S543 support of tls annex t normative gprs ims

Info icon This preview shows pages 6–9. Sign up to view the full content.

View Full Document Right Arrow Icon
S.5.4.3 Support of TLS ............................................................................................................................................. Annex T (normative): GPRS-IMS-Bundled Authentication (GIBA) for Gm interface ............... T.1 Introduction .......................................................................................................................................... T.2 Requirements ........................................................................................................................................ T.3 Threat Scenarios ................................................................................................................................. T.3.0 General ............................................................................................................................................................. T.3.1 Impersonation on IMS level using the identity of an innocent user ................................................................ T.3.2 IP spoofing ....................................................................................................................................................... T.3.3 Combined threat scenario ................................................................................................................................ 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 6 Release 12
Image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
T.4 GIBA Security Mechanism ................................................................................................................. T.5 Restrictions imposed by GIBA ........................................................................................................... T.6 Protection against IP address spoofing in GGSN ................................................................................ T.7 Interworking cases .............................................................................................................................. T.8 Message Flows ................................................................................................................................... T.8.1 Successful registration ..................................................................................................................................... T.8.2 Unsuccessful registration ................................................................................................................................. T.8.3 Successful registration for a selected interworking case ................................................................................. Annex U (normative): Trusted Node Authentication (TNA) ......................................................... U.1 Overview ............................................................................................................................................ U.2 Use case and detailed description ........................................................................................................ Annex V (informative) : NAT deployment considerations for GIBA .............................................. Annex W (normative): Tunnelling of IMS Services over Restrictive Access Networks ................ W.1 Overview ........................................................................................................................................... W.2 Service and Media Reachability for Users over Restrictive Firewalls – Tunneled Firewall Traversal for IMS traffic ..................................................................................................................... W.2.0 General ............................................................................................................................................................. W.2.1 Firewall detection procedure ........................................................................................................................... W.3 Service and Media Reachability for Users over Restrictive Firewalls – Extensions to STUN/TURN/ICE .............................................................................................................................. W.3.1 Introduction ...................................................................................................................................................... W.3.1.1 General ....................................................................................................................................................... W.3.1.2 Firewall traversal for IMS control plane using SIP over TLS/TCP ........................................................... W.3.1.3 Firewall traversal for IMS media plane using ICE and TURN .................................................................. W.3.2 Reference model .............................................................................................................................................. W.3.3 Required functions of the UE .......................................................................................................................... W.3.4 Required functions of the P-CSCF .................................................................................................................. W.3.5 Required functions of the TURN server .......................................................................................................... W.3.6 Required functions of the IMS-ALG and IMS-AGW ..................................................................................... Annex X (Normative): Security for WebRTC IMS Client access to IMS ...................................... X.1 Introduction ........................................................................................................................................ X.2 Authentication of WebRTC IMS Client with IMS subscription re-using existing IMS authentication mechanisms ................................................................................................................. X.2.0 General ............................................................................................................................................................. X.2.1 General requirements ....................................................................................................................................... X.2.2 Solution 1.1: Use of SIP Digest credentials ..................................................................................................... X.2.2.1 General ....................................................................................................................................................... X.2.2.2 Requirements ............................................................................................................................................. X.2.2.3 Procedures .................................................................................................................................................. X.2.3 Solution 1.2: Use of IMS AKA ....................................................................................................................... X.2.3.1 General ....................................................................................................................................................... X.2.3.2 Requirements ............................................................................................................................................. X.2.3.3 Procedures .................................................................................................................................................. X.3 Authentication of WebRTC IMS Client with IMS subscription using web credentials ....................... X.3.0 General ............................................................................................................................................................. X.3.1 General requirements ....................................................................................................................................... X.3.2 Solution 2.1 ...................................................................................................................................................... X.3.2.1 General ....................................................................................................................................................... X.3.2.2 Requirements ............................................................................................................................................. X.3.2.3 Procedures .................................................................................................................................................. 3GPP 3GPP TS 33.203 V12.67.0 (2014-0609) 7 Release 12
Image of page 7
X.4 Assignment of IMS identities to WebRTC IMS Client from pool of IMS subscriptions held by WWSF ................................................................................................................................................ X.4.0 General ............................................................................................................................................................. X.4.1 General requirements ....................................................................................................................................... X.4.2 Solution 3.1 ...................................................................................................................................................... X.4.2.1 General ....................................................................................................................................................... X.4.2.2 Requirements ............................................................................................................................................. X.4.2.3 Procedures .................................................................................................................................................. Annex Y (informative): Change history ............................................................................................ Foreword .......................................................................................................................................................... 1 ........................................................................................................................................................ Scope .............................................................................................................................................................. 2 ................................................................................................................................................ References .............................................................................................................................................................. 3 .................................................................................................... Definitions, symbols and abbreviations .............................................................................................................................................................. 3.1 Definitions ......................................................................................................................................................... 3.2 Symbols ............................................................................................................................................................. 3.3 Abbreviations ..................................................................................................................................................... 4 ....................................................................................................... Overview of the security architecture .............................................................................................................................................................. 5 ....................................................................................................................................... Security features .............................................................................................................................................................. 5.1 Secure access to IMS ......................................................................................................................................... 5.1.1 Authentication of the subscriber and the network ....................................................................................... 5.1.2 Re-Authentication of the subscriber ............................................................................................................ 5.1.3 Confidentiality protection ............................................................................................................................ 5.1.4 Integrity protection ....................................................................................................................................... 5.2 Network topology hiding ................................................................................................................................... 5.3 SIP Privacy handling in IMS Networks .............................................................................................................
Image of page 8

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern