ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf

上传人:dealItalian200 文档编号:798975 上传时间:2019-02-02 格式:PDF 页数:32 大小:402.60KB
下载 相关 举报
ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf_第1页
第1页 / 共32页
ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf_第2页
第2页 / 共32页
ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf_第3页
第3页 / 共32页
ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf_第4页
第4页 / 共32页
ITU-T J 366 7-2010 IPCablecom2 IP Multimedia Subsystem (IMS) Access security for IP-based services (Study Group 9)《有线互联网标准2(IPCablecom2)IP多媒体子系(IMS) 基于IP服务的访问安全 9号研究组》.pdf_第5页
第5页 / 共32页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T J.366.7TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2010) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS IPCablecom IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based servi

2、ces Recommendation ITU-T J.366.7 Rec. ITU-T J.366.7 (08/2010) i Recommendation ITU-T J.366.7 IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based services Summary Recommendation ITU-T J.366.7 specifies the security features and mechanisms for secure access to the IM subsystem (IMS

3、) for the 3G mobile telecommunication system as modified for use in cable networks. The Third Generation Partnership Project (3GPP) has developed the specification in a form optimized for the wireless environment. This Recommendation references the ETSI version of the 3GPP specification and specifie

4、s only the modifications necessary to optimize it for the cable environment. History Edition Recommendation Approval Study Group 1.0 ITU-T J.366.7 2010-08-29 9 ii Rec. ITU-T J.366.7 (08/2010) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the fie

5、ld of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardiz

6、ing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered

7、 by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate

8、 both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved w

9、hen all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPE

10、RTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserte

11、d by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned tha

12、t this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2011 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec.

13、 ITU-T J.366.7 (08/2010) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 1 4 Abbreviations and acronyms 1 5 Conventions 1 6 Modifications to ETSI TS 133.203 2 Rec. ITU-T J.366.7 (08/2010) 1 Recommendation ITU-T J.36

14、6.7 IPCablecom2 IP Multimedia Subsystem (IMS): Access security for IP-based services 1 Scope This Recommendation specifies the security features and mechanisms for secure access to the IM subsystem (IMS) for the 3G mobile telecommunication system as modified for use in cable networks. The Third Gene

15、ration Partnership Project (3GPP) has developed the specification in a form optimized for the wireless environment. This Recommendation references the ETSI version of the 3GPP specification and specifies only the modifications necessary to optimize it for the cable environment. It is an important ob

16、jective of this work that interoperability between IPCablecom 2.0 and 3GPP IMS is provided. IPCablecom 2.0 is based upon 3GPP IMS, but includes additional functionality necessary to meet the requirements of cable operators. Recognizing developing converged solutions for wireless, wireline, and cable

17、, it is expected that further development of IPCablecom 2.0 will continue to monitor and contribute to IMS developments in 3GPP, with the aim of alignment of 3GPP IMS and IPCablecom 2.0. Because this Recommendation indicates modifications from the ETSI specification ETSI TS 133.203, the structure of

18、 the Recommendation does not follow normal ITU-T practice, so as to ease the task of the reader to correlate the two documents. The modifications to the access security for IP-based services specification ETSI TS 133.203 are shown in clause 6. 2 References ETSI TS 133.203 ETSI TS 133.203 V6.9.0 (200

19、5), Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the terms defined in ETSI TS 133.203. 3.2 Terms defined in this Recomme

20、ndation None. 4 Abbreviations and acronyms This Recommendation uses the abbreviations provided in ETSI TS 133.203. 5 Conventions This Recommendation uses the conventions provided in ETSI TS 133.203. 2 Rec. ITU-T J.366.7 (08/2010) 6 Modifications to ETSI TS 133.203 Modifications introduced by this Re

21、commendation are shown in revision marks. Unchanged text is replaced by ellipsis (). Some parts of unchanged text (section numbers, etc.) may be kept to indicate the correct insertion points. 2 References 25 3GPP TR 33.978: “3rd Generation Partnership Project; Technical Specification Group Services

