| |
| 0 | Introduction p. 8
|
| 1 | Scope p. 9
|
| 2 | References p. 9
|
| 3 | Definitions, symbols and abbreviations p. 11
| 3.1 | Definitions p. 11
|
| 3.2 | Symbols p. 12
|
| 3.3 | Abbreviations p. 12
|
|
| 4 | IMS media plane security overview p. 12
| 4.1 | Introduction p. 12
| 4.1.1 | General p. 12
|
| 4.1.2 | Overview of key management solutions for IMS media plane security p. 13
| 4.1.2.1 | SDES based solution p. 13
|
| 4.1.2.2 | KMS based solution p. 13
|
| 4.1.2.3 | Certificate fingerprints based solution for e2ae TLS/DTLS p. 14
|
| 4.1.2.4 | Certificate fingerprints based solution for e2DCe DTLS p. 14
|
| 4.1.2.5 | Certificate fingerprints based solution for e2e DTLS p. 14
|
|
|
| 4.2 | IMS media plane security architecture p. 15
| 4.2.1 | General p. 15
|
| 4.2.2 | E2ae security p. 15
|
| 4.2.3 | E2e security using SDES p. 16
|
| 4.2.4 | E2e security using KMS p. 16
|
| 4.2.5 | E2DCe security p. 17
|
| 4.2.6 | E2e security for IMS Data Channels p. 18
|
|
|
| 5 | IMS media plane security features p. 18
| 5.1 | General p. 18
|
| 5.2 | Media integrity protection p. 19
|
| 5.3 | Media confidentiality protection p. 19
|
| 5.4 | Authentication and authorization p. 19
| 5.4.1 | Authentication and authorization for e2ae protection p. 19
|
| 5.4.2 | Authentication and authorization for e2e protection using SDES p. 20
|
| 5.4.3 | Authentication and authorization for e2e protection using KMS p. 20
|
| 5.4.4 | Authentication and authorization for e2DCe protection p. 21
|
| 5.4.5 | Authentication and authorization for e2e protection using DTLS p. 21
|
|
| 5.5 | Security properties of key management, distribution and derivation p. 21
| 5.5.1 | General security properties for protection using SDES p. 21
|
| 5.5.2 | Additional security properties for e2ae protection using SDES p. 22
|
| 5.5.3 | Security properties for e2e protection using KMS p. 22
|
| 5.5.4 | Security properties for e2ae protection using TLS/DTLS p. 22
|
| 5.5.5 | Security properties for e2ae protection using DTLS-SRTP p. 23
|
| 5.5.6 | Security properties for e2DCe protection using DTLS p. 23
|
|
|
| 6 | Security mechanisms p. 23
| 6.1 | Media security mechanisms p. 23
| 6.1.1 | Media security mechanisms for real-time traffic p. 23
|
| 6.1.2 | Media security mechanisms for session based messaging (MSRP) p. 23
|
| 6.1.3 | Media security mechanisms for IMS data channels p. 24
|
|
| 6.2 | Key management mechanisms for media protection p. 24
| 6.2.1 | Key management mechanisms for e2ae protection p. 24
| 6.2.1.1 | Endpoints for e2ae protection p. 24
|
| 6.2.1.2 | Key management protocol for e2ae protection p. 24
|
| 6.2.1.3 | Functional extension of the Iq interface for e2ae protection p. 25
| 6.2.1.3.1 | Functional extension of the Iq interface for e2ae protection for RTP p. 25
|
| 6.2.1.3.2 | Functional extension of the Iq interface for e2ae protection for MSRP p. 25
|
|
|
| 6.2.2 | Key management mechanisms for e2e protection using SDES p. 25
|
| 6.2.3 | Key management mechanisms for e2e protection using KMS p. 26
| 6.2.3.1 | General p. 26
|
| 6.2.3.2 | KMS user and user group identities p. 26
|
| 6.2.3.3 | IMS UE local policies p. 27
|
| 6.2.3.4 | Ticket data p. 27
| 6.2.3.4.1 | Ticket format p. 27
|
| 6.2.3.4.2 | Allocation of ticket subtype and version for ticket type 2 p. 27
|
|
| 6.2.3.5 | Authentication of public identities in REQUEST_INIT and RESOLVE_INIT p. 27
|
| 6.2.3.6 | Authentication of terminating user identity p. 27
|
| 6.2.3.7 | Reusable tickets p. 28
|
| 6.2.3.8 | Signalling between KMSs p. 28
|
|
| 6.2.4 | Key management mechanisms for e2DCe protection p. 28
| 6.2.4.1 | Endpoints for e2DCe protection p. 28
|
| 6.2.4.2 | Key management protocol for e2DCe protection p. 28
|
| 6.2.4.3 | Functional extension of the Mw, ISC, and DC2 interfaces for e2DCe protection p. 29
| 6.2.4.3.1 | Functional extension of the Mw, ISC, and DC2 interfaces for e2Dce protection for IMS data channel p. 29
|
|
|
|
|
| 7 | Security association set-up procedures for media protection p. 29
| 7.1 | IMS UE registration procedures p. 29
| 7.1.1 | Indication of support for e2ae security for RTP based media p. 29
|
| 7.1.2 | Indication of support for e2ae security for MSRP p. 30
|
| 7.1.3 | Indication of support for e2DCe security for IMS data channel p. 30
|
|
| 7.2 | IMS UE originating procedures p. 30
| 7.2.1 | IMS UE originating procedures for e2ae p. 30
|
| 7.2.2 | IMS UE originating procedures for e2e using SDES p. 33
|
| 7.2.3 | IMS UE originating procedures for e2e using KMS p. 35
|
| 7.2.4 | IMS UE originating procedures for e2DCe p. 36
