Meeting: TSGS4_135_India | Agenda Item: 10.8
7 documents found
[FS_DCE_MED] Key Issue Description for Interworking with MTSI
This contribution from Samsung proposes text for Key Issue #2 (Interworking facilitation with MTSI) in TR 26.814 for the DCE_MED study. The document addresses interworking scenarios between DCMTSI UEs and legacy MTSI UEs, identifying gaps between SA2's TS 23.228 and SA4's TS 26.114.
The document defines the necessary data flows for interworking between originating DCMTSI UE and terminating MTSI UE:
The document references TS 23.228 clause AC.7.9 procedures:
Via MF: - MF performs transcoding upon DCSF instructions - Transcoded MMTEL media transferred to terminating MTSI UE via associated RTP stream
Via DC AS: - DCSF determines IMS DC interworking based on session event notification from IMS AS - Changes P2P application data channel to P2A - Originating DCMTSI UE sends data channel application media to DC AS - DC AS performs interworking actions (details out of scope for TS 23.228)
The document identifies a critical gap between SA2 and SA4 specifications:
Observation 1: TS 23.228 specifies that IMS AS modifies endpoint type from P2P to P2A to support IMS DC interworking via DC AS.
Observation 2: TS 26.114 clause 6.2.10.3 states that SDP answerer for application DC shall include the same values for "a=3gpp-req-app" from the offer (except optional "app-dc-status" parameter), preventing modification of the "adc-stream-id-endpoint" parameter.
Observation 3: DC application in originating DCMTSI UE requires capability to identify when interworking mode is enabled to distinguish the actual target endpoint for specific media flows.
This document: 1. Provides foundational text describing interworking architecture and data flows for TR 26.814 2. Identifies specification misalignment between TS 23.228 (SA2) and TS 26.114 (SA4) regarding endpoint type modification in "a=3gpp-req-app" attribute 3. Highlights the need for DC application to detect interworking mode for proper endpoint identification
IMS Bootstrap Data Channel Restart
This contribution addresses issues related to IMS Data Channel (DC) failure and exceptional case handling in TS 26.114, which will be reviewed under the newly started study on DC Enhancements (FS_DCE_MED).
The document identifies that TS 26.114 lacks clear handling procedures for IMS DC failure and exceptional cases, which could result in: - Inconsistent behavior - Interoperability problems
The identified problem maps to multiple DC Enhancement study objectives: - Clarifications to HTTP protocol usage on DC - Identification of inconsistencies and ambiguities between TS 23.228, TS 26.114, TS 26.264, and TS 26.567
The contribution focuses on IMS DC transport restart (DTLS restart and/or SCTP restart), which may be triggered by: - IMS call forwarding - IMS call forking (typically when using IMS DC as "early media") - Access transport failures causing IP address and/or UDP port changes on core and/or UE side
Note: DTLS and SCTP restart procedures are covered by references to IETF RFC 8864 and RFC 8841 in TS 26.114.
Current TS 26.114 clause 6.2.10.1 specifies: - Initial entry point accessible at HTTP root ("/") URL after BDC establishment - Per TS 29.176 clause 6.1.6.2.5, this root URL is typically modified in the MF to represent the specific subscriber before being passed to DCSF for user customization - The modified URL is not visible to the UE
Key Gap: The specification does not define which initial URL the UE should use when the BDC is reestablished after a restart.
The document presents three alternative approaches for selecting the initial URL in a reestablished BDC:
Characteristics: - Reuse the same initial entry point as first BDC establishment - Possible interpretation of existing text - Straightforward implementation - Provides clearly defined restart point - Maintains possibility for MF to adapt URL to specific subscriber - No identified downsides
Source Position: This is the preferred approach.
Limitations: - Would likely fail in forking or forwarding scenarios - IMS network serving the URL may differ before and after restart - Previously valid URL may become invalid in the post-restart IMS network
Status: - No current use cases or scenarios exist to guide URL selection - Not a viable option at this time
The document proposes two actions for the DC Enhancement study:
[FS_DCE_MED] Key Issue #4 - Description for Automatic Resumption
This contribution from Samsung addresses Key Issue #4 concerning Automatic Resumption functionality in the context of the FS_DCE_MED study. The document responds to an LS from GSMA (S4-250755) requesting technical improvements to support automatic resumption service requirements developed by GSMA TSG IMSDCAS in GSMA PRD NG.129.
Core Functionality: - Automatic resumption enables users to resume streaming experiences from the point where they left off - Provides session continuity in IMS data channel environments - Commonly available on digital streaming platforms to maintain user engagement
The document identifies two primary use case categories:
1. Session Termination Scenarios: - Abnormal or normal session termination (network-initiated or user-initiated) - Enables application session continuation beyond single IMS session duration - Enhances user engagement with the platform
2. System Notification Scenarios: - User receives system notifications (e.g., security alerts) - Allows user to suspend application to address notifications - Enables resumption at appropriate point after handling notification
Automatic resumption must support: - Peer-to-peer sessions: Direct communication between caller UE#1 and callee UE#2 - Call transfer cases: Scenarios where caller UE#1 is transferred to UE#3
Key Technical Element: - Requires a persistent identifier serving as unique key for database storage of application context/state - This identifier must be: - Exchanged between peers - Configurable with defined lifetime
Proposed Analysis: The document proposes to analyze the technical feasibility of implementing this persistent identifier mechanism within the IMS data channel framework.
