SIPPING IETF51: 3GPP Security and Authentication

Download Report

Transcript SIPPING IETF51: 3GPP Security and Authentication

SIPPING IETF51
3GPP Security and Authentication
Peter Howard
3GPP SA3 (Security) delegate
[email protected]
3GPP IP Multimedia Subsystem (Release 5)
Cx interface based on
Diameter
SIP proxies get authorisation and
authentication information
HSS
Home
S-CSCF
I-CSCF
GGSN
SGSN
RAN
UA
REGISTER/INVITE
REGISTER/INVITE
P-CSCF
REGISTER/INVITE
Visited
PS domain
SIP-based interfaces
SIP proxy servers
3GPP Release 5 Security
• Packet Switched (PS) domain
– access security features retained from 3GPP Release 99
specifications
• IP Multimedia Subsystem (IMS) domain
– new access security features to be specified
• to protect the access link to the IMS domain
• independent of underlying PS domain security features
– network domain security features to protect signalling
links between network elements with the IMS domain
IP Multimedia Subsystem: Access Security
1. Distribution of
authentication information
Draft 3GPP TS 33.203
4. Protection of SIP signalling
using agreed session key
HSS
Home
S-CSCF
I-CSCF
GGSN
SGSN
RAN
UA
REGISTER/INVITE
REGISTER/INVITE
P-CSCF
REGISTER/INVITE
Visited
3. Session key distribution
2. Mutual authentication and session key agreement
IP Multimedia Subsystem: Network Domain Security
Draft 3GPP TS 33.210
HSS
Home
S-CSCF
I-CSCF
GGSN
SGSN
RAN
UA
REGISTER/INVITE
REGISTER/INVITE
P-CSCF
REGISTER/INVITE
Visited
Per-hop protection of
signalling using IPsec/IKE
Access Security:
Authentication Principles
• 3GPP authentication protocol (3GPP AKA)
– based on secret key stored in UA’s tamper-proof
subscriber identity module (SIM) and in the HSS
• Authentication check located in S-CSCF
• Working assumption is to authenticate only at SIP
registrations with on-demand re-authentication
requiring re-registration
• Use SIP authentication rather than an outer layer
protocol such as TLS or IKE in order to minimise
roundtrips
Integration of Authentication Protocol into
DIAMETER and SIP
• Distribution of authentication information to SCSCF using DIAMETER
– distribution of authentication vectors for 3GPP AKA
• Integration of authentication protocol into SIP
registration
– 3GPP AKA protocol between UA and S-CSCF
– distribution of session key to P-CSCF
Possible Information Flow for Authentication and Session
Key Establishment (from draft 3GPP TS 33.203)
Changed to 407 Proxy
Authentication
Required
Cx-Put
Cx-Pull
Use of Extensible Authentication Protocol (EAP)
• There is a desire to minimise impact on protocols
and equipment if 3GPP AKA is updated or if other
schemes are used
– a generic/extensible scheme to carry the authentication
messages is desirable
– candidates include SASL, EAP, GSS_API
– current working assumption is EAP which has much of
the necessary machinery in place
EAP AKA in SIP
SIP
HTTP Authentication
HTTP Basic
EAP Token Card
PGP
HTTP Digest
EAP TLS
HTTP EAP
EAP GSM
EAP AKA
EAP ...
Concrete Authentication Example in SIP
1.  REGISTER sip:… SIP/2.0
Authorization: eap base64_eap_identity_response
...
2.  SIP/2.0 407 Proxy Authentication Required
WWW-Authenticate: eap base64_eap_aka_challenge_request
…
3.  REGISTER sip:… SIP/2.0
Authorization: eap base64_eap_aka_challenge_response
…
4.  SIP/2.0 200 OK
WWW-Authenticate: eap base64_eap_aka_success
...
EAP AKA in DIAMETER
DIAMETER base
EAP Extensions
EAP Token Card
EAP TLS
EAP GSM
EAP AKA
EAP ...
Access Security: Security Mode
Establishment between UA and P-CSCF
• Determines when to start applying protection and
which algorithm to use
– includes secure algorithm negotiation
• Uses session key derived during authentication
• Integration into SIP registration with no new
roundtrips
Access security: Protection of SIP signalling
between UA and P-CSCF
• Integrity protection of SIP signalling between UA
and P-CSCF
• Uses session key derived during authentication
• Symmetric scheme because of efficiency concerns
• Candidate mechanisms include modified CMS and
ESP
IP Multimedia Subsystem:
Access Security Documentation
3GPP
High level
architecture
Protocol detail
TS 23.228
(SA2)
TS 33.203
(SA3)
TS 24.228
(CN1)
TS 29.228
(CN4)
TS 24.229
(CN1)
TS 29.229
(CN4)
Other specs
(e.g. AKA)
(SA3)
IETF
SIPPING
WG
AAA, PPPEXT, IPsec, …
Summary of 3GPP dependencies on IETF
relating to security
• 3GPP AKA in EAP
– draft-arkko-pppext-aka-00.txt
• EAP and session key transport in SIP
– draft-torvinen-http-eap-00.txt (to appear)
• EAP and session key transport in DIAMETER
• SIP extensions to support security mode
establishment
References
• Draft 3GPP TS 33.203, Access security for IP-based
services (Release 5).
• Draft 3GPP TS 33.210, Network domain security; IP
network layer security (Release 5).
• J. Arkko and H. Haverinen, “EAP AKA Authentication”
draft-arkko-pppext-aka-00.txt.
• V. Torvinen, J. Arkko, A. Niemi, “HTTP Authentication
with EAP”, draft-torvinen-http-eap-00.txt (to appear).
• L. Blunk, J. Vollbrecht, “PPP Extensible Authentication
Protocol (EAP)”, RFC 2284.
• P. Calhoun et al. “DIAMETER NASREQ Extensions”,
draft-ietf-aaa-diameter-nasreq-06.txt.
Questions?
Peter Howard
[email protected]
Authentication and Key Agreement Protocol
(3GPP AKA)
ISIM/UA
S-CSCF
HSS
Authentication vector request
Authentication vector response
• Three party protocol
• Two-pass mutual authentication
protocol between UA and S-CSCF
Authentication response
• Each authentication vector is good
for one authentication
Distribution of session
• Authentication vectors can be
key to P-CSCF
P-CSCF
distributed in batches to minimise
signalling/load on HSS
Authentication request
Other IP Multimedia Subsystem Security Issues (1)
• Hide caller’s public ID from called party
– by encrypting remote party ID header at caller’s SCSCF and decrypting by same S-CSCF
– is there a requirement to hide caller’s IP addresses that
are dynamically assigned?
• Network configuration hiding
– mechanism being developed to hide host domain name
of CSCFs and number of CSCFs within one operator’s
network
Other IP Multimedia Subsystem Security Issues (2)
• Session transfer
– guidance on security aspects based on GSM call
transfer feature
• authorisation and accounting of transferred leg needs to
involve transferring party who has dropped out of session
• should there be a limit to the number of transferred sessions?
• should final destination be hidden from calling party?
• Security aspects of other IP multimedia subsystem
services?
• End-to-end security