firmware patch. The step by step guide below, shows how to upgrade your Snom phone.


Step-by-step-guide

To upgrade the built-in certificate to SHA-2 version follow these steps:

  1. Factory reset the phone or check that the setting_server parameter has the default value.
  2. Upgrade the phone to the latest firmware version.
  3. Create an account on SRAPS (https://sraps.snom.com/), if you don't have one.
  4. Add the phone mac address into your SRAPS account.
  5. On SRAPS, for each phone, include provisioning of any parameter (for example the phone language)
  6. When you click "Save" on SRAPS, a popup will appear asking if you want to upgrade the certificate to SHA-2. Accept the injection.
  7. Reboot the phone. → Ready.


Hint: If you want to do this for more then one Phone, you can also create a provisioning profile with one or many parameters, and then assign all devices to it. With this you will save some time.


Snom Certification Authority public certificates

From the following links you can download:

As SHA1 gets widely deprecated and SHA2 becomes more and more the standard, support for it is getting mandatory in real world deployments.



Server Authentication

  • Version 8.x
    In version 8.x, you do not need to worry about the server identification. Snom phones do not verify server identities by default. Starting with FW version 8.2.30 you can enable a setting to require verification of server certificates though. You can activate the feature on the certificates page of the web interface:


NOTE

Please be careful when enabling this feature. The phone will reject all secure connections from peers offering an unknown certificate that could not be verified by one of the built-in CAs of the Snom phone. Please refer to the Certificate Authorities tab to see which authorities are supported by the phone. Due to security concerns, you can only disable this feature by resetting the phone to the factory defaults.
  • Version 10.x
    As of version 10.x, Snom has decided to force the server identity verification. This verification cannot be disabled because that would create a security weakness for the Snom Phones.
    In addition to the server certificate a phone can also verify the identity of the server checking if the certificate DN matches the server name FQDN. This can be done via the setting check_fqdn_against_server_cert. The behaviour of the server name validation can be modified via the setting host_name_validation_flags.

Adding Unknown Certificates

The phone will reject a connection if it cannot verify the identification with the certificate delivered by the server. If this happens, the following notification will appear on the screen:


A certificate is trusted if its signature is signed by a certificate authority. Snom has pre-installed a list of CAs which are listed on the Certificate Authorities tab of the Certificates page. This list is automatically updated based on the Mozilla official list, at every new firmware upgrade.


All rejected certificates are listed in the Unknown Certificates tab. If you want to permanently trust a certificate you can add it as an exception:


After adding it as an exception in the Server Certificates tab a connection from a peer using this certificate will no longer be rejected.


Manually Uploading Certificates

In admin mode, you can manually upload certificates signed by one of the phone’s accepted authorities or server certificates in the Unknown Certificates tab. Every attempt to upload an unknown certificate will fail. In case of upload failures, please refer to the log and make sure your certificate is in DER format and is signed by one of phone's authorities or server certificates.


Uploading Server Certificates via Provisioning

You can upload a server certificate using auto provisioning. For this, the download link to the certificate needs to be placed within the XML.

The certificates settings (<certificates> tag) contains the trusted server certificates. This XML tag can be used either inside the <settings> tag or as an individual XML file whose URL is listed inside <setting-files> tag

The tag contains an attribute with the URL of the certificate file to fetch:

<certificate url="http://some.url/certificate.der" />

Please note that the download of the certificate is delayed after all provisioning xml files have been loaded and processed.


Beginning with firmware release 8.7.5.52/8.9.3.41 a second variant of this tag is supported, where the content of the certificate file is included as a base64 encoded string:

<certificate type="base64">...</certificate>

The benefit of this variant is that the certificate is immediately available after processing the line in the provisioning XML.


INFO

You can get the base64 encoded certificate out of the PEM format, removing the BEGIN / END taglines:

-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----


If you decide to provide the download link(s) in an additional XML file, this is how it could look like: 

<certificates>
 <certificate url="http://192.168.1.101/trusted_cert1.DER" />
 <certificate url="http://192.168.1.101/trusted_cert2.DER" />
</certificates>

The attributes url and base64 can be combined in the same file, as the following example:

