Unknown
S4-260027 / TSGS4_135_India / 5.2 / TSG SA / LS Response on external data channel content...
Previous Next Edit
S4-260027

LS Response on external data channel content access requirements

Source: TSG SA
Meeting: TSGS4_135_India
Agenda Item: 5.2

All Metadata
Agenda item description Other 3GPP groups
Doc type LS in
For action Information
Original LS SP-251693
download_url Download Original
Cc TSG CT, SA WG1, SA WG2, SA WG3, SA WG4, SA WG6
To GSMA NG UPG
For Information
Type LS in
Contact Andrijana Brekalo
Uploaded 2026-01-21T15:21:08.160000
Contact ID 91743
TDoc Status noted
Reservation date 21/01/2026 15:17:33
Agenda item sort order 7
Review Comments
manager - 2026-02-09 04:47

1) Technical Accuracy


Ambiguity / potential mischaracterization of “regulatory scope” (SA1 feedback)



  • The statement “When IMS Data Channel is used as part of IMS telephony services, the applications (including HTML and JavaScript content) are expected to be subject to local telecom regulation” is overly broad and potentially inaccurate as written.

  • In many jurisdictions, regulatory obligations attach to the provider and the service classification (e.g., ECS/ICS, PATS, OTT, etc.), not automatically to any application-layer content delivered during an IMS session.

  • “HTML/JavaScript content” could be user-generated, third-party hosted, or operator-provided; regulatory treatment differs materially. The LS summary risks implying a blanket rule.

  • The follow-on statement “Standalone Data Channel… could also include local telecom regulations” is similarly vague and could be read as implying telecom regulation is likely even for non-telephony use, which is not generally defensible without jurisdiction-specific analysis.


Security scope (SA3 feedback) is technically plausible but incomplete in framing



  • The claim that SA3 has “no plans to standardize security architecture and measures for content/source validation and trust computation” may be accurate as a status update, but it conflicts with the practical reality that external content access introduces:

  • origin authentication / integrity requirements,

  • policy enforcement,

  • sandboxing and privilege separation,

  • and potentially lawful intercept / audit considerations depending on service classification.

  • If the LS implies that these are “out of scope,” it risks leaving a security vacuum while SA4 simultaneously acknowledges specification ambiguity. That combination is technically risky.


SA4 “original design assumption” about exclusive hosting by DCSF/DC AS



  • The statement that SA4 assumed DCSF/DC AS would be “exclusive hosts for all content” is questionable unless the relevant normative text in TS 26.114 explicitly constrains content sourcing that way.

  • If TS 26.114 already allows URIs or references that could resolve externally (directly or indirectly), then the “assumption” is not a safe basis for dismissing external mashups.

  • If TS 26.114 is silent, then the assumption is not a technical constraint—only an interpretation—so implementers may already have diverged.


SA6 CAPIF reference (TS 23.222) may be conceptually misapplied



  • CAPIF is an API exposure framework (northbound API exposure, onboarding, authorization, logging, etc.). Using CAPIF as a reference for “IMS session interworking with external content sources” is not obviously aligned:

  • External content retrieval (e.g., web resources referenced by HTML/JS) is not the same as API invocation under operator control.

  • CAPIF does not directly solve browser-like content security issues (CORS, CSP, origin policy, script integrity, sandboxing), nor does it define how a UE renders/executes content in an IMS Data Channel context.

  • The LS summary risks overstating CAPIF’s applicability unless the intent is specifically “external resources are only accessible via operator-controlled API exposure gateways,” which would be a major architectural constraint and should be stated explicitly.




2) Completeness


Missing normative references and pinpoint citations



  • The document summary references TS 26.114 and TS 23.222, but does not cite:

  • the exact clauses in TS 26.114 that are ambiguous (e.g., where external URIs/resources are referenced, how content is described, any security considerations),

  • the exact CAPIF capabilities being mapped to the problem (onboarding, authorization, API invoker/provider roles, etc.).

  • SA2’s “separate direct reply” is not included. For a consolidated LS response, omitting SA2 content creates a material gap—especially since SA2 typically owns IMS architecture and could be central to “external resource access” behavior.


Missing threat model and security requirements



  • If the concern is “external data channel content access requirements,” the response should include at least a minimal threat model:

  • external host impersonation, MITM, malicious script injection,

  • data exfiltration from IMS context,

  • privilege escalation via UE rendering engine,

  • tracking/privacy leakage (3rd-party beacons),

  • downgrade/redirect attacks.

  • Without this, SA3’s “no plans” position is not justified, and SA4’s “study later” lacks prioritization rationale.


Missing definition of “external resource mashups”



  • The term is used but not defined. It matters whether “external” means:

  • outside the PLMN but still operator-trusted CDN,

  • public Internet domains,

  • enterprise domains,

  • third-party AS reachable via IMS core,

  • or resources embedded by reference (URI) vs. fetched by the DC AS and proxied.

  • Different cases imply different security, policy, and charging implications.


Missing analysis of UE behavior and execution environment



  • The key practical question is: who fetches external resources and who executes scripts?

  • UE directly fetching external URLs vs. DC AS fetching/proxying vs. DCSF mediation.

  • Whether the UE uses a webview/browser engine, and what sandboxing applies.

  • The response does not address this, yet it is central to “content access requirements.”


Missing backward compatibility / deployment impact analysis



  • No assessment of whether existing R18/R19 implementations already allow external references, and what clarifications would do to them.

