LS on LI requirements on IMS Data Channel
Source: SA3-LI
Meeting:
TSGS4_135_India
Agenda Item:
5.2
| Agenda item description | Other 3GPP groups |
|---|---|
| Doc type | LS in |
| For action | Action |
| Release | Rel-19 |
| Original LS | s3i250185 |
| download_url | Download Original |
| Cc | CT1, SA3 |
| To | SA4, SA2 |
| For | Action |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T15:41:08.240000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 15:37:03 |
| Agenda item sort order | 7 |
Review Comments
[Technical] The LS asserts that “neither approach is currently achievable” for IMS Data Channel LI, but it provides no concrete analysis of where the current keying/encryption (e.g., DTLS-SRTP, E2E vs hop-by-hop, key ownership/termination points) prevents delivery of CC or decryption parameters, making the conclusion unverifiable and hard for SA2/SA4 to act on.
[Technical] The “required (if preferred not feasible)” framing (access to encryption parameters) is potentially incompatible with LI security principles unless tightly scoped (who provides keys, under what authorization, how protected, auditability); the LS should reference the exact TS 33.126 clauses and clarify whether it expects IRI/CC delivery of session keys, key escrow, or network-terminated encryption.
[Technical] Roaming cases “S8HR/N9HR model” are cited, but those are EPC/5GC roaming models and not directly an IMS/IMS Data Channel architectural term; the LS needs to map the roaming scenario to IMS entities (P-CSCF/S-CSCF/IBCF/TrGW) and identify which operator is expected to perform LI and where encryption terminates.
[Technical] The interoperability gap scenario (one CSP supports IMS Data Channel, the other does not, target on the non-Data-Channel CSP) is underspecified: it’s unclear whether the session is negotiated as MSRP/SIP MESSAGE fallback, rejected, or transcoded/translated at an interconnect function, and without that call flow it’s not possible to conclude LI is impossible.
[Technical] “Direct communications between two users” is ambiguous in IMS context (still network-routed SIP with media/data path via IP, or true P2P/E2E); LI feasibility depends critically on whether the data channel is end-to-end encrypted at the application layer versus protected only on access legs.
[Technical] Mid-session interception is mentioned, but the LS does not specify which mid-session events break LI (e.g., re-keying, ICE restart, DTLS renegotiation, path change, handover, inter-PSAP transfer), nor what LI function fails (CC duplication, correlation, key update delivery).
[Technical] The LS references TS 26.114 Figure 6.2.10.1-1 for “Data Channel Workflow,” but does not identify which nodes in that figure would need LI mediation/duplication or key access; without pinpointing the interception points, SA4/SA2 cannot derive normative architectural changes.
[Technical] The request “Develop a solution and architecture for secured IMS Data Channel that enables CSPs to meet LI requirements” is too open-ended; it should propose candidate solution directions (e.g., network-terminated DTLS at SBC/TrGW, LI-friendly key management hooks, standardized key export to MDF under warrant) to avoid divergent interpretations across groups.
[Technical] The LS does not address whether the LI requirement applies to both CC and IRI for IMS Data Channel, and how correlation identifiers (SIP dialog identifiers, data channel identifiers, 5-tuple changes) would be maintained—this is often the practical blocker in multi-leg/interconnect scenarios.
[Editorial] The document cites TS 33.126 requirements by IDs (R6.4-160/170/180/190) but does not quote or summarize them; readers outside SA3-LI may not know what each requirement mandates, weakening the clarity and actionability of the LS.
[Editorial] Terminology is inconsistent/unclear: “CSP” is used without definition (operator, service provider, or IMS network provider), and “IMS without IMS Data Channel feature” should be aligned to the exact feature name and spec references in SA4/CT (e.g., IMS Data Channel per TS 26.114/related stage 2/3).
[Editorial] The LS claims “major complications for CSPs to respect their national regulations” but does not separate regulatory obligation from 3GPP requirement compliance; it would be better to state the specific 3GPP compliance risk (non-fulfilment of TS 33.126 LI requirements) and the impacted deployment scenarios.
1) Technical Accuracy
1.1 “Current encryption architecture prevents meeting TS 33.126 R6.4-160/170/180/190”
1.2 “Two acceptable approaches for LI: plaintext copy preferred; otherwise provide encryption parameters”
1.3 Roaming references: “S8HR/N9HR model”
1.4 “Interoperability case: one CSP uses IMS Data Channel, other does not; target on CSP without Data Channel; cannot intercept content”
1.5 “Direct communications between two users (when at least one is an LI target)”
Each has different LI implications. The LS does not define the scenario.
