ImageVerifierCode 换一换
格式:PDF , 页数:16 ,大小:113.98KB ,
资源ID:798976      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-798976.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T J 366 8-2006 IPCablecom2 IP Multimedia Subsystem (IMS) Network domain security specification (Study Group 9)《IPCablecom2 IMS delta建议 网络域名安全准则 研究组9》.pdf)为本站会员(dealItalian200)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T J 366 8-2006 IPCablecom2 IP Multimedia Subsystem (IMS) Network domain security specification (Study Group 9)《IPCablecom2 IMS delta建议 网络域名安全准则 研究组9》.pdf

1、 International Telecommunication Union ITU-T J.366.8 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2006) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS IPCablecom IPCablecom2 IP Multimedia Subsystem (IMS): Network domain security specifica

2、tion ITU-T Recommendation J.366.8 ITU-T Rec. J.366.8 (11/2006) i ITU-T Recommendation J.366.8 IPCablecom2 IP Multimedia Subsystem (IMS): Network domain security specification Summary This Recommendation introduces a new IPCablecom2 Recommendation to define the security architecture for the UMTS netw

3、ork domain IP-based control plane. The scope of the UMTS network domain control plane security is to cover the control signalling on selected interfaces between UMTS network elements. The Third Generation Partnership Project (3GPP) has developed the specification in a form optimized for the wireless

4、 environment. This Recommendation references the ETSI version of the 3GPP specification and specifies only the modifications necessary to optimize it for the cable environment. Source ITU-T Recommendation J.366.8 was approved on 29 November 2006 by ITU-T Study Group 9 (2005-2008) under the ITU-T Rec

5、ommendation A.8 procedure. ii ITU-T Rec. J.366.8 (11/2006) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible

6、for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T st

7、udy groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basi

8、s with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory

9、provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use o

10、f such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no po

11、sition concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, pro

12、tected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2007 All rights reserved. No part

13、 of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. J.366.8 (11/2006) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions, symbols and abbreviations 1 3.1 Definitions 1 3.2 Symbols 1 3.3 Abbreviations. 2 4 Overview over UMTS

14、network domain security for IP based protocols . 2 4.1 Introduction 2 4.2 Protection at the network layer 2 4.3 Security for native IP-based protocols. 2 4.4 Security domains 2 4.5 Security Gateways (SEGs). 2 5 Key management and distribution architecture for NDS/IP. 2 5.1 Security services afforded

15、 to the protocols 2 5.2 Security Associations (SAs) 2 5.3 Profiling of IPsec . 3 5.4 Profiling of IKE . 3 5.5 Security policy granularity. 3 5.6 UMTS key management and distribution architecture for native IP based protocols. 3 6 TLS Option for Protection of Intra-Network SIP. 4 6.1 TLS Authenticati

16、on Algorithms. 4 6.2 Key Exchange Algorithms for TLS . 4 6.3 Random Number Generator for TLS . 4 6.4 TLS Encryption Algorithms. 5 6.5 Ciphersuites for TLS 5 6.6 TLS Authentication 5 6.7 TLS Certificate Profile. 6 6.8 Certificate Validation. 6 6.9 Certificate Revocation 6 Annexes A-D 7 ITU-T Rec. J.3

17、66.8 (11/2006) 1 ITU-T Recommendation J.366.8 IPCablecom2 IP Multimedia Subsystem (IMS): Network domain security specification 1 Scope This Recommendation defines the security architecture for the UMTS network domain IP-based control plane. The scope of the UMTS network domain control plane security

18、 is to cover the control signalling on selected interfaces between UMTS network elements. The Third Generation Partnership Project (3GPP) has developed the specification in a form optimized for the wireless environment. This Recommendation references the ETSI version of the 3GPP specification and sp

19、ecifies only the modifications necessary to optimize it for the cable environment. Additions are shown in blue underline and deletions in red strikethrough. It is an important objective of this work that interoperability between IPCablecom 2.0 and 3GPP IMS is provided. IPCablecom 2.0 is based upon 3

20、GPP IMS, but includes additional functionality necessary to meet the requirements of cable operators. Recognizing developing converged solutions for wireless, wireline, and cable, it is expected that further development of IPCablecom 2.0 will continue to monitor and contribute to IMS developments in

