Meeting: TSGS4_135_India | Agenda Item: 5.2
LS reply on LI requirements on IMS Data Channel
SA3
LS in
Information
Rel-18
| TDoc | S4-260024 |
| Title | LS reply on LI requirements on IMS Data Channel |
| Source | SA3 |
| Agenda item | 5.2 |
| Agenda item description | Other 3GPP groups |
| Doc type | LS in |
| For action | Information |
| Release | Rel-18 |
| Original LS | S3-253806 |
| download_url | https://www.3gpp.org/ftp/tsg_sa/WG4_CODEC/TSGS4_135_India/Docs/S4-260024.zip |
| Cc | SA4, CT1 |
| To | SA2, SA3-LI |
| For | Information |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T14:51:08.610000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 14:43:36 |
| Agenda item sort order | 7 |
1) Technical Accuracy
Scenario 1 (Roaming S8HR/N9HR): “LI implies these interfaces should not be confidentiality protected”
“VPLMN could access DC content copy … using DTLS 1.2 with NULL cipher”
“DTLS 1.3 is recommended from Rel-19 onwards”
“Security downgrade must be applied to all HPLMN UEs to avoid LI detectability”
“Conflicts with regulatory requirements (e.g., EU Cyber Resilience Act)”
2) Completeness
Missing normative references and clause-level grounding
The summary lacks:
- Exact spec references for IMS Data Channel security architecture (e.g., where DTLS is specified, endpoints, cipher requirements).
- LI architecture references (TS 33.107/33.108, and any IMS-specific LI specs such as TS 33.108 annexes or relevant SA3-LI outputs). The document should explicitly map the scenarios to LI requirements: IRI, CC, and where interception points are expected.
Missing analysis of alternative LI-compliant architectures
Scenario 1 focuses on “NULL cipher / no confidentiality” as the implied solution and rejects it. What’s missing:
- Options such as anchoring/termination in a trusted network function (home or visited) that can lawfully provide CC.
- Key escrow / lawful key access models (even if controversial) should be mentioned as possibilities and then rejected with rationale if SA3 opposes them.
- Split interception (IRI in VPLMN, CC in HPLMN) and how that meets regulatory needs in roaming.
Missing threat model and detectability analysis
Claims about detectability and downgrade need:
- What the UE can observe (DTLS handshake, cipher suite negotiation, ALPN, certificate, fingerprinting).
- Whether “undetectability” is a requirement in the relevant LI requirements baseline for this feature.
Scenario 2: insufficient technical detail
Scenario 3: acceptance of “no gaps” is weak
3) Impact Assessment
On security posture and interoperability
On existing IMS/DC implementations
On LI specifications and handover interfaces
4) Feasibility
DTLS NULL cipher approach
“Apply downgrade to all HPLMN UEs”
Proxy-mode anchoring for LI (Scenario 2)
5) Weaknesses
6) Suggestions for Improvement
A) Add precise references and tighten wording
B) Provide an explicit options analysis for Scenario 1
Include at least 3–4 candidate approaches with pros/cons:
1. Home-network interception only (CC produced in HPLMN; VPLMN provides IRI and routing info).
2. Visited-network anchoring/termination (MF in VPLMN terminates DTLS under defined trust model).
3. Lawful key access (if considered at all—likely controversial; document why it is/ isn’t acceptable).
4. Service restriction in roaming (if LI cannot be met without weakening security, consider policy-based disablement of DC in certain roaming cases—again, controversial but should be analyzed).
C) Clarify the threat model and “undetectability” requirement
D) Strengthen Scenario 2 with concrete call flows
E) Do not dismiss Scenario 3 without validation
F) Reframe regulatory discussion
Bottom line
The document correctly flags that “weakening encryption to satisfy LI” is problematic, but it is not sufficiently rigorous or complete: it lacks normative references, overstates some claims (DTLS versioning, “interfaces should not be protected,” “must downgrade all UEs”), and does not provide a structured set of feasible alternatives. Strengthening the contribution requires clause-level grounding, explicit architectural options, and concrete call flows—especially for roaming and UE-initiated P2P cases.