2) Completeness
2.1 Missing normative references and scope definition
2.2 No problem decomposition by interception type
2.3 No call flows / keying flows / trust model
2.4 “Mid-session interception” not analyzed
2.5 No explicit requirements to SA2/SA4
3) Impact Assessment
3.1 Potential cross-spec impact is high but not acknowledged
If SA2/SA4 were to “enable LI” for an encrypted data channel, possible impacts include:
- Architecture changes (SA2): anchoring, media path requirements, interconnect assumptions, roaming models.
- Codec/media framework changes (SA4): security profiles, key management, transport selection, fallback behavior.
- Security architecture changes (SA3): if network access to plaintext or keys is introduced, it may:
- weaken confidentiality guarantees,
- create new attack surfaces,
- require new trust assumptions and compliance controls.
The LS does not discuss these trade-offs.
3.2 Backward compatibility and deployment impact not addressed
then existing deployments may break or require upgrades. The LS does not assess this.
3.3 Inter-operator implications
4) Feasibility
4.1 Feasibility depends entirely on whether encryption is E2EE or hop-by-hop
4.2 Mid-session LI feasibility requires explicit re-key / duplication strategy
None is described.
4.3 Roaming feasibility requires clear anchoring model
5) Weaknesses
5.1 Assertions without substantiation
5.2 Conflation of regulatory requirement with technical mechanism
5.3 Unclear scope and terminology
5.4 No threat/security impact discussion
6) Suggestions for Improvement
6.1 Add a structured gap analysis table
For each cited TS 33.126 requirement (R6.4-160/170/180/190):
- quote the requirement text (or summarize precisely with clause reference),
- state the IMS Data Channel feature behavior (with TS 26.114 clause references),
- identify the failing point (e.g., no interception point, no key access, no association to IRI),
- specify whether the gap is for IRI, CC, or both,
- indicate whether the gap is specific to roaming/interconnect/mid-session.
6.2 Provide at least two concrete call flows
Include message/media/keying flows for:
1) Roaming (clearly specify: IMS home-routed vs LBO; and how data channel media is routed)
2) Inter-CSP interconnect (both sides support vs one side does not)
Mark:
- where encryption is applied/terminated,
- where an operator could realistically duplicate content,
- where LI mediation would obtain CC/IRI.
6.3 Clarify the security model of IMS Data Channel
Explicitly state:
- transport protocol (e.g., RTP/RTCP, SCTP/DTLS, MSRP, QUIC, etc.),
- security protocol (DTLS-SRTP, TLS, etc.),
- key establishment (SDP offer/answer, certificates, identity binding),
- whether keys are UE-only or network-terminated.
Without this, SA2/SA4 cannot act.
6.4 Narrow and make the “Action Requested” implementable
Instead of “develop a solution”, propose specific study items/questions, e.g.:
- Define an operator-controlled media anchoring option for IMS Data Channel to enable LI (with clear interoperability rules).
- Define fallback/interworking behavior when the peer network does not support IMS Data Channel (and LI expectations in fallback).
- Define mid-session LI activation handling (e.g., re-key triggers, duplication start, buffering).
- Define roaming/interconnect responsibilities (home vs visited interception, where CC is obtained).
6.5 Address security/privacy trade-offs explicitly
Add a section assessing:
- impact on confidentiality and threat model,
- key protection requirements if any key material is exposed to network functions,
- audit and authorization controls aligned with LI principles.
6.6 Identify impacted specs and propose ownership
List candidate specs likely impacted and which group should lead:
- SA2: architecture/roaming/interconnect anchoring
- SA4: media transport/security profiles and interworking
- SA3: security requirements and LI alignment (and ensure no contradiction with security objectives)
6.7 Validate the roaming terminology
If S8HR/N9HR is truly relevant, explain the mapping to IMS Data Channel routing and LI points. Otherwise, replace with correct IMS roaming models and references.
Bottom line
The LS raises a plausible concern (LI vs encrypted IMS Data Channel), but in its current form it is too assertion-based and underspecified to drive actionable work in SA2/SA4. Strengthening it with precise requirement mapping, concrete flows, and a clear security/termination model is necessary before meaningful specification impact or feasibility can be evaluated.