Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.872  Word version:  13.0.0

Top   Top   None   None   Next
1…   4…

 

1  Scopep. 5

The present document contains a study on security issues following the potential modifications of the IMS architecture and stage 2 procedures as required by the support of eWebRTCi (Enhancements to WEBRTC interoperability).
In particular, the present document focuses on:
  • Support for end to end WebRTC security, subject to regulatory constraints, that avoids conversion between WebRTC and IMS security protocols , including the feasibility of end to end security aspects
  • Third-party WebRTC access in the case where the 3rd party allocates IMS identities from a block where the associated subscription corresponds to a class of users supported by the WebRTC environment (e.g., enterprise associates) rather than a single end user
Up

2  Referencesp. 5

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TR 41.001: "GSM Release specifications".
→ to date, withdrawn by 3GPP
[3]
TR 21 912 (V3.1.0): "Example 2, using fixed text".
→ to date, withdrawn by 3GPP
[4]
https://tools.ietf.org/html/rfc5766: Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
[5]
http://tools.ietf.org/html/rfc5389: Session Traversal Utilities for NAT (STUN)
[6]
http://tools.ietf.org/html/rfc7376: Problems with Session Traversal Utilities for NAT (STUN) Long-Term Authentication for Traversal Using Relays around NAT (TURN)
[7]
https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-01: OAuth 2.0 Proof-of-Possesson (PoP) Security Architecture
[8]
https://tools.ietf.org/html/draft-ietf-oauth-pop-key-distribution-01: OAuth 2.0 Proof-of-Possession: Authorization Server to Client Key Distribution
[9]
https://tools.ietf.org/html/draft-ietf-tram-turn-third-party-authz-13: Session Traversal Utilities for NAT (STUN) Extension for Third Party Authorization
[10]
TS 33.328: "IP Multimedia (IMS) media plane security".
[11]
TS 23.228: "IP Multimedia Subsystem (IMS)"
[12]
TS 33.203: "Access security for IP-based services"
[13]
TS 23.334: "IP Multimedia Subsystem (IMS) Application Level Gateway (IMS-ALG) - IMS Access Gateway (IMS-AGW) interface: Procedures descriptions"
[14]
TS 33.871: "Study on security for Web Real Time Communications (WebRTC) IP Multimedia Subsystem (IMS) client access to IMS" (Release 12)
[15]
TR 23.706: "TR on Architectural enhancements to support webRTC interworking"
[16]
TR 33.871: "Study on security for Web Real Time Communications (WebRTC) IP Multimedia Subsystem (IMS) client access to IMS"
Up

3  Definitions and abbreviationsp. 6

3.1  Definitionsp. 6

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.

3.2  Abbreviationsp. 6

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply.
An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.

Up   Top   ToC