Tdoc List
2019-02-01 16:48
TDoc | Title | Source | Type | For | Agenda | Avail | Treated | Decision | Wdrn | Replaced-by | Replaces |
---|---|---|---|---|---|---|---|---|---|---|---|
S3‑190000 | Agenda | WG Chairman | agenda |
2Approval of Agenda and Meeting Objectives
| Yes |
Yes
| approved | No | |||
S3‑190001 | Report from last SA3 meeting/s | MCC | report |
4.1Approval of the report from previous SA3 meeting(s)
| Yes |
Yes
| approved | No | |||
S3‑190002 | SA3 Work Plan | MCC | Work Plan |
9.1Review of work plan
| Yes |
Yes
| noted | No | |||
S3‑190003 | Report from last SA meeting | WG Chairman | report |
4.2Report from SA Plenary
| Yes |
Yes
| noted | No | |||
S3‑190004 | SA3 meeting calendar | MCC | other |
10Future Meeting Dates and Venues
| Yes |
Yes
| noted | No | |||
S3‑190005 | Work Plan input from Rapporteurs | MCC | other |
9.2Rapporteur input on status of WID or SID
| Yes |
Yes
| revised | No | S3‑190563 | ||
S3‑190006 | Draft TR 33.xxx - Skeleton TR on User Plane Integrity Protection | Vodafone Group | other | Agreement |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| revised | No | S3‑190014 | |
S3‑190007 | pCR to TR 33.853 - addition of scope | Vodafone GmbH | pCR | Agreement |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| revised | No | S3‑190015 | |
S3‑190008 | draft skeleton document TR 33.935 - v001 - Detailed Long term key solutions | Vodafone GmbH | other | Agreement |
8.16Study on LTKUP Detailed solutions
| Yes |
Yes
| not treated | No | ||
S3‑190009 | Discussion document on the changes required to BEST for the authentication available on the 5G options | Vodafone GmbH | discussion | Discussion |
7.5.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
| Yes |
YesDeutsche Telekom: we support option one.
Nokia: we are having a similar issue in the AKMA work item. We prefer to analyze both before making a decision.
NEC supported Nokia. Option 2 could be studied in the scope of AKMA and option one was fine too.
BT: we are losing the focus on the battery efficiency and going for key sharing instead.
Vodafone proposed to reword the option 2 and include in the scope of the AKMA study with contributions. Option one would be the way to go.
| noted | No | ||
S3‑190010 | CR to 33.163 - Addition of HSE to NR core authentication interface | Vodafone GmbH | CR | Endorsement |
7.5.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
| No |
Yes
| withdrawn | Yes | ||
S3‑190011 | draft WID for Addition of HSE to 5G core interface for authentication (if required) | Vodafone GmbH | WID new | Endorsement |
7.6New Work Item proposals
| No |
Yes
| withdrawn | Yes | S3‑183450 | |
S3‑190012 | CR to 33.834 - implementation of changes requested by edithelp | Vodafone GmbH | CR | Endorsement |
8.2Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-16)
| No |
Yes
| left for email approval | No | ||
S3‑190013 | CR to 33.841 - implementation of requested by edithelp | Vodafone GmbH | CR | Endorsement |
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
| No |
Yes
| left for email approval | No | ||
S3‑190014 | Draft TR 33.853 - Skeleton TR on User Plane Integrity Protection (updated after conf call) | Vodafone Group | draft TR | Agreement |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| approved | No | S3‑190006 | |
S3‑190015 | pCR to TR 33.853 - addition of scope (updated following conf call) | Vodafone GmbH | pCR | Agreement |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| approved | No | S3‑190007 | |
S3‑190016 | Correcting TLS crypto profiles | Juniper Networks, Ericsson | CR |
7.5.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | |||
S3‑190017 | LTKUP: addition of solution 5 in TR 33.935 | Gemalto N.V. | pCR | Approval |
8.16Study on LTKUP Detailed solutions
| Yes |
Yes
| not treated | No | ||
S3‑190018 | Cooperation on Generic Slice Template definition | GSMA | LS in |
6.4GSMA
| Yes |
Yes
| noted | No | |||
S3‑190019 | User Plane Security for 5GC Roaming | GSMA | LS in |
6.4GSMA
| Yes |
YesDeutsche Telekom: we have taken into acount in the FBA study already.
BT commented that this should be taken care of in Rel-16.
Vodafone: make a recommendation in Rel-15 to get around this issue and fix it in Rel-16.
BT clarified that SA plenary would take care of a response to GSMA coordinating with SA3.
| noted | No | |||
S3‑190020 | LS on new 5G-GUTI allocation | C1-188921 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesAddressed in tdoc 106.
| replied to | No | |||
S3‑190021 | LS on protection of initial NAS messages | C1-188925 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | |||
S3‑190022 | Reply LS on Routing ID | S2-1813178 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesNEC had a discussion document about this in tdoc 401.
| noted | No | |||
S3‑190023 | Reply LS on Routing ID | C1-188979 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | |||
S3‑190024 | LS on EAS-C&U support | C3-186313 | LS in |
7.5.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
| Yes |
YesVodafone rejected CT3's last comment on the protocol details.
ORANGE: we have already an annex with these protocols and CT3 is going to talk about the same protocols with differences. We should avoid that.
Vodafone: there is no requirement for the work they are doing. We need to point them out that.
| replied to | No | |||
S3‑190025 | LS on OAuth authorization flows supported for Northbound APIs | C3-187660 | LS in |
7.5.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
| Yes |
Yes
| replied to | No | |||
S3‑190026 | LS on Nudr Sensitive Data Protection | C4-188524 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesVodafone commented that this shouldn’t be done at all.
BT: this is trying to structure unenstrucutred data.
| replied to | No | |||
S3‑190027 | Clarification request on NF authorization in UE Reachability Notification Request procedure | C4-188603 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesVodafone pointed out that the second question was relevant for SA3.
Docomo commented that this point was about reachability, not security related.
| noted | No | |||
S3‑190028 | Response to 3GPP SA2 liaison S2-189038 on ‘general status of work’ | BBF | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | |||
S3‑190029 | Response to 3GPP SA2 liaison S2-1811575 on ‘general status of work’ | BBF | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | |||
S3‑190030 | Response to 3GPP SA2 liaison S2-1810989 on ‘Reply LS on devices behind 5G-RG accessing the 5GC’ | BBF | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | |||
S3‑190031 | Response to 3GPP SA2 liaison S2-1812643 | BBF | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | |||
S3‑190032 | Response to 3GPP SA2 on FN-RG authentication | BBF | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| replied to | No | |||
S3‑190033 | LS to 3GPP TSG-SA WG6 on Use of ITS Dedicated Spectrum within V2X UE | ETSI TC ITS | LS in |
6.11Other Groups
| Yes |
Yes
| noted | No | |||
S3‑190034 | LS on DRB Integrity Protection | R2-1819080 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | |||
S3‑190035 | Reply LS on UP Integrity Protection for Small Data in Early Data Transfer | R3-187230 | LS in |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| withdrawn | Yes | |||
S3‑190036 | Reply LS on inclusion of selected PLMN into the complete message | R3-187235 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | |||
S3‑190037 | LS on Security Result Exchange Between NG-RAN and SMF in DC | R3-187244 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesNokia: there is no security issue here.
Ericsson: the SMF should be informed.This was taken offline.
| replied to | No | |||
S3‑190038 | Enforcement of maximum supported data rate for integrity protection | R3-187267 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesThis had to be taken offline since Docomo doubted about the necessity of doing this.
| noted | No | |||
S3‑190039 | GTP Recovery Counter & GSN node behaviou | GSMA | LS in |
6.4GSMA
| Yes |
YesDirected to CT4.
| noted | No | |||
S3‑190040 | LS on Authentication for UEs not Supporting NAS | S2-1812600 | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesVodafone: non-5G-capable over WLAN UE has nothing to do with us.
ORANGE didn't agree with the solutions shown here.
Vodafone: why they talk about primary authentication if we have settled on having secondary authentication here?
Lenovo: we have LTE over WLAN case when you could access the core network without USIM. In this case you are a subscriber of the core network, no roaming scenarios considered. We don’t see any issue if this is under control of the network operator.
ORANGE: there is an LI issue. Who's liable? The owner of the UE or the WLAN owner? There is no point in asking for anything different from EAP' .
Vodafone: You must have the USIM if you want to do the primary authentication.
Gemalto supported Vodafone and ORANGE.
The proposal by ORANGE was to tell SA2 to reuse the procedure in TS 33.501 for EAP' for primary authentication, and credential storage as detailed in the same spec.
Samsung: ask SA2 about what kind of UE they are talking about.
| replied to | No | |||
S3‑190041 | Reply LS on FN-RG authentication and related questions | S2-1812601 | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| replied to | No | |||
S3‑190042 | LS on the security aspects of UE Capability ID | S2-1812607 | LS in |
6.13GPP Working Groups
| Yes |
Yes373,374 and 129 are docs related to this.
| replied to | No | |||
S3‑190043 | Reply LS on FS_5WWC conclusion of study work | S2-1812643 | LS in |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | |||
S3‑190044 | LS on PC5 unicast and groupcast security protection | S2-1812896 | LS in |
8.21New study item proposals
| Yes |
YesORANGE: do we answer SA2 before or after the study?
LG: we reply that we will investigate it with a study.
ORANGE: study all possible solutions or those two proposed by SA2? LG commented that only the two from sA2.
| replied to | No | |||
S3‑190045 | LS On Slice-Specific Secondary Authentication | S2-1813359 | LS in |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesHuawei: not urgent to send it during this meeting. Timer is defined in CT1 and would rather wait for CT1's reply. Not sure that there are security issues.
Ericsson: We don’t support the SA2 solution, let's wait and analize this.
CableLabs: timer can be manipulated, let's discuss this and wait for CT1's reply.
Interdigital: SA3 doesn’t see any security issues, we can reply with that.
Nokia: ask CT1 if they can manage a flexible timer.
It was decided to postpone it for the next meeting.
| postponed | No | |||
S3‑190046 | LS response on API invoker onboarding | S6-181848 | LS in |
7.5.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
| Yes |
Yes
| noted | No | |||
S3‑190047 | Reply LS on Control Plane Solution for Steering of Roaming in 5GS | SP-181244 | LS in |
6.13GPP Working Groups
| Yes |
Yes
| noted | No | |||
S3‑190048 | TCG Progress Report | InterDigital, Inc. | report | Information |
6.6TCG
| Yes |
Yes
| noted | No | ||
S3‑190049 | [33.179] R13 Annex D.3.4.2 XSD correction | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | ||
S3‑190050 | [33.180] R14 Annex D.3.5.2 XSD correction (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190444 | |
S3‑190051 | [33.180] R15 Annex D.3.5.2 XSD correction (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190445 | |
S3‑190052 | [33.179] R13 IdMS interface security | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | ||
S3‑190053 | [33.180] R14 IdMS interface security (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesCableLAbs
| revised | No | S3‑190446 | |
S3‑190054 | [33.180] R15 IdMS interface security (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesJuniper: the TLS profile has been moved to 33.210.
It was commented that there was a note in 33.310 pointing to 33.210 anyway and this could be fixed later.
| revised | No | S3‑190447 | |
S3‑190055 | [33.179] R13 user service authorisation | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesSamsung: we cannot delete a feature from Release 13 for this reason. We can wait for stage 3 before deleting this.
Tim (Motorola): leave it in Rel-13? It's ok, but even beyond stage 3 problems there is an interoperability problem. We should remove it from Rel-15, Rel-16.
Nokia: plugtest results should be evaluated by Samsung and bring a paper with their conclusions. Samsung agreed to do that.
| not pursued | No | ||
S3‑190056 | [33.180] R14 user service authorisation (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| not pursued | No | ||
S3‑190057 | [33.180] R15 user service authorisation (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| not pursued | No | ||
S3‑190058 | [33.180] R14 InK clarifications | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190448 | |
S3‑190059 | [33.180] R15 InK clarifications (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190449 | |
S3‑190060 | [33.180] R14 MCX identity clarifications | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190450 | |
S3‑190061 | [33.180] R15 MCX identity clarifications (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| revised | No | S3‑190451 | |
S3‑190062 | Adding Security Protection Requirement of Unicast RRC Messges | HUAWEI TECH. GmbH | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| No |
Yes
| withdrawn | Yes | ||
S3‑190063 | Security Solution for RRC UE capability transfer | HUAWEI TECH. GmbH | pCR |
8.9Study on 5G security enhancement against false base stations
| No |
Yes
| withdrawn | Yes | |||
S3‑190064 | Details of protecting gNB from RRC DoS attack | HUAWEI TECH. GmbH | pCR |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| No |
Yes
| withdrawn | Yes | |||
S3‑190065 | Corrections of messages names etc | HUAWEI TECH. GmbH | CR |
7.1.4AS security
| No |
Yes
| withdrawn | Yes | |||
S3‑190066 | LS to RAN2/3 on EDT data integrity protection | HUAWEI TECH. GmbH | LS out |
7.5.1SAE/LTE Security
| No |
Yes
| withdrawn | Yes | |||
S3‑190067 | Adding Security Protection Requirement of Unicast RRC Messges | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesCompared with 275.
| noted | No | ||
S3‑190068 | Security Solution for RRC UE capability transfer | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | ||
S3‑190069 | Security Requirement for Paging Messges | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesApple: requirement should be more general.
Ericsson: protection of paging in a separate key issue should be in a separate key issue.
| noted | No | ||
S3‑190070 | Protection for Incoming Paging Message Based on Stored Security Context | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| noted | No | ||
S3‑190071 | Avoiding UE connecting to fake base station during HO | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190072 | Corrections of messages names etc | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
Yes
| merged | No | S3‑190423 | |
S3‑190073 | EDT UP IP handling of multiple PDCP PDUs | Huawei, Hisilicon | CR | Approval |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesIntel: RAN2 hasn’t discussed the LS that we sent to them, so we don’t need to pursue this CR during this meeting. Besides this solution doesn’t cover a particular scenario and we don’t agree with this solution.
