3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting in Phoenix new work item Security Aspects of Requirement for Network Configurtion Independence ws pproved. This contribution ddresses the Security needs of Configurtion Independence (k Network Hiding). It includes mechnisms needed to route SIP requests nd responses, ensuring tht informtion bout the S-CSCF is not provided to those not uthorized to receive it. A CR to 23.228 is proposed. 2 Discussion Network Configurtion Independence requirement is stted in TS23.228 s follows: It is requirement tht it shll be possible to hide the network topology from other opertors. It shll be possible to restrict the following informtion from being pssed outside of n opertor s network: exct number of S-CSCFs, cpbilities of S-CSCFs, or cpcity of the network. The design for Configurtion Independence hs been discussed in both SA2 nd CN1. The mechnism being studied is to encrypt the S-CSCF ddress in SIP Vi, Record- Route, Route, nd Pth heders t n I-CSCF, nd then decrypt them in hndling the response to the SIP request. Further, the routing informtion given to P-CSCF during Registrtion my contin encrypted informtion, which would be decrypted by n I- CSCF in hndling SIP request. Depending on the opertor s configurtion, the I-CSCF tht encrypts the forementioned heders my or my not be the sme I-CSCF tht needs to decrypt the informtion; ll I- CSCFs of n opertor should hve the bility to decrypt ech other s dt. In the simplest conceivble implementtion, ll I-CSCFs shre key, which is distributed by whtever provisioning mechnisms lredy exist for the purposes of setting up security-relted informtion on the CSCFs. This key could lso be estblished by running ny number of shred-key genertion protocols. This key, which we shll cll Kv, will need to be regenerted periodiclly. When tht hppens, the previous key is lso kept for smll frction of the key lifetime in cse there re still sessions using the old key. With modern lgorithm such s AES, with 128-bit block nd 256-bit key, there is no rel reson to ever rekey during the lifetime of the system, unless, of course, the key gets compromised or otherwise exposed.
The informtion to be encrypted is ppended with rndom 128-bit Initiliztion Vector, nd pdded to multiple of 128 bits. The informtion is encrypted nd MAC-protected with block cipher (e.g., AES), in CBC-MAC mode. One of the proposed new modes for AES is one-pss integrity-protection nd encryption mode, nd tht should be used once it is stndrdized by NIST. All this is bse-64 encoded nd trnsmitted s single entry in the heder. This informtion is treted opquely by the other CSCFs. When n I-CSCF receives this opque heder, it decrypts it with the shred key, verifies the integrity, nd reconstructs the heders. The IV shll be rndom number; it cnnot be counter, becuse multiple CSCFs re using the sme key. With rndom vlue nd 128-bit IV, the probbility of two CSCFs picking the sme IV is roughly 2-64, which is more thn dequte. The informtion does not need to be uthenticted, s the thret model does not include mlicious tmpering of its contents; wht is being protected is the identities of ll the CSCFs of the home network. 3 Proposl It is proposed tht SA3 endorse the encryption bsed mechnism s method of implementing the network configurtion independence requirement nd tht LS to be sent to S2 with the following CR to TS23.228.
CHANGE REQUEST 23.228 CR xx rev Current version: 5.1.0 CR-Form-v3 For HELP on using this form, see bottom of this pge or look t the pop-up text over the symbols. Proposed chnge ffects: (U)SIM ME/UE Rdio Access Network Core Network X Title: Source: Network Configurtion Independence AT&T Wireless Work item code: 1515 Dte: 07.07.2001 Ctegory: C Relese: REL-5 Use one of the following ctegories: F (essentil correction) A (corresponds to correction in n erlier relese) B (Addition of feture), C (Functionl modifiction of feture) D (Editoril modifiction) Detiled explntions of the bove ctegories cn be found in 3GPP TR 21.900. Use one of the following releses: 2 (GSM Phse 2) R96 (Relese 1996) R97 (Relese 1997) R98 (Relese 1998) R99 (Relese 1999) REL-4 (Relese 4) REL-5 (Relese 5) Reson for chnge: The mechnism for Network Configurtion Independence ws left open in TS23.228. This CR proposes the encryption-bsed method for Network Configurtion Independence, nd contins the necessry chnges to be pplied to the Registrtion flows in TS23.228. Summry of chnge: This CR modifies the registrtion flows to reflect the encryption-bsed method for Network Configurtion Independence requirement. Consequences if not pproved: Cluses ffected: 5.2.2.3 nd 5.2.2.4 Other specs Other core specifictions ffected: Test specifictions O&M Specifictions Other comments: How to crete CRs using this form: Comprehensive informtion nd tips bout how to crete CRs cn be found t: http://www.3gpp.org/3g_specs/crs.htm. Below is brief summry: 1) Fill out the bove form. The symbols bove mrked contin pop-up help informtion bout the field tht they re closest to.
