34 Support for signed attestation for emergency and priority IMS sessions

29.1653GPPInter-IMS Network to Network Interface (NNI)Release 18TS

34.1 General

Where a network has requirements on a signed attestation for emergency IMS sessions the "Calling number verification using signature verification and attestation information" and "Priority verification using assertion of priority information" features described in 3GPP TS 24.229 [5] need to be supported.

Where a network has requirements on a signed attestation for priority IMS sessions (e.g., MPS sessions) the "Priority verification using assertion of priority information" feature described in 3GPP TS 24.229 [5] needs to be supported and the "Calling number verification using signature verification and attestation information" feature described in 3GPP TS 24.229 [5] might need to be supported.

Based on inter-operator agreement, the signed attestation for emergency and priority IMS sessions may be supported over the II-NNI as further specified below.

34.2 Calling number verification using signature verification and attestation information

The requirements to support the "Calling number verification using signature verification and attestation information" functionality for emergency and priority IMS sessions over the II-NNI are the same as in clause 29.

34.3 Priority verification using assertion of priority information

"Priority verification using assertion of priority information" functionality, as described in 3GPP TS 24.229 [5], may be supported over the II-NNI.

If the "Priority verification using assertion of priority information" is supported, the related procedures in 3GPP TS 24.229 [5] shall be applied with the requirements in this clause.

An initial INVITE request containing:

– a Resource-Priority header field; and

– optionally, a Priority header field with a "psap-callback" header field value, for emergency call-back cases;

shall be supported at the II-NNI.

An initial INVITE request containing:

– an Identity header field (defined in IETF RFC 8224 [206]); and

– a Priority-Verstat header field (defined in 3GPP TS 24.229 [5] clause 7.2.21)

shall be supported at the non-roaming II-NNI.

A re-INVITE request containing a Resource-Priority header field shall be supported at the II-NNI.

A re-INVITE request containing:

– an Identity header field (defined in IETF RFC 8224 [206]); and

– a Priority-Verstat header field (defined in 3GPP TS 24.229 [5] clause 7.2.21)

shall be supported at the non-roaming II-NNI.

Annex A (informative):
Summary of SIP header fields

A summary of the SIP header fields to be used in case of interconnection by using II-NNI is proposed in table A.1.

The starting point is the sending behaviour described for proxy and UA roles in annex A of 3GPP TS 24.229 [5]:

– In case of misalignment between table A.1 and the behaviour described in 3GPP TS 24.229 [5], the behaviour in 3GPP TS 24.229 [5] has the precedence.

– In case a header field is not described in table A.1 and it is described in 3GPP TS 24.229 [5], the description in 3GPP TS 24.229 [5] is applicable over II-NNI.

– If a header field is not described in 3GPP TS 24.229 [5], the description in table A.1 is applicable over II-NNI.

The definition of the notation codes used in table A.1 is provided in table A.2.

Table A.1: Supported header fields

Item

Header field

Ref.

II-NNI

1

Accept

[5]

m

2

Accept-Contact

[5]

m

3

Accept-Encoding

[5]

m

4

Accept-Language

[5]

m

4a

Accept-Resource-Priority

[5]

o

4b

Additional-Identity

[5], clause 6.1.1.3.1 (table 6.2, item 25) and clause 12.26.2

o in case of a trust relationship between the interconnected networks, else n/a

5

Alert-Info

[5]

o

6

Allow

[5]

m

7

Allow-Events

[5]

m on roaming II-NNI, else o

7a

Attestation-Info

[5], clause 6.1.1.3.1

(table 6.2, item 23) and clause 29

o on non-roaming II-NNI, else n/a

8

Authentication-Info

[5]

m on roaming II-NNI, else n/a

9

Authorization

[5]

m on roaming II-NNI, else n/a

9a

Answer-Mode

[5]

o

10

Call-ID

[5]

m

11

Call-Info

[5]

m

11a

Cellular-Network-Info

clause 6.1.1.3.1

(table 6.2, item 21)

o

12

Contact

[5]

m

13

Content-Disposition

[5]

m

14

Content-Encoding

[5]

m

14a

Content-ID

[5]

o

15

Content-Language

[5]

m

16

Content-Length

[5]

m

17

Content-Type

[5]

m

18

CSeq

[5]

m

19

Date

[5]

m

20

Error-Info

[5]

o

21

Expires

[5]

m

21a

Flow-Timer

[5]

m on roaming II-NNI, else o

21b

Feature-Caps

clause 6.1.1.3.1

(table 6.2, item 13)

o

22

Event

[5]

m

23

From

[5]

m

24

Geolocation

[5]

m

24a

Geolocation-Error

[5]

m

24b

Geolocation-Routing

[5]

m

25

History-Info

clause 6.1.1.3.1

(table 6.2, item 4)

o

25b

Identity

[206], clause 29 and clause 34

o on non-roaming II-NNI, else n/a

25a

Info-Package

[5]

o

26

In-Reply-To

[5]

o

27

Join

[5]

o

27a

Max-Breadth

[5]

m

28

Max-Forwards

[5]

m

29

Min-Expires

[5]

m

30

MIME-Version

[5]

m

31

Min-SE

[5]

m

32

Organization

[5]

m

32a

Origination-Id

[5], clause 6.1.1.3.1

(table 6.2, item 24) and clause 29

o on non-roaming II-NNI, else n/a

33

P-Access-Network-Info

clause 6.1.1.3.1 (table 6.2, item 2)

m in case of a trust relationship between the interconnected networks, else n/a

33a

P-Answer-state

[5]