21、 3GPP, with the aim of alignment of 3GPP IMS and IPCablecom 2.0. The modifications to ETSI TS 133.210 V6.5 (2005-01) Network Domain Security Specification are listed below. 2 References 30 RFC 2246 “The TLS Protocol Version 1“. 31 RFC 3268 “AES Ciphersuites for TLS“. 32 RFC 3261 “SIP: Session Initia

22、tion Protocol“. 33 RFC 3546 “Transport Layer Security (TLS) Extensions“. 34 RFC 1750 “Randomness Recommendations for Security“. 35 RFC 3280 “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile“. 3 Definitions, symbols and abbreviations 3.1 Definitions .

23、 3.2 Symbols . 2 ITU-T Rec. J.366.8 (11/2006) 3.3 Abbreviations 3DES Triple DES a block cipher formed from the Data Encryption Standard (DES) cipher CA Certification Authority CBC Cipher Block Chaining CRL Certificate Revocation List DH Diffie-Hellman EDE A 3DES mode where the data is encrypted, dec

24、rypted and encrypted RSA An algorithm for public-key encryption invented by Ron Rivest, Adi Shamir and Len Adleman SHA Secure Hash Algorithm TLS Transport Layer Security 4 Overview over UMTS network domain security for IP-based protocols 4.1 Introduction . 4.2 Protection at the network layer For nat

25、ive IP-based protocols, security shall be provided at the network layer. The security protocols to be used at the network layer are the IETF defined IPsec security protocols as specified in RFC 2401 12. Optionally, for the Zb interface, TLS may be used instead of or in addition to IPsec, as describe

26、d in clause 6. 4.3 Security for native IP-based protocols . 4.4 Security domains . 4.5 Security Gateways (SEGs) . 5 Key management and distribution architecture for NDS/IP 5.1 Security services afforded to the protocols . 5.2 Security Associations (SAs) . ITU-T Rec. J.366.8 (11/2006) 3 5.3 Profiling

27、 of IPsec . 5.4 Profiling of IKE . 5.5 Security policy granularity . 5.6 UMTS key management and distribution architecture for native IP-based protocols 5.6.1 Network domain security architecture outline . 5.6.2 Interface description The following interfaces are defined for protection of native IP-b

28、ased protocols: Za-interface (SEG-SEG) The Za-interface covers all NDS/IP traffic between security domains. On the Za-interface, authentication/integrity protection is mandatory and encryption is recommended. ESP shall be used for providing authentication/integrity protection and encryption. The SEG

29、s use IKE to negotiate, establish and maintain a secure ESP tunnel between them. The tunnel is subsequently used for forwarding NDS/IP traffic between security domain A and security domain B. Inter-SEG tunnels can be available at all times, but they can also be established as needed. One SEG of secu

30、rity domain A can be dedicated to only serve a certain subset of security domains that security domain A needs to communicate with. This will limit the number of SAs and tunnels that need to be maintained. All security domains compliant with this specification shall operate the Za-interface. Zb-inte

31、rface (NE-SEG / NE-NE) The Zb-interface is located between SEGs and NEs and between NEs within the same security domain. The Zb-interface is optional for implementation. If implemented, it shall implement ESP+IKE or TLS. On the Zb-interface, ESP shall always be used with authentication/integrity pro

32、tection. The use of encryption is optional. The ESP Security Association shall be used for all control plane traffic that needs security protection. Whether the Security Association is established when needed or a priori is for the security domain operator to decide. The Security Association is subs

33、equently used for exchange of NDS/IP traffic between the NEs. NOTE 1 The security policy established over the Za-interface may be subject to roaming agreements. This differs from the security policy enforced over the Zb-interface, which is unilaterally decided by the security domain operator. NOTE 2

34、 There is normally no NE-NE interface for NEs belonging to separate security domains. This is because it is important to have a clear separation between the security domains. This is particularly relevant when different security policies are employed whithinwithin the security domain and towards ext