This was left open.
| not pursued | No | ||
S3‑190074 | Details of protecting gNB from RRC DoS attack | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: no drawbacks at all in the evaluation, impacts and no sales pitch. Not clear which key issue is being evaluated.
| revised | No | S3‑190482 | |
S3‑190075 | Resolving Editor’s Note for solution #7 (clause 6.7) | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190076 | LS to RAN2/3 on EDT data integrity protection | Huawei, Hisilicon | LS out | Approval |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| revised | No | S3‑190454 | |
S3‑190077 | Update Solution #4 to use HASHUE-data as in TS33.401 | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190078 | Clarification and correct clause reference for RNAU w/o context relocation | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
Yes
| agreed | No | ||
S3‑190079 | New key issue: Protection of Line ID | Ericsson | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesThreats and requirements go out, key issues are merged.
| merged | No | ||
S3‑190080 | New key issue: TNAP mobility for trusted non-3GPP access | Ericsson | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesORANGE: less key issues and more solutions.
| noted | No | ||
S3‑190081 | Reply-LS on FN-RG authentication and related questions | Ericsson | LS out | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190518 | |
S3‑190082 | Reply-LS on FN-RG authentication and related questions | Ericsson | LS out | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesORANGE: SA2 should not assume solutions before consulting SA3 on the security feasibility of these solutions.
Huawei: we agree on roaming scenarios but we don’t have solutions yet. Ericsson: progress is easier by answering LS.
| merged | No | S3‑190518 | |
S3‑190083 | Alignment with TS 23.502: Optimization of UDM selection in AUSF | Ericsson | CR | Agreement |
7.1.8Primary authentication
| Yes |
YesVodafone: Compatibility issue with the networks that are rolled out today. It's too late to change this.
Ericsson replied that this was alignment with SA2. Huawei disagreed. This had to be taken offline.
| not pursued | No | ||
S3‑190084 | Correction to authentication step | Ericsson | CR | Agreement |
7.1.8Primary authentication
| Yes |
YesCableLabs: good requirement. Does the AUSF do the same validation?
ZTE: this depends on the discussion about the SUPI type and the AMF.
Nokia: the MNC is part of the SUPI value. Why does it depend on the SUPI type? The current procedure already addresses this. What kind of attack are we facing here? Huawei agreed with Nokia.
Ericsson: there is no attack, there is a weakness.
Lenovo didn’t understand how this could ever happen.
| not pursued | No | ||
S3‑190085 | Reply LS on Nudr Sensitive Data Protection | Ericsson | LS out | Approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| revised | No | S3‑190411 | |
S3‑190086 | New solution: WLAN measurements from UEs | Ericsson | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190087 | New solution: Bluetooth measurements from UEs | Ericsson | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190088 | Resubmission of S3-183526 “WLAN positioning - new KI for the upcoming TR on FS_eLCS_Sec” | Ericsson | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| approved | No | ||
S3‑190089 | Editorials and minor clarifications for clause 13.1 | Ericsson | CR | Agreement |
7.1.13.2Other
| Yes |
Yes
| agreed | No | ||
S3‑190090 | Editorials and minor clarifications for clause 13.2 | Ericsson | CR | Agreement |
7.1.13.1Interconnect (SEPP related)
| Yes |
Yes
| revised | No | S3‑190439 | |
S3‑190091 | Minimized kernel functions | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesIf agreed, this should become a mirror and we would need a new CR for Rel-14.
| not pursued | No | ||
S3‑190092 | Minimized kernel functions | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| not pursued | No | ||
S3‑190093 | Protection from buffer overflows | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesMCC commented that the error should be corrected in the earliest release of this spec,Rel-14.
Huawei: the test case is not impacted, only the examples.
NTT-Docomo agreed with removing the examples to keep the spec more aligned with the reality.
| revised | No | S3‑190456 | |
S3‑190094 | Protection from buffer overflows | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | ||
S3‑190095 | Uunused software | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesDeutsche Telekom didn't agree with this change. The test was important to maintain.
Ericsson wasn't clear on how to test this.
NEC supported Deutsche Telekom, BT as well.
| not pursued | No | ||
S3‑190096 | Uunused software | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| not pursued | No | ||
S3‑190097 | No unsupported components | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesDeutsche Telekom didn't agree with removing this test case. NEC and BT supported this.
| not pursued | No | ||
S3‑190098 | No unsupported components | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| not pursued | No | ||
S3‑190099 | Analysis of requirements on the AUSF in TS 33.501 | Ericsson | discussion | Endorsement |
7.2.6Authentication Server Function (AUSF) (TS 33.516)
| Yes |
YesHuawei: the failure should be also tested and that does not belong to any category.
Alf (Vice chair) commented that the confusion focused on whether interoperability and failure authentication were in or out of scope of SCAS.
Huawei: very few requirements deal with failure test cases: what happens if a particular test fails.
The Vice Chair asked the delegates if the requirements in the table were considered category one. NEC replied that number 3 wasn’t category one.
Ericsson: check these requirements and see what could go wrong and come back next meeting with the test cases?
Huawei: refer to CT group standard as well.
Deutsche Telekom: agree with Ericsson that these test cases are out of scope of SCAS. The way forward would be to agree on this.
NEC: at least 1,2 and 4 are category one and this is agreed by the group.
Huawei: failure test case included in the category one or not?
| noted | No | ||
S3‑190100 | Name correction of the Nudm_SDM_Notification service operation | Ericsson | CR | Agreement |
7.5.14PLMN RAT selection (Steering of Roaming) (Rel-15)
| Yes |
Yes
| agreed | No | ||
S3‑190101 | New Key Issue: UP integrity activation in EPS | Ericsson | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| approved | No | ||
S3‑190102 | Update to Study Item Description FS_SBA_Sec: Security for inter-PLMN user plane traffic (N9 reference point) | Ericsson | SID revised | Approval |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| No |
Yes
| withdrawn | Yes | ||
S3‑190103 | Reply LS on Interim conclusions for SA2 study on Radio Capabilities Signalling Optimisations (FS_RACS) | R2-1819206 | LS in |
6.13GPP Working Groups
| Yes |
Yes
| noted | No | |||
S3‑190104 | Update to KI#2.1 in TR 33.819 | InterDigital Europe. Ltd. | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190105 | Update to Study Item Description FS_SBA_Sec: Security for inter-PLMN user plane traffic (N9 reference point) | Ericsson, Juniper Networks, Deutsche Telekom AG | SID revised |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
Yes
| merged | No | S3‑190464 | ||
S3‑190106 | Reply LS on new 5G-GUTI allocation | Ericsson | LS out | Approval |
7.1.15Incoming and outgoing Lses
| Yes |
YesQualcomm agreed with this except in the case of non-3GPP networks.
| revised | No | S3‑190410 | |
S3‑190107 | Expectations and requirements for 256 bit algorithms | ETSI SAGE | LS in |
6.3ETSI SAGE
| Yes |
Yes
| withdrawn | Yes | |||
S3‑190108 | TR33848 Study on Virtualisation Skeleton | BT plc | draft TR | Agreement |
8.18Study on Security Impacts of Virtualisation
| Yes |
Yes
| approved | No | ||
S3‑190109 | TR33848 Introduction and Scope | BT plc | other | Agreement |
8.18Study on Security Impacts of Virtualisation
| No |
Yes
| withdrawn | Yes | ||
S3‑190110 | TR33848 Section 4 Background | BT plc | other | Agreement |
8.18Study on Security Impacts of Virtualisation
| No |
Yes
| withdrawn | Yes | ||
S3‑190111 | Evaluation text for solution #2 | NEC Corporation | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| withdrawn | Yes | ||
S3‑190112 | New key issue on user plane integrity protection in MR-DC scenarios | NEC Corporation | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| withdrawn | Yes | ||
S3‑190113 | New key issue on data rate limitation of integrity protection in UP DRB | NEC Corporation | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| withdrawn | Yes | ||
S3‑190114 | New Key Issue: Basic security requirements on SFSF message transport | Telekom Deutschland GmbH | pCR | Approval |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
Yes
| noted | No | ||
S3‑190115 | New Key Issue: Protection of SFSF interfaces | Telekom Deutschland GmbH | pCR | Approval |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
Yes
| noted | No | ||
S3‑190116 | Subscriber privacy: test data for SUCI computation | Gemalto N.V. | CR | Approval |
7.1.14Privacy
| Yes |
YesIDEMIA: some coding is wrong, nt compliying with CT4's decisions.
Qualcomm: good idea to have testers' data, but there are things missing here. We can come back next meeting with a better look at this.
| not pursued | No | ||
S3‑190117 | Update to Study Item Description FS_SBA_Sec: Enhanced-SBA aspects | Telekom Deutschland GmbH | SID revised | Approval |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
YesMCC commented that taking the Rel-15 study and expanding it for a study in Rel-16 looked a bit unusual. It was agreed to do it like this since the TR hadn’t been approved. MCC added that the document should take the original SID and add revision marks for the changes. Any discussion should be part of a different document.
| revised | No | S3‑190464 | |
S3‑190118 | On the handling of invalid JSON patches in N32-f messages | Telekom Deutschland GmbH | discussion | Discussion |
7.1.13.1Interconnect (SEPP related)
| Yes |
Yes
| noted | No | ||
S3‑190119 | Inter-PLMN N9 Security | Telekom Deutschland GmbH | discussion | Endorsement |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
YesBT: it's up to the study to decide whether this is to be performed by a "box".
Ericsson: let's study this as a key issue.
TIM: SBA architecture is for control plane interfaces. N9 is a user plane interface. How is N9 security related to SBA architecture and why is it treated inside this SID? NTT-Docomo replied that SBA architecture should be in one study and the N9 part in a new study,
| noted | No | ||
S3‑190120 | New Test Case: Separation of cryptographic storage within the SEPP | Telekom Deutschland GmbH | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| revised | No | S3‑190511 | |
S3‑190121 | New Test Case: Connection-specific scope of cryptographic material by IPX-providers | Telekom Deutschland GmbH | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| noted | No | ||
S3‑190122 | New Test Case: Precendence of preconfigured protection policies | Telekom Deutschland GmbH | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| noted | No | ||
S3‑190123 | New Test Case: Validating the common message formatting | Telekom Deutschland GmbH | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| noted | No | ||
S3‑190124 | CR Add UE trace to UE Authentication Get Service | Nokia, Nokia Shanghai Bell | CR | Approval |
7.1.8Primary authentication
| Yes |
YesVodafone: what data is Trace Data? NEC agreed, there was no security reasoning behind this.
Nokia: This is described in SA2 and CT4.
Huawei: limit to authentication related parameters.
Nokia: it doesn't impact the security directly. This particular definition does only exist in 33.401, that’s why it's here.
Ericsson: we need to know what is done in SA2 but at the moment there is no mentioning of this, the clause is empty. Nokia commented that this was aligned with results from the SA2 meeting held the previous week, not available at that time.
Vodafone: we might be giving away data that is covered by the GDPR.
It was agreed to send an LS to SA2 and attach this CR. The agreement on this CR would depend on the response from SA2.
After discussions on the LS, it was decided to note the LS.
| not pursued | No | ||
S3‑190125 | Discussion on providing AS security during RRC connection establishment to protect NSSAI | NEC Europe Ltd | discussion | Agreement |
7.6New Work Item proposals
| Yes |
Yes
| withdrawn | Yes | ||
S3‑190126 | Discussion on C1-188921 LS on GUTI Re-assignment | Nokia, Nokia Shangahi Bell | discussion | Endorsement |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | ||
S3‑190127 | Key Issue for Fake Base Station | Intel Deutschland GmbH | pCR |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | |||
S3‑190128 | New WID on providing the encryption of slice identity at the AS layer during RRC connection establishment procedure | NEC Europe Ltd | WID new | Approval |
7.6New Work Item proposals
| Yes |
YesNokia: SA3 and SA2 have agreed on a solution already. If a new solution is needed, it should be triggered in SA2 and not here. Ericsson agreed with this.
NEC clarified that this was presented in SA2 and that they directed the discussions to SA3. Deustche Telekom supported this study.
Vodafone: this is a study item, not a Work Item.
NEC: it's a TR and CRs for the TS. Vodafone replied that wasn't the way of working.
Supporting the study in Rel-16: NEC, Huawei,NIST,BT,KPN,Docomo,Intel,ARICC,T-Mobile.
Not in Rel-16: Nokia.
Qualcomm: key issue in the key authentication study that we already have. Huawei agreed with this. NTT-Docomo preferred to have a separate study.
The Chair recommended to decrease the number of study items, for the sake of progress.
| noted | No | ||
S3‑190129 | Discussion on Radio Capability indication LS S2-1812607 | Nokia, Nokia Shanghai Bell | discussion | Endorsement |
7.1.15Incoming and outgoing Lses
| Yes |
YesVodafone was in line with Nokia's comments: It could be a problem given that it wouldn't be sent after authentication. Ericsson also agreed with sending the capbilities encrypted.
| noted | No | ||
S3‑190130 | Security Requirement for Key issue 2 | Intel Deutschland GmbH | pCR |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
YesBT: EPC instead of EPS.
Ericsson: impact on ME is considerable.
Qualcomm: this is driving to a solution.
| noted | No | |||
S3‑190131 | EPC solution for RLOS access | Intel Deutschland GmbH | pCR |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
YesVodafone: does PARLOS work for roaming customers? Sprint replied that it was an accepted option.
Nobody seemed to agree on this contribution so it was noted.
| noted | No | |||
S3‑190132 | Discussion on SA2 LS on Slice Specific Authentication S2-1813359 | Nokia, Nokia Shanghai-Bell | discussion | Endorsement |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| noted | No | ||
S3‑190133 | Solution for Slice Specific secondary authentication | Nokia, Nokia Shangahi Bell | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesORANGE wanted to question the SA2 solution (dependency of primary and secondary authentication) from SA3 perspective, by adding an editor's note.
TIM commented that secondary authentication was not related to the slice concept. The slice is inside the core network and does have nothing to do with the secondary authentication as SA3 had agreed. We need to agree on the correct terminology.
Slice secondary authentication would be the terminology to follow instead of secondary authentication.
Interdigital: nested authentication is an open issue between SA2 and CT1. Add an editor's note about this.
ORANGE: remove the evaluation, too early.
| revised | No | S3‑190533 | |
S3‑190134 | Clarification on Establishment of a mapped security context during intersystem handover(N1 to S1) | Intel Deutschland GmbH | CR |
7.1.10Interworking
| Yes |
YesQualcomm and Ericsson didn’t agree with this.
| not pursued | No | |||
S3‑190135 | Clarification to the 5G-GUTI change during the NAS procedure. | NEC Europe Ltd | CR | Approval |
7.1.3Mobility
| Yes |
Yes
| not pursued | No | ||
S3‑190136 | Clarification to the 5G-GUTI allocation during the Notification procedure. | NEC Europe Ltd | CR | Approval |
7.1.5NAS security
| Yes |
Yes
| not pursued | No | ||
S3‑190137 | Clarification on Establishment of a mapped security context during intersystem handover(S1 to N1) | Intel Deutschland GmbH | CR |
7.1.10Interworking
| Yes |
YesZTE didn’t agree with the scenarios.
Ericsson: the clause is misplaced.
| not pursued | No | |||
S3‑190138 | Handling of SUCI de-concealment during registration retry procedure | NEC Europe Ltd | CR | Approval |
7.1.3Mobility
| Yes |
YesEricsson: this is done in TS 34.501 already. It's in scope of CT1.
Huawei: it doesn’t belong here. Nokia agreed with this.
There was a strong support on this being in CT1's scope.
| not pursued | No | ||
S3‑190139 | requirement of protection of broadcast messages | Apple (UK) Limited | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| noted | No | ||
S3‑190140 | Clarification on Handover message in Interworking | Intel Deutschland GmbH | CR |
7.1.10Interworking
| Yes |
YesQualcomm disagreed with this.
| not pursued | No | |||
S3‑190141 | requirement of protection of unicast messages | Apple (UK) Limited | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| noted | No | ||
S3‑190142 | Discussion about a new study on eV2X security | LG Electronics | discussion | Discussion |
8.21New study item proposals
| Yes |
Yes
| noted | No | ||
S3‑190143 | New SID on Security Aspects of 3GPP support for Advanced V2X Services | LG Electronics | SID new | Approval |
8.21New study item proposals
| Yes |
YesORANGE: conclusions should be based on the TR conclusions from sA2.
LG clarified that the solutions will go for the normative work that is being carried out in SA2.
| revised | No | S3‑190462 | |
S3‑190144 | Reply LS on PC5 unicast and groupcast security protection | LG Electronics | LS out | Approval |
8.21New study item proposals
| Yes |
Yes
| revised | No | S3‑190463 | |
S3‑190145 | Editorial pCR for PARLOS TR 33.815 | LG Electronics | pCR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190466 | |
S3‑190146 | ID-based solution in 5GFBS | Apple (UK) Limited | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| noted | No | ||
S3‑190147 | Credential-based solution in 5GFBS | Apple (UK) Limited | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesORANGE was against these solutions.
Qualcomm: we studied those kind of solutions in PWS.
Ericsson: it's important to capture this and the scalability issues.
ORANGE: don’t repeat the same evaluations from other TRs.
Apple: why are we doing a study if we are killing all solutions?
| noted | No | ||
S3‑190148 | Key issue of network credential revocation consideration | Apple (UK) Limited | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| No |
Yes
| withdrawn | Yes | ||
S3‑190149 | Key issue of UP IP performance | Apple (UK) Limited | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesHuawei: performance is not a security issue.
ORANGE: consider bidding down attack.
| noted | No | ||
S3‑190150 | Solution of improving efficiency of UP IP | Apple (UK) Limited | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| noted | No | ||
S3‑190151 | Align NAS connection identifier values | ZTE Corporation | CR | Agreement |
7.1.3Mobility
| Yes |
YesDiscussed with overlapping documents 365, 378 and 222.
Nokia: Huawei's document is proposing to re-use the concept in LTE.
Ericsson: in LTE we didn’t have the concept of NAS connection identifier.
It was finally decided to go for Qualcomm's point in 378.
The last two changes of this document were merged in 422.
| merged | No | S3‑190422 | |
S3‑190152 | Clarification on Registration procedure for mobility from EPS to 5GS over N26 | ZTE Corporation | CR | Agreement |
7.1.10Interworking
| Yes |
YesEricsson: we don’t need this clarification, nothing new here.
Vodafone: this is not an essential correction, cat-F.Nokia supported Vodafone.
| not pursued | No | ||
S3‑190153 | Handling of AMF redirection | ZTE Corporation | CR | Agreement |
7.1.5NAS security
| Yes |
YesEricsson: Why restrict the AMF from performing re-authentication procedure?It is not clear why this is needed. Nokia agreed with Ericsson.
Proposal 2 and 3 were related to one.
| not pursued | No | ||
S3‑190154 | Authorization on northbound APIs | ZTE Corporation | pCR | Approval |
7.2.9Network Exposure Function (NEF) (TS 33.519)
| Yes |
Yes
| revised | No | S3‑190514 | |
S3‑190155 | Anti fake base station based on symmetric algorithm | ZTE Corporation | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190156 | Solution on registration for mutual exclusive slices | ZTE Corporation | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesORANGE, TIM didn’t understand the contrbution.
BT didn’t see the requirement forthis.
For this reason the document was noted.
| noted | No | ||
S3‑190157 | Key issue for acceleration of AKA procedure for low latency | ZTE Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesVodafone: this is more a solution.
ORANGE didn’t agree with the requirement.
New editor's note added.
| revised | No | S3‑190541 | |
S3‑190158 | Solution on enhancement of handover with direct Xn tunnel for single user plan path | ZTE Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| noted | No | ||
S3‑190159 | Key issue for SUPI concealment | ZTE Corporation | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190160 | Key issue for linkability when AUTN verification fails | ZTE Corporation | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190161 | Solution on mitigation of large SUCI attack | ZTE Corporation | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190162 | Solution for linkability issue | ZTE Corporation | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190163 | New SID on 5G forward security | ZTE Corporation | SID new | Approval |
8.21New study item proposals
| Yes |
YesNokia: there is a forward secrecy study item.
Ericsson: this is not very urgent for Rel-16. There is no clear threat, it's more of an enhancement.
ORANGE preferred to have a security paper for the next meeting describing the security issue. This was also recommended by the Chair.
| noted | No | ||
S3‑190164 | New SID on IPsec enhancement to meet 5G data rate requirements | ZTE Corporation | SID new | Approval |
8.21New study item proposals
| Yes |
Yes
| noted | No | ||
S3‑190165 | Discussion on improving the efficiency of IPsec to meet 5G data rate requirements | ZTE Corporation | discussion | Discussion |
8.21New study item proposals
| Yes |
YesZTE clarified that the results were coming from testing.
BT: 20Gbps? What was the experimental setup? 3GPP deployment? ZTE answered that a 3GPP deployment. IPSec is an IETF standard, and the issue should be considered there.
NEC: this is about performance and implementation, not a standard issue.
| noted | No | ||
S3‑190166 | Solution on privacy protection of SUPI | ZTE Corporation | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesVodafone: This assumes that we are only using GPM whereas AKMA's scope will be wider.
BT: no distribution of private key here.
Qualcomm: this solution adds nothing, it should be noted.
Vodafone: the solution doesn’t meet the criteria.
| noted | No | ||
S3‑190167 | a skeleton of security aspects of 5G SRVCC to UTRAN | Huawei, Hisilicon, China Unicom | draftCR | Approval |
7.4Security aspects of single radio voice continuity from 5GS to UTRAN () (Rel-16)
| Yes |
Yes
| revised | No | S3‑190443 | |
S3‑190168 | Resovle Editor's note in Solution for bootstrapping authentication of AKMA | Huawei, Hisilicon | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190169 | Solution for Key freshness in AKMA | Huawei, Hisilicon | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesVodafone, ORANGE: the document is badly structured.You have a solution in mind, write the key issues properly.
There was no support for this document.
| noted | No | ||
S3‑190170 | New Conclusion for Small Data Transfer via NAS Signaling | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: too premature for having conclusions. We still have lot of new key issues.
Nokia supported Huawei in order to make progress and not delay anything.
Ericsson: we should have a conclusion for each key issue as SA2 is doing.
| revised | No | S3‑190489 | |
S3‑190171 | New Solution Security-Property-Group-based Mitigation for DDoS Attack Triggered by Malicious Applications on the UE | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesJuniper: this is an operational issue for operators. It should be treated outside security.Qualcomm agreed with Juniper; it's application level.
Alf (NTT-Docomo): not advisable to have standardised these kind of mechanisms since it would be too exposed to the public.
It was agreed to add two editor's notes.
Qualcomm suggested the need for discussion papers justifying why these kind of solutions should be justified.
ORANGE: editor's note on investigating whether this solutions brings new DoS attacks.
| revised | No | S3‑190485 | |
S3‑190172 | Address EN in Key Issue 4 of Definition of Misbehaving UE | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesNEC: the clause 8.8.1 in 23.791 does have nothing to do with the misbehaving UE.
Vodafone preffered to have this moved to the Definitions clause.
Qualcomm: we need to understand the definition of misbehaving UE in the context of CIoT.
Huawei: we don’t want to define anything, just to use an existing definition.
| revised | No | S3‑190474 | |
S3‑190173 | New Key Issue for NAS based Redirection between Core Networks | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: the key issue is the bidding attack. The anti-bidding down is the solution.
NEC: this problem is not specific for IoT. NEC supported this.
CableLabs supported having this threat.
NTT-Docomo: What happens if there is no key negotiated, key wrong, etc? What’s there it is a solution specific requirement.
Vodafone: there is nothing that says here what protection we have in the current system. Then explain why it could be unprotected.
| revised | No | S3‑190475 | |
S3‑190174 | Clarification for section 6.10.2.1 | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190433 | |
S3‑190175 | Clarification for UP security in option4&7 | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
YesNokia: delete the "rather than".
| revised | No | S3‑190434 | |
S3‑190176 | claification on interworking case | Huawei, Hisilicon | CR | Approval |
7.1.10Interworking
| Yes |
YesVodafone: not happy with the use of "done" in these sentences.
Qualcomm: changes are not needed, they are obvious.
MCC: replace 4G with LTE.
| revised | No | S3‑190437 | |
S3‑190177 | key update in multi-NAS scenario | Huawei, Hisilicon | CR | Approval |
7.1.5NAS security
| Yes |
YesNokia: why are we bringing these changes based on access type?
Overlapping with tdoc 282 and 372.
| revised | No | S3‑190556 | |
S3‑190178 | Clarification on the UE selecting the 4G or 5G security protection method | Huawei, Hisilicon | CR | Approval |
7.1.16Others
| Yes |
YesQualcomm: already specified in CT1, not needed here.
Huawei: this is not done in CT1.
Ericsson: why is NAS not mentioned here and only AS SMC procedure? Is the AS SMC part an example? This had to be taken offline.
| revised | No | S3‑190478 | |
S3‑190179 | Add requirement to KI#2 | Huawei, Hisilicon | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190180 | A new KI on the trust of W-5GAN | Huawei, Hisilicon | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesEricsson, ORANGE: this is not needed.
| noted | No | ||
S3‑190181 | Add evaulation to sloutlion 3 | Huawei, Hisilicon | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190182 | add conclusion clauses | Huawei, Hisilicon | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesEricsson: we don’t have conclusions yet.
Huawei: but we will.
ORANGE: just keep the Key Issue X.
| approved | No | ||
S3‑190183 | Add conclusion to KI#1 | Huawei,Hisilicon | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190184 | Key Issue for encryption and integrity protection of assistance data | Huawei, Hisilicon | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190185 | Key Issue for encryption and integrity protection of location data | Huawei, Hisilicon | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190186 | Key Issue for integrity protection of privacy setting between UE and home network | Huawei, Hisilicon | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190187 | Solution for DDoS attack mitigation in CIoT | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesEricsson: editor's note on how this filter is determined. This was agreed.
| revised | No | S3‑190486 | |
S3‑190188 | Solution for integrity protection of privacy setting between UE and UDM | Huawei, Hisilicon | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190189 | Key Issue for protection against DDoS attack | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesVodafone: why mandate the NPN to support anything? The first requirement needs rewording anyway.
Nokia: does the Denial of Service a key issue need to be addressed at all?
Qualcomm: this key issue is not needed.
| noted | No | ||
S3‑190190 | Security Solution for DDoS attack mitigation in the roaming scenarios between NPN and PLMN | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190191 | Editorial corrections in TS 33.117 R15 | Nokia, Nokia Shanghai Bell | CR | Approval |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesIt was agreed in order to see if Rel-14 had the same issue to be corrected.
| revised | No | S3‑190458 | |
S3‑190192 | Corrections on ng-ran keys | Huawei, HiSilicon | CR | Agreement |
7.1.4AS security
| Yes |
YesNokia didn’t agree with using multiple names for the same keys. KNG-RAN should not be used as this is causing confusion.
| revised | No | S3‑190426 | |
S3‑190193 | New clause for intra ng-enb handover | Huawei, HiSilicon | CR | Agreement |
7.1.4AS security
| Yes |
YesNokia: not sure if we need this new clause. Ericsson agreed.
| not pursued | No | ||
S3‑190194 | Clarifications CIOT security assumptions | Huawei, HiSilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: it's clearer to have the introducion of 268 instead of having it in here.
ORANGE: why comparing it with EPS? Staet that the Ues shall follow 5G requirements.
Huawei: we may miss solutions for IoT Ues that have EPS solutions (e.g. if they are redirected to EPS).
ORANGE: if they are connected to 5G the Ues shall have security as strong as 5G.
| revised | No | S3‑190473 | |
S3‑190195 | CIOT solution 6 improvement | Huawei, HiSilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190196 | Roaming key issue for AKMA | Huawei, HiSilicon | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesORANGE: why is the proxy needed?
Huawei: it’s for the roaming.
Qualcomm, Gemalto didn’t see the point for having a proxy either.
Qualcomm: roaming needs to be supported, but we only need a description of the key issue to start with. Remove everything else and come back for the next meeting with the rest.
| noted | No | ||
S3‑190197 | architecture solution for AKMA with non-standalone function | Huawei, HiSilicon | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesORANGE: why mandating a specific authentication for the network in AKMA?
Huawei: we want to reuse primary authentication.It's a general authentication procedure.
ORANGE: this authentication is not needed.
Vodafone: missing how the enterprise interacts with the system.
Qualcomm: if you don’t want to use primary authentication describe it somewhere else. This is mixing primary authentication with Kusf authenticaiton.
Vodafone: this is two different solutions mixed.
| noted | No | ||
S3‑190198 | URLLC solution for N3 tunnel redundancy | Huawei, HiSilicon | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesEricsson: Redundace of N9 tunnel needs more clarification.
Ericsson: there is no key issue for the backhaul interface, which is being addressed here in the N3 interface.
| revised | No | S3‑190549 | |
S3‑190199 | URLLC solution for Key Issue 1 | Huawei, HiSilicon | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesOption 2 is merged into 545.
| merged | No | S3‑190545 | |
S3‑190200 | URLLC solution for Key Issue 3 | Huawei, HiSilicon | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesVodafone: how do they satisfy LI requirements?