o

34

P-Asserted-Identity

clause 6.1.1.3.1 (table 6.2, item 1)

m in case of a trust relationship between the interconnected networks, else n/a

35

P-Asserted-Service

clause 6.1.1.3.1 (table 6.2, item 5)

o

35a

P-Associated-URI

[5]

m on roaming II-NNI, else n/a

36

P-Called-Party-ID

[5]

m on roaming II-NNI, else n/a

37

P-Charging-Function-Addresses

clause 6.1.1.3.1 (table 6.2, item 7)

n/a

38

P-Charging-Vector

clause 6.1.1.3.1

(table 6.2, item 6)

m on roaming II-NNI, else o

39

P-Early-Media

clause 6.1.1.3.1 (table 6.2, item 12)

m in case of a trust relationship between the interconnected networks, else n/a

40

P-Media-Authorization

[5]

n/a

41

P-Preferred-Identity

[5]

n/a

42

P-Preferred-Service

[5]

m on roaming II-NNI, else n/a

43

P-Private-Network-Indication

clause 6.1.1.3.1 (table 6.2, item 9)

m on roaming II-NNI, else o

44

P-Profile-Key

clause 6.1.1.3.1 (table 6.2, item 8)

o on roaming II-NNI, else n/a

44a

P-Refused-URI-List

[5]

o on non-roaming II-NNI, else n/a

45

P-Served-User

clause 6.1.1.3.1 (table 6.2, item 10)

m on roaming II-NNI, else n/a

46

P-User-Database

[5]

n/a

47

P-Visited-Network-ID

[5]

m on roaming II-NNI, else n/a

47a

Path

[5]

m on roaming II-NNI, else n/a

47b

Permission-Missing

[5]

o

47c

Policy-Contact

[133] and clause 15.6.2

o

48

Priority

clause 6.1.1.3.1

(table 6.2, item 14)

o

48b

Priority-Share

[5] clause 7.2.16

o on roaming II-NNI, else n/a

48c

Priority-Verstat

[5], clause 6.1.1.3.1

(table 6.2, item 26) and clause 34

o on non-roaming II-NNI, else n/a

48a

Priv-Answer-Mode

[5]

o

49

Privacy

[5]

m

50

Proxy-Authenticate

[5]

m on roaming II-NNI, else n/a

51

Proxy-Authorization

[5]

m on roaming II-NNI, else n/a

52

Proxy-Require

[5]

m

52a

RAck

[5]

m

53

Reason

[5] and clause 6.1.1.3.1 (table 6.2, item 11)

o when in a request.

When in a response, m in case of a trust relationship between the interconnected networks, else n/a

54

Record-Route

[5]

m

54a

Recv-Info

[5]

o

55

Referred-By

[5]

m

55a

Refer-Sub

[5]

m in the case the REFER request is supported, else n/a

55b

Refer-To

[5]

m in the case the REFER request is supported, else n/a

56

Reject-Contact

[5]

m

56a

Relayed-Charge

clause 6.1.1.3.1 (table 6.2, item 19)

n/a

57

Replaces

[5]

o

58

Reply-To

[5]

o

59

Request-Disposition

[5]

m

60

Require

[5]

m

61

Resource-Priority

clause 6.1.1.3.1 (table 6.2, item 3)

o

61c

Resource-Share

[5] clause 7.2.13

o on roaming II-NNI, else n/a

61d

Response-Source

[5]

o in case of a trust relationship between the interconnected networks, else n/a

61b

Restoration-Info

clause 6.1.1.3.1 (table 6.2, item 18)

o on roaming II-NNI, else n/a

61a

Retry-After

[5]

o

62

Route

[5]

m

62a

RSeq

[5]

m

63

Security-Client

[5]

n/a

63a

Security-Server

[5]

n/a

64

Security-Verify

[5]

n/a

65

Server

[5]

o

65c

Service-Interact-Info

[5] and clause 6.1.1.3.1 (table 6.2, item 20)

o in case of a trust relationship between the interconnected networks, else n/a

65a

Service-Route

[5]

m on roaming II-NNI, else n/a

65b

Session-ID

[5]

o

66

Session-Expires

[5]

m

66a

SIP-ETag

[5]

m in the case the PUBLISH request is supported, else n/a

66b

SIP-If-Match

[5]

m in the case the PUBLISH request is supported, else n/a

67

Subject

[5]

o

67a

Subscription-State

[5]

m in the case the NOTIFY request is supported, else n/a

67b

Suppress-If-Match

[144] and clause 15.6.4

o

68

Supported

[5]

m

68a

Target-Dialog

[5]

o

69

Timestamp

[5]

m

70

To

[5]

m

71

Trigger-Consent

[5]

m

71a

Unsupported

[5]

m

72

User-Agent

[5]

m

73

User-to-User

[5]

o

74

Via

[5]

m

75

Warning

[5]

o

76

WWW-Authenticate

[5]

m on roaming II-NNI, else n/a

Table A.2: Key to notation codes for SIP header fields

Notation code

Meaning

m

The SIP header field is applicable at II-NNI.

Supporting a SIP header field at the II-NNI means that this header field is passed through the IBCF. It does not imply that network elements inside the serving and served networks or user equipment connected to these networks shall support this header field, where 3GPP TS 24.229 [5] is applied. If specified in 3GPP TS 24.229 [5], the IBCF modifies the SIP header field.

o

The applicability of SIP header field at II-NNI depends on bilateral agreement between the operators.

n/a

It is impossible to use the SIP header field at the II-NNI. This header field could be discarded by the IBCF.

Annex B (informative):
Dynamic view of SIP header fields within SIP messages