2) Obtin the ltest version for the relese of the specifiction to which the chnge is proposed. Use the MS Word "revision mrks" feture (lso known s "trck chnges") when mking the chnges. All 3GPP specifictions cn be downloded from the 3GPP server under ftp://www.3gpp.org/specs/ For the ltest version, look for the directory nme with the ltest dte e.g. 2000-09 contins the specifictions resulting from the September 2000 TSG meetings. 3) With "trck chnges" disbled, pste the entire CR form (use CTRL-A to select it) into the specifiction just in front of the cluse contining the first piece of chnged text. Delete those prts of the specifiction which re not relevnt to the chnge request. 5.2.2.3 Registrtion informtion flow User not registered The ppliction level registrtion cn be initited fter the registrtion to the ccess is performed, nd fter IP connectivity for the signlling hs been gined from the ccess network. For the purpose of the registrtion informtion flows, the subscriber is considered to be lwys roming. For subscribers roming in their home network, the home network shll perform the role of the visited network elements nd the home network elements. Visited Network Home Network UE P-CSCF I-CSCF HSS S-CSCF 1. Register 2. Register 3. Cx-Query 4. Cx-Query Resp 5. Cx-Select-pull 6. Cx-Select-pull Resp 7. Register 8. Cx-put 9. Cx-put Resp 10. Cx-Pull 11. Cx-Pull Resp 14. 200 OK 13. 200 OK 12. 200 OK Figure 5.1: Registrtion User not registered 1. After the UE hs obtined signlling chnnel through the ccess network, it cn perform the IM registrtion. To do so, the UE sends the Register informtion flow to the proxy (subscriber identity, home networks domin nme). 2. Upon receipt of the register informtion flow, the P-CSCF shll exmine the home domin nme to discover the entry point to the home network (i.e. the I-CSCF). The proxy shll send the Register informtion flow to the I-CSCF (P-CSCFs nme, subscriber identity, visited network contct nme).
A nme-ddress resolution mechnism is utilised in order to determine the ddress of the home network from the home domin nme. When the I-CSCF receives the registrtion informtion flow from the proxy, it shll exmine the subscriber identity nd the home domin nme, nd employ the services of nme-ddress resolution mechnism, to determine the HSS ddress to contct. 3. The I-CSCF shll send the Cx-Query informtion flow to the HSS (subscriber identity, visited domin nme). The P-CSCF nme is the contct nme tht the opertor wishes to use for future contct to tht P- CSCF. The HSS shll check whether the user is registered lredy. The HSS shll indicte whether the user is llowed to register in tht visited network ccording to the User subscription nd opertor limittions/restrictions if ny. 4. Cx-Query Resp is sent from the HSS to the I-CSCF. If the checking in HSS ws not successful the Cx-Query Resp shll reject the registrtion ttempt. 5. At this stge, it is ssumed tht the uthentiction of the user hs been completed (lthough it my hve been determined t n erlier point in the informtion flows). The I-CSCF shll send Cx- Select-Pull (subscriber identity) to the HSS to request the informtion relted to the required S- CSCF cpbilities which shll be input into the S-CSCF selection function. 6. The HSS shll send Cx-Select-Pull Resp (required S-CSCF cpbilities) to the I-CSCF. 7. The I-CSCF, using the nme of the S-CSCF, shll determine the ddress of the S-CSCF through nme-ddress resolution mechnism. I-CSCF lso determines the nme of suitble home network contct point, possibly bsed on informtion received from the HSS. The home network contct point my either be the S-CSCF itself, or suitble I-CSCF in cse network configurtion hiding is desired. If n I-CSCF is chosen s the home network contct point, it my be distinct from the I- CSCF tht ppers in this registrtion flow, nd it will be cpble of decrypting the S-CSCF nme from the home contct informtion. I-CSCF shll then send the register informtion flow (P-CSCFs nme, subscriber identity, visited network contct nme, home network contct point in cse network configurtion hiding is desired) to the selected S-CSCF. The home network contct point will be used by the P-CSCF to forwrd session initittion signlling to the home network. 8. The S-CSCF shll send Cx-Put (subscriber identity, S-CSCF nme) to the HSS. The HSS stores the S-CSCF nme for tht subscriber. 9. The HSS shll send Cx-Put Resp to the I-CSCF to cknowledge the sending of Cx-Put. 10. On receipt of the Cx-Put Resp informtion flow, the S-CSCF shll send the Cx-Pull informtion flow (subscriber identity) to the HSS in order to be ble to downlod the relevnt informtion from the subscriber profile to the S-CSCF. The S-CSCF shll store the P-CSCFs nme, s supplied by the visited network. This represents the nme tht the home network forwrds the subsequent terminting session signlling to for the UE. 11. The HSS shll return the informtion flow Cx-Pull Resp (user informtion) to the S-CSCF. The user informtion pssed from the HSS to the S-CSCF shll include one or more nmes/ddresses informtion which cn be used to ccess the pltform(s) used for service control while the user is registered t this S-CSCF. The S-CSCF shll store the informtion for the indicted user. In ddition to the nmes/ddresses informtion, security informtion my lso be sent for use within the S-CSCF. 12. The S-CSCF shll return the 200 OK informtion flow (serving network contct informtion) to the I-CSCF. If n I-CSCF is chosen s the home network contct point, the I-CSCF shll encrypt the S- CSCF ddress in the serving network contct informtion. 13. The I-CSCF shll send informtion flow 200 OK (serving network contct informtion) to the P- CSCF. The I-CSCF shll relese ll registrtion informtion fter sending informtion flow 200 OK.
14. The P-CSCF shll store the serving network contct informtion, nd shll send informtion flow 200 OK to the UE. 5.2.2.4 Re-Registrtion informtion flow User currently registered Editor s Note: the definition of re-registrtion timers requires further study, however it is noted tht the timers in the UE re shorter thn the registrtion relted timers in the network. Periodic ppliction level re-registrtion is initited by the UE either to refresh n existing registrtion or in response to chnge in the registrtion sttus of the UE. Re-registrtion follows the sme process s defined in subcluse 5.2.2.3 Registrtion Informtion Flow User not registered. Visited Network Home Network UE P-CSCF I-CSCF HSS S-CSCF 1. Register 2. Register 3. Cx-Query 4. Cx-Query Resp 5. Register 6. Cx-put 7. Cx-put Resp 8. Cx-Pull 9. Cx-Pull Resp 12. 200 OK 11. 200 OK 10. 200 OK Figure 5.2: Re-registrtion - user currently registered 1. Prior to expiry of the greed registrtion timer, the UE initites re-registrtion. To re-register, the UE sends new REGISTER request. The UE sends the REGISTER informtion flow to the proxy (subscriber identity, home networks domin nme). 2. Upon receipt of the register informtion flow, the P-CSCF shll exmine the home domin nme to discover the entry point to the home network (i.e. the I-CSCF). The proxy does not use the entry point cched from prior registrtions. The proxy shll send the Register informtion flow to the I- CSCF (P-CSCFs nme, subscriber identity, visited network contct nme). A nme-ddress resolution mechnism is utilised in order to determine the ddress of the home network from the home domin nme. When the I-CSCF receives the registrtion informtion flow from the proxy, it shll exmine the subscriber identity nd the home domin nme, nd employ the services of nme-ddress resolution mechnism, to determine the HSS ddress to contct.
3. The I-CSCF shll send the Cx-Query informtion flow to the HSS (subscriber identity, visited domin nme). 4. The HSS shll check whether the user is registered lredy nd return n indiction indicting tht n S-CSCF is ssigned. The Cx-Query Resp (indiction of entry contct point, e.g. S-CSCF) is sent from the HSS to the I-CSCF. 5. At this stge, it is ssumed tht the uthentiction of the user hs been completed (lthough it my hve been determined t n erlier point in the informtion flows). The I-CSCF, using the nme of the S-CSCF, shll determine the ddress of the S-CSCF through nme-ddress resolution mechnism. I-CSCF lso determines the nme of suitble home network contct point, possibly bsed on informtion received from the HSS. The home network contct point my either be the S- CSCF itself, or suitble I-CSCF in cse network configurtion hiding is desired. If n I-CSCF is chosen s the home network contct point, it my be distinct from the I-CSCF tht ppers in this registrtion flow, nd it will be cpble of decrypting the S-CSCF nme from the home contct informtion. I-CSCF shll then send the register informtion flow (P-CSCFs nme, subscriber identity, visited network contct nme, home network contct point in cse network configurtion hiding is desired) to the selected S-CSCF. The home network contct point will be used by the P- CSCF to forwrd session initittion signlling to the home network. 6. The S-CSCF shll send Cx-Put (subscriber identity, S-CSCF nme) to the HSS. The HSS stores the S-CSCF nme for tht subscriber. Note: Optionlly s n optimistion, the S-CSCF cn detect tht this is re-registrtion nd omit the Cx-Put request. 7. The HSS shll send Cx-Put Resp to the S-CSCF to cknowledge the sending of Cx-Put. 8. On receipt of the Cx-Put Resp informtion flow, the S-CSCF shll send the Cx-Pull informtion flow (subscriber identity) to the HSS in order to be ble to downlod the relevnt informtion from the subscriber profile to the S-CSCF. The S-CSCF shll store the P-CSCFs nme, s supplied by the visited network. This represents the nme tht the home network forwrds the subsequent terminting session signlling to for the UE. Note: Optionlly s n optimistion, the S-CSCF cn detect tht this re-registrtion nd omit the Cx-Pull request. 9. The HSS shll return the informtion flow Cx-Pull-Resp (user informtion) to the S-CSCF. The S- CSCF shll store the user informtion for tht indicted user. 10. The S-CSCF shll return the 200 OK informtion flow (serving network contct informtion) to the I-CSCF. If n I-CSCF is chosen s the home network contct point, the I-CSCF shll encrypt the S- CSCF ddress in the serving network contct informtion. 11. The I-CSCF shll send informtion flow 200 OK (serving network contct informtion) to the P- CSCF. The I-CSCF shll relese ll registrtion informtion fter sending informtion flow 200 OK. 12. The P-CSCF shll store the serving network contct informtion, nd shll send informtion flow 200 OK to the UE.