On 20.05.2013 21:27, Moacir Ferreira wrote:
I would appreciate some help on the following questions I have:

- If I use TLS mutual authentication, do I still need a subscriber
password or the TLS successful mutual session setup will assume that the
client is "trusted" so it can register what it is asking to register?

Indeed. The TLS-layer only checks the validity of the client certificate. Thus, before calling save() (or setting up a call) you need to check manually that a user is allowed to use a certain identity in From/To headers.

This means, that have to check the user-id in the TLS certificate against the user-id in the SIP message. For example if the client certificates have the SIP username as common name:

if (@tls.peer.subj.cn != $fu) {
  sl_send_reply("403");
}

Verify To header for REGISTER, R-URI for PUBLISH, and From header for all others.

Available TLS variables:
http://sip-router.org/docbook/sip-router/branch/master/select_list/select_list.html#select_list.tls

- For large deployments, can I issue a single certificate and install it
on all my telephone sets making them "trusted" to me or I need one
certificate per telephone/subscriber?

It depends. If you want to rely purely on TLS for authentication (using MTLS as described above) then you need dedicated certificates for each client.

Actually I do not know a SIP client which supports TLS client certficates. Therefore the usually used approach is TLS without client certificates and SIP-based authentication (username+pw).


- Anyway, can you share your "good practices" advises for large deployment?

- Finally, do you know any free softphone that implements mutual TLS
authentication?

I am not aware of any.

regards
Klaus


_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to