|
| 7.2.5 | IMS UE originating procedures for e2e using TLS/DTLS certificate / fingerprint p. 38
|
|
| 7.3 | UE terminating procedures p. 39
| 7.3.1 | UE terminating procedures for e2ae p. 39
|
| 7.3.2 | IMS UE terminating procedures for e2e using SDES p. 42
|
| 7.3.3 | IMS UE terminating procedures for e2e using KMS p. 44
|
| 7.3.4 | UE terminating procedures for e2DCe p. 45
|
| 7.3.5 | IMS UE terminating procedures for e2e using TLS/DTLS certificate / fingerprint p. 47
|
|
| 7.4 | Session update procedures p. 47
|
| 7.5 | Handling of emergency calls p. 47
|
|
| A | (Normative) HTTP based key management messages p. 48
| A.1 | General aspects p. 48
|
| A.2 | Key management procedures p. 48
|
| A.3 | Error situations p. 49
|
|
| B | (Normative) KMS based key management p. 50
| B.1 | UE originating procedures p. 50
|
| B.2 | UE terminating procedures p. 51
| B.2.1 | General p. 51
|
| B.2.2 | Procedures for the case with one KMS domain p. 51
|
| B.2.3 | Procedures for the case with two KMS domains p. 52
|
|
|
| C | (Normative) SRTP profiling for IMS media plane security p. 54
|
| D | (Normative) MIKEY-TICKET profile for IMS media plane security p. 55
| D.1 | Scope p. 55
|
| D.2 | General p. 55
|
| D.2A | Keys, RANDs and algorithms p. 55
|
| D.3 | Exchanges p. 55
| D.3.1 | Ticket Request p. 55
|
| D.3.2 | Ticket Transfer p. 56
|
| D.3.3 | Ticket Resolve p. 56
|
|
| D.4 | Profiling of tickets p. 56
|
|
| E | (Normative) Profiling of SDES p. 58
|
| F | (Normative) IMS media plane security for immediate messaging p. 59
| F.1 | Void p. …
|
| F.2 | Security for immediate messaging based on SIP signalling security p. 59
|
| F.3 | Security for immediate messaging based on MIKEY-TICKET p. 59
| F.3.1 | UE sends a SIP MESSAGE p. 59
|
| F.3.2 | UE receives a SIP MESSAGE p. 60
|
| F.3.3 | List server forwards a SIP MESSAGE to multiple recipients using a PSI p. 61
|
| F.3.4 | List server forwards a SIP MESSAGE to multiple recipients using a URI-list p. 61
|
|
|
| G | (Normative) IMS media plane security for conferencing p. 62
| G.1 | General aspects p. 62
|
| G.2 | Security for conferencing based on SIP signalling security p. 62
|
| G.3 | Security for conferencing based on MIKEY-TICKET p. 63
| G.3.1 | Conference creation and policy control p. 63
|
| G.3.2 | User joining a secure conference p. 64
|
| G.3.3 | Subscribing to conference event package p. 64
|
|
|
| H | (Normative) Setup of TLS-PSK using MIKEY-TICKET p. 65
| H.1 | The TLS Prot Type p. 65
|
| H.2 | Establishing a TLS connection p. 66
|
| H.3 | Usage with SDP p. 66
|
|
| I | (Normative) Pre-shared key MIME protection p. 67
| I.1 | The smime-type parameter p. 67
|
| I.2 | The Auth-Enveloped S/MIME type p. 67
| I.2.1 | General p. 67
|
| I.2.2 | Creating an Auth-Enveloped message p. 68
|
|
| I.3 | Transferring KEK using MIKEY-TICKET p. 68
|
| I.4 | MIKEY-TICKET profile for pre-shared key MIME protection p. 69
|
|
| J | (Normative) IANA considerations p. 71
| J.1 | IANA assignments p. 71
|
|
| K | (Normative) MIKEY general extension payload for message proof-of-origin p. 71
|
| L | (Normative) IMS media plane security for T.38 fax p. 72
| L.1 | Introduction p. 72
|
| L.2 | Use cases p. 72
|
| L.3 | e2ae security for T.38 fax using DTLS p. 73
|
|
| M | (Normative) TLS profile for IMS media plane security p. 74
|
| N | (Normative) IMS media plane security interworking for WebRTC access to IMS and IMS data channels p. 75
| N.1 | General p. 75
|
| N.2 | Media security for RTP p. 75
| N.2.1 | General p. 75
|
| N.2.2 | e2ae security for RTP using DTLS-SRTP p. 75
|
|
| N.3 | Media security for WebRTC and IMS data channels p. 76
| N.3.1 | General p. 76
|
| N.3.2 | e2ae security for WebRTC data channels p. 78
|
| N.3.3 | e2DCe security for IMS data channels p. 79
|
| N.3.4 | e2e security for IMS data channels p. 80
|
|
|
| O | (Normative) Profiling of DTLS-SRTP p. 81
|
| P | (Normative) Security aspects of next generation real time communication services p. 82
| P.1 | Security aspects of SBA in IMS media control interface p. 82
| P.1.1 | General p. 82
|
| P.1.2 | Protection at the network or transport layer p. 82
|
| P.1.3 | Authentication and authorization p. 82
|
|
|
| Q | (Normative) Security and privacy for IMS capability exposure p. 83
| Q.1 | General p. 83
|
| Q.2 | Security requirements p. 83
|
| Q.3 | Procedures p. 83
|
|
| R | (Normative) Security for IMS avatar communication p. 84
| R.1 | General p. 84
|
| R.2 | Security requirements p. 84
|
| R.3 | Security Procedures p. 84
|
|
| $ | Change history p. 86
|