Ericsson: there are no LI issues.
| revised | No | S3‑190546 | |
S3‑190201 | A key issue on the long-term key and its related anchor key leakage | Huawei, HiSilicon | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190202 | A solution to slice authentication | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesORANGE: step 5 is slice registration complete. Add step 6.An editor's note was agreed, step one revised as well.
Interdigital: this is still a nested approach and it needs waiting for SA2 and CT1's discussions.
| revised | No | S3‑190534 | |
S3‑190203 | A new KI on NSSAI protection | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| revised | No | S3‑190477 | |
S3‑190204 | Solutions to AMF key separation | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesOrange: second solution is not related to this study item.
NCSC didn't support this either as it was introducing a new solution that should be assesed agains quantum computing.
Nokia didn't support it either.
| noted | No | ||
S3‑190205 | A solution to security features for NSaaS | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesORANGE: why defining these security features at all here? I don’t want his table.
BT, CableLabs: network slices hould have their own invocable security features according to policy.
ORANGE: we only introduce secondary authentication in TS33.501, there is no other security feature added for them.
TIM: how is the secondary authentication intended here? ORANGE clarified that it referred to the slice authentication.
| revised | No | S3‑190537 | |
S3‑190206 | Security threats and requirement for KI #4 | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesDeutsche Telekom: privacy doesn’t leak, but user sensitive information.
NTT-Docomo, NEC: against whom are we protecting?
Editor's note was added to that effect.
| revised | No | S3‑190535 | |
S3‑190207 | Considerations on network product class when using NFV technology | China Mobile, ZTE Corporation, Nokia, Nokia Shanghai Bell | pCR |
8.14Study on SECAM and SCAS for 3GPP virtualized network products
| Yes |
Yes
| not treated | No | |||
S3‑190208 | Evaluation text for solution #2 | NEC Corporation | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: we are still adding key issues. Will you update this when new key issues will be added?
NEC: this is the evaluation for a specific solution from last meeting.
KPN: this looks like an evaluation for all key issues, this is very generic.
Vodafone: editor's note on adding an evaluation for future key issues.
| revised | No | S3‑190479 | |
S3‑190209 | New key issue on user plane integrity protection in MR-DC scenarios | NEC Corporation | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| noted | No | ||
S3‑190210 | New key issue on data rate limitation of integrity protection in UP DRB | NEC Corporation | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesQualcomm: max data rate is full data rate, minimum is 64Kbps. The key issue is wrong. There was a different understanding on this and had to be discussed offline.
| noted | No | ||
S3‑190211 | Discussion on Requirement for KDF Negotiation | NEC Corporation, Huawei, Hisilicon | discussion | Discussion |
8.10Study of KDF negotiation for 5G System Security
| Yes |
YesORANGE: premature to have this proposal.
It was noted that the document was sent for discussion and not for endorsement.
| noted | No | ||
S3‑190212 | Update to clause 4 to add KDF negotiation rationale | NEC Corporation, Huawei, Hisilicon | pCR | Approval |
8.10Study of KDF negotiation for 5G System Security
| Yes |
YesEricsson: geopolitics and cost issues are not true.They didn’t agree with the preferences of UE vendors either.
Qualcomm: we cannot agree with this document. Too premature. KDF negotiation is needed in 5G. That's the only point we need now.
ORANGE supported Ericsson and Qualcomm. ORANGE didn’t agree with anything in this contribution.
NEC: this is just a rational clause for the study item, not a key issue.
Colin (BT): Where are the KDFs and what's the impact on the operators?
Vodafone: can only accept he paragraph on the future proofness.
It looked like companies preferred a much shorter rational. This was taken offline.
| revised | No | S3‑190517 | |
S3‑190213 | New Key Issue on use of established keys for AKMA | NEC Corporation | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190214 | Solution for using established keys for AKMA | NEC Corporation | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| revised | No | S3‑190558 | |
S3‑190215 | Considerations on SECAM of the virtualized network products | China Mobile, ZTE Corporation, Nokia, Nokia Shanghai Bell | pCR |
8.14Study on SECAM and SCAS for 3GPP virtualized network products
| Yes |
Yes
| not treated | No | |||
S3‑190216 | CR to TR 33.841 regarding key derivation function | China Mobile | CR |
8.3Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
| Yes |
YesEricsson: the note is not clear.
NCSC commented that this wasn’t necessary for the study, which is finished.
| not pursued | No | |||
S3‑190217 | Key issue regarding minimal computational cost when generating session anchor keys | China Mobile | pCR |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | |||
S3‑190218 | Key issue to ensure the correct routing of the data packets in the user plane | China Mobile | pCR |
8.17Study on User Plane Integrity Protection
| Yes |
YesDeutsche Telekom: same key issue as the NEC contribution.
| noted | No | |||
S3‑190219 | Clarification on UE Parameters Update Data used for MAC computation | Huawei, HiSilicon | CR | Agreement |
7.1.16Others
| Yes |
YesQualcomm: it is already clear, no need to clarify.
IDEMIA and Gemalto didn't support this either.
| not pursued | No | ||
S3‑190220 | Test Case: Mutual Authentication between Network Functions | Nokia, Nokia Shanghai Bell | draftCR | Approval |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| noted | No | ||
S3‑190221 | Key issue to ensure the security of session anchor keys | China Mobile | pCR |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | |||
S3‑190222 | Modificaiton on the NAS connection identifier for backward compatibility with LTE | Huawei, Hisilicon | CR |
7.1.5NAS security
| Yes |
Yes
| not pursued | No | |||
S3‑190223 | Key issue to mitigate the DDoS attacks on the UDM | China Mobile | pCR |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | |||
S3‑190224 | NAS counter clarification on interworking | Huawei, Hisilicon | CR | Agreement |
7.1.10Interworking
| Yes |
YesEricsson: first set of changes are legacy behaviour. Not needed.
Qualcomm didn’t agree with this contribution at all.
| revised | No | S3‑190438 | |
S3‑190225 | Test Case: Authorization of NF Serive Access | Nokia, Nokia Shanghai Bell | draftCR | Approval |
7.2.1NR Node B (gNB) (TS 33.511)
| Yes |
Yes
| noted | No | ||
S3‑190226 | Key issue to resist the linkability attacks | China Mobile | pCR |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | |||
S3‑190227 | Update on the token verification | Huawei, Hisilicon,Nokia | CR | Agreement |
7.1.13.2Other
| Yes |
YesNokia: not OK with removing the verification part, agree to remove where the verification is done. This was taken offline and then agreed.
| agreed | No | ||
S3‑190228 | Proposed revision of solution 6 | China Mobile,ZTE Corporation | pCR |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesORANGE: this is mixing two authentication procedures.
ZTE agreed to separate them.
ORANGE then commented that the authentication procedure looked strange. ORANGE didn’t see it clear that there were two procedures after all and couldn’t agree with the contribution.
ZTE wanted to add an editor's note on the need for separating both procedures but this was rejected by ORANGE. It had to be taken offline.
| noted | No | |||
S3‑190229 | Clarification on service authorization and token verification | Huawei, Hisilicon | CR | Agreement |
7.1.13.2Other
| Yes |
Yes
| revised | No | S3‑190440 | |
S3‑190230 | A key issue: Slice-specific Security in roaming | China Mobile | pCR |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesBT: What is the difference with the non-slicing scenario? This is not slice specific.
ORANGE: have this as a key issue in the SBA study.
| noted | No | |||
S3‑190231 | Clarification on securing the procedure of idle mode mobility from 5GS to EPS over N26 interface | Huawei, Hisilicon | CR | Agreement |
7.1.10Interworking
| Yes |
YesWe don’t need this change. Initial attach procedure is done where there is no N26. Ericsson commented that it didn't matter whether there was N26 or not.
| not pursued | No | ||
S3‑190232 | Clarification on the Use of the SUPI in the Kamf Derivation | Huawei, Hisilicon,Nokia,Nokia Shanghai Bell | CR | Agreement |
7.1.2Key derivation
| Yes |
YesEricsson didn’t agree since this would affect Legal Interception requirements. The question is whether to remove the SUPI type part.
ZTE didn’t agree with this change.
Vodafone: the wording is confusing.
| revised | No | S3‑190416 | |
S3‑190233 | SCAS SEPP: Introduction and general approach | Nokia, Nokia Shanghai Bell | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| revised | No | S3‑190512 | |
S3‑190234 | Clarification on the allocation of 5G-GUTI | Huawei, Hisilicon | CR | Agreement |
7.1.14Privacy
| Yes |
Yes
| revised | No | S3‑190397 | |
S3‑190235 | SCAS NRF: Introduction and general approach | Nokia, Nokia Shanghai Bell | pCR | Approval |
7.2.8Network Resource Function (NRF) (TS 33.518)
| Yes |
Yes
| approved | No | ||
S3‑190236 | pCR to TR33.814 - Key issue for end-to-end LCS data security | CATT | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190237 | New KI: SUPI privacy protection across different security domains | Huawei, Hisilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesORANGE: why sending the SUPI to the slice?
Huawei: according to SA2 several network functions can be deployed in the slice, so it is necessary in some cases to send the SUPI.
Nokia: additional protection for SUPI? They are already protected.
DT: we need a new mechanism to send the SUPI to third parties. ORANGE wasn't sure that SA2 could see the SUPI, and if that was the case SA3 should tell them not to do that.
Alf (NTT-Docomo: SUPI shall not be available outside the operator's network.
BT: struggling to see this slice specific.
| noted | No | ||
S3‑190238 | Dynamic UP security policy control solution for URLLC | Huawei, HiSilicon | pCR |
8.13Study on security for 5G URLLC
| Yes |
YesVodafone: solution details need rewriting.
Ericsson: PCF issue is not clear here.
| noted | No | |||
S3‑190239 | New KI: Access token handling between network slices | Huawei Technologies Sweden AB | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| revised | No | S3‑190318 | |
S3‑190240 | Test Case: Mutual Authentication | Nokia, Nokia Shanghai Bell | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| noted | No | ||
S3‑190241 | Solution for NPN network access via PLMN | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesEricsson: why not use SA2's conclusion on this? There is no security problem here.
| revised | No | S3‑190493 | |
S3‑190242 | pCR to TR33.814 - Key issue for broadcast assistance data security | CATT | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190243 | New KI: Isolation of multiple NAS connections | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE objected to this document.
| noted | No | ||
S3‑190244 | Test Case: NF Discovery Service Authorization | Nokia, Nokia Shanghai Bell | pCR | Approval |
7.2.8Network Resource Function (NRF) (TS 33.518)
| Yes |
Yes
| noted | No | ||
S3‑190245 | New requirment for Authentication relay attack | Huawei, Hisilicon | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190246 | pCR to TR33.814 - Solution of provisioning keys for broadcast assistant data protection | CATT | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190247 | pCR to TR33.814 - Solution of ciphering algorithms | CATT | pCR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| not treated | No | ||
S3‑190248 | New key issue: Key revocation | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesVodafone: more requirements and definitions are needed.For example, who rebokes the application keys.
ORANGE repplied that it was the network who revoked the keys.
Qualcomm proposed to add an editor's note to procceed with the work during the next meeting.
| revised | No | S3‑190528 | |
S3‑190249 | Protocol clarifications to solution 2 | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesVodafone: the third party application doesn’t seem represented.
Ericsson: this is about the authentication procedure, bootstrapping, not about how the keys are used.
Ericsson: this is purely used plane based. A copy of GBA making sure that it works in 5G.
ORANGE: revocation of the keys in the UE needs to be clarified.
It was agreed to add an editor's note stating the above.
| revised | No | S3‑190529 | |
S3‑190250 | Evaluation of solution 2 | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesORANGE: key issues are still coming, having the evaluation is a bit premature. Qualcomm agreed.
| noted | No | ||
S3‑190251 | New solution:Key revocation | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesORANGE: remove the evaluation.
Vodafone: consequences are not described in detail.
| revised | No | S3‑190530 | |
S3‑190252 | New solution: Implicit Bootstrapping | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
YesNEC proposed to alter the order of some clauses.
Ericsson: too early to decide the solution since there are still revocation aspects that need to be considered.
| revised | No | S3‑190531 | |
S3‑190253 | New solution: AKMA authentication via the control plane | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190254 | Corrections to RRC Inactive procedure.and RAN-based notification area update procedure. | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesHuawei didn’t agree with the new requirement, since this was implementation specific and not needed.
NEC supported the Ericsson's view.
Nokia: there is an impact on implementation, it has performance implications. They needed to check if this was fine with them.
| revised | No | S3‑190429 | |
S3‑190255 | EUTRA connected to 5GC: clause 6.6.2 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesVodafone didn't see the purpose of the note.Just refer to 33.401.
Nokia: ng-eNodeB specific topics are specified in 33.501, not 33.401.
Vodafone admitted the above but preferred to have the note as a requirement. Ericsson replied that the requirement existed somewhere else.
This was taken offline.
| revised | No | S3‑190501 | |
S3‑190256 | EUTRA connected to 5GC: clause 6.7.3 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190427 | |
S3‑190257 | EUTRA connected to 5GC: clause 6.7.4 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190428 | |
S3‑190258 | EUTRA connected to 5GC: clause 6.8.1 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesNokia: There is no consistency with the key names. Don’t use KngRAN.
| revised | No | S3‑190424 | |
S3‑190259 | EUTRA connected to 5GC: clause 6.8.2 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesThe NOTE was removed since it was adressed in other conitrbutions.Also other changes related with message names.
Overlaps with 192.
| revised | No | S3‑190425 | |
S3‑190260 | EUTRA connected to 5GC: clause 6.9.2.1 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190430 | |
S3‑190261 | EUTRA connected to 5GC: clauses 6.9.2.3.1 and 6.9.2.3.2 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| merged | No | S3‑190426 | |
S3‑190262 | EUTRA connected to 5GC: clauses 6.9.3 and 6.9.4 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190431 | |
S3‑190263 | EUTRA connected to 5GC: clause 6.9.5 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190432 | |
S3‑190264 | EUTRA connected to 5GC: clause 6.11 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | ||
S3‑190265 | Updates to Solution #3: Security solution for MO SMS at AMF re-allocation | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesHuawei: add an editor's note on why this assumption is made in the solution. Qualcomm supported this.
