Meeting: TSGS4_135_India | Agenda Item: 5.2
LS on LI requirements on IMS Data Channel
SA3-LI
LS in
Action
Rel-19
| TDoc | S4-260029 |
| Title | LS on LI requirements on IMS Data Channel |
| Source | SA3-LI |
| Agenda item | 5.2 |
| Agenda item description | Other 3GPP groups |
| Doc type | LS in |
| For action | Action |
| Release | Rel-19 |
| Original LS | s3i250185 |
| download_url | https://www.3gpp.org/ftp/tsg_sa/WG4_CODEC/TSGS4_135_India/Docs/S4-260029.zip |
| Cc | CT1, SA3 |
| To | SA4, SA2 |
| For | Action |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T15:41:08.240000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 15:37:03 |
| Agenda item sort order | 7 |
Each has different LI implications. The LS does not define the scenario.
If SA2/SA4 were to “enable LI” for an encrypted data channel, possible impacts include:
- Architecture changes (SA2): anchoring, media path requirements, interconnect assumptions, roaming models.
- Codec/media framework changes (SA4): security profiles, key management, transport selection, fallback behavior.
- Security architecture changes (SA3): if network access to plaintext or keys is introduced, it may:
- weaken confidentiality guarantees,
- create new attack surfaces,
- require new trust assumptions and compliance controls.
The LS does not discuss these trade-offs.
For each cited TS 33.126 requirement (R6.4-160/170/180/190):
- quote the requirement text (or summarize precisely with clause reference),
- state the IMS Data Channel feature behavior (with TS 26.114 clause references),
- identify the failing point (e.g., no interception point, no key access, no association to IRI),
- specify whether the gap is for IRI, CC, or both,
- indicate whether the gap is specific to roaming/interconnect/mid-session.
Include message/media/keying flows for:
1) Roaming (clearly specify: IMS home-routed vs LBO; and how data channel media is routed)
2) Inter-CSP interconnect (both sides support vs one side does not)
Mark:
- where encryption is applied/terminated,
- where an operator could realistically duplicate content,
- where LI mediation would obtain CC/IRI.
Explicitly state:
- transport protocol (e.g., RTP/RTCP, SCTP/DTLS, MSRP, QUIC, etc.),
- security protocol (DTLS-SRTP, TLS, etc.),
- key establishment (SDP offer/answer, certificates, identity binding),
- whether keys are UE-only or network-terminated.
Without this, SA2/SA4 cannot act.
Instead of “develop a solution”, propose specific study items/questions, e.g.:
- Define an operator-controlled media anchoring option for IMS Data Channel to enable LI (with clear interoperability rules).
- Define fallback/interworking behavior when the peer network does not support IMS Data Channel (and LI expectations in fallback).
- Define mid-session LI activation handling (e.g., re-key triggers, duplication start, buffering).
- Define roaming/interconnect responsibilities (home vs visited interception, where CC is obtained).
Add a section assessing:
- impact on confidentiality and threat model,
- key protection requirements if any key material is exposed to network functions,
- audit and authorization controls aligned with LI principles.
List candidate specs likely impacted and which group should lead:
- SA2: architecture/roaming/interconnect anchoring
- SA4: media transport/security profiles and interworking
- SA3: security requirements and LI alignment (and ensure no contradiction with security objectives)
If S8HR/N9HR is truly relevant, explain the mapping to IMS Data Channel routing and LI points. Otherwise, replace with correct IMS roaming models and references.
The LS raises a plausible concern (LI vs encrypted IMS Data Channel), but in its current form it is too assertion-based and underspecified to drive actionable work in SA2/SA4. Strengthening it with precise requirement mapping, concrete flows, and a clear security/termination model is necessary before meaningful specification impact or feasibility can be evaluated.
[Technical] The LS asserts that “neither approach is currently achievable” for IMS Data Channel LI, but it provides no concrete analysis of where the current keying/encryption (e.g., DTLS-SRTP, E2E vs hop-by-hop, key ownership/termination points) prevents delivery of CC or decryption parameters, making the conclusion unverifiable and hard for SA2/SA4 to act on.
[Technical] The “required (if preferred not feasible)” framing (access to encryption parameters) is potentially incompatible with LI security principles unless tightly scoped (who provides keys, under what authorization, how protected, auditability); the LS should reference the exact TS 33.126 clauses and clarify whether it expects IRI/CC delivery of session keys, key escrow, or network-terminated encryption.
[Technical] Roaming cases “S8HR/N9HR model” are cited, but those are EPC/5GC roaming models and not directly an IMS/IMS Data Channel architectural term; the LS needs to map the roaming scenario to IMS entities (P-CSCF/S-CSCF/IBCF/TrGW) and identify which operator is expected to perform LI and where encryption terminates.
[Technical] The interoperability gap scenario (one CSP supports IMS Data Channel, the other does not, target on the non-Data-Channel CSP) is underspecified: it’s unclear whether the session is negotiated as MSRP/SIP MESSAGE fallback, rejected, or transcoded/translated at an interconnect function, and without that call flow it’s not possible to conclude LI is impossible.
[Technical] “Direct communications between two users” is ambiguous in IMS context (still network-routed SIP with media/data path via IP, or true P2P/E2E); LI feasibility depends critically on whether the data channel is end-to-end encrypted at the application layer versus protected only on access legs.
[Technical] Mid-session interception is mentioned, but the LS does not specify which mid-session events break LI (e.g., re-keying, ICE restart, DTLS renegotiation, path change, handover, inter-PSAP transfer), nor what LI function fails (CC duplication, correlation, key update delivery).
[Technical] The LS references TS 26.114 Figure 6.2.10.1-1 for “Data Channel Workflow,” but does not identify which nodes in that figure would need LI mediation/duplication or key access; without pinpointing the interception points, SA4/SA2 cannot derive normative architectural changes.
[Technical] The request “Develop a solution and architecture for secured IMS Data Channel that enables CSPs to meet LI requirements” is too open-ended; it should propose candidate solution directions (e.g., network-terminated DTLS at SBC/TrGW, LI-friendly key management hooks, standardized key export to MDF under warrant) to avoid divergent interpretations across groups.
[Technical] The LS does not address whether the LI requirement applies to both CC and IRI for IMS Data Channel, and how correlation identifiers (SIP dialog identifiers, data channel identifiers, 5-tuple changes) would be maintained—this is often the practical blocker in multi-leg/interconnect scenarios.
[Editorial] The document cites TS 33.126 requirements by IDs (R6.4-160/170/180/190) but does not quote or summarize them; readers outside SA3-LI may not know what each requirement mandates, weakening the clarity and actionability of the LS.
[Editorial] Terminology is inconsistent/unclear: “CSP” is used without definition (operator, service provider, or IMS network provider), and “IMS without IMS Data Channel feature” should be aligned to the exact feature name and spec references in SA4/CT (e.g., IMS Data Channel per TS 26.114/related stage 2/3).
[Editorial] The LS claims “major complications for CSPs to respect their national regulations” but does not separate regulatory obligation from 3GPP requirement compliance; it would be better to state the specific 3GPP compliance risk (non-fulfilment of TS 33.126 LI requirements) and the impacted deployment scenarios.