| |
| 1 | Scope p. 7
|
| 2 | References p. 7
|
| 3 | Definitions and abbreviations p. 9
| 3.1 | Definitions p. 9
|
| 3.2 | Abbreviations p. 9
|
|
| 4 | Generic Bootstrapping Architecture; Ub interface p. 10
| 4.1 | Introduction p. 10
|
| 4.2 | Bootstrapping procedure p. 11
|
| 4.3 | User authentication failure p. 12
|
| 4.4 | Network authentication failure p. 12
|
| 4.5 | Synchronization failure p. 13
|
|
| 4A | Generic Bootstrapping Achitecture Push; Upa |R8| p. 13
| 4A.1 | Introduction p. 13
|
| 4A.2 | Bootstrapping procedure p. 13
|
| 4A.3 | User authentication failure p. 14
|
| 4A.4 | Network authentication failure p. 14
|
| 4A.5 | Synchronization failure p. 14
|
|
| 5 | Network application function; Ua interface p. 14
| 5.1 | Introduction p. 14
|
| 5.2 | HTTP Digest authentication p. 15
| 5.2.1 | General p. 15
|
| 5.2.2 | Authentication procedure p. 15
|
| 5.2.3 | Authentication failures p. 16
|
| 5.2.4 | Bootstrapping required indication p. 16
|
| 5.2.5 | Bootstrapping renegotiation indication p. 16
|
| 5.2.6 | Integrity protection p. 17
|
|
| 5.3 | UE and NAF authentication using HTTPS p. 17
| 5.3.1 | General p. 17
|
| 5.3.2 | Shared key-based UE authentication with certificate-based NAF authentication p. 17
| 5.3.2.1 | Authentication procedure p. 17
|
| 5.3.2.2 | Authentication failures p. 18
|
| 5.3.2.3 | Bootstrapping required indication p. 18
|
| 5.3.2.4 | Bootstrapping renegotiation indication p. 18
|
|
| 5.3.3 | Shared key-based mutual authentication between UE and NAF p. 18
| 5.3.3.1 | Authentication procedure p. 18
| 5.3.3.1.1 | General |R17| p. 18
|
| 5.3.3.1.2 | Authentication procedure using TLS 1.2 |R17| p. 18
|
| 5.3.3.1.3 | Authentication procedure using TLS 1.3 |R17| p. 19
|
|
| 5.3.3.2 | Authentication failures p. 21
|
| 5.3.3.3 | Bootstrapping required indication p. 21
|
| 5.3.3.4 | Bootstrapping renegotiation indication p. 21
|
|
| 5.3.4 | Certificate based mutual authentication between UE and application server p. 21
|
| 5.3.5 | Integrity protection p. 21
|
|
|
| 6 | PKI portal, Ua interface p. 22
| 6.1 | Introduction p. 22
|
| 6.2 | Subscriber certificate enrolment p. 22
| 6.2.1 | Enrolment procedure p. 22
|
| 6.2.2 | WIM specific authentication code for key generation p. 24
|
| 6.2.3 | WIM specific authentication code for proof of key origin p. 24
|
| 6.2.4 | Error situations p. 25
|
|
| 6.3 | CA certificate delivery p. 25
| 6.3.1 | CA certificate delivery procedure p. 26
|
| 6.3.2 | Error situations p. 26
|
|
|
| 7 | Authentication Proxy p. 27
| 7.1 | Introduction p. 27
|
| 7.2 | Authentication p. 27
|
| 7.3 | Authorization p. 28
|
|
| A | Signalling flows of bootstrapping procedure p. 29
| A.1 | Scope of signalling flows p. 29
|
| A.2 | Introduction p. 29
| A.2.1 | General p. 29
|
| A.2.2 | Key required to interpret signalling flows p. 29
|
|
| A.3 | Signalling flows demonstrating a successful bootstrapping procedure p. 29
|
| A.4 | Signalling flows demonstrating a synchronization failure in the bootstrapping procedure p. 33
|
|
| A1 | Signalling flows of GBA Push procedure |R8| p. 36
| A1.1 | Scope of signalling flows p. 36
|
| A1.2 | Introduction p. 36
| A1.2.1 | General p. 36
|
