VoIP: SIP-over-TLS and sRTP: Samsung

The Samsung SMT-i series is End-of-Sale on the 30th of September 2019 (source). However, software development ceased much earlier. For example, the built-in OpenSSL version is 1.0.1r from January 2016, although the last firmware has a timestamp from December 2017. These phones can be used with:

The latter two are based on SIP. Therefore, you have to convert your phone from OS to SCM… The default password for the phone interface is 1234. The phone interface allows for configuration: (hardware button) Options → Phone → Version → *153# (blind entry) → Easy Install → Mode: Standard. The Web interface called Deskphone Manager is reachable via HTTP (port 8080) or HTTPs (port 443). I had to use a combination of both because the phone interface did not take my SIP password, and the Web interface did not take my SIP host.

Last tested firmware

01.62SCMx IP phone Software

Configuration

Password: admin/samsung*# and user/samsung
Phone Management → Password
HTTPS: enabled on default
Update: Phone Management → S/W Upgrade
Trust Anchors: Phone Management → Certificate Management
broken; gives me: No upload directory
SIP-URI User: Network → Provisioning → Mode: Standard
Network → Provisioning → Line Number
SIP-URI Host: Network → Provisioning → Address
Advanced → Server: Registrar → Registrar Server1 → Port: 0 (enables DNS-SRV)
SIP-over-TLS: Network → Provisioning → Protocol: TLS
broken because the phone requires a trust anchor
SDES-sRTP: Network → Provisioning → (Registrar) Data: SRTP
which is RTP/SAVP

Software Bugs

SHA-2 Digest: does not pick MD5, continues without header Authorization, therefore is not able to register; therefore incompatible with Linphone
DNS-NAPTR: missing
Call Reject (UDUB): sends status 603; found no way to send status 486
Audio: AMR-WB octet-aligned mode but not signaled in SDP
Mitigation: Web → Phone → Media → (Voice Codec Priority) 2: Not use
Named Curves: offers not P-256 (NID_X9_62_prime256v1) but only P-224 (NID_secp224r1)
Because OpenSSL does not accept that on default, this disables all Cipher Suites based on ECDHE.
Mitigation: patch your server SSL_CTX_set1_groups_list(, "X25519:P-256:P-224:X448:P-384:P-521"); Digium Asterisk 13 LTS: example
DiffServ: not enabled on default
Mitigation: Web → Advanced → SIP Option → QoS → Type: DSCP → Signal: 40 → Media: 46

Security

Bugs: missing TLS_ECDHE_[RSA|ECDSA]_WITH_AES_128_GCM_SHA256,
Cipher Suites include RC4 and Single-DES (OpenSSL 1.0.1r; version displayed in phone menu)
Responsible Disclosure: via E-mail (difficult to get)
Firmware Update: missing Automation
missing Newsletter

Miscellaneous

Model Range

Power Supply

12 V 2.0 A Coaxial: unknown

back to the other phones.