Ericsson: this is an editor's note on existing text. Bring it with a contribution. Huawei commented that it was impacted by the new text.
| revised | No | S3‑190480 | |
S3‑190266 | Updates to Solution #5: Security solution for small data included in initial NAS signalling at mobility | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190481 | |
S3‑190267 | Potential new security impact in Rel-16 for the selected CIoT solutions in SA2 TR 23.724 | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesHuawei didn’t see the need for having this in the TR. ORANGE agreed with Huawei.
| noted | No | ||
S3‑190268 | Proposal for content to introduction clause | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesHuawei: refer to SA2 with regards to architecture. References are wrong.Clash with 194.
Vodafone: no clash with 194, really.
Vodafone and TIM agreed to have this in the introduction.
| revised | No | S3‑190470 | |
S3‑190269 | Proposal for content to clause 4 | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesHuawei: reference SA2; it is also referring to things that SA2 hasn’t decided yet.
Ericsson: SA2 concluded.
| revised | No | S3‑190472 | |
S3‑190270 | A new key issue for privacy protection of new parameters for CIoT included in NAS messages | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesHuawei: wait for SA2 to have the parameters that need to be privacy protected.
ORANGE: remove requirements, keep the key issue, analyze parameters as they come.
| revised | No | S3‑190476 | |
S3‑190271 | Solution for privacy protection of new parameters for CIoT included in NAS messages | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190272 | Solution for key separation based on slice authentication keys | Ericsson | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesOverlapping with 204.
| noted | No | ||
S3‑190273 | KI#2 in TR 33.809 – new requirement and solution for non-public networks | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesQualcomm was against this contribution. No other support was found.
| noted | No | ||
S3‑190274 | KI#1 in TR 33.809 – a new NOTE for requirements | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | ||
S3‑190275 | KI#1 in TR 33.809 – new requirement and solution for UECapabilityInformation RRC message | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesThe requirement was agreed.The solution had to be discussed separately.
| revised | No | S3‑190554 | |
S3‑190276 | KI#1 in TR 33.809 – new requirement and solution for RRC Reject message | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
YesDocomo preferred 359. The requirement was removed.
| noted | No | ||
S3‑190277 | KI#3 in TR 33.809 – updates to requriements and editorials | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190278 | KI#3 in TR 33.809 – new solution for enriched measurement reports | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190279 | KI#3 in TR 33.809 – conclusion on second requirement (reactive action) | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190280 | EUTRA connected to 5GC: clause 8 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| revised | No | S3‑190435 | |
S3‑190281 | Clarification to AKA parameter derivation | Ericsson | CR | Approval |
7.1.5NAS security
| Yes |
YesNokia missed some text covering RES* and XRES*.It was proposed to add this during the next meeting.
| agreed | No | ||
S3‑190282 | Multiple NAS connecions: mobility with horizontal KAMF derivation | Ericsson | CR | Approval |
7.1.5NAS security
| Yes |
Yes
| merged | No | S3‑190556 | |
S3‑190283 | Multiple active NAS connections in the same PLMN's serving network: common algorithm identifiers | Ericsson | CR | Approval |
7.1.5NAS security
| Yes |
YesQualcomm: how do you achieve this requirement? They didn't agree with the wording.
It was revised to reword the sentence.
| revised | No | S3‑190436 | |
S3‑190284 | Clarification to the implementation requirement for the protectaion of the backhaul and sidehaul interfaces | Ericsson | CR | Agreement |
7.1.12NDS
| Yes |
Yes
| agreed | No | ||
S3‑190285 | New key issue on the secure negotiation of the user plane integrity protection feature | Ericsson | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| revised | No | S3‑190551 | |
S3‑190286 | Update to KI#3 or KI#4 taking Dual Connectivity into considerations | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| revised | No | S3‑190543 | |
S3‑190287 | Evaluation to solution #1 and conclusion to key issue #3 | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesHuawei: remove the conclusion.This was agreed.
| revised | No | S3‑190547 | |
S3‑190288 | Evaluation on solution #2 and conclusion to key issue #3 | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesSame as the one above.
| revised | No | S3‑190548 | |
S3‑190289 | New key issue on UP security policy for the 5GLAN Group | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesHuawei didn't agree with the example.
The requirement was reworded to state "a" 5GLAN group instead of "the".
| revised | No | S3‑190498 | |
S3‑190290 | New security solution for handling UP security policy for a 5GLAN Group | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| revised | No | S3‑190499 | |
S3‑190291 | TR 33.819: new key issue on security and privacy aspects of service continuity and session continuity | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesNokia: session and service continuity are requirements in SA2. This is a very vague requirement. Key issue is valid.
NTT-Docomo: security threats need to be more concrete.
| revised | No | S3‑190494 | |
S3‑190292 | Skeleton for TR 33.846 on authentication enhancements | Ericsson | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190293 | Scope for the study on authentication enhancements (FS_AUTH_ENH) | Ericsson | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190294 | New KI: Leakage of long-term key | Ericsson | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190295 | New solution: EAP-AKA´ PFS | Ericsson | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190296 | Update on EAP-AKA´ PFS | Ericsson | pCR | Information |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190297 | Clarification to idle mode mobility from EPS to 5GS | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | ||
S3‑190298 | EDT correction – input "S" to calculation of HASHUE-data and HASHeNB-data | Ericsson | CR | Agreement |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesEricsson considered that RAN2 had the responsibility for a solution and not SA3. Huawei disagreed.
Ericsson: we don’t need to take a stand on how RAN will solve the issue. We can wait for them. Huawei replied that SA3 knew what RAN solution would be about, but it didn’t work when having multiple PDCP PDUs.
Nokia: calculation at the MAC layer feasibility should be pondered by RAN2, not SA3. Let's ask them about this in an LS. Qualcomm supported involving RAN2.
Docomo commented that SA3 may reconsider the requirement for having it at the MAC layer and make it application dependent.
It was agreed to send an LS to RAN2 with several questions involving potential solutions to the multiple PDU issue.
| not pursued | No | ||
S3‑190299 | EDT correction – length of HASHUE-data and HASHeNB-data | Ericsson | CR | Agreement |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesQualcomm: solution dependent? We may have to revisit this based on the solution we settle down on.
Ericsson clarified that this was sent through the RAN nodes, not transferred over the air.
The sentence needed rewording so it was taken offline.
| revised | No | S3‑190455 | |
S3‑190300 | EDT correction – input to calculation of shortResumeMAC-I | Ericsson | CR | Agreement |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| agreed | No | ||
S3‑190301 | EDT correction – clarification of NOTE about no-integrity protection for non-EDT data | Ericsson | CR | Agreement |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesHuawei didn’t agree with the CR.Ericsson could come back once the solution was defined.
| not pursued | No | ||
S3‑190302 | LS on EDT security | Ericsson | LS out | Approval |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| noted | No | ||
S3‑190303 | Key issue on linkability attack | Huawei, Hisilicon | pCR | Approval |
8.19Study on authentication enhancements in 5GS
| Yes |
Yes
| not treated | No | ||
S3‑190304 | Update on Key issue #2.1 | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE: is this the right conclusion in sA2? This was confirmed.
| approved | No | ||
S3‑190305 | Response LS on Authentication for UEs not Supporting NAS | Lenovo (Beijing) Ltd | LS out |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190519 | ||
S3‑190306 | Solution for 5GC access from WLAN UEs that do not support NAS | Motorola Mobility, Lenovo | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesDeutsche Telekom: we need to modify this according to our LS reply to SA2.
ORANGE: SUCI is enough for 3GPP credentials.
| merged | No | S3‑190507 | |
S3‑190307 | Security Assurance Requirement and Test for authorization handling in the NF | Huawei, HiSilicon | draftCR | Agreement |
7.2.1NR Node B (gNB) (TS 33.511)
| Yes |
Yes
| revised | No | S3‑190540 | |
S3‑190308 | Solution for Key Issue #7: Key refreshing for protection of small data | Lenovo, Motorla Mobility | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190488 | |
S3‑190309 | Solution for partial UP IP considering UE limitations | Motorola Mobility, Lenovo | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesDeutsche Telekom: This is not the solution SA3 should go for.
| noted | No | ||
S3‑190310 | SCAS: UDM-specific adaptations of security functional requirements and related test cases | Huawei, Hisilicon | pCR | Approval |
7.2.4Unified Data Management (UDM) (TS 33.514)
| Yes |
Yes
| revised | No | S3‑190508 | |
S3‑190311 | SCAS: AMF-specific adaptations of security functional requirements and related test cases | Huawei, Hisilicon | pCR | Approval |
7.2.2Access and Mobility Management Function (TS 33.512)
| Yes |
YesEricsson: interoperability testing is out of scope of SCAS.
NEC pointed out that tdoc 099 was related to this discussion. 099 was discussed and then this document gone through.
Test case one was scrapped out, related to interoperability.
Test case two: the vice Chair commented that failure of integrity protection would fit in here.
There didn’t seem to be a discussion so the vice chair proposed to take this document offline.
| noted | No | ||
S3‑190312 | Security Assurance Requirements and Tests for the Security Functionalities Provided by UPF | Huawei, Hisilicon | pCR | Approval |
7.2.2Access and Mobility Management Function (TS 33.512)
| Yes |
Yes
| noted | No | ||
S3‑190313 | Security Assurance Requirement and Test for NRF | Huawei, Hisilicon | pCR | Approval |
7.2.8Network Resource Function (NRF) (TS 33.518)
| Yes |
Yes
| noted | No | ||
S3‑190314 | New Key Issue: Subscription identifier exposure outside 3GPP network | Ericsson India Private Limited | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesZTE: the requirement is not clear, it's also a generic one not related to cIoT. There is a requirement in 33.501 for the AMF already. Vodafone supported this.
Ericsson: there is no requirement with the NIDD API involved.
| noted | No | ||
S3‑190315 | Removing the test case on Kseaf handling | Huawei, Hisilicon | pCR | Approval |
7.2.6Authentication Server Function (AUSF) (TS 33.516)
| Yes |
Yes
| approved | No | ||
S3‑190316 | New solution - Battery efficient AKMA | KPN | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| not treated | No | ||
S3‑190317 | Requirement and test cases for SMF | Huawei, Hisilicon | pCR | Approval |
7.2.5Session Management Function (SMF) (TS 33.515)
| Yes |
Yes
| noted | No | ||
S3‑190318 | New KI: Access token handling between network slices | Huawei, Hisilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| revised | No | S3‑190538 | S3‑190239 |
S3‑190319 | Key Issue on access to 5GC from a non-3GPP device over Wireline 5G Cable Access Network | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190320 | Key Issue on NAS termination in TWIF | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesEricsson: no need to use NAS security here, you can rely on transport security. Add it to existing key issue 6.
Nokia: we can just remove the requirements. This was agreed.
ORANGE: generalise this since it refers to a key issue from the SA2 TR.
| revised | No | S3‑190520 | |
S3‑190321 | Editorial corrections in CAPIF TS | Ericsson | CR | Approval |
7.5.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
| Yes |
Yes
| agreed | No | ||
S3‑190322 | Key Issue on SUCI format for legacy FN-RG devices that access 5G over wireline network | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190522 | |
S3‑190323 | Key Issue on Authorization of IPTV subsystem | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesEricsson: this is already addressed in 33.501 in clause 12. There is no normative work needed for this, note it.
| noted | No | ||
S3‑190324 | Key Issue on security of TNGF mobility using EAP Reauthentication Protocol (ERP) | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190325 | Key Issue on NAS termination for registered FN-RGs | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesHuawei: solution specific requirement.ORANGE proposed to keep it solution specific since it was the base for normative work.
| revised | No | S3‑190523 | |
S3‑190326 | New KI: Interworking between AKMA and GBA | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| not treated | No | ||
S3‑190327 | Allocating new 5G-GUTI during the MO service request procedure | NEC Europe Ltd | CR | Approval |
7.1.3Mobility
| Yes |
YesHuawei: check with CT1.
Qualcomm: we should not mandate it, it's up to the network. Nokia agreed.
Ericsson: we discussed this before and decided not to mandate it.
Docomo proposed to change NOTE1 to clarify the "more frequently" bit.
| revised | No | S3‑190420 | |
S3‑190328 | Key Issue on security of the Tn interface between TNGFs | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesNokia: the scope of thi study is the Tn interface.
ORANGE: generalise this since it refers to a SA2 key issue.
SA2 conclusions needed to be checked offline.
| noted | No | ||
S3‑190329 | Key Issue on access to 5GC from non-3GPP device over Trusted WLAN | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesORANGE: this has been considered in our LS to SA2.
Huawei: non-3GPP device and non 5G capable device; What's the difference? We need to be consistent with the terminology in the future.
| noted | No | ||
S3‑190330 | Conclusion for Key Issue #9 | Ericsson | pCR |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: we changed some of the aspects related to this. We should finish the key issues before concluding the study.
Huawei: SA2 also concluded this topic.
| revised | No | S3‑190490 | ||
S3‑190331 | pCR to Solution #1 to include child SA creation for user plane data protection | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190332 | FN-RG registration to 5GC | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190506 | |
S3‑190333 | Access to 5GC via Trusted WLAN for UEs w/o NAS support | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesTIM: this is pointing wrongly to annex B of 33.501. This type of networks are not mentioned in there. It was agreed to remove the reference to annex B.
| revised | No | S3‑190507 | |
S3‑190334 | 5G-RG connecting to 5GC via Wireline Access (W-5GAN) | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190524 | |
S3‑190335 | 5G-RG connecting to 5GC via NG-RAN | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190525 | |
S3‑190336 | Vertical - Key Issue on Authentication of a UE for Non-public network | Huawei, HiSilicon, Nokia, Nokia Shanghai Bell, CableLabs | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE: how is this different from Rel-15? There is no issue here.
IDEMIA: How to protect non-3GPP credentials is not available for us.
Huawei: there is no SA1 requirement for non-public networks having to use UICC. IDEMIA: it's up to us to decide.
Vodafone: UICC are irrelevant, we talk about USIM in our specs.
ORANGE: NPN are 5G networks, hence the UICC is needed.
NEC was fine with this contribution.
DT,ORANGE, TIM and Vodafone didn’t support this contribution.
Qualcomm: NPN operators may or may not USIMs. ORANGE replied that this wasn’t part of the contribution and should be brought separately.
Vodafone: with no USIM we will have problems to connect to the network.
