Using Security Certificates On Yealink IP Phones - V83 - 10
Using Security Certificates On Yealink IP Phones - V83 - 10
Using Security Certificates On Yealink IP Phones - V83 - 10
This guide provides the detailed instructions on how to configure and use certificates on Yealink
IP phones. In addition, this guide provides step-by-step instructions on how to create custom
certificates for Yealink IP phones.
CP860, SIP-T46G, SIP-T42G and SIP-T41P IP phones running firmware version 71 or later
Introduction
Certificate is an important element in deploying a solution that ensures the integrity and privacy
of communications involving Yealink IP phones.
Three types of certificates are pre-loaded on Yealink IP phones and comply with X.509 standard.
Trusted certificates (Certificate Authority certificates): For SIP VP-T49G IP phones, there
are 30 trusted certificates installed by default. For SIP-T58V/T58A/T56A/CP960 IP phones
there are 186 trusted certificates installed by default. For
SIP-T54S/T52S/T48G/T48S/T46G/T46S/T42G/T42S/T41P/T41S/T40P/T40G/T29G/T27P/T27
G/T23P/T23G/T21(P) E2/T19(P) E2 and CP920 IP phones, there are 77 trusted certificates
installed by default. For CP860, W52P, W56P and W60 IP phones, there are 76 trusted
certificates installed by default. Refer to Appendix B Trusted Certificate Authority List for
more information.
Note The IP phone does not have the unique device certificate by upgrading firmware version to 72.
1
Using Security Certificates on Yealink IP Phones
The following shows an example of a Yealink generic certificate. For the information on fields of
X.509 certificate, refer to Appendix A X.509 Certificate Structure.
Note For the IP phone to determine whether a certificate is within its valid time range, check that the
time and date on the phone are configured properly.
2
Using Security Certificates on Yealink IP Phones
2. Click Browse to locate the certificate (*.pem, *.crt, *.cer or *.der) from your local system.
The information of the custom trusted certificate is displayed on the web user interface of
the IP phone.
Note The information of built-in trusted certificates is not displayed on the web user interface of the IP
phone.
3
Using Security Certificates on Yealink IP Phones
2. Select the desired value from the pull-down list of Only Accept Trusted Certificates.
If Enabled is selected, the IP phone will verify the server certificate based on the
trusted certificates list. Only when the authentication succeeds, the IP phone will trust
the server.
If Disabled is selected, the IP phone will trust the server no matter whether the
certificate received from the server is valid or not.
3. Select the desired value from the pull-down list of Common Name Validation.
If Default Certificates is selected, the IP phone will verify the server certificate based
on the built-in trusted certificates list.
If Custom Certificates is selected, the IP phone will verify the server certificate based
on the custom trusted certificates list.
If All Certificates is selected, the IP phone will verify the server certificate based on
the trusted certificates list, which contains built-in and custom trusted certificates.
SIP-T54S/T52S/T48G/T48S/T46G/T46S/T42G/T42S/T41P/T41S/T40P/T40G/T29G/T27P/T27
G/T23P/T23G/T21(P) E2/T19(P) E2, CP860, CP920, W60, W52P and W52P IP phones
running firmware version 81 or later
Other IP phones or the IP phones listed above running old firmware version use the old auto
provisioning mechanism.
4
Using Security Certificates on Yealink IP Phones
Description:
Configures the access URL of the custom trusted certificate used to authenticate the
connecting server.
Note: The certificate you want to upload must be in *.pem, *.crt, *.cer or *.der format.
None
security.trust_certificates 0 or 1 1
Description:
Enables or disables the IP phone to only trust the server certificates in the Trusted
Certificates list.
0-Disabled
1-Enabled
None
security.cn_validation 0 or 1 0
Description:
0-Disabled
1-Enabled
None
5
Using Security Certificates on Yealink IP Phones
security.ca_cert 0, 1 or 2 2
Description:
Configures the type of certificates in the Trusted Certificates list for the IP phone to
authenticate for TLS connection.
