Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.328
Word version: 18.1.0
0…
4…
A…
A
HTTP based key management messages
B
KMS based key management
C
SRTP profiling for IMS media plane security
D
MIKEY-TICKET profile for IMS media plane security
E
Profiling of SDES
F
IMS media plane security for immediate messaging
G
IMS media plane security for conferencing
H
Setup of TLS-PSK using MIKEY-TICKET
I
Pre-shared key MIME protection
J
IANA considerations
K
MIKEY general extension payload for message proof-of-origin
L
IMS media plane security for T.38 fax
M
TLS profile for IMS media plane security
N
IMS media plane security interworking for WebRTC access to IMS and IMS data channels
O
Profiling of DTLS-SRTP
P
Security aspects of next generation real time communication services
P.1
Security aspects of SBA in IMS media control interface
$
Change history
A
(Normative) HTTP based key management messages
p. 49
A.1
General aspects
p. 49
A.2
Key management procedures
p. 49
A.3
Error situations
p. 50
B
(Normative) KMS based key management
p. 51
B.1
UE originating procedures
p. 51
B.1.1
Preconditions
p. 51
B.1.2
Procedures
p. 51
B.2
UE terminating procedures
p. 52
B.2.1
General
p. 52
B.2.2
Procedures for the case with one KMS domain
p. 52
B.2.2.1
Preconditions
p. 52
B.2.2.2
Procedures
p. 52
B.2.3
Procedures for the case with two KMS domains
p. 53
B.2.3.1
Preconditions
p. 53
B.2.3.2
Procedures
p. 53
C
(Normative) SRTP profiling for IMS media plane security
p. 55
D
(Normative) MIKEY-TICKET profile for IMS media plane security
p. 56
D.1
Scope
p. 56
D.2
General
p. 56
D.2A
Keys, RANDs and algorithms
p. 56
D.3
Exchanges
p. 56
D.3.1
Ticket Request
p. 56
D.3.2
Ticket Transfer
p. 57
D.3.3
Ticket Resolve
p. 57
D.4
Profiling of tickets
p. 57
E
(Normative) Profiling of SDES
p. 59
F
(Normative) IMS media plane security for immediate messaging
p. 60
F.1
Void
F.2
Security for immediate messaging based on SIP signalling security
p. 60
F.3
Security for immediate messaging based on MIKEY-TICKET
p. 60
F.3.1
UE sends a SIP MESSAGE
p. 60
F.3.2
UE receives a SIP MESSAGE
p. 61
F.3.3
List server forwards a SIP MESSAGE to multiple recipients using a PSI
p. 62
F.3.4
List server forwards a SIP MESSAGE to multiple recipients using a URI-list
p. 62
G
(Normative) IMS media plane security for conferencing
p. 63
G.1
General aspects
p. 63
G.2
Security for conferencing based on SIP signalling security
p. 63
G.3
Security for conferencing based on MIKEY-TICKET
p. 64
G.3.1
Conference creation and policy control
p. 64
G.3.2
User joining a secure conference
p. 65
G.3.3
Subscribing to conference event package
p. 65
H
(Normative) Setup of TLS-PSK using MIKEY-TICKET
p. 66
H.1
The TLS Prot Type
p. 66
H.2
Establishing a TLS connection
p. 67
H.3
Usage with SDP
p. 67
I
(Normative) Pre-shared key MIME protection
p. 68
I.1
The smime-type parameter
p. 68
I.2
The Auth-Enveloped S/MIME type
p. 68
I.2.1
General
p. 68
I.2.2
Creating an Auth-Enveloped message
p. 69
I.3
Transferring KEK using MIKEY-TICKET
p. 69
I.4
MIKEY-TICKET profile for pre-shared key MIME protection
p. 70
J
(Normative) IANA considerations
p. 72
J.1
IANA assignments
p. 72
K
(Normative) MIKEY general extension payload for message proof-of-origin
p. 72
K.1
Payload format
p. 72
L
(Normative) IMS media plane security for T.38 fax
p. 73
L.1
Introduction
p. 73
L.2
Use cases
p. 73
L.3
e2ae security for T.38 fax using DTLS
p. 74
M
(Normative) TLS profile for IMS media plane security
p. 75
M.1
General
p. 75
N
(Normative) IMS media plane security interworking for WebRTC access to IMS and IMS data channels
p. 76
N.1
General
p. 76
N.2
Media security for RTP
p. 76
N.2.1
General
p. 76
N.2.2
e2ae security for RTP using DTLS-SRTP
p. 76
N.3
Media security for WebRTC and IMS data channels
p. 77
N.3.1
General
p. 77
N.3.2
e2ae security for WebRTC data channels
p. 79
N.3.3
e2DCe security for IMS data channels
p. 80
N.3.4
e2e security for IMS data channels
p. 80
O
(Normative) Profiling of DTLS-SRTP
p. 82
P
(Normative) Security aspects of next generation real time communication services
p. 83
P.1
Security aspects of SBA in IMS media control interface
p. 83
P.1.1
General
p. 83
P.1.2
Protection at the network or transport layer
p. 83
P.1.3
Authentication and authorization
p. 83
$
Change history
p. 84