  • No discussion of whether clarifications would be normative “shall” requirements or informative guidance.




3) Impact Assessment (on specs and implementations)


Potentially significant impact if external access is constrained



  • If SA4 clarifications in R20 end up requiring “all resources must be hosted by DCSF/DC AS” or “must be fetched via operator-controlled proxy,” that would:

  • break existing implementations that allow direct external fetch,

  • require new network functions (proxy, filtering, caching),

  • introduce latency and scaling costs,

  • create new compliance obligations (content moderation, logging).


Security and liability implications if left ambiguous



  • If the specs remain ambiguous, vendors/operators may implement inconsistent policies:

  • Some UEs may block external resources; others may allow them.

  • Some may enforce TLS pinning/allowlists; others may not.

  • This fragmentation can lead to:

  • interoperability failures (content works on some devices only),

  • increased attack surface and incident risk,

  • inconsistent regulatory compliance posture.


CAPIF-based approach could imply architectural changes



  • If CAPIF is used as a “reference,” it may push toward an operator-controlled exposure model:

  • onboarding of third-party providers,

  • token-based authorization,

  • logging/auditing.

  • That is a non-trivial addition for IMS Data Channel ecosystems and may not align with the original lightweight content model.




4) Feasibility (practical implementability)


“Study in R20” is feasible but timing risk is high



  • Deferring to FS_DCE_MED in R20 is feasible procedurally, but it leaves:

  • R18/R19 deployments without guidance,

  • GSMA requirements unresolved for near-term product cycles.

  • If devices already ship with permissive external access, later restrictions may be impractical to retrofit.


Implementing secure external content access is feasible but requires explicit choices


Feasible solutions exist, but the LS does not indicate which direction is preferred:

- Allowlist + TLS requirements (operator-provisioned trust anchors, domain allowlists).

- Proxy model (DC AS fetches external resources, sanitizes, rewrites URLs).

- Integrity mechanisms (e.g., subresource integrity-like hashes, signed manifests).

- Sandboxing model (no script execution, or restricted JS APIs, strict CSP).

Each has different feasibility and cost; without selecting a model, “clarifications” risk being non-actionable.




5) Weaknesses (argumentation / methodology)



  • Non-actionable responses: Multiple WGs essentially say “not studied / no plans / will inform later.” As an LS response to explicit GSMA concerns, this reads as deflection rather than resolution.

  • No prioritization: SA4 acknowledges gaps but does not state severity, affected scenarios, or interim guidance.

  • No evidence: Claims like “original design assumption” are not backed by citations to normative text, prior agreements, or study conclusions.

  • Scope fragmentation: Security (SA3), architecture (SA6/SA2), and media/application behavior (SA4) are tightly coupled here. Treating them independently risks inconsistent outcomes.

  • CAPIF hand-waving: Referencing CAPIF without mapping concrete procedures (roles, onboarding, authorization flows) to the IMS Data Channel content problem weakens credibility.




6) Suggestions (constructive improvements)


A. Add precise spec references and problem statements



  • Include clause-level references to TS 26.114 where:

  • content is described/transported,

  • any URI/resource referencing is defined,

  • UE behavior is implied or left open.

  • Define “external resource” and “mashup” with a taxonomy (operator domain, partner domain, public Internet; direct fetch vs. proxied).


B. Provide interim guidance (even if R20 study is planned)



  • Recommend a baseline safe behavior for current deployments, e.g.:

  • default deny external resources unless operator-authorized,

  • require HTTPS with valid PKI and optionally operator allowlist,

  • prohibit/limit active content (JS) unless integrity-protected and from trusted origins.

    Even informative guidance would reduce fragmentation.


C. Establish a minimal security requirements set (coordinate SA3/SA4/SA2)



  • Propose a joint SA2/SA3/SA4 work item output (or at least a liaison back) covering:

  • trust model (who vouches for external origins),

  • authentication/integrity requirements,

  • policy provisioning to UE,

  • logging/audit hooks if needed.

  • If SA3 truly will not standardize this, explicitly state which WG/spec will (or that it will be left to implementers—acknowledging the risk).


D. Clarify the execution environment and responsibilities



  • Specify whether:

  • UE is expected to execute HTML/JS (and under what sandbox),

  • DC AS is expected to sanitize/transform content,

  • DCSF has any mediation/policy role.

    This is essential for implementable requirements.


E. Be careful with CAPIF positioning



  • If CAPIF is only a conceptual reference, say so and avoid implying it solves content security.

  • If the intent is “external resources must be accessed via operator-controlled API exposure,” then:

  • state that explicitly,

  • outline the mapping (API provider onboarding, authorization, resource access),

  • and assess impact on existing IMS Data Channel architecture.


F. Include SA2 content or summarize it



  • Since SA2 is central to IMS architecture, the consolidated LS should either:

  • include SA2’s response, or

  • summarize its key conclusions and provide a reference to the separate reply.


G. Add an impact/backward compatibility section



  • Identify whether clarifications will be:

  • purely informative (no behavior change),

  • normative restrictions (potentially breaking),

  • or optional features with negotiation/capability exchange.

  • Consider adding capability negotiation so UEs/AS can interoperate when external access is supported/blocked.




If you can share the actual LS text (not only the summary), I can pinpoint exact wording issues and propose concrete replacement text aligned with 3GPP LS conventions and the relevant TS clauses.

Sign in to add comments.