Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.203
Word version: 18.1.0
1…
4
5…
6…
7…
8…
G…
M…
N…
O…
P…
T…
X…
T
GPRS-IMS-Bundled Authentication (GIBA) for Gm interface
T.1
Introduction
T.2
Requirements
T.3
Threat Scenarios
T.4
GIBA Security Mechanism
T.5
Restrictions imposed by GIBA
T.6
Protection against IP address spoofing in GGSN
T.7
Interworking cases
T.8
Message Flows
U
Trusted Node Authentication (TNA)
U.1
Overview
U.2
Use case and detailed description
V
NAT deployment considerations for GIBA
W
Tunnelling of IMS Services over Restrictive Access Networks
W.1
Overview
W.2
Service and Media Reachability for Users over Restrictive Firewalls - Tunneled Firewall Traversal for IMS traffic
W.3
Service and Media Reachability for Users over Restrictive Firewalls - Extensions to STUN/TURN/ICE
T
(Normative) GPRS-IMS-Bundled Authentication (GIBA) for Gm interface
|R8|
p. 99
T.1
Introduction
p. 99
T.2
Requirements
p. 99
T.3
Threat Scenarios
p. 100
T.3.0
General
|R12|
p. 100
T.3.1
Impersonation on IMS level using the identity of an innocent user
p. 100
T.3.2
IP spoofing
p. 100
T.3.3
Combined threat scenario
p. 100
T.4
GIBA Security Mechanism
p. 101
T.5
Restrictions imposed by GIBA
p. 101
T.6
Protection against IP address spoofing in GGSN
p. 102
T.7
Interworking cases
p. 102
T.8
Message Flows
p. 105
T.8.1
Successful registration
p. 105
T.8.2
Unsuccessful registration
p. 106
T.8.3
Successful registration for a selected interworking case
p. 108
U
(Normative) Trusted Node Authentication (TNA)
|R8|
p. 111
U.1
Overview
p. 111
U.2
Use case and detailed description
p. 111
V
NAT deployment considerations for GIBA
|R9|
p. 114
W
(Normative) Tunnelling of IMS Services over Restrictive Access Networks
|R12|
p. 115
W.1
Overview
p. 115
W.2
Service and Media Reachability for Users over Restrictive Firewalls - Tunneled Firewall Traversal for IMS traffic
p. 115
W.2.0
General
p. 115
W.2.1
Firewall detection procedure
p. 116
W.3
Service and Media Reachability for Users over Restrictive Firewalls - Extensions to STUN/TURN/ICE
p. 117
W.3.1
Introduction
p. 118
W.3.1.1
General
p. 118
W.3.1.2
Firewall traversal for IMS control plane using SIP over TLS/TCP
p. 118
W.3.1.3
Firewall traversal for IMS media plane using ICE and TURN
p. 118
W.3.2
Reference model
p. 119
W.3.3
Required functions of the UE
p. 119
W.3.4
Required functions of the P-CSCF
p. 120
W.3.5
Required functions of the TURN server
p. 120
W.3.6
Required functions of the IMS-ALG and IMS-AGW
p. 120