Internet DRAFT - draft-yan-sip-cave-requirements
draft-yan-sip-cave-requirements
SIP Working Group B. Yan
Internet-Draft Z. Zhang
Expires: April 19, 2006 F. Zhang
China Unicom
Q. Li
Beihang University
H. Deng
Hitachi (China)
October 16, 2005
MMD CAVE Support Requirements
draft-yan-sip-cave-requirements-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 19, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
This document describes why there is a need to support CAVE
authentication in Multi-Media Domain, and outlines the requirements
of the potential solution to this problem.
Yan, et al. Expires April 19, 2006 [Page 1]
Internet-Draft CAVE Requirements October 2005
Table of Contents
1. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Background . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
6. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 6
Intellectual Property and Copyright Statements . . . . . . . . . . 8
Yan, et al. Expires April 19, 2006 [Page 2]
Internet-Draft CAVE Requirements October 2005
1. Terminology
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14, [RFC2119].
CDMA
Code Division Multiple Access
CAVE
Cellular Authentication and Voice Encryption. Cellular Message
Encryption Algorithm used in the cdma system
R-UIM
Removable User Identify Module. The UIM is an application
traditionally resident on smart cards distributed by cdma
operators. R-UIM indicates that UIM itself could be removed from
the cdma device.
UE
User Equipment. Equivalent to Mobile Station
MMD
Multi-media Domain defined in 3GPP2 which is almost equivalent to
IMS in 3GPP
2. Introduction
3GPP2 MMD provides an IP-based session control capability based on
the SIP [RFC3261] protocol. MMD can be used to enable services such
as push to talk, instant messaging, presence and conferencing.
However at present time, it is not possible for devices equipped with
legacy cards to access 3GPP2 MMD-based services under current
standards and technology. Specially, there will be a need to deploy
some MMD-based services which can be accessed reusing the current
CDMA 1X R-UIM devices.
This document outlines some of the reasons why such a problem is
essential to ensure the applicability and for wider deployment, and
also describes the requirements of the solution to this problem.
Yan, et al. Expires April 19, 2006 [Page 3]
Internet-Draft CAVE Requirements October 2005
3. Background
As the second-largest CDMA operator, China Unicom held about 30
millions subscribers equipped with CDMA 1X R-UIM at the end of last
year. If reusing the legacy R-UIM devices, MMD services will not
support more than the 30 millions subccribers.
Recently operators would like to provide MMD-basde services to its
subscribers. Except that existing R-UIM cards only support CAVE
authentication method, which means it is not possible to process AKA
authentication vectors in current devices because of the lack of 3G
secret key K. Since mobile equipment must be firstly authenticated to
the network before accessing the services provided by the MMD, that
means current subscribers with existing R-UIM cards will not be able
to use these services based on SIP protocol.
However, replacing with new R-UIM cards for large subscribers to
support AKA will be difficult and expensive since more than 30
millions subscribers have to change their R-UIM card if they want to
subscribe IMS service. Such kind of additional time and expense
needed work should be avoided by operators. Also that reusing
current R-UIM card would be more convenient and preferable to
operators.
Therefore, an alternative authentication scheme which supports CAVE
would be useful for legacy CDMA 1X R-UIM devices. Such athentication
scheme should provide adequate level of security, as well as to
minimize the possible impacts on existing entities, as described in
following section.
4. Requirements
There is a need to provide an alternative authentication scheme to
legacy CDMA 1X R-UIM devices which supports CAVE algorithm in
addition to [RFC3329]. Therefore with the support of such
authentication scheme, legacy devices with CAVE capability can be
authenticated by SIP server (S-CSCF) in the MMD. The following are
the requirements to such authentication scheme in general:
o Such authentication mechanism should not bring massive impact to
existing entities.
o Any MMD security mechanisms should be such that impacts on
existing entities.
o The mechanism should be quick to implement so that the window of
opportunity for the MMD security solution is not missed.
Yan, et al. Expires April 19, 2006 [Page 4]
Internet-Draft CAVE Requirements October 2005
5. Security Considerations
The security requirements for the new authentication scheme is to
ensure adequate level of security. It should provide an adequate
level of security to protect against the most significant security
threats that will exist in MMD implementations. As a guide, the
strength of subscriber authentication should be comparable to the
level of authentication provided for existing chargeable services in
mobile networks.
6. References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[RFC3329] Arkko, J., Torvinen, V., Camarillo, G., Niemi, A., and T.
Haukka, "Security Mechanism Agreement for the Session
Initiation Protocol (SIP)", RFC 3329, January 2003.
Yan, et al. Expires April 19, 2006 [Page 5]
Internet-Draft CAVE Requirements October 2005
Authors' Addresses
Bifeng Yan
China Unicom
No. 133A Xidan North Street
Xicheng District
Beijing 100032
China
Email: yanbf@chinaunicom.com.cn
Zhijiang Zhang
China Unicom
No. 133A Xidan North Street
Xicheng District
Beijing 100032
China
Email: zhangzhj@chinaunicom.com.cn
Fan Zhang
China Unicom
No. 133A Xidan North Street
Xicheng District
Beijing 100032
China
Email: zhangf@chinaunicom.com.cn
Qin Li
Beihang University
No. 35 Xueyuan Road
Haidian District
Beijing 100083
China
Phone: +86 10 8231 6342
Email: liqin@cse.buaa.edu.cn
Yan, et al. Expires April 19, 2006 [Page 6]
Internet-Draft CAVE Requirements October 2005
Hui Deng
Hitachi (China)
Beijing Fortune Bldg. 1701
5 Dong San Huan Bei-Lu
Chao Yang District
Beijing 100004
China
Email: hdeng@hitachi.cn
Yan, et al. Expires April 19, 2006 [Page 7]
Internet-Draft CAVE Requirements October 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Yan, et al. Expires April 19, 2006 [Page 8]