Reply LS on the status of the IMS Avatar Security Aspects
Source: SA3
Meeting:
TSGS4_135_India
Agenda Item:
5.2
| Agenda item description | Other 3GPP groups |
|---|---|
| Doc type | LS in |
| For action | Information |
| Release | Rel-19 |
| Original LS | S3-254551 |
| download_url | Download Original |
| Cc | SA4 |
| To | SA2 |
| For | Information |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T15:01:09.583000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 14:49:28 |
| Agenda item sort order | 7 |
Review Comments
1) Technical Accuracy
1.1 Incorrect/unclear document identifiers and scope
1.2 Questionable claim: “fully specified” / “completion of Rel-19 security requirements”
1.3 Potential inconsistency: “normative Annex R” and CR status
1.4 Work item naming and traceability
2) Completeness
2.1 Missing technical substance for SA2 consumption
As a reply LS summary, it may be acceptable to be short, but it is missing key information SA2 needs to act:
- What exactly is covered in Annex R (high-level bullets): threat model assumptions, security objectives, procedures, interfaces, and whether it covers both control plane and media plane aspects.
- Dependencies on SA2 architecture: Are there any assumptions about IMS avatar signaling, media transport, identity binding, or network functions that SA2 must ensure?
- Any open issues / residual risks: Even if normative work is “complete”, there may be known limitations, deferred items, or implementation notes.
2.2 Missing references and cross-spec alignment
2.3 Missing CR details
This makes it hard for SA2 to understand impact.
3) Impact Assessment
3.1 Impact on specifications
3.2 Impact on implementations
3.3 Interoperability and deployment impact
4) Feasibility
4.1 Practical implementability not demonstrated
4.2 Process feasibility: timing and approvals
Otherwise, SA2 may proceed assuming stability when changes could still occur.
5) Weaknesses
5.1 Over-reliance on a single statement of completion
5.2 Lack of traceability and verifiability
5.3 No explicit request to SA2 beyond “take into account”
The current wording risks being ignored or misinterpreted.
6) Suggestions for Improvement
6.1 Fix identifiers and improve clarity
6.2 Provide a minimal technical summary of Annex R
Add 5–10 bullets summarizing what Annex R normatively specifies, for example:
- Security objectives and threat assumptions for IMS avatar communication
- Authentication/authorization model (reuse of IMS AKA? additional authorization?)
- Key establishment and media protection approach
- Integrity/confidentiality requirements for avatar-related signaling and media
- Privacy considerations (avatar metadata, user identifiers)
- Interop/negotiation and fallback behavior
6.3 Add traceability details
Include:
- TS 33.328 version and release
- CR084 title, affected clauses, and a 2–3 line change summary
- WI identifier (SP number) for NG_RTC_SEC_Ph2
6.4 Be precise about “completion”
Replace “fully specified” with scoped language, e.g.:
- “SA3 has completed the normative security specification deliverables for IMS Avatar communication under NG_RTC_SEC_Ph2, captured in TS 33.328 Annex R (CR084 agreed in SA3#124, pending SA#110 approval).”
Also state whether any non-normative guidance, test specs, or remaining study items exist.
6.5 Provide explicit actions for SA2
Depending on the intent, propose concrete actions such as:
- “SA2 to reference TS 33.328 Annex R clause R.x in the IMS Avatar stage-2 spec”
- “SA2 to ensure architecture supports [specific security assumption], e.g., binding of avatar stream to authenticated IMS identity”
- “SA2 to confirm no additional security requirements beyond Annex R are needed”
6.6 Add an impact note
Even a short paragraph would help:
- Backward compatibility expectations
- Any new network/UE capabilities required
- Any expected deployment constraints (roaming, interconnect, certificate/trust)
Bottom line
As a process/status reply, the document is directionally fine, but it is too thin and over-claims completion without scoping, traceability, or actionable guidance. Strengthening the LS with a concise technical summary, explicit mapping to SA2 questions, and clear references (CR title/clause/version/WI) would materially improve its usefulness and reduce the risk of misalignment between SA2 architecture and SA3 security specifications.