<?xml version="1.0" encoding="utf-8" ?>
<certificates>
   <certificate url="http://192.168.1.101/trusted_cert1.DER" />
   <certificate url="http://192.168.1.101/trusted_cert2.DER" />
   <certificate type="base64">
 MIIG9zCCBd+gAwIBAgIIUf9BRQhu9JwwDQYJKoZIhvcNAQELBQAwdTELMAkGA1UE
 BhMCREUxJTAjBgNVBAoTHFQtU3lzdGVtcyBJbnRlcm5hdGlvbmFsIEdtYkgxHzAd
 BgNVBAsTFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxHjAcBgNVBAMTFVRlbGVTZWMg
 QnVzaW5lc3MgQ0EgMTAeFw0xODA0MTkxMDQ3MTlaFw0yMDA3MTkyMzU5NTlaMIGl
 MQswCQYDVQQGEwJERTEcMBoGA1UEChMTRGV1dHNjaGUgVGVsZWtvbSBBRzEdMBsG
 A1UECxMUU0lQLVRydW5rLnRlbGVrb20uZGUxEjAQBgNVBAsTCVNJUC1UcnVuazEY
 [...]
 [...]
 MBYGA1UEAxMPdGVsLnQtb25saW5lLmRlMRwwGgYDVQQIExNOb3JkcmhlaW4tV2Vz
 dGZhbGVuMQ0wCwYDVQQHEwRCb25uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
 CgKCAQEAwl6iq3B9EBJe9z34yCikyfla+ZSKE4gQUpo3hLLz2zXKiQildQc6qB6g
 MzYvwjVJI64t5S2CbqEybBtrPn0FiziseDRZKnt+bkuIqZNPOYtkE1akGgdjIieV
 Wjg6oD37+BCCqyq60gq0FbsGgjlwiNb68jL7dUXzRi2lgxtwk86+g/QFg+3rQts/
 3GREGNhwVbu4mUIrnnphaUA8BnUeGi++8j9d21ZF/uW2pIQqVBItYDflBee+qGfk
   </certificate>
</certificates>


All provisioned certificates need to be signed by one of the phone's server or authority certificates (this restriction was removed starting with firmware revisions 8.7.5.52/8.9.3.41). Make sure the supplied certificates are in DER format.


Tech Notes

Phone's Web Server Certificate

The phone uses the built-in certificate also as a certificate for the web user interface when accessed via HTTPS. Currently Snom phones come with SHA1(RSA, 1024 bit key length) or SHA2(RSA, 2048 bit key length) certificates.

Starting from firmware 8.9.3.40 it is possible to switch the certificate via the setting phone_cert_type to a SHA256 certificate .

Supported Cipher Suites

 

PhoneFirmwareProtocol VersionKey ExchangeAuthenticationBlock CipherKey Length
[bit]
Mode of OperationMessage Authentication CodeNotes
snom3008.7.3.25.9SSL 3, TLS 1.0DH, RSANULL, RSA3DES, DES, NULL, RC456, 128, 168CBCMD5, SHA1Firmware version not
supported anymore (EoL).
It is highly recommended to
upgrade to a higher version.
snom320
snom360
snom370
snom710
snom720
snom760
snom820
snom821
snom870
snomMP
snomPA1
snom300 8.7.5.35TLS 1.0DH, RSANULL, RSA3DES, AES, DES, NULL, RC456, 128, 168CBCMD5, SHA1* Since firmware version 8.7.5.49
the snom710 has the same
TLS-properties as the snom715
(see below).
* Starting with version 8.7.5.57
3DES, DES, NULL and RC4
have been removed from the
supported block ciphers.
snom320
snom370
snom710
snomPA1
snom715TLS 1.0, TLS 1.1,
TLS 1.2
DH, ECDH, RSA, SRPDSS, ECDSA, RSA3DES, AES, Camellia128, 168, 256CBC, GCMSHA1, SHA256, SHA384
snom720
snom725
snom760
snomD765
snom821
snom870
snomMP
snomD3058.9.3.52TLS 1.0, TLS 1.1,
TLS 1.2
DH, ECDH, RSAECDSA, RSAAES128, 256CBC, GCMSHA1, SHA256, SHA384
snomD315
snomD345
snomD375
snomD745
snomPA1+

10.1.20.0

10.1.33.33

TLS 1.0, TLS 1.1,
TLS 1.2
DH, ECDH, RSAECDSA, RSAAES128, 256CBC, GCMSHA1, SHA256, SHA384
snomSP800
snomD120
snomD140
snomD150
snomD305
snomD315
snomD335
snomD345
snomD375
snomD385
snomD712
snomD713
snom715
snomD717
snom725
snomD735
snomD745
snomD765
snomD785
snomD812
snomD815
snomD862
snomD865

Limitations

  • No support of Certificate Revocation Lists (CRL).
  • No support for Certificate Lifecycle Management (e.g. SCEP).

Â