TDoc: S4-260025

Meeting: TSGS4_135_India | Agenda Item: 5.2

Back to Agenda
Document Information
Title

Reply LS on the status of the IMS Avatar Security Aspects

Source

SA3

Type

LS in

For

Information

Release

Rel-19

3GPP Document
View on 3GPP
TDoc S4-260025
Title Reply LS on the status of the IMS Avatar Security Aspects
Source SA3
Agenda item 5.2
Agenda item description Other 3GPP groups
Doc type LS in
For action Information
Release Rel-19
Original LS S3-254551
download_url https://www.3gpp.org/ftp/tsg_sa/WG4_CODEC/TSGS4_135_India/Docs/S4-260025.zip
Cc SA4
To SA2
For Information
Type LS in
Contact Andrijana Brekalo
Uploaded 2026-01-21T15:01:09.583000
Contact ID 91743
TDoc Status noted
Reservation date 21/01/2026 14:49:28
Agenda item sort order 7
Comments
Previous Comments:
manager
2026-02-09 04:48:17

1) Technical Accuracy


1.1 Incorrect/unclear document identifiers and scope



  • Title mismatch: The contribution is labeled S4-260025 but the content is a “Summary of S3-254551”. If this is intended as an S4 document, the relationship between S4-260025 and S3-254551 should be explicit (e.g., “S4-260025 contains S3-254551 for information” or “S4-260025 summarizes S3-254551”). As written, it is confusing and risks mis-tracking in the meeting records.

  • LS references appear inconsistent: You cite “SA2’s LS (S3-254015/S2-2509593)”. An LS from SA2 would normally be tracked in SA2 (S2-…) and received/registered in SA3 (S3-…). That’s plausible, but the pairing should be explained (e.g., “received in SA3 as S3-254015, originating from SA2 as S2-2509593”). Right now it reads like two unrelated numbers.


1.2 Questionable claim: “fully specified” / “completion of Rel-19 security requirements”



  • The statement that “security aspects … have been fully specified in normative Annex R of TS 33.328” is too strong unless you explicitly delimit what “security aspects” means (e.g., authentication, key management, media protection, identity, authorization, privacy, interop, lawful intercept considerations, etc.).

  • TS 33.328 is typically a security specification for a particular service domain; claiming that Annex R alone “completes Rel-19 security requirements” for “IMS avatar communication” may be incomplete if other specs are involved (e.g., IMS security baseline in TS 33.203, SIP/IMS security procedures, media security, identity/privacy, certificate handling, etc.). At minimum, the claim should be scoped to “the security normative work item deliverables under NG_RTC_SEC_Ph2 for IMS Avatar as captured in TS 33.328 Annex R”.


1.3 Potential inconsistency: “normative Annex R” and CR status



  • You state “Final CR (CR084) … agreed at SA3#124” and “Expected approval: SA#110 plenary”.

  • If the CR is “Final” and “agreed” at SA3, it still needs TSG SA approval; that part is fine. However, the document should clarify whether it is for approval at SA#110 or merely planned (and whether any remaining dependencies exist).

  • Also, “Final CR” terminology can be ambiguous: in 3GPP practice, “Final” is a CR category, but it does not automatically mean the work is complete—only that the CR is in a final state for approval. The text conflates “Final CR agreed” with “work completed”.


1.4 Work item naming and traceability



  • NG_RTC_SEC_Ph2” is plausible, but the document provides no WI identifier (e.g., SP-xxxx) or a link to the SA work plan. Without that, the claim is hard to verify and weak from a process/traceability standpoint.




2) Completeness


2.1 Missing technical substance for SA2 consumption


As a reply LS summary, it may be acceptable to be short, but it is missing key information SA2 needs to act:

- What exactly is covered in Annex R (high-level bullets): threat model assumptions, security objectives, procedures, interfaces, and whether it covers both control plane and media plane aspects.

- Dependencies on SA2 architecture: Are there any assumptions about IMS avatar signaling, media transport, identity binding, or network functions that SA2 must ensure?

- Any open issues / residual risks: Even if normative work is “complete”, there may be known limitations, deferred items, or implementation notes.


2.2 Missing references and cross-spec alignment



  • Only TS 33.328 Annex R is referenced. If IMS avatar communication relies on other security specs (likely), the LS should point to:

  • TS 33.203 (IMS security) and any relevant clauses impacted/assumed.

  • Any relevant key management / media security specs (depending on whether SRTP/DTLS-SRTP, MIKEY, or other mechanisms are used in the avatar context).

  • Any privacy/identity specs if avatars involve user representation, metadata, or biometric-like data.

  • If SA2 asked specific questions in S3-254015/S2-2509593, the reply should explicitly map question → answer. The current text does not demonstrate that SA3 addressed SA2’s concerns; it only states completion.


2.3 Missing CR details



  • “CR084” is mentioned without:

  • CR title

  • affected version/release

  • summary of changes

  • whether it introduces new requirements on UE/IMS core

    This makes it hard for SA2 to understand impact.




