Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.829
Word version: 12.0.0
0…
4…
4
Overview
5
IMS conferencing
6
SRVCC
7
Services for user groups with high security requirements
8
IMS messaging
9
Communications diversion
10
Mid-call lawful Interception
11
IMS T.38 fax
12
Conclusions
A
IANA considerations
B
Pre-shared key MIME protection
C
MIKEY general extension payload for 3GPP ad-hoc conferencing
D
Setup of TLS-PSK using MIKEY
E
MIKEY-TICKET profile for pre-shared key MIME protection
F
MIKEY general extension payload for message proof-of-origin
$
Change history
4
Overview
p. 9
5
IMS conferencing
p. 9
5.1
Introduction
p. 9
5.1.1
General
p. 9
5.1.2
Immediate security observations/requirements
p. 10
5.1.3
Requirements
p. 11
5.2
Use cases
p. 12
5.2.1
Ad hoc conferencing
p. 12
5.2.1.1
Main events
p. 12
5.2.1.2
Three party conferencing
p. 12
5.2.2
Planned conferences
p. 13
5.3
Solution(s)
p. 13
5.3.1
General
p. 13
5.3.1.1
Policies for secure conferences
p. 13
5.3.1.2
Group keys versus bilateral keys
p. 13
5.3.2
SDES-based solution
p. 14
5.3.2.1
Discussion
p. 14
5.3.2.2
Recommended Solution
p. 16
5.3.3
KMS-based solution
p. 17
5.3.3.1
Introduction
p. 17
5.3.3.2
Overview of the solution
p. 17
5.3.3.3
Secure conference creation with a conference factory URI
p. 18
5.3.3.4
Inviting other users to a secure conference
p. 19
5.3.3.4.1
Conference creator includes an URI list at conference creation
p. 19
5.3.3.4.2
Conference creator sends REFER to conference focus
p. 20
5.3.3.4.3
Conference creator sends REFER to other user
p. 23
5.3.3.5
User joining a secure conference
p. 24
5.3.3.6
Subscription to conference event package
p. 25
6
SRVCC
p. 25
6.1
Introduction
p. 25
6.2
Use case description
p. 26
6.3
Solution(s)
p. 26
7
Services for user groups with high security requirements
p. 27
7.1
General
p. 27
7.2
Use cases
p. 27
7.3
Solution(s)
p. 27
7.3.1
MIKEY-IBAKE
p. 27
8
IMS messaging
p. 28
8.1
Introduction
p. 28
8.1.1
General
p. 28
8.1.2
Immediate security observations
p. 29
8.2
Use cases
p. 29
8.2.1
Immediate messaging
p. 29
8.2.1.1
General
p. 29
8.2.1.2
Deferred delivery
p. 30
8.2.1.3
Multiple recipients
p. 31
8.2.2
Session-based messaging
p. 31
8.2.2.1
(One-to-one) session-based messaging
p. 31
8.2.2.2
Session-based conference messaging
p. 32
8.3
Solution(s)
p. 33
8.3.1
KMS-based solution
p. 33
8.3.1.1
Immediate messaging
p. 33
8.3.1.1.1
UE sends a SIP MESSAGE
p. 33
8.3.1.1.2
UE receives a SIP MESSAGE
p. 34
8.3.1.1.3
List server forwards a SIP MESSAGE to multiple recipients using a PSI
p. 34
8.3.1.1.4
List server forwards a SIP MESSAGE to multiple recipients using a URI-list
p. 34
8.3.1.2
One-to-one session based messaging
p. 34
8.3.1.3
Session based messaging conferences
p. 35
8.3.2
Solutions that leverage IMS control plane security
p. 35
8.3.2.1
Immediate messaging
p. 35
8.3.2.2
One-to-one session based messaging
p. 35
8.3.2.2.1
General
p. 35
8.3.2.2.2
E2m security for one-to-one session based messaging
p. 36
8.3.2.2.2.1
Terminating security at an AS
p. 36
8.3.2.2.2.2
Terminating security at the IMS access gateway
p. 37
8.3.2.2.3
Hop-by-hop security for one-to-one session based messaging
p. 37
8.3.2.3
Session based messaging conferences
p. 38
8.3.2.4
Preferred approach for IMS messaging security that leverages IMS control plane security
p. 38
8.3.2.4.1
Security for immediate messaging using SIP MESSAGE messages leveraging IMS control plane security
p. 38
8.3.2.4.2
Security for session based messaging using MSRP leveraging IMS control plane security
p. 39
9
Communications diversion
p. 39
9.1
Introduction
p. 39
9.2
Use cases and requirements
p. 40
9.3
Solution(s)
p. 41
9.3.1
SDES-based solution
p. 41
9.3.1.4
Recommended solution
p. 42
9.3.2
KMS-based solution
p. 42
9.3.2.1
General
p. 42
9.3.2.2
KMS-based solution number 1
p. 42
9.3.2.3
KMS-based solution number 2
p. 44
10
Mid-call lawful Interception
p. 45
10.1
Introduction
p. 45
10.2
Use cases
p. 45
10.3
Solutions
p. 45
10.3.1
Carrying key recovery material in MKI field
p. 45
10.3.2
Use locally stored information
p. 45
11
IMS T.38 fax
p. 46
11.1
Introduction
p. 46
11.2
Use cases
p. 46
11.3
Analysis
p. 47
11.4
E2ae security for T.38 fax using DTLS
p. 47
12
Conclusions
p. 47
12.1
IMS messaging security
p. 47
12.2
IMS conferencing security
p. 48
12.3
IMS call diversion security
p. 48
12.4
Mid-call start of intercept
p. 48
12.5
IMS T.38 fax security
p. 48
A
IANA considerations
p. 50
A.1
IANA assignments
p. 50
B
Pre-shared key MIME protection
p. 51
B.1
New smime-type parameter
p. 51
B.2
Creating an Auth-Enveloped message
p. 51
B.3
Using MIKEY-TICKET to transfer the protection key
p. 52
C
MIKEY general extension payload for 3GPP ad-hoc conferencing
p. 53
C.1
Payload format
p. 53
D
Setup of TLS-PSK using MIKEY
p. 53
D.1
The TLS Prot Type
p. 53
D.2
Establishing a TLS connection
p. 54
D.3
Usage with SDP
p. 55
E
MIKEY-TICKET profile for pre-shared key MIME protection
p. 55
F
MIKEY general extension payload for message proof-of-origin
p. 56
F.1
Payload format
p. 56
$
Change history
p. 56