22、and System Aspects; 3G Security; Security Aspects Of Early IMS“. 26 IETF RFC 5626 (2009), Managing Client-Initiated Connections in the Session Initiation Protocol (SIP). 27 OMA WAP-211-WAPCert, 22.5.2001, http:/www.openmobilealliance.org/tech/affiliates/wap/wap-211-wapcert-20010522-a.pdf. 28 IETF RF

23、C 1750 (1994), Randomness Recommendations for Security. 29 IETF RFC 3268 (2002), Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS). 30 OMA WAP-219-TLS, 4.11.2001, http:/www.openmobilealliance.org/tech/affiliates/wap/wap-219-tls-20010411-a.pdf. 31 IETF RFC 2246 (1999)

24、, The TLS Protocol Version 1.0. 3.3 Abbreviations SIP Session Initiation Protocol TLS Transport Layer Security 4 Overview of the security architecture The mechanisms specified in this technical specification are independent of the mechanisms defined for the CS- and PS-domain. An independent IMS secu

25、rity mechanism provides additional protection against security breaches. For example, if the PS-Domain security is breached the IMS would continue to be protected by its own security mechanism. As indicated in figure 1 the P-CSCF may be located either in the Visited or the Home Network. The P-CSCF s

26、hall be co-located within the same network as the GGSN, which may reside in the VPLMN or HPLMN according to the APN and GGSN selection criteria, cf. TS 23.060 10. NOTE The text in this specification applies to both IPsec and TLS-based access security unless otherwise noted. P-CSCF in the Visited Net

27、work. Rec. ITU-T J.366.7 (08/2010) 3 5.1 Secure access to IMS 5.1.1 Authentication of the subscriber and the network The AKA-protocol is a secure protocol developed for UMTS and the same concept/principles will be reused for the IP Multimedia Core Network Subsystem, where it is called IMS AKA. NOTE

28、Although the method of calculating the parameters in UTMS AKA and IMS AKA are identical, the parameters are transported in slightly different ways. In UMTS, the UEs response RES is sent in the clear, while in IMS RES is not sent in the clear but combined with other parameters to form an authenticati

29、on response and the authentication response is sent to the network (as described in RFC 3310 17). An optional mechanism for authentication is SIP Digest. It is also a challenge response protocol, and operates in a similar manner to IMS AKA. An authentication vector containing authentication informat

30、ion is sent from the Home Stratum to the Serving Network. The serving network uses the authentication information in an authentication vector to authenticate the UE. The Home Network authenticates the subscriber at anytime via the registration or re-registration procedures. 5.1.3 Confidentiality pro

31、tection Possibility for IMS specific confidentiality protection shall be provided to SIP signalling messages between the UE and the P-CSCF. Mobile Operators shall take care that the deployed confidentiality protection solution and roaming agreements fulfils the confidentiality requirements presented

32、 in the local privacy legislation. The following mechanisms are provided at SIP layer: for IPsec-based access security: 1) The UE shall always offer encryption algorithms for P-CSCF to be used for the session, as specified in clause 7. 2) The P-CSCF shall decide whether the IMS specific encryption m

33、echanism is used. If used, the UE and the P-CSCF shall agree on security associations, which include the encryption key that shall be used for the confidentiality protection. The mechanism is based on IMS AKA and specified in clause 6.1. The following mechanisms are provided for TLS-based access sec

34、urity: 1) Negotiation of TLS related confidentiality protection features shall take place at the TLS layer as specified in clause 7.1.2. 2) The UE shall always offer TLS cipher suites for P-CSCF to be used for the session, as specified in RFC 2246 31. 3) The P-CSCF shall decide whether the TLS ciphe

35、r suites are used. If used, the UE and the P-CSCF shall agree on TLS cipher suites at the TLS layer as specified in RFC 2246 31. Confidentiality between CSCFs, and between CSCFs and the HSS shall rely on mechanisms specified by Network Domain Security in TS 33.210 5. 5.1.4 Integrity protection Integ

