.
for requesting e2e security for a media stream is described step-by-step with an emphasis on the additional aspects for the MRFC and the MRFP of the e2e media protection using TLS and KMS.
Step 1.
The MRFC receives a trigger to create an ad-hoc conference. Depending on the KMS and a local policy, the MRFC will either interact with the KMS to obtain keys and a MIKEY-TICKET ticket usable for the IMS UE-B, or it will create the ticket by itself. In the latter case, MIKEY-TICKET mode 3 as specified in
RFC 6043 is used, and the MRFC will then perform all key and ticket generation functions otherwise performed by the KMS.
The MRFC generates the TRANSFER_INIT message according to
RFC 6043. The identities of the initiator and the responder in the message are the KMS user identities derived from the URI's in the To and From header fields in the SIP INVITE request.
A single Crypto Session is included in the TRANSFER_INIT message as described in
Annex H.3 of
TS 33.328. The protocol type in the Crypto Session is set to TLS.
Step 2. - 4.
The MRFC uses the "Reserve IMS resources" procedure to request a termination for "TCP/TLS/MSRP" media towards the IMS UE-B.
Step 5.
The MRFC creates an SDP offer with an MSRP based media over TLS transport protocol and inserts the
"a=setup:actpass" SDP attribute specified in
RFC 4145 and the key management protocol
"a=key-mgmt" SDP attribute specified in
RFC 4567 which indicates the use of the MIKEY-TICKET ticket and contains the TRANSFER_INIT message encapsulated in a keymgmt-data field.
Step 6.
The MRFC sends the SIP INVITE request with the SDP offer to the IMS UE-B.
Step 7.
Upon reception of the SIP INVITE request with the SDP offer containing a media stream that uses transport "TCP/TLS/MSRP", the IMS UE-B checks if it is authorized to resolve a ticket and if that is the case the IMS UE-B interacts with the KMS to resolve the ticket and receive keys.
Step 8.
The IMS UE-B includes the MIKEY-TICKET response in the TRANSFER_RESP message created according to
RFC 6043. The IMS UE-B inserts the key management protocol
"a=key-mgmt" SDP attribute specified in
RFC 4567.
The IMS UE-B sends the SIP 200 (OK) final response (or 18x provisional response) to the SIP INVITE request with an SDP answer.
Step 9. - 11.
After receiving the SIP 200 (OK) final response (or 18x provisional response) to the SIP INVITE request with the SDP answer the MRFC extracts a key management data from the keymgmt-data field and
"base64" decodes them to reconstruct the original TRANSFER-RESP message. The MRFC verifies the TRANSFER-RESP message according to
RFC 6043 and then verifies that the authenticated identity of the recipient corresponds to the policy for the MSRP session before completing the media security set-up.
The MRFC uses the
"Configure IMS resources" procedure to configure a termination towards the IMS UE-B with an IP address and port received from the IMS UE-B and includes a Pre-Shared Key information element containing the derived PSK i.e. the Traffic-Encrypting Key associated with the Crypto Session that will be used by the MRFP in TLS handshake. The MRFC includes a Notify TCP connection establishment Failure Event information element to request reporting of an unsuccessful TCP connection set-up and a Notify TLS session establishment Failure Event information element to request reporting of un unsuccessful TLS session set-up.
Step 12.
The IMS UE-B sends a TCP SYN message towards the MRFP to establish a TCP connection. The MRFP answers with a TCP SYN ACK message and the IMS UE-B replies with a TCP ACK message, completing the TCP connection establishment.
Step 13.
Upon completion of the TCP connection establishment, the IMS UE-B starts a TLS session establishment using the received Pre-Shared Key information element to set-up a TLS-PSK tunnel to protect MSRP messages.