Nokia: we have a SA1 requirement that cannot be fulfilled by 33.501.
| noted | No | ||
S3‑190337 | Vertical - Key Issue on credential storage for Non-public network | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190338 | Vertical - Requirements to Key Issue on Authentication of a UE for Non-public network | Huawei, HiSilicon, Nokia, Nokia Shanghai Bell, CableLabs | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE: no need to have these definitions in the potential security requirements clause.
Gemalto also disagreed with this contributions.
Vodafone wanted to remove note 1. Gemalto also disagreed since it implied that the the credentials were stored in the device.
The Chair saw very strong support towards removing note one and very little possibility of having a compromise for this note.
DT: closed access groups should strongly and properly authenticated, not as it appears in note 2.
Nokia argued that the disagreement of this contribution endangered the future normative work, but ORANGE replied that the study didn’t depend entirely on this issue.
| noted | No | ||
S3‑190339 | Vertical - solution on EAP authentication framework | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE didn’t agree with this contribution.
Gemalto,TIM and IDEMIA supported ORANGE. It’s already covered in TS 33.501 in an informative annex.
Nokia: then we should reword it in TS 33.501.
Contribution supported by Samsung.
Vodafone: the solution is not described well.
| noted | No | ||
S3‑190340 | Vertical - solution on EAP-TLS | Nokia, Nokia Shanghai Bell, CableLabs | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesVodafone: solution is not described well enough.
ORANGE: this is more a requirement, not a solution. Why are we mandating TLS? No other options?
| noted | No | ||
S3‑190341 | Vertical - solution on EAP-TTLS | Nokia, Nokia Shanghai Bell, CableLabs | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesThe Chair argued that this study needed more offline discussions, probably conference calls. ORANGE replied that the study was not based on authentication only.
Vodafone: we don’t need to specify the methods used.
| noted | No | ||
S3‑190342 | Vertical - Conclusion on authentication | Nokia, Nokia Shanghai Bell, CableLabs | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190343 | Vertical - Discussion of WID for 5GS Vertical_LAN_SEC | Nokia, Nokia Shanghai Bell | discussion | Endorsement |
7.6New Work Item proposals
| Yes |
YesNokia clarified that the document referred to Rel-16.
Ericsson pointed out that if this was going for Rel-16 there was no such rush.
Huawei, ORANGE commented that there was still time and the rush was not justified.
Vodafone commented that the WID proposed was too general.
| noted | No | ||
S3‑190344 | WID proposal for 5GS Vertical_LAN_SEC | Nokia, Nokia Shanghai Bell | WID new | Agreement |
7.6New Work Item proposals
| Yes |
Yes
| noted | No | ||
S3‑190345 | Correction to clause 14.2.1 | NEC Corporation | CR | Approval |
7.1.16Others
| Yes |
Yes
| agreed | No | ||
S3‑190346 | New KI on Privacy aspects for NPN | NEC Corporation | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE: last requirement not in the scope of SA3. First requirement covered by the previous contribution.
Nokia: second requirement is too strong formulated. The operator can decide whether they can apply privacy or not (e.g. depending on regulator rules).
It was also commented that the second requirement was already covered in 33.501.
The general agreement was that all requirements covered in TS 33.501 will not be covered here as well. No repetition of work.
| noted | No | ||
S3‑190347 | New Solution on Privacy aspects for NPN | NEC Corporation | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190348 | New Solution for Redundant data protection | NEC Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| revised | No | S3‑190545 | |
S3‑190349 | New KI on Supporting low latency during Re-attach procedure | NEC Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| revised | No | S3‑190542 | |
S3‑190350 | Solution to KI#9 Key separation for AKMA AFs | NEC Corporation | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| not treated | No | ||
S3‑190351 | Updating key issue#3 for network detection of nearby fake base station | NEC Corporation | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| revised | No | S3‑190532 | |
S3‑190352 | New solution for preventing UE from attaching to a false base station | NEC Corporation | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190353 | New solution for protecting the System Information Block | NEC Corporation | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190354 | Updating Access Token Response to include token expiration time and scope | Nokia, Nokia Shanghai Bell | CR | Agreement |
7.1.13.2Other
| Yes |
Yes
| merged | No | S3‑190440 | |
S3‑190355 | SN Id and SNN clarification | Ericsson India Private Limited | discussion | Discussion |
7.1.16Others
| Yes |
YesIt was agreed to do a CR for this (tdoc 441).
| noted | No | ||
S3‑190356 | New WID on Security for NR Integrated Access and Backhaul | Samsung | WID new | Approval |
7.6New Work Item proposals
| Yes |
Yes
| revised | No | S3‑190442 | |
S3‑190357 | Security framework for the NR integrated access backhaul | Samsung | discussion | Decision |
7.6New Work Item proposals
| Yes |
YesSamsung clarified that the work in RAN was in normative phase. The purpose was to create a draftCR that would eventually become a CR to 33.501. Vodafone didn’t agree with this style of work and preferred to have a Study Item. Samsung commented that the time scales were too limited to have both SID and WID.
The Chair proposed to have a Study that could last for two meetings and then a Work Item to be sent for approval to SA together with the necessary CRs in one go. This was accepted.
| noted | No | ||
S3‑190358 | Correction on RRC states terminology usage | Samsung | CR |
7.1.4AS security
| Yes |
YesOverlapping with 0072, 258,259.
| revised | No | S3‑190423 | ||
S3‑190359 | Requirement on security of unprotected unicast messages | Samsung | pCR |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| revised | No | S3‑190553 | ||
S3‑190360 | Solution on security of RRC Reject messages | Samsung | pCR |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| revised | No | S3‑190555 | ||
S3‑190361 | Requirement on security of unprotected unicast messages | Samsung | pCR |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | |||
S3‑190362 | Solution for AS security during RRC Idle mode | Samsung | pCR |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| noted | No | |||
S3‑190363 | New WID on Enhancements for Security aspects of Common API Framework | Samsung, China Telecom, China Unicom, Nokia | WID new |
7.6New Work Item proposals
| Yes |
YesSamsung clarified that SA6 had finished their work and that this WID would only need a single CR to be brought in the next meeting.
Vodafone: there is a clear single solution for this? No other solutions to be studied?
NTT-Docomo: we don’t need studies for all the CRs we make.
| revised | No | S3‑190461 | ||
S3‑190364 | P-CR for PARLOS evaluation clause | SPRINT Corporation | pCR | Agreement |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| noted | No | ||
S3‑190365 | Non-3GPP Access: Correcting Connection Identifier | Samsung | CR |
7.1.3Mobility
| Yes |
Yes
| revised | No | S3‑190422 | ||
S3‑190366 | Key issue on Multiple and Separate credentials for PLMN and NPN network | Samsung | pCR |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| revised | No | S3‑190495 | ||
S3‑190367 | Discussion paper on N9 firewall for inter-PLMN GTP-U filtering | Nokia, Nokia Shanghai Bell | discussion | Endorsement |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
Yes
| noted | No | ||
S3‑190368 | Protecting small data at idle mobility using the Registration Complete message | Qualcomm Incorporated | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesEricsson: not aligned with SA2 procedure on data delivery.
Qualcomm: SA2 is consulting CT1 on this issue.
NEC: this issue needs to be discussed in SA2.
Vodafone: this is a study. No point to discuss with SA2 until it is selected. The comment should be part of the evaluation of the solution. Huawei agreed, since this was part of the usual process performed in SA3.
It was agreed to add an editor's note.
| revised | No | S3‑190484 | |
S3‑190369 | Proposed key issue on binding key to network identity for standalone non-public networks | Qualcomm Incorporated | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
YesORANGE: the security threat is not clear enough. Remove it with the requirements.
| revised | No | S3‑190497 | |
S3‑190370 | Proposed key issue on key hierarchy for non-public networks | Qualcomm Incorporated | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| revised | No | S3‑190496 | |
S3‑190371 | Proposed solution on binding key to network identity for standalone non-public networks | Qualcomm Incorporated | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| noted | No | ||
S3‑190372 | Handling the non-3GPP security context at mobility on the 3GPP access | Qualcomm Incorporated | CR | Agreement |
7.1.5NAS security
| Yes |
YesEricsson was fine with this proposal.
| merged | No | S3‑190556 | |
S3‑190373 | Discussion on the incoming SA2 on security aspects of UE Capability ID | Qualcomm Incorporated | discussion | Discussion |
6.13GPP Working Groups
| Yes |
Yes
| noted | No | ||
S3‑190374 | Draft response LS on the security aspects of UE Capability ID | Qualcomm Incorporated | LS out | Approval |
6.13GPP Working Groups
| Yes |
YesHuawei: The capbility to be ssent after AES.
| revised | No | ||
S3‑190375 | Modifying AKA to provide freshness for the protection of SQN in the case of re-synchronisations | Qualcomm Incorporated | discussion | Discussion |
7.1.16Others
| Yes |
Yes
| noted | No | ||
S3‑190376 | Adding MACS as an input parameter to the calculation of AK* to provide freshness | Qualcomm Incorporated | CR | Agreement |
7.1.16Others
| Yes |
YesAT&T supported this change.
Apple:we should first investigate whether it is feasible in 5G, and then evaluate the effect and make corresponding enhancement.
It was left open to verify what GSMA was doing on this topic.
| not pursued | No | ||
S3‑190377 | Solution for PARLOS based on emergency call procedures | Qualcomm Incorporated | pCR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| revised | No | S3‑190468 | |
S3‑190378 | CR on NAS connection id for NAS MAC calculation | Qualcomm Incorporated | CR | Agreement |
7.1.3Mobility
| Yes |
Yes
| agreed | No | ||
S3‑190379 | CR on clarification on N2 handover | Qualcomm Incorporated | CR | Agreement |
7.1.3Mobility
| Yes |
YesEricsson wasn't fully in line with this.It was taken offline.
| revised | No | S3‑190421 | |
S3‑190380 | CR - clarification on key handling in handover | Qualcomm Incorporated | CR | Agreement |
7.1.3Mobility
| Yes |
Yes
| agreed | No | ||
S3‑190381 | Key Issue MITM attacks | Qualcomm Incorporated | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | ||
S3‑190382 | Solution for small data at idle mode mobility | Qualcomm Incorporated | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesVodafone: solution details are not really detailed.
It was agreed to add an editor's note to add more details in the future.
| revised | No | S3‑190483 | |
S3‑190383 | SUPI Type clarification | Qualcomm Incorporated | CR | Approval |
7.1.14Privacy
| Yes |
YesGemalto: what happens if there are two files in the UICC? Which one do you compute?
Qualcomm: question for CT1. I don’t know if there is a scenario with two files.
We may have more types of SUPI. CT hasn’t decided to remove this yet.
There was no agreement with this contribution.
| not pursued | No | ||
S3‑190384 | Input encoding for ECIES protection schemes | Qualcomm Incorporated | CR | Approval |
7.1.14Privacy
| Yes |
YesVodafone: does this protect types?
Qualcomm: no, just the subscription identifier part.
IDEMIA: why isnt the CT4 referenced here?
Qualcomm: it doesn’t apply to transport.
This was taken offline.
IDEMIA objected since this meant additional processing in the UICC.
| revised | No | S3‑190557 | |
S3‑190385 | pCR: Reusing KAUSF for AKMA | Qualcomm Incorporated | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| not treated | No | ||
S3‑190386 | pCR: New KI: Efficient handling of PDCP discardTimer expiry on the UE Uplink | Qualcomm Incorporated | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesHuawei: not security related. Apple agreed.
| noted | No | ||
S3‑190387 | pCR: New KI: Ability to prioritize certain PDCP packets on the UE uplink | Qualcomm Incorporated | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesHuawei: not related to security, this should go to RAN2.
NTT-Docomo disagreed, this could lead to DoS attacks.
Ericsson, Apple: more solution than key issue.
| noted | No | ||
S3‑190388 | pCR: New KI: Integrity Algorithm independence | Qualcomm Incorporated | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
YesApple: evaluation of solutions that we don’t have.
Vodafone: this is putting the framework of the solution into plan.
NEC: this is not a key issue.
NCSC agreed with NEC and Apple.
Vodafone proposed to have conference calls in order to discuss how to progress with the key issues.
| noted | No | ||
S3‑190389 | P-CR for editors note in PARLOS manual roaming clause | SPRINT Corporation | pCR | Agreement |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190390 | PARLOS TR cover sheet for plenary presentation | SPRINT Corporation | TS or TR cover | Agreement |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
YesVodafone: it seems to be really early-on for sending it for information. There are missing key issues.
ORANGE: no evaluations, key issues without requirements,..this not ready for presentation for information.
Sprint: we can mention these open key issues as outstanding issues.
ORANGE: this is not 60% ready.
BT: one region's regulatory issue should not affect all the handsets in the rest of the countries. I would like to see that in the evaluation.
| noted | No | ||
S3‑190391 | Removal of editor’s note in solution #1 | Lenovo, Motorola Mobility | pCR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
YesEricsson didn't agree with the changes.No one agreed with the change so the document was noted.
| noted | No | ||
S3‑190392 | draft SID for User Identities and Authentication | Vodafone GmbH | SID new | Agreement |
8.21New study item proposals
| No |
Yes
| withdrawn | Yes | ||
S3‑190393 | New proposal on the length of password and other clarifications | Huawei, Hisilicon | CR | Approval |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
YesDT didn’t agree with the last note (third change).
NEC supported this change.
NTT-Docomo: Anti-spoofing in internal networks is necessary.Huawei commented that SA3 didn’t do this for every network element.
CableLabs didn't agree with the first change. NCSC suggested having longer simpler passwords was a better solution.
BT wasn’t in favour of this change either. It was decided to drop the first change.
BT: there are use cases in certain interfaces where we may want to allow this, for the note in the third change. BT was in favour of maintaing this.
DT didn’t agree with the second change either.There were arguments on the 100 accounts so this was taken offline.
BT wasn’t comfortable with having SA3 imposing limitations on the products.
| revised | No | S3‑190503 | |
S3‑190394 | LS on the need to update home network public key and key ID during Routing indicator update | C1-190377 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesQualcomm had tdoc 400 related to this.
| replied to | No | |||
S3‑190395 | LS on mandating 5G-GUTI allocation after network triggered service request | C1-190380 | LS in |
7.1.15Incoming and outgoing Lses
| Yes |
YesHuawei proposed a CR in 397.
Qualcomm proposed to respond afirmatively to this LS but didn't agree with the CR.