| A1.2.2 | Key required to interpret signalling flows p. 36
|
|
| A1.3 | Signalling flows demonstrating a successful GBA Push procedure p. 36
|
|
| B | Signalling flows for HTTP Digest Authentication with bootstrapped security association p. 39
| B.1 | Scope of signalling flows p. 39
|
| B.2 | Introduction p. 39
| B.2.1 | General p. 39
|
| B.2.2 | Key required to interpret signalling flows p. 39
|
|
| B.3 | Signalling flows demonstrating a successful authentication procedure p. 39
|
|
| C | (Normative) XML Schema Definition p. 44
|
| D | Signalling flows for Authentication Proxy p. 45
| D.1 | Scope of signalling flows p. 45
|
| D.2 | Introduction p. 45
| D.2.1 | Key required to interpret signalling flows p. 45
|
|
| D.3 | Signalling flow demonstrating a successful authentication procedure p. 45
|
|
| E | Signalling flows for PKI portal p. 51
| E.1 | Scope of signalling flows p. 51
|
| E.2 | Introduction p. 51
| E.2.1 | General p. 51
|
| E.2.2 | Key required to interpret signalling flows p. 51
|
|
| E.3 | Signalling flows demonstrating a successful subscriber certificate enrolment p. 51
| E.3.1 | Simple subscriber certificate enrolment p. 51
|
| E.3.2 | Subscriber certificate enrolment with WIM authentication codes p. 55
|
|
| E.4 | Signalling flows demonstrating a failure in subscriber certificate enrolment p. 62
|
| E.5 | Signalling flows demonstrating a successful CA certificate delivery p. 62
|
| E.6 | Signalling flows demonstrating a failure in CA certificate delivery p. 66
|
|
| F | Signalling flows for PSK TLS with bootstrapped security association p. 67
| F.1 | Scope of signalling flows p. 67
|
| F.2 | Introduction p. 67
| F.2.1 | General p. 67
|
| F.2.2 | Key required to interpret signalling flows p. 67
|
|
| F.3 | Signalling flow demonstrating a successful PSK TLS authentication procedure p. 68
|
|
| G | (Normative) 3GPP specific extension-headers for HTTP entity-header fields p. 70
| G.1 | General p. 70
|
| G.2 | X-3GPP-Intended-Identity extension-header p. 70
|
| G.3 | X-3GPP-Asserted-Identity extension-header p. 71
|
| G.4 | X-3GPP-Authorization-Flags extension-header p. 71
|
|
| H | (Normative) 2G GBA |R7| p. 71
| H.1 | Introduction p. 71
|
| H.2 | 2G GBA bootstrapping procedure p. 71
|
| H.3 | User authentication failure p. 73
|
| H.4 | Network authentication failure p. 73
|
|
| I | (Normative) GBA_Digest |R11| p. 74
| I.1 | Introduction p. 74
|
| I.2 | GBA_Digest bootstrapping procedure p. 74
|
| I.3 | User authentication failure p. 75
|
| I.4 | Network authentication failure p. 75
|
|
| J | (Normative) Realization of GBA Push delivery |R11| p. 75
| J.1 | Introduction p. 75
|
| J.2 | GPI delivery using WAP Push p. 75
| J.2.1 | General p. 75
|
| J.2.2 | Push-NAF procedures p. 75
|
| J.2.3 | UE procedures p. 76
| J.2.3.1 | Reception of GPI in push message p. 76
|
|
|
| J.3 | PDUs and parameters specific to the present document p. 77
|
|
| K | (Normative) TLS with AKMA profiles |R17| p. 79
| K.1 | General p. 79
|
| K.2 | Shared key-based UE authentication with certificate-based AF authentication p. 79
|
| K.3 | Shared key-based mutual authentication between UE and AF p. 80
|
|
| $ | Change history p. 82
|