08-31-2017 05:29 AM - edited 03-17-2019 11:05 AM
Two years ago, the platform I now manage was upgraded from V9 to 10.5. It was a secure mode super cluster consisting of 12000 CIPC phones and 7000 various hard phones.
The upgrade broke the secure mode on the CIPC which would not registered and have to be switch to a non secure phone profile and the LSC was removed. The problem was recently uncovered and attributed to a bug where if the CTL files is over 3200 bytes the CIPC phones will not accept it. The CTL files over 5000 bytes was remedied by patch for hard phones but never for CIPC phones.
Over the course of two years this have never been resolved and an open security issue. The repair of this is to reduce the size of the CTL file down to 3200 bytes by deleting and removing expired certificates.
The argument of this is that the security mode of the cluster is authenticated and By Null String. It is believed that this configuration provides SRTP. My interpretation of this security profile is that all it is doing is using the LSC to authenticate to the cluster instead of the MIC and that no security is being provided.
My understanding this configuration is not doing any thing at all, and the same as what the MIC and ITL does in non secure profile?
08-31-2017 11:47 PM
Hi Alex,
As per the following link:
Table 7 Security Authentication Settings Supported on Cisco IP Communicator Authentication Mode Field Description
By Authentication String | Installs or upgrades, deletes, or troubleshoots an LSC only when you or the user enters the CAPF authentication string on Cisco IP Communicator. | ||
By Null String | Installs or upgrades, deletes, or troubleshoots an LCS without user intervention
| ||
By Existing Certificate (Precedence to LSC) | Installs or upgrades, deletes, or troubleshoots an LSC if an LSC exists on Cisco IP Communicator. If an LSC exists on Cisco IP Communicator, authentication occurs through the LSC, whether or not another certificate exists on Cisco IP Communicator. If another certificate and an LSC exist on Cisco IP Communicator, authentication occurs through the LSC. Before you choose this option, verify that a certificate exists on Cisco IP Communicator. If you choose this option and no certificate exists on Cisco IP Communicator, the operation fails. At any time, Cisco IP Communicator uses only one certificate to authenticate to CAPF. If the primary certificate, which takes precedence, becomes compromised for any reason, or, if you want to authenticate through the other certificate, you must update the authentication mode. |
![]() | The By Existing Certificate (Precedence to MIC) option is not supported by Cisco IP Communicator. |
and the following
Certificate Authority Proxy Function (CAPF), which automatically installs with Cisco Unified Communications Manager, performs the following tasks, depending on your configuration:
Your understanding seems to be correct.
HTH
Manish
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide