3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany



Similar documents
2. Archtiecture overview related to support for use of a reverse http proxy

Security considerations for IMS access independence

ETSI TS V5.1.0 ( )

TSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, March 2005,Tokyo, Japan

ETSI TR V6.1.0 ( )

3GPP TSG CN Plenary Meeting #16 5 th - 7 th June Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N Budapest, Hungary,

A Call Conference Room Interception Attack and its Detection

3GPP TS V ( )

Implementing Conditional Conference Call Use Case over IMS and Non IMS Testbed an experimental results through comparison approach

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

End-to-End Quality-of-Service Support in Next Generation Networks with NSIS

Delivery of Voice and Text Messages over LTE

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

Location in SIP/IP Core (LOCSIP)

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

GAA/GBA: a new Architecture for single sign-on

Authentication and Security in IP based Multi Hop Networks

CHANGE REQUEST. 2 (GSM Phase 2) A (corresponds to a correction in an earlier release) R96 (Release 1996) B (addition of feature),

Design Document. Offline Charging Server (Offline CS ) Version i -

A Proposed Model For QoS guarantee In IMSbased Video Conference services

A Scenario of Machine-to-Machine (M2M) Health Care Service

3GPP TR V ( )

Advanced SIP Series: SIP and 3GPP

ETSI TS V2.1.1 ( ) Technical Specification

Architectural Overview of IP Multimedia Subsystem -IMS

Load Balancing Support for Self-Organizing IMS Networks

Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

XML Document Management Architecture

ETSI TS V6.8.0 ( ) Technical Specification

3GPP TS V8.1.0 ( )

LTE and the Evolution to 4G Wireless

Acme Packet Net-Net SIP Multimedia-Xpress

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

Investigation of Interworked IMS Architecture In Terms Of Traffic Security

Secured Communications using Linphone & Flexisip

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Securing IP Networks with Implementation of IPv6

MED: Voice over IP systems

Authentication, Authorization and Accounting (AAA) Protocols

Juha Heinänen

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

Mobility and cellular networks

Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures

Implementing LTE International Data Roaming

End-2-End QoS Provisioning in UMTS networks

Table of Content. Introduction Components Architectural Characteristics Concepts Protocols Service Examples Discussion. ToC

Chapter 17. Transport-Level Security

How To Understand The Security Of An Ip Multimedia Subsystem (Ims)

Security and Authentication Concepts

ETSI TS V8.4.0 ( )

Application Note. Onsight Connect Network Requirements v6.3

Voice Quality with VoLTE

Experiences on the Establishment and Provisioning of NGN/IMS Testbeds - The FOKUS Open IMS Playground and the Related Open Source IMS Core

Presence SIMPLE Architecture

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ARIB TR-T V7.0.0

Kommunikationsdienste im Internet Möglichkeiten und Risiken

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Advanced SIP Series: SIP and 3GPP Operations

II. Service deployment

PacketCable 2.0. HSS Technical Report PKT-TR-HSS-V RELEASED. Notice

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

Migration of Enterprise VoIP/SIP Solutions towards IMS

RadSec RADIUS improved. Stig Venaas

SIP Based Architecture for Integration of 1xRTT Femtocells

IMS Release 10 Tutorial

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

IMS Interconnect: Peering, Roaming and Security Part One

Packet Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Research on Initial Filter Criteria of IP Multimedia Subsystem

7.1. Remote Access Connection

Lecture 4b AAA protocols (Authentication Authorization Accounting)

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Communication Services in the Cloud: Challenges and Solutions Oracle Communications Session Monitor

ETSI TS V1.7.1 ( ) Technical Specification

All-IP Network Emergency Call Support

Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

ETSI TS V3.3.1 ( ) Technical Specification

SIP : Session Initiation Protocol

ETSI TS V ( ) Technical Specification

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

Performance Estimation of a SIP based Push-to-Talk Service for 3G Networks

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

ETSI TS V ( ) Technical Specification

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

The FOKUS Open SIP AS - A Service Platform for NGN

Securing the Interconnect Signaling Network Security

Transcription:

3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security Issues with use of HTTP within IMS SA3 SA2 SA1, SA5 Contact Person: Name: Tao Haukka Company: Nokia Corporation Tel. Number: +358 40 5170079 E-mail Address: tao.haukka@nokia.com Attachments: S3-020528, HTTP security 1. Overall Description: SA3 would like to thank to SA2 for communicating their Liaison statement on the usage of HTTP within release 6. As requested, SA3 have investigated a potential solution (S3-020528, attached) to provide security for HTTP data channel within IMS for service related purposes. It is however unclear to SA3 what services shall utilize HTTP and what functionalities to be achieved. SA3 also kindly remind that the architecture choices made by SA2 may have impact to the security solution, therefore the solution attached should be considered as one of the options but not as SA3 s approved one at current stage. 2. Actions: To SA2 group: SA3 is looking forward to SA2 s response to clarify the services utilizing HTTP and the functionalities to be achieved. 3. Date of next SA3 Meetings: SA3 #26 19 22 Nov. 2002 Oxford, UK. SA3#27 25-28 Feb. 2003 TBC

3GPP TSG SA WG3 Security S3#25 S3-020528 8-11 October 2002 Munich, Germany 1 Source: Title: Document for: Nokia HTTP Security Discussion /Decision Agenda Item: 7.17 Abstract This paper is a study of HTTP security under request from SA2 WG. One solution very much based on IETF existing protocol is presented. It also combines 3GPP Digest AKA for authentication as advantage. 1. Introduction SA2 is currently working on a number of IMS related work items for release 6 including the stage 2 for the Presence Service. Proposals have been presented in SA2 suggesting the use of HTTP within IMS for various service-related purposes. It has also been identified within SA2 that there are possible Security and Charging issues currently with the use of HTTP as part of the IMS. Though they have not yet identified any particular use scenarios for HTTP however it is likely that such scenarios will be identified by SA2 within release 6. SA2 asked SA3 and SA5 to comment and investigate potential security and charging issues related to the use of HTTP within IMS for service related purposes (e.g. for UE control of service provisioning and manipulation of service related data, etc) [1]. This discussion paper is based on S2 s LS S2-022609, which requests SA3 s investigation on Security issues in use of HTTP with IMS. We have studied security implementations and one potential solution, where Authentication Proxy (AP), is introduced. It takes care of security on behalf of certain application servers e.g. Presence. As such the HTTP security function can be implemented with IMS system rather independently and efficiently. We have also compared potential security protocols for HTTP security, namely IPsec and TLS. 2. HTTP Security 2.1. User authentication in the home network By using the Authentication Proxy (AP) it is possible to authenticate UE on behalf of all Application services, based on AKA protocol. Only one HTTP security association is created between UE and Authentication Proxy. UE shall be able to initiate an HTTP session. In this case, user authentication is performed between UE and AP using AKA over HTTP Digest, so the user does not need to have any password-like in the original design of HTTP Digest. Authentication Vectors (AV) for HTTP connection can be fetched from the HSS to the Authentication Proxy via Diameter based interface similar to the Cx interface (hereafter written as Cx-like). Re-use of the IMS authentication scheme can simplify the implementation in UE and Application servers. Also the sequence number management of AKA protects against replay attack. Note that, before establishment of HTTP session, TLS connection must be done first according to IETF RFC2818 [2]. In an alternative case, IPSec ESP connection can be established. In the next clause the two alternatives are compared. For the sake of simplicity, TLS is assumed in the figure below.

Figure 1 illustrates the solution that provides security for HTTP based connection in case where UE is in Home Network. 2 Application Servers Authentication Proxy HTTP over TLS AVs for HTTP over Cx-like interface SIP HTTP Digest-AKA HSS UE P-CSCF I-CSCF S-CSCF AVs for SIP over Cx ISC(SIP/NDS) Figure 1. Security of HTTP connection for IMS data In this solution HTTP security is independent from the IMS security. The common parts between Application servers and IMS are the same Digest AKA mechanism and the same user name (IMPI). SIP is used between UE and IMS, and also through ISC interface. Cx and Cx-like interfaces are Diameter based and also protected over NDS/IP. This solution does not require registration of UE to the IMS before accessing to some Application Server, if this service requires HTTP transport only. This independence also allows operators to add Application service later on the top of existing IMS. 2.2. Transport security TLS (SSL also) was designed for applications directly on top of transport layer, such as HTTP, SMTP or FTP. Both the HTTP and TLS require reliability of data delivery, thus usually run on top of TCP stack. Now that TCP is mandated in IMS, the use of TLS seems to be a permitted solution for HTTP. Compared with IPsec, TLS obviously is optimized for HTTP data security. It resolves credentiality closely with application located in client and server. There have been various practices in the Internet, such as banking, e-purchasing, using TLS/SSL for HTTP as protocol. Standard has been established secure and mature in this aspect [4]. Comparatively, IPsec is sufficient to provide data security in hop level, but not session level. 2.3. Authentication Proxy The Authentication Proxy supports application protocol (HTTP) level authentication of user identity and also establishes integrity and confidentiality protected connection based on TLS between UE and AP. The mutual authentication between UE and AP is based on Digest AKA using IMPI as a user identifier. HTTP Digest AKA-procedure is a replica of the similar procedure specified by 3GPP and used in IMS for the authentication of UE over Digest AKA (AKA-procedure is executed during the SIP registration). Digest AKA is supported both by UE and S-CSCF. AP is actually an HTTP alike server, which terminates the TLS-connections and it has the ability to route traffic between the UE and the Application Servers. The security association may be maintained between sessions and it is renewed in each run of the AKA procedure.

3 The use of TLS between the UE and the Authentication Proxy to protect HTTP connection does not require additional standardisation work in IETF. UE is authenticated using HTTP Digest-AKA via the secure TLS connection. To make sure the contacted AP is the intended server, it is recommended to process server authentication by requesting server s certificate. When IMS service is located at the home network, the verification shall be easy, because usually the root certificate of the home CA is available in terminal. After a successful mutual authentication over TLS-protected 1 st hop UE can have access to several application servers over a single security association. AP may also establish TLS connections between AP and Application servers but this part is not further discussed in this contribution. 2.4. Interface between Authentication Proxy and HSS Existing 3GPP Cx application could be reused for the IMS based services. Although the Cx application contains more complicated commands, only the authentication commands are needed. Authentication Proxy should therefore, only use them and thereby according to the Cx application the HSS shall not initiate other commands, because there is no SIP registration state in the Diameter client node (e.g. S- CSCF). HSS does not see any distinction whether S-CSCF or AP requesting the authentication items. The current Cx specification mandates that the server name, i.e. S-CSCF name, is included into the Multimedia-Auth-Request (MAR). This is needed in IMS, e.g. in the initial registration, so as to route SIP messages to the S-CSCF. AP requesting authentication items does not need to include the server name. HSS can decide to maintain the existing IMS registration state, e.g. the name of the S-CSCF, and not overwrite the S-CSCF name with the new name. In Cx, the integrity key is mandatory and the confidentiality key optionally returned in the Multimedia- Auth-Answer (MAA) command. Application servers may not need these keys. This is the content we see in Cx-like interface. 2.4.1. Sequence number management By using a common system for sequence number management, IMS provides network authentication for SIP between UE and S-CSCF as well as for HTTP between UE and AP. The Authentication Center (AuC) functionality in HSS creates Authentication Vectors (AVs) using master secret key K of IMS, which is the key in ISIM for both SIP/IMS and HTTP security systems. Some of the generated AVs are used by SIP security system as is defined in the 3GPP TS 33.203 [3] and some are used by HTTP security system. The Authentication Proxy asks one AV via interface from HSS/AuC for each HTTP-user authentication (between UE and AP). Stored in ISIM in UE there is only one common set of sequence numbers for SIP/IMS domain and HTTP/Application domain. This sequence number management method is operator-specific. However, the recommended method is to store an array of sequence numbers in the ISIM. In that case, some of the indices in the array can be reserved for Application domain usage. Fetching only one AV at a time guarantees that the disturbance caused by the second domain is minimised. Each AV should be used only once. The sequence number management method between IMS and Application domains in UE is similar to the one used in 3GPP TS 33.102 [4] between Packet Switched (PS) and Circuit Switched (CS) access network domains. Also there, CS and PS domain run AKA procedures independently of each other while using similar AVs. Re-synchronisation of the sequence numbers is also done similarly as for PS and CS domains in the cases where synchronisation is needed.

3. Conclusion and proposal 4 This contribution establishes a separate data channel than SIP connection. It does not assume the access to IMS previously. The study has shown that it is possible to offer authentication and other security services to different application servers in the Application cloud with only one Authentication Proxy. Then less performance is consumed in UE, because there is no need to connect to each Application Server separately to establish several security associations. Also, there are similar benefits on the network side: all Application servers may share the same security associations. The advantages of this scheme are also the re-use of AKA and partial functionality of the Cx interface. Without Authentication Proxy sequence number management of SAs is much more complicated, separate authentications to every application server would cause extra delay and terminal burden; several connections to HSS decrease the system security. The use of TLS to protect HTTP traffic is seen as a better solution as the use of IPsec, although the latter was chosen in the case of IMS security. This preference follows the general trend in the IETF and Internet domain services. It is proposed to start the analysis based on knowledge investigated as baseline. And it is also proposed to query from SA2 for the deployment detail of HTTP feature and its security function required. 4. References [1] 3GPP Tdoc S3-020475 Liaison on Security and Charging Issues with use of HTTP within IMS [2] IETF RFC 2818: HTTP over TLS [3] 3GPP TS 33.203 Access security for IP-based services v5.3.0 [4] 3GPP TS 33.102 Security Architecture v5.0.0