The contribution establishes the foundation for technical feasibility analysis of automatic resumption support, focusing on the identifier mechanism required to maintain and restore application state across session boundaries.
The Discussion of using a single DC stream for Multi DC Application Data Transmission
This contribution from China Mobile discusses potential issues with the current DC (Data Channel) application data transmission mechanism and proposes enhancements to support multiple DC applications over a single DC stream.
Support a common DC channel shared among multiple DC applications with the following approach:
Study whether to use and how to enhance DC to support multiple DC Application Data Transmission in a single DC stream.
[FS_DC_MED] Proposed TR 26.814 skeleton
This Technical Report is an early-stage study document (v0.0.1) from SA4 focusing on enhancements to the IMS Data Channel feature. The document builds upon Release 19 work that introduced architecture and procedure enhancements for IMS DC in TS 23.228 Annex AC, including Data Channel Signalling Function (DCSF), Media Function (MF), Data Channel Application Server (DC AS), and associated procedures.
The study aims to: - Improve interoperability of IMS Data Channel specified in TS 26.114 - Close ambiguities identified after Release 19 stage 2 architecture work - Address issues raised by external groups (e.g., GSMA) and other 3GPP working groups - Align stage 3 specification work with the Release 19 stage 2 framework
Key focus areas include: - Multi-application multiplexing - Interworking between Data Channel enabled MTSI and MTSI-only endpoints - HTTP subprotocol usage and handling of external resources - Cross-specification alignment
IMS Data Channel: A WebRTC data channel established within an IMS session according to TS 26.114, typically using DTLS/SCTP
Data Channel Application: An application identified and requested for use over the IMS Data Channel as described in TS 23.228 Annex AC
Data Channel Application Server (DC AS): An application server that provides DC application content and may participate in DC procedures
Data Channel Signalling Function (DCSF): A network function supporting IMS Data Channel application discovery, bootstrap, and policy handling
Media Function (MF): A network function for media anchoring, potentially supporting proxying and interworking functions for IMS Data Channel
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
Issue Statement: [Empty - to be filled]
Solution Direction: [Empty - to be filled]
Potential Specification Impacts: [Empty - to be filled]
Open Points and Dependencies: [Empty - to be filled]
[Empty - to be filled]
This is a skeleton/template document (v0.0.1) dated February 2026. All technical content sections are currently empty placeholders awaiting population with actual study results. The document has not been subject to any approval process and is provided for future development work within 3GPP only.
The document establishes the framework for studying six key issues related to IMS Data Channel enhancements, with focus on alignment between stage 2 (TS 23.228) and stage 3 (TS 26.114) specifications, as well as addressing practical implementation concerns around multiplexing, interworking, protocol usage, and cross-specification consistency.
[FS_DC_MED] Draft time plan
This document proposes a time plan for the Study Item on Data Channel Enhancements (FS_DCE_MED), which was approved at SA plenary #110. The study aims to address clarifications and enhancements to the Data Channel functionality in TS 26.114.
The Study Item addresses six key issues:
[FS_DCE_MED] External resources for DC applications
This contribution from Qualcomm addresses the issue of access to external resources by IMS Data Channel (DC) applications, as raised by GSMA. The document proposes solutions for enabling DC web applications to securely access third-party services while maintaining security and compliance with web standards.
