1
Scope
2 References
2.1
Normative
references
2.2
Informative
references
3 Definitions
4 Abbreviations
5 Conventions
6 Basic framework
6.1
Improved
negotiation capabilities in H.235.0
6.2 Use between endpoint and
gatekeeper
6.3 Use of profile between
gatekeepers
6.4 Signalling channel encryption
and authentication
7 A specific security profile
(SP1)
8 An improved security profile
(SP2)
8.1
Call
Signalling sequence number
8.2
Generation
of Weak Encryption Key from password
8.3
Nonce
size
8.4
Initialization
vector salting
8.5
ClearToken
encoding
9 Extensions to the framework
(Informative)
9.1 Using the master key to secure
the call signalling channel via TLS
9.2
Use
of certificates to authenticate the gatekeeper
9.3
Use
of alternative signalling security mechanisms
10 Threats (Informative)
10.1
Passive
attack
10.2
Denial-of-Service
attacks
10.3
Man-in-the-Middle
attacks
10.4
Guessing
attacks
10.5
Unencrypted
gatekeeper half-key