BroadSAFE Enhanced IP Phone Networks



Similar documents
Using BroadSAFE TM Technology 07/18/05

Complying with PCI Data Security

M-Shield mobile security technology

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Secure Network Communications FIPS Non Proprietary Security Policy

Overview. SSL Cryptography Overview CHAPTER 1

Client Server Registration Protocol

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Potential Targets - Field Devices

ipad in Business Security

PrivyLink Cryptographic Key Server *

Sectra Communications ensuring security with flexibility

VOICE OVER IP SECURITY

Trusted Platforms for Homeland Security

Secure Data Exchange Solution

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Securing SIP Trunks APPLICATION NOTE.

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Pulse Secure, LLC. January 9, 2015

SENSE Security overview 2014

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Deploying iphone and ipad Security Overview

IBM Crypto Server Management General Information Manual

SecureDoc Disk Encryption Cryptographic Engine

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Criteria for web application security check. Version

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

Acano solution. Security Considerations. August E

CRYPTOGRAPHY AS A SERVICE

CHAPTER 1 INTRODUCTION

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Guide to Data Field Encryption

MySQL Security: Best Practices

SkyRecon Cryptographic Module (SCM)

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Security vulnerabilities in the Internet and possible solutions

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Sync Security and Privacy Brief

Guidance Regarding Skype and Other P2P VoIP Solutions

Hardware Security Modules for Protecting Embedded Systems

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

An Overview of Communication Manager Transport and Storage Encryption Algorithms

Security Controls for the Autodesk 360 Managed Services

CS 356 Lecture 28 Internet Authentication. Spring 2013

Thick Client Application Security

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

[SMO-SFO-ICO-PE-046-GU-

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

TPM Key Backup and Recovery. For Trusted Platforms

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

How To Get To A Cloud Storage And Byod System

iphone in Business Security Overview

SafeNet DataSecure vs. Native Oracle Encryption

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Applying Cryptography as a Service to Mobile Applications

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EMC VMAX3 DATA AT REST ENCRYPTION

Key Management Interoperability Protocol (KMIP)

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Application Security: Threats and Architecture

Cisco Advanced Services for Network Security

Authentication Application

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability

TLS and SRTP for Skype Connect. Technical Datasheet

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Taxonomic Modeling of Security Threats in Software Defined Networking

Information Security Basic Concepts

McAfee Firewall Enterprise 8.3.1

OMAP platform security features

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

EMC Symmetrix Data at Rest Encryption

Ovation Security Center Data Sheet

Our Key Security Features Are:

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Cryptography and network security CNET4523

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi


Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Dell Client BIOS: Signed Firmware Update

Building A Secure Microsoft Exchange Continuity Appliance

Enterprise A Closer Look at Wireless Intrusion Detection:

Recommended Wireless Local Area Network Architecture

Transcription:

White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005

Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls over a computer network. VoIP converts telephone voice signals into a digital signal that travels over the Internet. Industry trends confirm that VoIP usage is rapidly increasing, and this elevates the level of security concerns associated with the technology. Deployment of IP-enabled devices on corporate and public networks has resulted in new challenges for network managers, particularly in the realm of security. Until recently, VoIP usage has primarily been enterprise-based where, in comparison to the public Internet, the number of users is small and the environment tightly controlled, therefore, security concerns have been limited. With the marked growth and developmental progress of VoIP on the public Internet, there is a correlative increase in risk for data traffic sniffing and device spoofing attacks. Even in the enterprise, the overriding corporate concern is the unauthorized use of the network by both outsiders and employees. 1 How do we keep the mailroom employee from accessing confidential voice mails belonging to the CEO? Unprotected networks are susceptible to audio capture (eavesdropping on phone calls), identity theft where a hacker may spoof SIP messages and IP addresses to emulate another client device, and Denial of Service (DoS) attacks such as packet/broadcast storms, worms, and viruses which render the network unusable. DoS attacks are especially problematic because the intrusion is characterized by an explicit attempt to prevent legitimate users of a service from using that service, and, depending on the nature of your enterprise, this can effectively disable your organization. How can we secure the endpoints on the network so that: Devices will only receive packets from authorized or trusted sources? Only authenticated users may communicate in the network? Communications between endpoints or between a server and an endpoint are private and the data integrity is maintained? The intent of this paper is to help the reader understand how the use of the BroadSAFE TM core embedded in the BCM1103 and BCM1104 IP phone chips provide the foundation for strong security in IP Phone networks. Page 2