The document describes a scenario from GSMA NG UPG where: - A UE-resident web application is delivered by a DC Application Server (DC AS) - The application integrates an external AI Large Language Model (LLM) hosted at a third-party origin over HTTPS - Authorization is handled via OAuth 2.0 - After the DC AS serves the UI over the Data Channel, the application must contact external endpoints to: - Submit prompts - Stream partial outputs (via WebSockets, Server-Sent Events, or HTTP/2/3) - Fetch auxiliary sub-resources (scripts, fonts, images, authorization panels)
Rejected Approach:
The document strongly recommends against using the MF as an HTTP(s) proxy that terminates TLS connections, as this: - Exposes user credentials and application data to the MF - Creates extreme security risks with potential data leakage
Proxy-Tunnel Approach Analysis:
The document analyzes a proxy-tunnel over IMS Data Channel approach where:
- UE uses DTLS/SCTP association established during call setup
- Application data channels are opened for tunneling to external origins via MF
- Per TS 26.114, each application data channel requires a=dcmap attribute in SDP
- UE sends subsequent SDP offer (via SIP re-INVITE or SIP UPDATE per TS 24.229) to add/update channels
- MF validates requested authority, opens TCP connection to external origin, and confirms tunnel
- UE runs full TLS handshake to origin through tunnel, preserving end-to-end confidentiality
Performance and Scaling Issues: - One external destination maps to one application data channel - Each additional channel requires SDP change and new offer/answer round-trip - P-CSCF and S-CSCF process each update - Non-trivial delay before application bytes can flow on new stream
UE Implementation Complexity:
- Standard browser/OS HTTP stacks don't expose IMS primitives
- Web application must intercept fetch() and XMLHttpRequest
- Must trigger IMS client to create subsequent SDP offer with new a=dcmap entries
- Must wait for answer before serializing HTTP over SCTP stream
- Must parse response bytes and reconstruct JavaScript Response objects
- Complex error handling spanning Service Worker, SIP offer/answer, SCTP stream state, MF policy, and external origin
- Long-lived responses (e.g., Server-Sent Events) increase fragility
- Service Worker must bridge flow control between browser and SCTP stream
- SCTP reset or mid-call session change truncates stream, requiring recovery logic
Provider-Side Security and Operations Issues: - OAuth workflows rely on source network and geolocation context - Provider observes MF's egress address rather than UE's carrier address - Tokens issued in one network context may appear replayed from another - Refresh flows validating by IP continuity may fail - Provider heuristics depending on IP reputation, ASN alignment, or regional consistency can misclassify traffic - Aggregation behind single MF address collapses attribution - Rate limiting, quota enforcement, abuse mitigation, and usage-based billing lose per-user fidelity - Single abusive client can trigger blocks affecting all users sharing the MF - Geolocation and regulatory controls reflect MF's location instead of UE's, creating false rejections and compliance issues - Audit trails record MF as caller, complicating incident response and per-user tracing
Recommended Approach:
The CSP-centric solution: - Keeps policy expression at the DC Application Server - Enforcement at the UE - Fully compatible with all web browsers
Mechanism:
- DC AS delivers DC web application and declares strict Content-Security-Policy in HTTP response over bootstrap data channel
- Policy starts from "default deny" then allows only required external origins for each resource class
- UE enforces effective CSP locally
- Any fully qualified URL not admitted by policy is blocked before network connection is made
Policy Constraints:
- connect-src constrains connections for data exchange
- Only authorization server and specific API endpoints needed by LLM workflow are listed
- Script execution limited to code authorized by DC AS using per-response nonce or stable hashes
CSP and CORS Integration:
- CSP operates together with CORS
- Even when CSP admits an origin, cross-origin request only proceeds if external server opts in with correct Access-Control-Allow-Origin value
- When credentials are present, external server returns caller origin (no wildcards)
- Keeps OAuth flows predictable
- Tokens sent only to hosts listed in connect-src
- Frames and form submissions restricted to explicit authorization domains
- No network element added
- Preserves end-to-end TLS between UE and external provider
Example Headers:
Baseline CSP with default deny and nonce-based scripts:
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-<per-response-random>' 'strict-dynamic'; style-src 'self'; img-src 'self' data:; font-src 'self'; connect-src 'self'; frame-src 'none'; object-src 'none'; base-uri 'none'; frame-ancestors 'none'; upgrade-insecure-requests; block-all-mixed-content
LLM integration with OAuth authorization server:
Content-Security-Policy: default-src 'self'; connect-src 'self' https://api.example-llm.com https://auth.example-llm.com; script-src 'self' 'nonce-<per-response-random>' 'strict-dynamic'; style-src 'self'; img-src 'self' data:; font-src 'self'; frame-src https://auth.example-llm.com; form-action 'self' https://auth.example-llm.com; object-src 'none'; base-uri 'none'; frame-ancestors 'none'; upgrade-insecure-requests; block-all-mixed-content
Adopt CSP and CORS based approach for secure external resource access by IMS Data Channel web applications because it: - Keeps standard web security model - Preserves end-to-end TLS between UE and external origins - Avoids introducing network intermediaries that terminate TLS or require per-destination IMS signaling
Application Origin: Clarify that DC AS is the application origin for delivered web content, and that UE applies standard same-origin policy
External Resource Fetching: Clarify that external resources may be fetched directly by UE over HTTPS, subject to UE enforcement of Content-Security-Policy delivered by DC AS
CORS Processing: Clarify that cross-origin requests follow standard CORS processing at external origin, including rules for credentialed requests
Informative Examples: Provide informative examples for common patterns including:
HTTP/2 or HTTP/3 streaming
Scope Boundaries: Clarify that:
Regulation: - Per SA1 guidance, applicability of telecom regulation to Data Channel applications depends on local regulation and service context
CAPIF Framework: - If use case requires network-controlled exposure of third-party APIs, CAPIF framework in TS 23.222 can be considered as reference (per SA6 feedback) - Complementary to CSP and CORS approach for web application resource access
Lawful Intercept (LI): - Additional incoming liaison statements (e.g., SA3-LI requests on LI requirements for IMS Data Channel) should be tracked under KI#4 of FS_DCE_MED - SA4 should document which media plane configurations provide: - Decrypted content at network element (e.g., when MF terminates security association and has access to plaintext) - No decrypted content at network element (e.g., when MF only forwards encrypted packets, or when DTLS is end-to-end between UEs) - SA4 should coordinate with SA2 and SA3 on required stage 2 and security updates, including DTLS profile choices and LI related procedures