0-Default Certificates
1-Custom Certificates
2-All Certificates
None
trusted_certificates.url = http://192.168.1.20/tc.crt
security.trust_certificates = 1
security.cn_validation = 0
security.ca_cert = 2
2. Upload configuration files to the root directory of the provisioning server and trigger IP
phones to perform an auto provisioning for configuration update.
For more information on auto provisioning, refer to the latest Auto Provisioning Guide for
your phone on Yealink Technical Support.
Description:
Configures the access URL of the custom trusted certificate used to authenticate the
connecting server.
Note: The certificate you want to upload must be in *.pem, *.crt, *.cer or *.der format.
6
Using Security Certificates on Yealink IP Phones
None
static.security.trust_certificates 0 or 1 1
Description:
Enables or disables the IP phone to only trust the server certificates in the Trusted
Certificates list.
0-Disabled
1-Enabled
None
static.security.cn_validation 0 or 1 0
Description:
0-Disabled
1-Enabled
None
static.security.ca_cert 0, 1 or 2 2
Description:
Configures the type of certificates in the Trusted Certificates list for the IP phone to
authenticate for TLS connection.
0-Default Certificates
1-Custom Certificates
2-All Certificates
None
7
Using Security Certificates on Yealink IP Phones
static.trusted_certificates.url = http://192.168.1.20/tc.crt
static.security.trust_certificates = 1
static.security.cn_validation = 0
static.security.ca_cert = 2
Example:
include:config “http://10.2.1.158/static.cfg”
3. Upload the boot file and configuration file to the root directory of the provisioning server.
For more information on auto provisioning, refer to the latest Auto Provisioning Guide for
your phone on Yealink Technical Support.
2. Click Browse to locate the certificate (*.pem and *.cer) from your local system.
8
Using Security Certificates on Yealink IP Phones
The information of the custom device certificate is displayed on the web user interface of
the IP phone.
Note The information of built-in device certificates is not displayed on the web user interface of the IP
phone.
2. Select the desired value from the pull-down list of Device Certificates.
If Default Certificates is selected, the IP phone will send the unique or the generic
device certificate to clients for authentication.
If Custom Certificates is selected, the IP phone will send custom certificates to clients
for authentication.
SIP-T54S/T52S/T48G/T48S/T46G/T46S/T42G/T42S/T41P/T41S/T40P/T40G/T29G/T27P/T27
G/T23P/T23G/T21(P) E2/T19(P) E2, CP860, CP920, W60, W52P and W56P IP phones
running firmware version 81 or later
Other IP phones or the IP phones listed above running old firmware version use the old auto
provisioning mechanism.
9
Using Security Certificates on Yealink IP Phones
Description:
Configures the access URL of the certificate the IP phone sends for authentication.
Note: The certificate you want to upload must be in *.pem or *.cer format.
None
security.dev_cert 0 or 1 0
Description:
Configures the type of the device certificates for the IP phone to send for TLS authentication.
0-Default Certificates
1-Custom Certificates
None
server_certificates.url = http://192.168.1.20/ca.pem
security.dev_cert = 0
2. Upload configuration files to the root directory of the provisioning server and trigger IP
phones to perform an auto provisioning for configuration update.
For more information on auto provisioning, refer to the latest Auto Provisioning Guide for
your phone on Yealink Technical Support.
10
Using Security Certificates on Yealink IP Phones
Description:
Configures the access URL of the certificate the IP phone sends for authentication.
Note: The certificate you want to upload must be in *.pem or *.cer format.
None
static.security.dev_cert 0 or 1 0
Description:
Configures the type of the device certificates for the IP phone to send for TLS authentication.
0-Default Certificates
1-Custom Certificates
None
static.server_certificates.url = http://192.168.1.20/ca.pem
static.security.dev_cert = 0
Example:
include:config “http://10.2.1.158/static.cfg”
3. Upload the boot file and configuration file to the root directory of the provisioning server.
For more information on auto provisioning, refer to the latest Auto Provisioning Guide for
your phone on Yealink Technical Support.
11
Using Security Certificates on Yealink IP Phones
If you intend to use certificates on Yealink IP phones, they must exist on the IP phones.