Nokia: on the GUTI realocation we should be flexible.
| replied to | No | |||
S3‑190396 | LS on securing warning messages in ePWS | C1-190393 | LS in |
6.13GPP Working Groups
| Yes |
YesVodafone considered a serious problem to have a possible mechanism that can shut down IoT devices.
Sprint: the focus should be on the broadcast service and not on PWS.
Nokia: we did PWS security before and didn’t reach a conclusion given the different regulations in different parts of the World. This kind of mechanism is application specific and I'm not sure what security capbility we can enforce here.
NEC: IoT devices need an intelligence to distinguish the PWS message to shut down. What is the use case here?
BT: Don’t mix PWS with IoT, shutdown commands would be dangerous.
Ericsson: SA3's study had a different scope. We had a user behind the device and in here we have a new use case.
Sprint: this use case is not defined as a service. This should come as a SA1 requirement. NTT-Docomo and NCSC agreed with this.
Qualcomm: this seems to be more application layer specific.
NTT-Docomo: make it very clear that using existing PWS mechanisms without application layer security would not be acceptable.
| replied to | No | |||
S3‑190397 | Clarification on the allocation of 5G-GUTI | Huawei, Hisilicon | CR | Agreement |
7.1.14Privacy
| Yes |
YesQualcomm didn’t agree with this CR.A rewording was then proposed and for that reason the CR was revised.
NEC: remove the last line and let CT1, CT4 decide.
| revised | No | S3‑190415 | S3‑190234 |
S3‑190398 | Comment on S3-190116 | Huawei, Hisilicon | discussion | Discussion |
7.1.14Privacy
| Yes |
Yes
| noted | No | ||
S3‑190399 | Discussion on providing AS security during RRC connection establishment to protect slice identity | NEC Corporation | discussion | Agreement |
7.6New Work Item proposals
| Yes |
Yes
| noted | No | ||
S3‑190400 | Discussion on incoming CT1 LS on update of Routing Indicator (S3-190394) | Qualcomm Incorporated | discussion | Endorsement |
7.1.15Incoming and outgoing Lses
| Yes |
YesVodafone: the mechanism of the public key update is out of standardization scope and it should be kept this way.BT, IDEMIA, CableLabs and ORANGE supported this.
| noted | No | ||
S3‑190401 | [Late contribution] Discussion on dealing with Routing ID update Lses | NEC Corporation | discussion | discussion |
7.1.15Incoming and outgoing Lses
| Yes |
YesQualcomm and Gemalto commented that there was an existing mechanism for what SA2 was proposing. NEC replied that they were not arguing that but wanted to put it down in words and send it to them.
IDEMIA: the proof of receipt needs to go through the UDM but I'm not sure that this is the case in our spec.
Vodafone: OTA is transport independent protocol. In steering of roaming, OTA was one of the possible protocols to be used there.
Ericsson: we don’t need to send an LS saying that OTA is fine from the security point of view.
At&T considered that the LS wasn’t necessary since they wouldn't do anything with it.
Vodafone: the attached CR contains OTA as a path to and from.
| noted | No | ||
S3‑190402 | 128-EIA3 maximum message size | ETSI SAGE | LS in | discussion |
6.3ETSI SAGE
| Yes |
Yes
| noted | No | ||
S3‑190403 | Expectations and requirements for 256 bit algorithms | ETSI SAGE | LS in | discussion |
6.3ETSI SAGE
| Yes |
Yes
| replied to | No | ||
S3‑190404 | Interception of voice services over new radio in a 5GS environment | S3i190057 | LS in | discussion |
7.1.15Incoming and outgoing Lses
| Yes |
YesVodafone asked if a study could cover this work. BT replied that a study could be done. The Chair commented that a study would be easier to manage.
Vodafone, AT&T, Deutsche Telekom and others supported having a study item, so BT would bring it for the next meeting in May.
| postponed | No | ||
S3‑190405 | Reply to: LS on the security aspects of UE Capability ID | Qualcomm | LS out | approval |
6.13GPP Working Groups
| Yes |
Yes
| approved | No | ||
S3‑190406 | Reply to: LS on securing warning messages in ePWS | Ericsson | LS out | approval |
6.13GPP Working Groups
| Yes |
Yes
| approved | No | ||
S3‑190407 | Reply to: Expectations and requirements for 256 bit algorithms | Vodafone | LS out | approval |
6.3ETSI SAGE
| Yes |
Yes
| approved | No | ||
S3‑190408 | User Plane Security for 5GC Roaming | Vodafone | CR | Agreement |
6.4GSMA
| Yes |
Yes
| agreed | No | ||
S3‑190409 | LS on User Plane Security for 5GC Roaming | BT | LS out | Agreement |
6.4GSMA
| Yes |
Yes
| approved | No | ||
S3‑190410 | Reply to: LS on new 5G-GUTI allocation | Ericsson | LS out | approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| approved | No | ||
S3‑190411 | Reply to: LS on Nudr Sensitive Data Protection | Ericsson | LS out | approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| approved | No | ||
S3‑190412 | Reply to: LS on Security Result Exchange Between NG-RAN and SMF in DC | Nokia | LS out | approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| approved | No | ||
S3‑190413 | Reply to: LS on the need to update home network public key and key ID during Routing indicator update | Vodafone | LS out | approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| approved | No | ||
S3‑190414 | Reply to: LS on mandating 5G-GUTI allocation after network triggered service request | Huawei | LS out | approval |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| approved | No | ||
S3‑190415 | Clarification on the allocation of 5G-GUTI | Huawei, Hisilicon,Nokia,Interdigital | CR | Agreement |
7.1.14Privacy
| Yes |
Yes
| agreed | No | S3‑190397 | |
S3‑190416 | Clarification on the Use of the SUPI in the Kamf Derivation | Huawei, Hisilicon,Nokia,Nokia Shanghai Bell,Qualcomm,Vodafone | CR | Agreement |
7.1.2Key derivation
| Yes |
Yes
| agreed | No | S3‑190232 | |
S3‑190417 | LS Response on Enforcement of maximum supported data rate for integrity protection | S2-1812600 | LS in | discussion |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | ||
S3‑190418 | Reply LS on Interim conclusions for SA2 study on Radio Capabilities Signalling Optimisations (FS_RACS) | S2-1901303 | LS in | discussion |
6.13GPP Working Groups
| Yes |
Yes
| noted | No | ||
S3‑190419 | LS Response on Security Result Exchange Between NG-RAN and SMF in DC | S2-1901386 | LS in | discussion |
7.1.15Incoming and outgoing Lses
| Yes |
Yes
| noted | No | ||
S3‑190420 | Allocating new 5G-GUTI during the MO service request procedure | NEC Europe Ltd | CR | Approval |
7.1.3Mobility
| Yes |
Yes
| agreed | No | S3‑190327 | |
S3‑190421 | CR on clarification on N2 handover | Qualcomm Incorporated | CR | Agreement |
7.1.3Mobility
| Yes |
Yes
| agreed | No | S3‑190379 | |
S3‑190422 | Non-3GPP Access: Correcting Connection Identifier | Samsung,ZTE | CR | - |
7.1.3Mobility
| Yes |
Yes
| agreed | No | S3‑190365 | |
S3‑190423 | Correction on RRC states terminology usage | Samsung,Huawei | CR | - |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190358 | |
S3‑190424 | EUTRA connected to 5GC: clause 6.8.1 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesRevised to include all clauses affected in the cover page.
| agreed | No | S3‑190258 | |
S3‑190425 | EUTRA connected to 5GC: clause 6.8.2 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190259 | |
S3‑190426 | Corrections on ng-ran keys | Huawei, HiSilicon,Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190192 | |
S3‑190427 | EUTRA connected to 5GC: clause 6.7.3 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesRevised to address issues on the cover.
| agreed | No | S3‑190256 | |
S3‑190428 | EUTRA connected to 5GC: clause 6.7.4 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190257 | |
S3‑190429 | Corrections to RRC Inactive procedure.and RAN-based notification area update procedure. | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190254 | |
S3‑190430 | EUTRA connected to 5GC: clause 6.9.2.1 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190260 | |
S3‑190431 | EUTRA connected to 5GC: clauses 6.9.3 and 6.9.4 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
YesRevised to fix mistakes on the cover page.
| agreed | No | S3‑190262 | |
S3‑190432 | EUTRA connected to 5GC: clause 6.9.5 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190263 | |
S3‑190433 | Clarification for section 6.10.2.1 | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
YesIncorporating changes suggested by Ericsson.
| agreed | No | S3‑190174 | |
S3‑190434 | Clarification for UP security in option4&7 | Huawei, Hisilicon | CR | Approval |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190175 | |
S3‑190435 | EUTRA connected to 5GC: clause 8 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190280 | |
S3‑190436 | Multiple active NAS connections in the same PLMN's serving network: common algorithm identifiers | Ericsson | CR | Approval |
7.1.5NAS security
| Yes |
Yes
| agreed | No | S3‑190283 | |
S3‑190437 | claification on interworking case | Huawei, Hisilicon | CR | Approval |
7.1.10Interworking
| Yes |
Yes
| agreed | No | S3‑190176 | |
S3‑190438 | NAS counter clarification on interworking | Huawei, Hisilicon | CR | Agreement |
7.1.10Interworking
| Yes |
YesFirst change is gone.
| agreed | No | S3‑190224 | |
S3‑190439 | Editorials and minor clarifications for clause 13.2 | Ericsson | CR | Agreement |
7.1.13.1Interconnect (SEPP related)
| Yes |
Yes
| agreed | No | S3‑190090 | |
S3‑190440 | Clarification on service authorization and token verification | Huawei, Hisilicon, Nokia | CR | Agreement |
7.1.13.2Other
| Yes |
Yes
| agreed | No | S3‑190229 | |
S3‑190441 | SN Id and SNN clarification | Ericsson | CR | discussion |
7.1.16Others
| Yes |
Yes
| agreed | No | ||
S3‑190442 | New WID on Security for NR Integrated Access and Backhaul | Samsung | WID new | Agreement |
7.6New Work Item proposals
| Yes |
YesIt was agreed to reformulate this as a SID.
| revised | No | S3‑190460 | S3‑190356 |
S3‑190443 | a skeleton of security aspects of 5G SRVCC to UTRAN | Huawei, Hisilicon, China Unicom | draftCR | Approval |
7.4Security aspects of single radio voice continuity from 5GS to UTRAN () (Rel-16)
| Yes |
YesThe annex was retitled.
| approved | No | S3‑190167 | |
S3‑190444 | [33.180] R14 Annex D.3.5.2 XSD correction (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesFixng issues on the cover page.
| agreed | No | S3‑190050 | |
S3‑190445 | [33.180] R15 Annex D.3.5.2 XSD correction (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | S3‑190051 | |
S3‑190446 | [33.180] R14 IdMS interface security (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | S3‑190053 | |
S3‑190447 | [33.180] R15 IdMS interface security (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | S3‑190054 | |
S3‑190448 | [33.180] R14 InK clarifications | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesRevised to address issues on the cover page.
| agreed | No | S3‑190058 | |
S3‑190449 | [33.180] R15 InK clarifications (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
YesIssues on the cover page.
| agreed | No | S3‑190059 | |
S3‑190450 | [33.180] R14 MCX identity clarifications | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | S3‑190060 | |
S3‑190451 | [33.180] R15 MCX identity clarifications (mirror) | Motorola Solutions Germany | CR | Agreement |
7.5.8Mission Critical (MCPTT, MCSec, eMCSec, MONASTERY_SEC)
| Yes |
Yes
| agreed | No | S3‑190061 | |
S3‑190452 | Reply to: LS on OAuth authorization flows supported for Northbound APIs | Nokia | LS out | approval |
7.5.13Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
| Yes |
Yes
| approved | No | ||
S3‑190453 | Reply to: LS on EAS-C&U support | Vodafone | LS out | approval |
7.5.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15)
| Yes |
Yes
| approved | No | ||
S3‑190454 | LS to RAN2/3 on EDT data integrity protection | Huawei, Hisilicon | LS out | Approval |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| approved | No | S3‑190076 | |
S3‑190455 | EDT correction – length of HASHUE-data and HASHeNB-data | Ericsson | CR | Agreement |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| agreed | No | S3‑190299 | |
S3‑190456 | Protection from buffer overflows | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | S3‑190093 | |
S3‑190457 | Protection from buffer overflows | Ericsson | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | ||
S3‑190458 | Editorial corrections in TS 33.117 R15 | Nokia, Nokia Shanghai Bell | CR | Approval |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | S3‑190191 | |
S3‑190459 | Editorial corrections | Nokia | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | ||
S3‑190460 | New SID on Security for NR Integrated Access and Backhaul | Samsung | SID new | Agreement |
7.6New Work Item proposals
| Yes |
YesQualcomm proposed to start working on pCRs in the ad-hoc before the study was approved in SA.
| agreed | No | S3‑190442 | |
S3‑190461 | New WID on Enhancements for Security aspects of Common API Framework | Samsung, China Telecom, China Unicom, Nokia | WID new | - |
7.6New Work Item proposals
| Yes |
Yes
| agreed | No | S3‑190363 | |
S3‑190462 | New SID on Security Aspects of 3GPP support for Advanced V2X Services | LG Electronics | SID new | Agreement |
8.21New study item proposals
| Yes |
Yes
| agreed | No | S3‑190143 | |
S3‑190463 | Reply LS on PC5 unicast and groupcast security protection | LG Electronics | LS out | Approval |
8.21New study item proposals
| Yes |
Yes
| approved | No | S3‑190144 | |
S3‑190464 | Update to Study Item Description FS_SBA_Sec: Enhanced-SBA aspects | Telekom Deutschland GmbH | SID revised | Agreement |
8.1Study on Security Aspects of the 5G Service Based Architecture (FS_SBA-Sec) (Rel-15)
| Yes |
Yes
| agreed | No | S3‑190117 | |
S3‑190465 | EDT UP IP handling of multiple PDCP PDUs | Huawei, Hisilicon | CR | Approval |
7.5.10Security Aspects of Narrowband IOT (CIoT)
| No |
Yes
| withdrawn | Yes | ||
S3‑190466 | Editorial pCR for PARLOS TR 33.815 | LG Electronics | pCR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190145 | |
S3‑190467 | Draft TR 33.815 | Sprint | draft TR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190468 | Solution for PARLOS based on emergency call procedures | Qualcomm Incorporated | pCR | Approval |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190377 | |
S3‑190469 | P-CR for PARLOS evaluation clause | SPRINT Corporation | pCR | Agreement |
8.8Study on Security Aspects of PARLOS (FS_PARLOS_Sec) (Rel-16)
| No |
Yes
| withdrawn | Yes | ||
S3‑190470 | Proposal for content to introduction clause | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190268 | |
S3‑190471 | Draft TR 33.861 | Ericsson | draft TR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190472 | Proposal for content to clause 4 | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190269 | |
S3‑190473 | Clarifications CIOT security assumptions | Huawei, HiSilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190194 | |
S3‑190474 | Address EN in Key Issue 4 of Definition of Misbehaving UE | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190172 | |
S3‑190475 | New Key Issue for NAS based Redirection between Core Networks | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190173 | |
S3‑190476 | A new key issue for privacy protection of new parameters for CIoT included in NAS messages | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190270 | |
S3‑190477 | A new KI on NSSAI protection | Huawei, HiSilicon,NEC,Interdigital | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
YesNokia: there are implications on the study item if we procceed with this.