36、rity protection shall be applied between the UE and the P-CSCF for protecting the SIP signalling, as specified in clause 6.3. 4 Rec. ITU-T J.366.7 (08/2010) The following mechanisms are provided for IPsec-based access security.: 1) The UE and the P-CSCF shall negotiate the integrity algorithm that s

37、hall be used for the session, as specified in clause 7. 2) The UE and the P-CSCF shall agree on security associations, which include the integrity keys, that shall be used for the integrity protection. The mechanism is based on IMS AKA and specified in clause 6.1. 3) The UE and the P-CSCF shall both

38、 verify that the data received originates from a node, which has the agreed integrity key. This verification is also used to detect if the data has been tampered with. 4) Replay attacks and reflection attacks shall be mitigated. The following mechanisms are provided for TLS-based access security: 1)

39、 Negotiation of TLS-related integrity protection features shall take place at the TLS layer. 2) The use of TLS cipher suites with NULL integrity protection (or HASH) shall not be allowed. 3) The UE and the P-CSCF shall both verify that the data received originates from each other according to RFC 22

40、46 31. This verification is also used to detect if the received data has been tampered with. 4) Replay attacks and reflection attacks shall be mitigated. Integrity protection between CSCFs and between CSCFs and the HSS shall rely on mechanisms specified by Network Domain Security in TS 33.210 5. NOT

41、E 1 TLS is mandatorily supported by SIP proxies according to RFC 3261 6, and operators may use it to provide confidentiality and integrity inside their networks instead of or on top of IPsec, as the intra-domain Za interface is optional, and TLS may also be used between IMS networks on top of IPsec.

42、 It should be pointed out, that the 3GPP specifications do not provide support for TLS certificate management in a fashion similar to TS 33.310 (NDS/AF) 24 nor do they ensure backward compatibility with Release 5 CSCFs nor interoperability with other networks which do not use TLS, in case TLS is use

43、d by Release 6 CSCFs. These management and capability issues need then to be solved by manual configuration of the involved operators. 6.1 Authentication and key agreement The One scheme for authentication and key agreement in the IMS is called IMS AKA. The IMS AKA achieves mutual authentication bet

44、ween the ISIM and the HN, cf. figure 1. The identity used for authenticating a subscriber is the private identity, IMPI, which has the form of a NAI, cf. TS 23.228 3. The HSS and the ISIM share a long-term key associated with the IMPI. The HN shall choose the IMS AKA scheme for authenticating an IM

45、subscriber accessing through UMTS. The security parameters e.g., keys generated by the IMS AKA scheme are transported by SIP. The generation of the authentication vector AV that includes RAND, XRES, CK, IK and AUTN shall be done in the same way as specified in TS 33.102 1. The ISIM and the HSS keep

46、track of counters SQNISIMand SQNHSSrespectively. The requirements on the handling of the counters and mechanisms for sequence number management are specified in TS 33.102 1. The AMF field can be used in the same way as in TS 33.102 1. An additional scheme for authentication is SIP Digest as specifie

47、d in RFC 3261 6. SIP Digest achieves mutual authentication between the UE and the HN. The identity used for authenticating a subscriber is the private identity, IMPI, which has the form of a NAI. The HSS and the UE share a Rec. ITU-T J.366.7 (08/2010) 5 preset secret associated by the IMPI. The gene

48、ration of the authentication challenge shall be done in the same way as specified in RFC 3261 6 and this document. The HN shall choose the appropriate scheme for authenticating an IM subscriber based on the authentication algorithm parameter received from the UE in the initial register request. To m

49、itigate bid down attacks, the HN may specify the lowest acceptable authentication algorithm to be used for authenticating an IM subscriber. FurthermoreIf IPsec based access security is used, two pairs of (unilateral) security associations (SAs) are established between the UE and the P-CSCF. The subscriber may have several IMPUs associated with one IMPI. These may belong to the same or different service profiles. Only two pairs of SAs shall be active between the UE and the P-CSCF. These two pairs

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1