Certificates issued by Yealink Certificate Authority (CA) are pre-loaded on Yealink IP phones and
a custom certificate can be uploaded to Yealink IP phones. You can check whether a built-in
device certificate is installed on your phone via web/phone user interface. A built-in device
certificate can be either a unique certificate (based on the MAC address) or a generic certificate.
Each certificate is issued by the Yealink Certificate Authority (CA), so a server can verify that a
device is truly a Yealink device (not a malicious device or software masquerading as a Yealink
device).
To check whether a built-in device certificate is installed on your phone via phone user
interface:
1. Press OK or Menu->Status.
2. Press to scroll to More and then press the Enter soft key.
3. Select Phone.
If the status is Factory Installed, it means there is a valid device certificate installed on
your phone. If your IP phone is running firmware version 71, the valid certificate is a
generic certificate. If your IP phone is running firmware version 72 or later, the valid
certificate is a unique certificate.
12
Using Security Certificates on Yealink IP Phones
If the status is Not Installed, it means there is no valid device certificate installed on your
phone.
When the IP phone initiates an SSL connection, we consider it as a client. The server will send its
certificate to the IP phone and the IP phone verifies this certificate. If “Mutual TLS Authentication
Required” is enabled on your server, the IP phone should send its certificate to the server as well.
The client certificate is the same as the server certificate.
The following shows a scenario of a mutual TLS authentication. In this scenario, the IP phone
acts as a client and connects to the HTTPS server for provisioning.
1. Create CA, server and client certificates. For more information, refer to Appendix C Creating
Custom Certificates.
2. Install CA and server certificates on your server. For more information, refer to the online
resource.
4. Check if Only Accept Trusted Certificates option has been enabled on the IP phone.
- If Yes, go to step 5.
- If No, please enable Only Accept Trusted Certificates option. For more information,
refer to Configuring Trusted Certificates on Yealink IP Phones.
13
Using Security Certificates on Yealink IP Phones
- If Yes, go to step 6.
6. Check if Device Certificates option has been configured as Custom Certificates on the IP
phone.
- If Yes, go to step 7.
- If No, please configure Device Certificates option. For more information, refer to
Configuring Device Certificates on Yealink IP Phones.
7. Make sure that “Mutual TLS Authentication Required” is enabled on your server.
8. Make sure that auto provisioning URL on the IP phone begins with https, e.g.,
“https://mydomain.com/autop/”.
9. Configure auto provisioning settings. For example, mark the On radio box in the Power On
field, and then reboot the IP phone. The IP phone will perform auto provisioning with
mutual TLS authentication.
For more information on auto provisioning, refer to the latest Auto Provisioning Guide for your
phone on Yealink Technical Support.
14
Using Security Certificates on Yealink IP Phones
Field Description
Identifies the entity associated with the public key stored in the subject
Subject
public key information field.
Subject Public Key Carries the public key and identifies the algorithm with which the key is
Information used.
6. GeoTrust Global CA
15
Using Security Certificates on Yealink IP Phones
31. ISRG Root X1 (Let’s Encrypt Authority X1 and Let’s Encrypt Authority X2 certificates are
signed by the root certificate ISRG Root X1.)
16
Using Security Certificates on Yealink IP Phones
65. RapidSSL CA
68. COMODOSSLCA
71. AmazonRootCA4
72. AmazonRootCA3
73. AmazonRootCA2
74. AmazonRootCA1
17
Using Security Certificates on Yealink IP Phones
Note SIP-T48G/T48S/T46G/T46S/T42G/T42S/T41P/T41S/T40P/T40G/T29G/T27P/T27G/T23P/T23G/T21
(P) E2/T19(P) E2 IP phones running firmware version earlier than X.81.0.15, and
CP860/W52P/W56P IP phones running firmware version earlier than X.81.0.10 do not support the
certificates from 35 to 76.
Note SIP-T54S/T52S/T48G/T48S/T46G/T46S/T42G/T42S/T41P/T41S/T40P/T40G/T29G/T27P/T27G/T23
P/T23G/T21(P) E2/T19(P) E2 IP phones running firmware version earlier than X.82.0.10, do not
support the certificates 77.
