Description
The Topology Hiding Inter-network Gateway (THIG) is a critical security and privacy component within the IP Multimedia Subsystem (IMS) architecture, operating at the application layer for SIP signaling. Its primary function is to obscure the internal structure, node addresses, and network topology of an IMS operator's network from peering or visited networks. It achieves this by acting as a Back-to-Back User Agent (B2BUA) or a SIP proxy for all cross-network SIP signaling messages, including INVITE, REGISTER, and MESSAGE. When a SIP message traverses from the internal network to an external network, the THIG scrutinizes and modifies specific SIP headers.
The key headers targeted for modification are the Via, Record-Route, and sometimes the Contact and Path headers. The Via header stack, which records the path a request has taken, is the primary focus. The THIG removes internal Via entries that contain private IP addresses or revealing domain names before forwarding the message externally. It often replaces them with a single Via entry pointing to itself, making it appear as the sole entry point. Similarly, for routing future requests within a dialog, the THIG may modify Record-Route headers to insert itself, ensuring subsequent in-dialog messages also pass through it for topology hiding. The THIG maintains state for ongoing sessions to correctly route responses and subsequent requests back to the original internal nodes, even though their identities are hidden from the external side.
Architecturally, the THIG is typically deployed at the network border, often co-located with or integrated into the Interconnection Border Control Function (IBCF) as defined in later releases. It interfaces with the S-CSCF and other IMS core nodes internally and with external networks via the Mm reference point. Its operation is transparent to the end-user service but vital for the network operator. By hiding internal IP addresses, server hostnames, and network architecture, the THIG mitigates security threats such as topology-based attacks, reconnaissance, and traffic interception targeting specific internal elements. It is a fundamental element in enabling secure IMS peering and interconnection between different administrative domains.
Purpose & Motivation
The THIG was created to address significant security and operational concerns arising from the openness of SIP protocol and IMS interconnection. The SIP protocol, by design, includes routing information in message headers to ensure reliable delivery. However, when used across untrusted administrative boundaries, this information leak exposes an operator's internal network architecture—including the number, types, and addresses of core servers like CSCFs. This exposure creates a vulnerability, allowing potential attackers to map the network for targeted attacks, such as Denial-of-Service (DoS) on specific internal nodes or exploitation of known software vulnerabilities on revealed server types.
Introduced in 3GPP Release 5 with the initial IMS specifications, the THIG solved this problem by standardizing a method for topology hiding. Prior to its definition, operators might have used generic firewalls or Network Address Translation (NAT), but these are insufficient for application-layer protocols like SIP where routing information is embedded in the payload. The THIG provides an application-aware solution. Its development was motivated by the commercial need for operators to keep their network investments and configurations confidential while still participating in global multimedia service interoperability.
Furthermore, the THIG supports regulatory and business requirements for interconnection privacy. It allows operators to peer with competitors without revealing capacity or architectural details that could be used for competitive analysis. As IMS evolved into the core for VoLTE and VoNR, the role of the THIG became even more critical for securing the voice and messaging infrastructure, ensuring that the move to all-IP networks did not come at the cost of reduced network security and operator confidentiality.
Key Features
- Acts as a SIP Back-to-Back User Agent (B2BUA) or proxy for topology hiding
- Selectively removes or modifies Via, Record-Route, and Contact headers in SIP messages
- Maintains session state to ensure correct routing of in-dialog messages
- Hides internal node IP addresses, hostnames, and network topology from external networks
- Typically integrated with the Interconnection Border Control Function (IBCF)
- Protects against topology discovery attacks and enhances interconnection security
Evolution Across Releases
Initial definition of the Topology Hiding Inter-network Gateway (THIG) as a standalone functional entity within the IMS architecture. Specified its basic role as a SIP application-level gateway for hiding network topology in the initial IMS Release 5 specifications.
Defining Specifications
| Specification | Title |
|---|---|
| TS 23.228 | 3GPP TS 23.228 |
| TS 24.173 | 3GPP TS 24.173 |
| TS 24.406 | 3GPP TS 24.406 |
| TS 29.162 | 3GPP TS 29.162 |
| TS 29.235 | 3GPP TS 29.235 |
| TS 32.849 | 3GPP TR 32.849 |