Overview BroadSAFE TM Technology Overview BroadSAFE is a general term used to describe the security technology implemented across a wide variety of Broadcom products. There are currently five different BroadSAFE implementations available, with each providing distinct levels of security services. The BroadSAFE implementation used in both the BCM1103 and BCM1104 is named µhsm or micro Hardware Security Module. This paper is focused on the security capabilities of the µhsm and its application in the IP Phone Networking space. Broadcom developed the µhsm to address the emergent requirement for hardware protection of private keys, and the need to manage keys in a construct that can scale to satisfy the demands of very large organizations. Certificates (keys) form the basis for any secure protocol by providing the credentials of a particular device on the network. When these credentials are stored in software, they can be copied, modified or spoofed by a rogue device on your network, exposing the network to attacks. As secure protocols like certificate-based Extensible Authentication Protocol/ Transport Level Security (EAP-TLS) and TLS-based Session Initiation Protocol (SIP) messaging are adopted, IT managers can respond to the vulnerability associated with storing certificates in software, and the challenge of managing certificates across a large enterprise. Broadcom s µhsm addresses each of these requirements by providing a hardware key usage and storage environment as well as a secure endpoint that enables secure remote certificate management. Page 3

µhsm Core Every µhsm core contains a 16-bit RISC processor, One Time Programmable (OTP) memory, ROM, public key (RSA, DSA, DH) engines, a 3DES engine, HMAC-SHA-1 engine and a random number generator. These components enable the µhsm core to establish a security boundary outside of which keys are never exposed in the clear. Keys are delivered to the µhsm in an encrypted form and decrypted inside the secure boundary of the µhsm, where they can be used and managed. For more details on the µhsm core, please refer to the micro Hardware Security Module Design Specification (HSM-TI-10x-R) stored in your docsafe account. Initialization Each µhsm module includes a block of OTP memory used to store the values of two unique private keys that are examined when the µhsm is initialized: A 160-bit Digital Signature Algorithm (DSA) identity key A 256-bit DH device confidentiality key These two keys are hardened into the device and establish the foundation for trusted client device and secure no touch network management. Storing these keys in hardware provides manifold advantages over storing them in software. Software is accessible and fluid. It can be changed, copied, debugged, and inspected, leaving keys susceptible to key-finding attacks. The private keys stored in the µhsm however, are never exposed outside of the µhsm core not to Broadcom, not to the OEM, not to anyone. Only associated public keys can ever be dispatched from the µhsm core. Page 4

The OTP memory is programmed during final test at Broadcom. There is no need for in-field programming. Every BCM1103/BCM1104 is shipped with unique keys programmed and verified. These values are listed in Table 1. Table 1: BCM1103/BCM1104-Unique Keys Key Name Identity Key (Kdi) Confidentiality Key (Kdc) Device Configuration (Dcfg) Device Authorization (Dauth) Description The 160-bit private key of a DSA Key. The key pair is generated on-chip and the secret is burned into the OTP. The public value is discarded, but can be regenerated on request. The 256-bit private key of a 2048-bit Diffie-Hellman Key. The key pair is generated on-chip. The private key is burned into the OTP. The public value is discarded, but can be regenerated on request. Register bits can be mapped to blocks on the host chip to enable/disable features on the chip, and to configure µhsm behavior. The BCM1103/BCM1104 does not have the option of enabling/disabling features using this register. This value contains a hash of the public key of an entity that can change the device configuration bits. Since the device configuration bits are programmed in OTP, the bits aren t physically changed, but the value written by an authorized entity will override the Dcfg bits (This value is not used in either the BCM1103 or BCM1104). Accessing the µhsm All µhsm features are accessible through the BroadSAFE µhsm API provided by Broadcom. This API is included with the BCM1103/BCM1104 SDK. Included applications can replace existing software implementations of cryptographic functions with calls to the µhsm API. BroadSAFE µhsm API documentation is available using your docsafe account. Page 5