78. (c) 2005 TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş.
81. ACCVRAIZ1
93. ApplicationCA
95. A-Trust-nQual-03
101. CA Disig
18
Using Security Certificates on Yealink IP Phones
104. Certigna
107. Certum CA
120. EC-ACC
135. IGC/A
136. Izenpe.com
137. Juur-SK
19
Using Security Certificates on Yealink IP Phones
156. SecureTrust CA
175. TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Aralık 2007
176. TÜRKTRUST Bilgi İletişim ve Bilişim Güvenliği Hizmetleri A.Ş. (c) Kasım 2005
20
Using Security Certificates on Yealink IP Phones
180. UTN-USERFirst-Hardware
Note Yealink endeavors to maintain a built-in list of the most commonly used CA Certificates. Due to
memory constraints, we cannot ensure a complete set of certificates. If you are using a certificate
from a commercial Certificate Authority not in the list above, you can send a request to your local
distributor. At this point, you can upload your particular CA certificate into your phone. For more
information on uploading a custom CA certificate, refer to Configuring Trusted Certificates on
Yealink IP Phones.
The certificates from 78 to 187 are only applicable to SIP-T58V/T58A/T56A/CP960 IP phones.
Creating a self-signed CA
Issuing certificates
2. Execute the following command to create a RSA private key for your CA:
..........++++++
............++++++
21
Using Security Certificates on Yealink IP Phones
e is 65537 (0x10001)
3. Execute the following command to create a self-signed CA certificate with the RSA private
key:
[root@localhost openssl-0.9.8k]#openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
You are about to be asked to enter information that will be incorporated into your
certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank. For some fields there will be a
default value,
-----
You will be prompted to enter a few attributes (e.g., State, organization or Common Name
(CN)). The command will generate a self-signed X.509 certificate valid for ten years (3650
days).
You can execute the following command to see the details of this certificate.
A server certificate is a digital certificate issued to a server by a CA. It verifies the server’s identity
for the client so that the client can securely browse the server. After the server certificate is
issued, you need to install the certificate on the server.
2. Execute the following command to create a RSA private key for your server:
..............................................++++++
........++++++
e is 65537 (0x10001)
3. Execute the following command to create a server Certificate Signing Request (CSR) with
the server RSA private key:
22
Using Security Certificates on Yealink IP Phones
You are about to be asked to enter information that will be incorporated into your
certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank. For some fields there will be a
default value,
-----
You will be prompted to enter a few attributes (e.g., State, organization or Common Name
(CN)). The command will generate a server.csr file.
Note The Common Name (CN) in the server certificate must match the name supplied as the server.
This is because the IP phone does not perform a DNS lookup, but only performs a simple string
comparison. The use of an IP address is also valid.
4. Execute the following command to issue your server certificate with ca.crt and ca.key
generated above:
[root@localhost openssl-0.9.8k]#openssl x509 -days 365 -CA ca.crt -CAkey ca.key -req
-CAcreateserial -CAserial ca.srl -in server.csr -out server.crt
Signature ok
subject=/C=CN/ST=FJ/L=XM/O=Yealink/CN=server.yealink.com/emailAddress=support@
yealink.com
The command will generate a X.509 server certificate valid for one year (365 days).
You can execute the following command to view the details of this certificate.
A client certificate is a digital certificate issued to a client by a CA. Client certificate issue steps
are very similar to server certificate. Remember to specify a unique CN.
23
Using Security Certificates on Yealink IP Phones
[root@localhost openssl-0.9.8k]#openssl x509 -days 365 -CA ca.crt -CAkey ca.key -req
-CAcreateserial -CAserial ca.srl -in client.csr -out client.crt
These commands will generate a client.key file, a client.csr file and a client.crt file.
If the mutual TLS authentication is required, you need to generate a *.pem certificate and upload
it to the IP phone.
Execute the following command to generate a client.pem file with client.crt and client.key files
generated above:
24
Using Security Certificates on Yealink IP Phones
Customer Feedback
We are striving to improve our documentation quality and we appreciate your feedback. Email your
opinions and comments to [email protected].
25