SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate

Slides:



Advertisements
Similar presentations
SIPPING 3GPP Requirements Ad Hoc Meeting Georg Mayer IETF#53, Minneapolis.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
22-23 June 2004TISPAN-3GPP Workshop - Sophia-Antipolis 1 TISPAN NGN Architecture Overview Richard Brennan pulver.com, WG2 Chair
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
1 Requirements Catalog Scott A. Moseley Farbum Scotus.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
IP Multimedia Subsystem (IMS) 江培文. Agenda Background IMS Definition IMS Architecture IMS Entities IMS-CS Interworking.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
World Class Standards ANFOV - Milano, 14 November 2007 – Paolo DE LUTIIS ANFOV - Milano, 14 November 2007 Autore:Paolo DE LUTIIS Telecom Italia Security.
Lawful Interception in 3G IP Multimedia Subsystem
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
SIP and the application of SIP as used in 3GPP Keith Drage - Lucent Technologies.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
One-Pass GPRS and IMS Authentication Procedure for UMTS
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
All IP Network Architecture 2001 년 12 월 5 일 통신공학연구실 석사 4 차 유성균
IP Multimedia Subsystem IMS
SIP Security Matt Hsu.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Agenda Introduction to 3GPP Introduction to SIP IP Multimedia Subsystem Service Routing in IMS Implementation Conclusions.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Arslan Munir and Ann Gordon-Ross+
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
3GPP2 IMS Charging Infrastructure
“IMS in a Bottle”: Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem Author:Joachim Fabini, Peter.
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
SIP Extensions for Enhanced Location Based Services in 3G Networks International SIP 2004, Paris Pavitra Krishnaswamy Application-Ready.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop - draft - Jack Nasielski
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
EAP Authentication for SIP & HTTP V. Torvinen (Ericsson), J. Arkko (Ericsson), A. Niemi (Nokia),
1 IETF 78: NETEXT Working Group IPSec/IKEv2 Access Link Support in Proxy Mobile IPv6 IPSec/IKEv2-based Access Link Support in Proxy Mobile IPv6 Sri Gundavelli.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Page 1 January 16, 2008 Source: 3GPP2 TSG-S WG4 (Security) Contacts: Anand Palanigounder, Chair, TSG-S WG4 ( Zhibi Wang,
1 MMD Evolution June 28, Outline MMD Basics End-to-End Example –Packet Switched Video Telephony Transition to MMD Legacy MS Domain Evolution MMD.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Alec Brusilovsky, Zhibi Wang Alcatel-Lucent, July 24, 2007.
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
MWIF Confidential MWIF-Arch Security Task Force Task 5: Security for Signaling July 11, 2001 Baba, Shinichi Ready for MWIF Kansas.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Zhibi Wang January, 2007.
1 Access Authentication to IMS Systems in Next Generation Networks Authors: Silke Holtmanns, Son Phan-Anh ICN’07 IEEE Speaker: Wen-Jen Lin.
User Notification Protocol Nikolai Leung, QUALCOMM Incorporated (703) Notice: QUALCOMM Incorporated grants.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
1 3GPP2 IMS Charging Infrastructure Presented for 3GPP2 TSG-X by Nick Mazzarella of Lucent Technologies September 25, 2004.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
Page 1TTT - May 12, GPP IMS Standardization Update Bell Labs Innovations Lucent Technologies Room 9C Lucent Ln. Naperville, IL E Mail.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Diameter SIP Application
S Postgraduate Course in Radio Communications. Interoperability between 3G and WLAN using IMS Antti Keurulainen,
3GPP and SIP Keith Drage - Lucent Technologies. Submitted drafts draft-drage-3gpp-registration-00 draft-drage-3gpp-establishment-00 ftp://ftp.3gpp.org/TSG_CN/WG1_mm-cc-sm/TSGN1_16/Tdocs/SIP_WG_Submissons.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Security Data Transmission and Authentication Lesson 9.
Internet Telephony 1 Reference Architecture of R00.
IP Multimedia Subsystem & W-CSCF
3GPP and SIP-AAA requirements
Security Activities in IETF in support of Mobile IP
Unit 8 Network Security.
Discussion Issues on IMS-based NGN
Presentation transcript:

SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate

3GPP IP Multimedia Subsystem (Release 5) Visited Home HSS RAN SGSN GGSN Cx interface based on Diameter SIP proxies get authorisation and authentication information P -CSCF REGISTER/INVITE I -CSCF REGISTER/INVITE S -CSCF REGISTER/INVITE SIP proxy serversSIP-based interfaces PS domain UA

3GPP Release 5 Security Packet Switched (PS) domain –access security features retained from 3GPP Release 99 specifications IP Multimedia Subsystem (IMS) domain –new access security features to be specified to protect the access link to the IMS domain independent of underlying PS domain security features –network domain security features to protect signalling links between network elements with the IMS domain

IP Multimedia Subsystem: Access Security Visited Home HSS RAN SGSN GGSN P -CSCF REGISTER/INVITE I -CSCF REGISTER/INVITE S -CSCF REGISTER/INVITE 4. Protection of SIP signalling using agreed session key 2. Mutual authentication and session key agreement 3. Session key distribution 1. Distribution of authentication information UA Draft 3GPP TS

IP Multimedia Subsystem: Network Domain Security Visited Home HSS RAN SGSN GGSN P -CSCF REGISTER/INVITE I -CSCF REGISTER/INVITE S -CSCF REGISTER/INVITE Per-hop protection of signalling using IPsec/IKE UA Draft 3GPP TS

Access Security: Authentication Principles 3GPP authentication protocol (3GPP AKA) –based on secret key stored in UA’s tamper-proof subscriber identity module (SIM) and in the HSS Authentication check located in S-CSCF Working assumption is to authenticate only at SIP registrations with on-demand re-authentication requiring re-registration Use SIP authentication rather than an outer layer protocol such as TLS or IKE in order to minimise roundtrips

Integration of Authentication Protocol into DIAMETER and SIP Distribution of authentication information to S- CSCF using DIAMETER –distribution of authentication vectors for 3GPP AKA Integration of authentication protocol into SIP registration –3GPP AKA protocol between UA and S-CSCF –distribution of session key to P-CSCF

Possible Information Flow for Authentication and Session Key Establishment (from draft 3GPP TS ) Cx-Put Cx-Pull Changed to 407 Proxy Authentication Required

Use of Extensible Authentication Protocol (EAP) There is a desire to minimise impact on protocols and equipment if 3GPP AKA is updated or if other schemes are used –a generic/extensible scheme to carry the authentication messages is desirable –candidates include SASL, EAP, GSS_API –current working assumption is EAP which has much of the necessary machinery in place

EAP AKA in SIP HTTP EAP SIP HTTP AuthenticationPGP HTTP Digest HTTP Basic EAP AKA EAP GSMEAP TLSEAP...EAP Token Card

Concrete Authentication Example in SIP 1.  REGISTER sip:… SIP/2.0 Authorization: eap base64_eap_identity_response  SIP/ Proxy Authentication Required WWW-Authenticate: eap base64_eap_aka_challenge_request … 3.  REGISTER sip:… SIP/2.0 Authorization: eap base64_eap_aka_challenge_response … 4.  SIP/ OK WWW-Authenticate: eap base64_eap_aka_success...

EAP AKA in DIAMETER EAP Extensions DIAMETER base EAP AKA EAP GSMEAP TLSEAP...EAP Token Card

Access Security: Security Mode Establishment between UA and P-CSCF Determines when to start applying protection and which algorithm to use –includes secure algorithm negotiation Uses session key derived during authentication Integration into SIP registration with no new roundtrips

Access security: Protection of SIP signalling between UA and P-CSCF Integrity protection of SIP signalling between UA and P-CSCF Uses session key derived during authentication Symmetric scheme because of efficiency concerns Candidate mechanisms include modified CMS and ESP

IP Multimedia Subsystem: Access Security Documentation TS (SA2) TS (CN1) TS (CN4) TS (CN4) 3GPPIETF SIPPING WG TS (SA3) TS (CN1) AAA, PPPEXT, IPsec, … Other specs (e.g. AKA) (SA3) High level architecture Protocol detail

Summary of 3GPP dependencies on IETF relating to security 3GPP AKA in EAP –draft-arkko-pppext-aka-00.txt EAP and session key transport in SIP –draft-torvinen-http-eap-00.txt (to appear) EAP and session key transport in DIAMETER SIP extensions to support security mode establishment

References Draft 3GPP TS , Access security for IP-based services (Release 5). Draft 3GPP TS , Network domain security; IP network layer security (Release 5). J. Arkko and H. Haverinen, “EAP AKA Authentication” draft-arkko-pppext-aka-00.txt. V. Torvinen, J. Arkko, A. Niemi, “HTTP Authentication with EAP”, draft-torvinen-http-eap-00.txt (to appear). L. Blunk, J. Vollbrecht, “PPP Extensible Authentication Protocol (EAP)”, RFC P. Calhoun et al. “DIAMETER NASREQ Extensions”, draft-ietf-aaa-diameter-nasreq-06.txt.

Questions? Peter Howard

Authentication and Key Agreement Protocol (3GPP AKA) ISIM/UA S-CSCF HSS Authentication vector request Authentication request Authentication response Authentication vector response Three party protocol Two-pass mutual authentication protocol between UA and S-CSCF Each authentication vector is good for one authentication Authentication vectors can be distributed in batches to minimise signalling/load on HSS Distribution of session key to P-CSCF P-CSCF

Other IP Multimedia Subsystem Security Issues (1) Hide caller’s public ID from called party –by encrypting remote party ID header at caller’s S- CSCF and decrypting by same S-CSCF –is there a requirement to hide caller’s IP addresses that are dynamically assigned? Network configuration hiding –mechanism being developed to hide host domain name of CSCFs and number of CSCFs within one operator’s network

Session transfer –guidance on security aspects based on GSM call transfer feature authorisation and accounting of transferred leg needs to involve transferring party who has dropped out of session should there be a limit to the number of transferred sessions? should final destination be hidden from calling party? Security aspects of other IP multimedia subsystem services? End-to-end security Other IP Multimedia Subsystem Security Issues (2)