3) Impact Assessment


3.1 Impact on specifications



  • If Annex R introduces new normative security procedures, it may affect:

  • IMS procedures (SIP signaling security, authentication, authorization)

  • Media security (if avatar streams are treated as media)

  • Interworking with existing IMS services and NG RTC features

  • The document does not assess whether SA2 specs need updates (e.g., new parameters, new SDP attributes, new SIP headers, new policy control hooks, new identifiers).


3.2 Impact on implementations



  • “Security work completed” can imply implementers should now implement Annex R. But the LS does not indicate:

  • Whether the solution is backward compatible

  • Whether it requires new credentials, new key derivations, new certificate validation, or new trust anchors

  • Whether it impacts performance (e.g., additional handshakes, crypto overhead) or latency (important for real-time avatar use)

  • Without this, SA2 and implementers cannot gauge rollout complexity.


3.3 Interoperability and deployment impact



  • If the security solution introduces optional features, profiles, or negotiation, SA2 needs to know mandatory-to-implement vs optional to avoid fragmentation. The LS does not mention any profile/optionality.




4) Feasibility


4.1 Practical implementability not demonstrated



  • The document provides no evidence that Annex R procedures are implementable within typical IMS/UE constraints:

  • Key management feasibility (UE capabilities, SIM/USIM involvement, certificate storage)

  • Compatibility with existing IMS security associations

  • Handling of roaming, interconnect, and multi-operator trust

  • If the avatar communication involves new media types or metadata, feasibility depends on how they are protected and negotiated; none of this is summarized.


4.2 Process feasibility: timing and approvals



  • “Agreed at SA3#124” and “expected approval at SA#110” suggests the work is near completion, but the LS should state:

  • Whether any parallel CRs exist in other specs

  • Whether any late objections or pending alignment with SA2 remain

    Otherwise, SA2 may proceed assuming stability when changes could still occur.




5) Weaknesses


5.1 Over-reliance on a single statement of completion



  • The core argument is essentially: “Annex R exists; therefore security is done.” This is weak because it does not:

  • Demonstrate coverage of SA2’s concerns

  • Provide a checklist of security aspects addressed

  • Identify assumptions and constraints


5.2 Lack of traceability and verifiability



  • No clause numbers, no CR title, no WI/SP reference, no version of TS 33.328, no link to the SA3 decision record. This makes the contribution hard to audit.


5.3 No explicit request to SA2 beyond “take into account”



  • “Take the completion status into account” is vague. SA2 typically needs actionable guidance:

  • “No further action needed”

  • or “Please align architecture/spec X with security assumptions Y”

  • or “Please reference TS 33.328 Annex R clause Z in your spec”

    The current wording risks being ignored or misinterpreted.




6) Suggestions for Improvement


6.1 Fix identifiers and improve clarity



  • Explicitly state the relationship between S4-260025 and S3-254551 (attach, summarize, or forward).

  • Clarify LS numbering: “Originating LS: S2-2509593; registered in SA3 as S3-254015”.


6.2 Provide a minimal technical summary of Annex R


Add 5–10 bullets summarizing what Annex R normatively specifies, for example:

- Security objectives and threat assumptions for IMS avatar communication

- Authentication/authorization model (reuse of IMS AKA? additional authorization?)

- Key establishment and media protection approach

- Integrity/confidentiality requirements for avatar-related signaling and media

- Privacy considerations (avatar metadata, user identifiers)

- Interop/negotiation and fallback behavior


6.3 Add traceability details


Include:

- TS 33.328 version and release

- CR084 title, affected clauses, and a 2–3 line change summary

- WI identifier (SP number) for NG_RTC_SEC_Ph2


6.4 Be precise about “completion”


Replace “fully specified” with scoped language, e.g.:

- “SA3 has completed the normative security specification deliverables for IMS Avatar communication under NG_RTC_SEC_Ph2, captured in TS 33.328 Annex R (CR084 agreed in SA3#124, pending SA#110 approval).”

Also state whether any non-normative guidance, test specs, or remaining study items exist.


6.5 Provide explicit actions for SA2


Depending on the intent, propose concrete actions such as:

- “SA2 to reference TS 33.328 Annex R clause R.x in the IMS Avatar stage-2 spec”

- “SA2 to ensure architecture supports [specific security assumption], e.g., binding of avatar stream to authenticated IMS identity”

- “SA2 to confirm no additional security requirements beyond Annex R are needed”


6.6 Add an impact note


Even a short paragraph would help:

- Backward compatibility expectations

- Any new network/UE capabilities required

- Any expected deployment constraints (roaming, interconnect, certificate/trust)




Bottom line


As a process/status reply, the document is directionally fine, but it is too thin and over-claims completion without scoping, traceability, or actionable guidance. Strengthening the LS with a concise technical summary, explicit mapping to SA2 questions, and clear references (CR title/clause/version/WI) would materially improve its usefulness and reduce the risk of misalignment between SA2 architecture and SA3 security specifications.

You must log in to post comment