µhsm Security Features Designing a secure IP phone network using the BCM1103/BCM1104 device with embedded µhsm provides four distinct advantages: Public key engines inside the µhsm core can be accessed to offload public key operations by applications running on the host processor. This frees up the host processor for additional tasks, and may help eliminate any critical timing paths related to call setup. Two unique private keys programmed in OTP memory securely authenticate network devices. These keys are burned into each µhsm core during final testing. One key establishes identity and the other encrypts data that only the µhsm can decrypt. Device identity is established using one of these keys and the DSA. This identity key can be used with the client verification message in a TLS initialization session to sign a hash of all previous messages. The µhsm core provides a secure key storage and usage environment for private key operations. Designing around a µhsm enables secure, centralized key management. In addition to hardware key protection, the µhsm also contains logic to enforce key expiration, revocation, usage and other key-based policy decisions. As keys expire, or are revoked, new keys must be distributed to end devices in a secure manner. The µhsm provides a trusted end point where the management server, housing a complete Hardware Security Module, handles key generation, backup, key-based policy setting, and secure key distribution. All of these advantages are distinct and independent, and can be implemented using a phased approach. Cryptographic offload One of the easiest techniques that can be used to take advantage of BCM1103/BCM1104 µhsm functionality is to offload public key operations to the public key engine contained in the µhsm. These engines can be used by any application to offload computationally expensive operations from software. The µhsm block was designed to be a small footprint, low-gate-count design, so performance from these engines is not comparable to traditional hardware cryptographic accelerators. The ability to offload these operations to hardware frees up the host processor for other tasks. The public key engine can perform about 10 public key operations per second, and supports RSA, RSA-CRT, Diffie-Hellman, and DSA. µhsm offload capabilities can be accessed using the Broadcom µhsm software reference library. In addition to the crypto engines contained inside the µhsm block, the BCM1103/BCM1104 also houses integrated AES and SHA-1 engines capable of 10Mbps sustained throughput. The AES engine supports 128-, 192- and 256-bit encryption in CTR, CBC and ECB cipher modes. The SHA-1 engine supports both pure SHA-1 hash as well as HMAC-SHA-1. These blocks operate independently of the µhsm block and are used primarily for encrypting and authenticating real-time media streams. Page 6

Robust Hardware-Based Authentication Device identification lies at the heart of any security architecture. Once the identity of a device on the network has been compromised, a hacker can exploit that identity to access corporate networks and conduct transactions while posing as a valid network entity. If device credentials are duplicated on a corporate network, which is the fundamental problem with storing certificates in software, it would be easy to access sensitive information contained in voice mails or call logs. The µhsm enables you to store device credentials using dedicated hardware protection, thus ensuring that devices on your network are who they say they are. Using BroadSAFE With EAP-TLS One method to ensure that only authenticated devices exist on the network is by using the EAP-TLS protocol. The µhsm secures X.509 certificates used in EAP-TLS by storing the certificate on an IP phone, encrypted with a key that can only be decrypted inside the µhsm. During the manufacturing process, the µhsm is queried for a confidentiality key (Kdc). A manufacturer-provided certificate server generates a device certificate, formats the private key as part of a Discrete Logarithm Integrated Encryption Scheme (DLIES) message according to IEEE1363bis, and encrypts the message with Kdc. The certificate, along with the encrypted private key, is then installed in flash memory on the phone in a non-eap network environment. Page 7

When the phone is installed on the network, software transports the encrypted private key of the certificate into the µhsm. Once the key is decrypted and resident in the µhsm, that certificate now resides in a hardware-protected boundary and can be used for network access in EAP-TLS or other similar protocol (see Figure 1). Additional certificates enabling different features can then be installed on the phone once network access is authorized. generates Certificate Server Device Device NV Memory NV Memory Private- Value DLIES Private - Key Value DLIES Private Private - Key Key Value Value BCM1103 BCM1103 µhsm uhsm IP Phone Figure 1: Certificate Server Key Generation and Delivery Page 8