ORANGE clarified that NEC had a study item on this (tdoc 128) and we had agreed on adding the objectives into a key issue here. ORANGE wasn't fine with the requirements since they were out of scope of the study item.
MCC commented that it seemed a bit strange to enumerate objectives and open issues for Rel-16 in the key issue details.The format of these key issue details was to be revised.
Qualcomm: last requirement doesn't make sense. It was agreed to remove it.
| revised | No | S3‑190536 | S3‑190203 |
S3‑190478 | Clarification on the UE selecting the 4G or 5G security protection method | Huawei, Hisilicon | CR | Approval |
7.1.16Others
| Yes |
Yes
| agreed | No | S3‑190178 | |
S3‑190479 | Evaluation text for solution #2 | NEC Corporation | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190208 | |
S3‑190480 | Updates to Solution #3: Security solution for MO SMS at AMF re-allocation | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190265 | |
S3‑190481 | Updates to Solution #5: Security solution for small data included in initial NAS signalling at mobility | Ericsson | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190266 | |
S3‑190482 | Details of protecting gNB from RRC DoS attack | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190074 | |
S3‑190483 | Solution for small data at idle mode mobility | Qualcomm Incorporated | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190382 | |
S3‑190484 | Protecting small data at idle mobility using the Registration Complete message | Qualcomm Incorporated | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190368 | |
S3‑190485 | New Solution Security-Property-Group-based Mitigation for DDoS Attack Triggered by Malicious Applications on the UE | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190171 | |
S3‑190486 | Solution for DDoS attack mitigation in CIoT | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190187 | |
S3‑190487 | Output of SCAS offline session | Deutsche Telekom | report | Information |
7.2.1NR Node B (gNB) (TS 33.511)
| Yes |
Yes
| noted | No | ||
S3‑190488 | Solution for Key Issue #7: Key refreshing for protection of small data | Lenovo, Motorla Mobility | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190308 | |
S3‑190489 | New Conclusion for Small Data Transfer via NAS Signaling | Huawei, Hisilicon | pCR | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190170 | |
S3‑190490 | Conclusion for Key Issue #9 | Ericsson | pCR | - |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190330 | |
S3‑190491 | Cover sheet TR 33.861 | Ericsson | TS or TR cover | Approval |
8.6Study on evolution of Cellular IoT security for the 5G System (FS_CIoT_sec_5G) (Rel-16)
| Yes |
YesThe TR will be sent for information.
| approved | No | ||
S3‑190492 | Draft TR 33.819 | Nokia | draft TR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | ||
S3‑190493 | Solution for NPN network access via PLMN | Huawei, Hisilicon | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190241 | |
S3‑190494 | TR 33.819: new key issue on security and privacy aspects of service continuity and session continuity | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190291 | |
S3‑190495 | Key issue on Multiple and Separate credentials for PLMN and NPN network | Samsung | pCR | - |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190366 | |
S3‑190496 | Proposed key issue on key hierarchy for non-public networks | Qualcomm Incorporated | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190370 | |
S3‑190497 | Proposed key issue on binding key to network identity for standalone non-public networks | Qualcomm Incorporated | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190369 | |
S3‑190498 | New key issue on UP security policy for the 5GLAN Group | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190289 | |
S3‑190499 | New security solution for handling UP security policy for a 5GLAN Group | Ericsson | pCR | Approval |
8.15Study on Security for 5GS Enhanced support of Vertical and LAN Services
| Yes |
Yes
| approved | No | S3‑190290 | |
S3‑190500 | LS on naming issues with SUPI | Vodafone | LS out | Approval |
7.1.2Key derivation
| No |
Yes
| withdrawn | Yes | ||
S3‑190501 | EUTRA connected to 5GC: clause 6.6.2 | Ericsson | CR | Agreement |
7.1.4AS security
| Yes |
Yes
| agreed | No | S3‑190255 | |
S3‑190502 | LS on clarification on UE trace definition | Nokia | LS out | Approval |
7.1.8Primary authentication
| Yes |
Yes
| approved | No | ||
S3‑190503 | New proposal on the length of password and other clarifications | Huawei, Hisilicon | CR | Approval |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | S3‑190393 | |
S3‑190504 | New proposal on the length of password and other clarification | Huawei | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | ||
S3‑190505 | New proposal on the length of password and other clarification | Huawei | CR | Agreement |
7.5.9Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB)
| Yes |
Yes
| agreed | No | ||
S3‑190506 | FN-RG registration to 5GC | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
YesAdding an editor's note.
| approved | No | S3‑190332 | |
S3‑190507 | Solution for 5GC access from WLAN UEs that do not support NAS | Nokia, Lenovo | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190333 | |
S3‑190508 | SCAS: UDM-specific adaptations of security functional requirements and related test cases | Huawei, Hisilicon | pCR | Approval |
7.2.4Unified Data Management (UDM) (TS 33.514)
| Yes |
Yes
| approved | No | S3‑190310 | |
S3‑190509 | Draft TS 33.514 | NEC | draft TS | Approval |
7.2.4Unified Data Management (UDM) (TS 33.514)
| Yes |
Yes
| approved | No | ||
S3‑190510 | Draft TS 33.512 | Deutsche Telekom | draft TS | Approval |
7.2.6Authentication Server Function (AUSF) (TS 33.516)
| Yes |
Yes
| approved | No | ||
S3‑190511 | New Test Case: Separation of cryptographic storage within the SEPP | Telekom Deutschland GmbH | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| approved | No | S3‑190120 | |
S3‑190512 | SCAS SEPP: Introduction and general approach | Nokia, Nokia Shanghai Bell | pCR | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| approved | No | S3‑190233 | |
S3‑190513 | Draft TS 33.518 | Nokia | draft TS | Approval |
7.2.8Network Resource Function (NRF) (TS 33.518)
| Yes |
Yes
| approved | No | ||
S3‑190514 | Authorization on northbound APIs | ZTE Corporation | pCR | Approval |
7.2.9Network Exposure Function (NEF) (TS 33.519)
| Yes |
Yes
| approved | No | S3‑190154 | |
S3‑190515 | Draft 33.517 | Nokia | draft TS | Approval |
7.2.7Security Edge Protection Proxy (SEPP) (TS 33.517)
| Yes |
Yes
| approved | No | ||
S3‑190516 | Draft TS 33.519 | ZTE | draft TS | Approval |
7.2.9Network Exposure Function (NEF) (TS 33.519)
| Yes |
Yes
| approved | No | ||
S3‑190517 | Update to clause 4 to add KDF negotiation rationale | NEC Corporation, Huawei, Hisilicon | pCR | Approval |
8.10Study of KDF negotiation for 5G System Security
| Yes |
YesThe purpose of the study was argued. The Chair proposed to have conference calls before the next meeting given the disagreement between the companies.
Huawei proposed to close the study and move forward.
NTT-Docomo commented that this was an old topic and to avoid having it coming back at least a rational should be written.
| noted | No | S3‑190212 | |
S3‑190518 | Reply-LS on FN-RG authentication and related questions | Ericsson | LS out | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190081 | |
S3‑190519 | Response LS on Authentication for UEs not Supporting NAS | Lenovo (Beijing) Ltd | LS out | - |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190305 | |
S3‑190520 | Key Issue on NAS termination in TWIF | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190320 | |
S3‑190521 | Draft TR 33.807 | Huawei | draft TR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190522 | Key Issue on SUCI format for legacy FN-RG devices that access 5G over wireline network | Nokia, Ericsson | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190322 | |
S3‑190523 | Key Issue on NAS termination for registered FN-RGs | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190325 | |
S3‑190524 | 5G-RG connecting to 5GC via Wireline Access (W-5GAN) | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190334 | |
S3‑190525 | 5G-RG connecting to 5GC via NG-RAN | Nokia, Nokia Shanghai Bell | pCR | Approval |
8.7Study on the security of the Wireless and Wireline Convergence for the 5G system architecture (FS_5WWC_SEC) (Rel-16)
| Yes |
Yes
| approved | No | S3‑190335 | |
S3‑190526 | Draft TR 33.835 | China Mobile | draft TR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | ||
S3‑190527 | Roaming key issue for AKMA | Huawei, HiSilicon | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| No |
Yes
| withdrawn | Yes | ||
S3‑190528 | New key issue: Key revocation | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | S3‑190248 | |
S3‑190529 | Protocol clarifications to solution 2 | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | S3‑190249 | |
S3‑190530 | New solution:Key revocation | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | S3‑190251 | |
S3‑190531 | New solution: Implicit Bootstrapping | Ericsson | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | S3‑190252 | |
S3‑190532 | Updating key issue#3 for network detection of nearby fake base station | NEC Corporation | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| not treated | No | S3‑190351 | |
S3‑190533 | Solution for Slice Specific secondary authentication | Nokia, Nokia Shangahi Bell | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190133 | |
S3‑190534 | A solution to slice authentication | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190202 | |
S3‑190535 | Security threats and requirement for KI #4 | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190206 | |
S3‑190536 | A new KI on NSSAI protection | Huawei, HiSilicon,NEC,Interdigital | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190477 | |
S3‑190537 | A solution to security features for NSaaS | Huawei, HiSilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190205 | |
S3‑190538 | New KI: Access token handling between network slices | Huawei, Hisilicon | pCR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | S3‑190318 | |
S3‑190539 | Draft TR 33.813 | Nokia | draft TR | Approval |
8.11Study on Security aspects of Enhancement of Network Slicing
| Yes |
Yes
| approved | No | ||
S3‑190540 | Security Assurance Requirement and Test for authorization handling in the NF | Huawei, HiSilicon | draftCR | Agreement |
7.2.1NR Node B (gNB) (TS 33.511)
| Yes |
Yes
| approved | No | S3‑190307 | |
S3‑190541 | Key issue for acceleration of AKA procedure for low latency | ZTE Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190157 | |
S3‑190542 | New KI on Supporting low latency during Re-attach procedure | NEC Corporation | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190349 | |
S3‑190543 | Update to KI#3 or KI#4 taking Dual Connectivity into considerations | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesLast paragraph removed as proposed by Huawei.
| approved | No | S3‑190286 | |
S3‑190544 | Draft TR 33.825 | Huawei | draft TR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | ||
S3‑190545 | New Solution for Redundant data protection | NEC Corporation,Huawei | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190348 | |
S3‑190546 | URLLC solution for Key Issue 3 | Huawei, HiSilicon | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
YesAdding two editor's notes.
| approved | No | S3‑190200 | |
S3‑190547 | Evaluation to solution #1 and conclusion to key issue #3 | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190287 | |
S3‑190548 | Evaluation on solution #2 and conclusion to key issue #3 | Ericsson | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190288 | |
S3‑190549 | URLLC solution for N3 tunnel redundancy | Huawei, HiSilicon | pCR | Approval |
8.13Study on security for 5G URLLC
| Yes |
Yes
| approved | No | S3‑190198 | |
S3‑190550 | draft TR 33.853 | Vodafone | draft TR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| approved | No | ||
S3‑190551 | New key issue on the secure negotiation of the user plane integrity protection feature | Ericsson | pCR | Approval |
8.17Study on User Plane Integrity Protection
| Yes |
Yes
| approved | No | S3‑190285 | |
S3‑190552 | Draft TR 33.809 | Apple | draft TR | Agreement |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | ||
S3‑190553 | Requirement on security of unprotected unicast messages | Samsung | pCR | - |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | S3‑190359 | |
S3‑190554 | KI#1 in TR 33.809 – new requirement and solution for UECapabilityInformation RRC message | Ericsson | pCR | Approval |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | S3‑190275 | |
S3‑190555 | Solution on security of RRC Reject messages | Samsung | pCR | - |
8.9Study on 5G security enhancement against false base stations
| Yes |
Yes
| approved | No | S3‑190360 | |
S3‑190556 | key update in multi-NAS scenario | Huawei, Hisilicon,Qualcomm,Ericsson | CR | Approval |
7.1.5NAS security
| Yes |
Yes
| agreed | No | S3‑190177 | |
S3‑190557 | Input encoding for ECIES protection schemes | Qualcomm Incorporated,IDEMIA,Gemalto | CR | Approval |
7.1.14Privacy
| Yes |
Yes
| agreed | No | S3‑190384 | |
S3‑190558 | Solution for using established keys for AKMA | NEC Corporation | pCR | Approval |
8.5Study on authentication and key management for applications based on 3GPP credential in 5G IoT (FS_AKMA)(Rel-16)
| Yes |
Yes
| approved | No | S3‑190214 | |
S3‑190559 | LS on PLMN-ID verification | Deutsche Telekom | LS out | Approval |
7.1.13.1Interconnect (SEPP related)
| No |
YesA conference call was setup to discuss the LS.
This was sent for email approval: Friday 8th available,Tuesday 12th ,Wednesday 13th final version available.
| left for email approval | No | ||
S3‑190560 | Draft agenda SA3_94 AdHoc | WG Vice Chair (Qualcomm) | discussion | Endorsement |
11Any Other Business
| Yes |
Yes
| endorsed | No | ||
S3‑190561 | draftCR General aspects in TS 33.117 | Nokia | draftCR | Approval |
7.2.1NR Node B (gNB) (TS 33.511)
| Yes |
Yes
| approved | No | ||
S3‑190562 | Draft TR 33.814 | CATT | draft TR | Approval |
8.12Study on Security of the enhancement to the 5GC location services
| Yes |
Yes
| approved | No | ||
S3‑190563 | Work Plan input from Rapporteurs | MCC | other | - |
9.2Rapporteur input on status of WID or SID
| Yes |
Yes
| noted | No | S3‑190005 |