Certificate Exchange in TLS
Server to IP Phone Authentication
The IP phone sends a random challenge to the server and requests that the server signs it.
The server signs the random challenge with its RSA private key and returns it to the IP Phone
The IP phone verifies the signature by using the RSA public key of the server (available locally in the CTL)
IP Phone to Server Authentication
The server sends a random challenge to the IP phone and requests that the phone signs it.
The IP phone signs the random challenge with its RSA private key and returns it to the server
The server verifies the signature by using the RSA public key of the IP phone that was just received over the network (in the certificate)
TLS Session Key Exchange
The IP phone generates session keys, encrypts them using the public RSA key of the server, and sends them to the server
The server decrypts the message, and now the IP phone and the server share session keys that can be used for signaling protection.
Authenticated Signaling using TLS