35、ernal destinations. 4 ITU-T Rec. J.366.8 (11/2006) The restriction not to allow secure inter-domain NE-NE communication does not preclude a single physical entity to contain both NE and SEG functionality. It is observed that SEGs are responsible for enforcing security policies towards external desti

36、nations and that a combined NE/SEG would have the same responsibility towards external destinations. The exact SEG functionality required to allow for secure inter- domain NE NE communication will be subject to the actual security policies being employed. Thus, it will be possible to have secure dir

37、ect inter-domain NE NE communication within the framework of NDS/IP if both NEs have implemented SEG functionality. If a NE and SEG is combined in one physical entity, the SEG functionality of the combined unit should not be used by other NEs towards external security domains. 6 TLS Option for Prote

38、ction of Intra-Network SIP The use of TLS is optional. TLS may be supported on the Zb interface (see Figure 1) for security of intra-network TCP interfaces. The TLS protocol provides privacy and data integrity over a reliable transport layer protocol such as TCP. This means that UDP-based protocols

39、will not be able to use TLS. The protocol is composed of two layers: the TLS Record Protocol and the TLS Handshake Protocol. The TLS Record Protocol is used to securely encapsulate upper layer protocols, while the TLS Handshake Protocol provides the key management functionality required to establish

40、 and manage TLS sessions. If TLS is supported, the NE shall implement the requirements specified in this clause. Unless specified within this clause, interfaces requiring TLS shall be compliant with the TLS specification 30. Additionally, SIP interface that requires TLS shall comply with any require

41、ments specified in 32 relating to the usage of TLS in SIP. TLS 30 supports the negotiation and use of compression methods. However, since these methods are not specified within TLS 30, compression shall not be used. Note that TLS is the IETF standardized successor to the Secure Socket Layer (SSL) pr

42、otocol. TLS has security enhancements over the SSL protocol. See 30, 31, and 33. 6.1 TLS Authentication Algorithms The HMAC-SHA-1 (with 160-bit key) algorithm shall be supported in order to provide data origin authentication and data integrity services in TLS. AES-XCBC is not required. 6.2 Key Excha

43、nge Algorithms for TLS Following are the requirements relating to methods for key exchange within the TLS protocol: RSA shall be supported; Diffie-Hellman (DH) shall be supported. 6.3 Random Number Generator for TLS Random number generation implementations tend to be weak. Many semiconductor manufac

44、turers are adding secure random number generators to their integrated circuits, which should be used if available. If no hardware is available, strong pseudo-random number generator software may optionally be used following the guidelines in 34. ITU-T Rec. J.366.8 (11/2006) 5 Following are the requi

45、rements relating to random number generation: A hardware random number generator may be supported. Pseudo-random number generator software shall be supported if a hardware random number generator is not supported. 6.4 TLS Encryption Algorithms Following are the TLS Client and TLS Server requirements

46、 related to encryption algorithms: 3DES CBC-mode (with 3 independent 56-bit keys) shall be supported. AES CBC (with 128-bit key) shall be supported. Null encryption may be supported. 6.5 Ciphersuites for TLS TLS specifies various ciphersuites for use within the TLS protocol, as discussed in detail i

47、n 31. Ciphersuites represent the recommended combinations of encryption, authentication, and key exchange algorithms to be used within the TLS protocol. Following are the requirements related to Ciphersuites for TLS: “TLS_RSA_WITH_AES_128_CBC_SHA“ shall be supported. “TLS_DH_RSA_WITH_AES_128_CBC_SHA

48、“ shall be supported. “TLS_RSA_WITH_3DES_EDE_CBC_SHA“ should be supported. “TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA“ should be supported. “TLS_RSA_WITH_NULL_SHA“ may be supported. 6.6 TLS Authentication TLS allows either unidirectional authentication where the server is authenticated to the client only, or

49、 bidirectional authentication where both client and server authenticate to each other. Unidirectional authentication is the usual method used in the public Internet; however, for network signalling and control applications, bidirectional authentication is mandatory to allow both parties to know they are communicating with the desired endpoint. Following is the requirement related to TLS authentication: Bidirectional authentication for TLS applications shall be supported. 6 ITU-T Rec. J.366.8 (11/2006) 6.7 TLS Cer

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1