Alternate Authentication Strategies It is possible to create an authentication strategy using the µhsm s capability to sign challenge data from an authentication server. This is an option for applications where system cost is at a premium and client software must be minimized to reduce memory costs. Instead of implementing the TLS protocol on the client, an alternative authentication strategy can be employed (see Figure 2). IP Phone EEPROM Network Request Certificate Submit Device Certificate Authentication Server μhsm Public Key (K DI-PUB ) Signed by Manufacturer s Private key Verifies signature using the manufacturer public key. Establishes that the public key of this module K DI-PUB is certified by the manufacturer. BCM1103 μhsm signs challenge using private identity key (K DI-PRIV ) Send random challenge Send signed challenge Generates a challenge (unique random 160 bit number). Verifies signed challenge using certified public key (K DI-PUB ). Establishes that the BCM1103 contains the private key K DI-PRIV that corresponds to the certified public key K DI-PUB Figure 2: Alternate Authentication Strategy Using this approach, a certificate, signed by the OEM, is installed on the IP phone. During authentication, the phone is queried for the certificate that the authentication server uses to verify the OEM signature. The server then authenticates the phone by sending it a random challenge that is signed by the µhsm. The signature is verified using the public key in the certificate. There is a minimal amount of code required on the client end for this type of authentication. User Authentication In addition to hardware-based device authentication, the BCM1103/BCM1104 µhsm provides the capability to authorize a network user. A user can enter a PIN via the keypad or supply credentials via the smartcard. These entries are input directly to the µhsm on GPIO lines. The µhsm hashes the input data and signs it with an identity key. This information can then be sent to a remote access server for authentication. Page 9

Key Management and Usage Once a network device is securely identified, it must be configured and managed. An initial configuration typically involves installation of a device certificate and enrollment of the device on the network. If the device certificate has no expiration, then an enforceable method for updating the device certificate, and any subsequent certificates, must be in place. These certificates authorize access to company databases, grant toll privileges and restrictions, or indicate the status of security patches and virus definitions. It is critical that these certificates securely transfer to the VoIP phone, without burdening IT with having to physically visit each device in order to install updated certificates. µhsm enables hardware-based secure communications using a certificate server to install certificates across the enterprise from remote locations. Broadcom employs a light-weight, proprietary but open protocol for communications between a Key Management Server (KMS) and µhsm called Key Delivery Protocol (KDP). This is a simple client-server based protocol that wraps key material according to DLIES. A KMS contains a hardware security module. The HSM provides secure key management to generate the cryptographic keys used in certificates, set the capabilities and security limits of keys, implement key backup and recovery, prepare keys for storage, and perform key revocation and destruction. Once keys are generated inside the protected HSM boundary, the KMS can establish a secure link between itself and a particular µhsm client, and install the keys or certificates on the client device. KMS products from ncipher ship with support for the KDP protocol. For more information, please visit http://www.ncipher.com. Secure Device Authentication at the Call Manager It is possible to transfer the authentication function into the call manager by adding a key management and cryptographic offload module. Broadcom provides a FIPS- 140-2 level 3 certifiable solution using the BCM5862 Security Processor with an embedded µhsm paired with a BCM5890 Secure Application Processor. Keys can be generated and managed inside the secure boundary of the BCM5890. For example, the BCM5890 can generate session keys and distribute them securely to client devices using KDP once call setup has completed. Cryptographic operations can be offloaded to the high-performance BCM5862, with keys moving in and out of the BCM5862 through a secure serial channel to the BCM5890. For more information, contact your Broadcom representative. Page 10

Conclusion The µhsm core embedded in the BCM1103/BCM1104 is a very flexible, hardwarebased policy engine that uses advanced security features not available in competing devices. These features can be accessed using a variety of methods: Cryptographic offload Hardware-based authentication User authentication Certificate management The secure authentication enabled by µhsm allows you to safeguard network assets, prevent potentially malicious devices from accessing your network, and enables "touch-free" management of µhsm secured endpoint devices. Since the majority of VoIP security concerns surface after VoIP has been deployed, designing with the BCM1103/BCM1104 µhsm core gives you a hardware-based security platform, in addition to best-of-class VOIP features, allowing you to provide advanced security solutions now and in the future. References 1 Trends and Spending Plans for Security Appliances: Are We Ready for VoIP? (Instat Report by Reed Electronics Group, August 2005) Page 11

Broadcom, the pulse logo, Connecting everything, the Connecting everything logo, BroadSAFE, BroadVoice and BroadVoice32 are trademarks of Broadcom Corporation and/or its affiliates in the United States, certain other countries and/or the EU. Any other trademarks or trade names mentioned are the property of their respective owners. Phone: 949-450-8700 Fax: 949-450-8710 E-mail: info@broadcom.com Web: www.broadcom.com BROADCOM CORPORATION 16215 Alton Parkway, P.O. Box 57013 Irvine, California 92619-7013 2005 by BROADCOM CORPORATION. All rights reserved. BroadSAFE-WP100-R 09/23/05