Tdoc List
2016-11-14 11:07
Agenda | Topic | TDoc | Title | Source | Type | For | Avail | Treated | Decision | Wdrn | Replaced-by | Replaces |
---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Opening of the Meeting |   | ||||||||||
2 | Approval of Agenda and Meeting Objectives | S3‑161600 | Agenda | WG Chairman | report | Yes |
YesGuenther (Nokia) commented that Rel-14 for stage 2 has been finished. 5G topics are headed towards Rel-15 to be more precise.
| revised | No | S3‑161963 | ||
S3‑161963 | Agenda | WG Chairman | report | - | Yes |
Yes
| approved | No | S3‑161600 | |||
3 | IPR Reminder |   | ||||||||||
4 | Meeting Reports |   | ||||||||||
4.1 | Approval of the report from SA3#84 and SA3#84 bis | S3‑161601 | Report from SA3#84 | MCC | report | Yes |
Yes
| approved | No | |||
S3‑161602 | Report from SA3 Adhoc NextGen | MCC | report | Yes |
Yes
| revised | No | S3‑161964 | ||||
S3‑161964 | Report from SA3 Adhoc NextGen | MCC | report | - | No |
YesRevised to introduce the correct attendees of the meeting.
| approved | No | S3‑161602 | |||
4.2 | Report from SA #73 | S3‑161604 | Report from last SA meeting | WG Chairman | report | Yes |
Yes
| noted | No | |||
4.3 | Report from SA3-LI |   | ||||||||||
5 | Items for early consideration |   | ||||||||||
6.1 | 3GPP Working Groups | S3‑161932 | LS on eDRX Paging Hyper-frame and PTW_Start Calculation | R2-165935 | LS in | Yes |
Yes
| noted | No | |||
S3‑161943 | LS on SeDoC related authentication procedure | S2-165439 | LS in | Yes |
YesEricsson: it seems to me that it is a new authentication method for IMS although we have many of those already.
CSI node is a trusted node.
Guenther (Nokia): this looks like a new authentication method that does not clearly fit in the SA3 IMS spec.Not sure that we want that the security policy requires a re-authentication. It was noted that more time was needed to give a response.
| replied to | No | |||||
S3‑161965 | Reply to: LS on SeDoC related authentication procedure | Deutsche Telekom | LS out | approval | No |
Yes
| left for email approval | No | ||||
6.2 | IETF |   | ||||||||||
6.3 | ETSI SAGE |   | ||||||||||
6.4 | GSMA |   | ||||||||||
6.5 | 3GPP2 |   | ||||||||||
6.6 | OMA |   | ||||||||||
6.7 | TCG |   | ||||||||||
6.8 | oneM2M |   | ||||||||||
6.9 | TC-CYBER |   | ||||||||||
6.10 | ETSI NFV security |   | ||||||||||
6.11 | Other Groups | S3‑161930 | LS-Out to NFV on Target Location | ETSI TC LI | LS in | Yes |
YesTarget's location cannot be derived in an NFV environment.
| noted | No | |||
7.1.1 | Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3) | S3‑161638 | Detailing clauses 4.2.1, 4.2.3.1 and 4.3.1 | TELECOM ITALIA S.p.A. | CR | Approval | Yes |
Yes
| revised | No | S3‑162049 | |
S3‑162049 | Detailing clauses 4.2.1, 4.2.3.1 and 4.3.1 | TELECOM ITALIA S.p.A. | CR | Approval | No |
YesChanged the reference to the 800 series TR to the TS (since the 800 series cannot be referenced).
| agreed | No | S3‑161638 | |||
7.1.2 | Security Assurance Specification for 3GPP network product classes (MME, TS 33.116) (SCAS-SA3) |   | ||||||||||
7.1.3 | Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW) | S3‑161607 | pCR adding the security requirements of minimized kernel network functions in the section 4.3.3.1.2 of TS33.250 | CATR | pCR | Yes |
Yes
| approved | No | |||
S3‑161609 | Adding the security requirements of user plane traffic differentiation | ZTE Corporation | pCR | Approval | Yes |
YesTIM: the desccription could be better described, otherwise it will be difficult to reproduce the test case. An editor's note was agreed to address this issue later.
NEC: expected format of evidence TBD.
Nokia had a problem with the requirement mentioning APNs. Is this coming from a SA2 spec?
It was agreed to add an editor's note on the pending reference to SA2.
| revised | No | S3‑162050 | |||
S3‑162050 | Adding the security requirements of user plane traffic differentiation | ZTE Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑161609 | |||
S3‑161634 | Adding requirement on unpredictable Charging ID | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
YesEricsson: the concept of unpredictable is not defined in the spec. This should be clarified.
Huawei proposed to use "random" instead.
TIM: bringing "random" causes certain issues that we want to avoid.
| noted | No | ||||
S3‑161635 | Adding test case on the uniqueness of the Charging ID deriving from the 3GPP specifications | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
Yes
| revised | No | S3‑162051 | |||
S3‑162051 | Adding test case on the uniqueness of the Charging ID deriving from the 3GPP specifications | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
YesIt removes a pre-condition as proposed by Ericsson.
DT:step two at least 10000 according to the current power of the processors.
| approved | No | S3‑161635 | |||
S3‑161636 | Adding requirement within 3GPP TR 33.250 on unpredictable TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
YesEricsson pointed out the unpredictability as previous contributions.
Ericsson: we don’t have a threat. Should we write the requirement and then find the threat? Is this the process?
TIM: start a threat analysis to find whether the requirement is correct.
TIM will bring a description for the next time. This was noted.
| noted | No | ||||
S3‑161637 | Adding requirement on the uniqueness of GTP TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
YesEricsson pointed out the TEID uniqueness issue and others that were already found in TIM's previous contributions.
| revised | No | S3‑162052 | |||
S3‑162052 | Adding requirement on the uniqueness of GTP TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval | Yes |
Yes
| approved | No | S3‑161637 | |||
S3‑161765 | pCR adding the introduction in the section 4.1 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | Yes |
Yes
| revised | No | S3‑162053 | |||
S3‑162053 | pCR adding the introduction in the section 4.1 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | Yes |
YesSome minor editorial changes pointed out by MCC.
| approved | No | S3‑161765 | |||
S3‑161771 | pCR adding the security requirements of traffic separation in the section 4.3.5 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | Yes |
YesNokia, DT and Telecom Italia suggested to change the requirement.
| revised | No | S3‑162054 | |||
S3‑162054 | pCR adding the security requirements of traffic separation in the section 4.3.5 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | Yes |
Yes
| approved | No | S3‑161771 | |||
S3‑161773 | pCR adding the security functional requirements on the PGW deriving from 3GPP specifications | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | Yes |
YesTIM:the requirement cannot be understood here.
MCC reminded about adding references to the specs that are mentioned (23.401, 33.117 and so on).
| revised | No | S3‑162055 | |||
S3‑162055 | pCR adding the security functional requirements on the PGW deriving from 3GPP specifications | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval | No |
Yes
| Left for email approval | No | S3‑161773 | |||
S3‑161811 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161812 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | Yes |
YesNoted without presentation.
Huawei commented that a Threat analysis is needed.
| noted | No | |||||
S3‑161813 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161823 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161824 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161825 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR | Yes |
YesNoted without presentation.
Huawei commented that a threat analysis is needed.
| noted | No | |||||
S3‑162056 | TS 33.250 | China Mobile | draft TS | Approval | No |
Yes
| left for email approval | No | ||||
7.1.4 | Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB) | S3‑161904 | Draft TS Skeleton for 33.216 | Huawei Tech.(UK) Co., Ltd | draft TS | Approval | Yes |
Yes
| approved | No | ||
S3‑161905 | Scope of TS 33.216 | Huawei Tech.(UK) Co., Ltd | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161906 | Adding Reference to TS 33.216 | Huawei Tech.(UK) Co., Ltd | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑162057 | TS 33.216 | Huawei | draft TS | Approval | Yes |
Yes
| approved | No | ||||
7.1.5 | Other |   | ||||||||||
7.2 | New GPRS algorithms for EASE (EASE_ALGOs_SA3) | S3‑161887 | discussion document on Ease Algorithm specifications | VODAFONE Group Plc | discussion | Discussion | Yes |
YesFrench government requires us to know who has the copies. ETSI must license the specifications.
The algorithms content were seen by the SA3 group in a non-public area of the local server. The files were seen anyway back in the Mexico meeting.
Vodafone noted that these files come from ETSI SAGE, not a company contribution from Vodafone.
SA3 agreed with the procedure of going ahead with the redacted documents going to the Plenary.
| noted | No | ||
S3‑161952 | Draft TS 55.241 - Specification of the GIA4 integrity algorithm for GPRS - GIA4 specification - (Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
YesMCC noted that it should be version 001 since it's an editorial change.
| revised | No | S3‑162126 | |||
S3‑162126 | Draft TS 55.241 - Specification of the GIA4 integrity algorithm for GPRS - GIA4 specification - (Release 14) | VODAFONE Group Plc | draft TS | Agreement | No |
Yes
| left for email approval | No | S3‑161952 | |||
S3‑161953 | Draft TS 55.242 - Specification of the GIA4 integrity algorithm for GPRS - Implementers test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
Yes
| postponed | No | ||||
S3‑161954 | Draft TS 55.243 - Specification of the GIA4 integrity algorithm for GPRS - Design conformance test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
Yes
| postponed | No | ||||
S3‑161955 | TS 55.251 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - GEA5 and GIA5 algorithm specification -(Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
YesMCC noted that it should be version 001 since it's an editorial change.
The information of where to find the algorithms will not be written in the spec, but in the ETSI website.
| revised | No | S3‑162128 | |||
S3‑162128 | TS 55.251 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - GEA5 and GIA5 algorithm specification -(Release 14) | VODAFONE Group Plc | draft TS | Agreement | No |
Yes
| left for email approval | No | S3‑161955 | |||
S3‑161956 | TS 55.252 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - Implementers test data -(Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
Yes
| postponed | No | ||||
S3‑161957 | TS 55.253 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - Design conformance test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement | Yes |
Yes
| postponed | No | ||||
S3‑162127 | Cover sheet for TS 55.241 | Vodafone | TS or TR cover | Approval | No |
Yes
| left for email approval | No | ||||
S3‑162129 | Cover sheet TS 55.251 | Vodafone | TS or TR cover | Approval | No |
Yes
| left for email approval | No | ||||
7.3 | Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) | S3‑161622 | Adding BEST Service to TS 33.401 | KPN, Vodafone | CR | Agreement | Yes |
Yes
| revised | No | S3‑161849 | |
S3‑161849 | Adding BEST Service to TS 33.401 | KPN, Vodafone | CR | Agreement | Yes |
Yes
| postponed | No | S3‑161622 | |||
S3‑161743 | Allocation of FC values for BEST | KPN, Vodafone | CR | Agreement | Yes |
Yes
| postponed | No | ||||
7.4 | Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) | S3‑161642 | Adding support of EAP Re-Authentication Protocol for WLAN Interworking (TWAN) | ORANGE | CR | Agreement | Yes |
YesAlf: Lack of normative verbs: shalls and shoulds.
Orange: This CR is for trusted access.
Ericsson: are we to widen up to WLAN?
Nokia: this is beyond the scope of our WID.
Ericsson: Is this run by IKEv2?
| revised | No | S3‑162020 | |
S3‑162020 | Adding support of EAP Re-Authentication Protocol for WLAN Interworking (TWAN) | ORANGE, Broadcom, Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161642 | |||
7.5 | Security of the Mission Critical Service (MCSec) | S3‑161612 | Skeleton of TS 33.180 | CESG (NCSC) | draft TS | Approval | Yes |
Yes
| approved | No | ||
S3‑161644 | [MCX] Proposed Mapping of 33.179 into 33.180 | CESG (NCSC) | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161643 | [MC_Sec] Baseline for 33.180 | CESG (NCSC) | draft TS | Approval | Yes |
Yes
| approved | No | ||||
S3‑161645 | [MC_Sec] Scope for 33.180 | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161613 | pCR 33.180 clause 3 | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161617 | pCR 33.180 pCR clause 5 | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| revised | No | S3‑161969 | |||
S3‑161969 | pCR 33.180 pCR clause 5 | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
YesCESG was fine with the document but they wanted to send an LS to SA6 on the terminology.
| approved | No | S3‑161617 | |||
S3‑161614 | pCR 33.180 clause 6 | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161615 | pCR 33.180 Annex B | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| revised | No | S3‑162030 | |||
S3‑162030 | pCR 33.180 Annex B | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | S3‑161615 | |||
S3‑161616 | pCR 33.180 Annex C | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161646 | [MC_Sec] Clean up of Clause 5.2 | CESG (NCSC) | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161996 | TS 33.180 | CESG | draft TS | Approval | Yes |
Yes
| approved | No | ||||
S3‑162082 | Ls on terminology used y SA6 | CESG | LS out | Approval | Yes |
Yes
| approved | No | ||||
7.6.1 | SAE/LTE Security | S3‑161664 | Privacy Protection for EAP-AKA and EAP-AKA’ | Apple (UK) Limited | discussion | Discussion | Yes |
YesVodafone: we should think of other solutions.
Apple: we are not changing the routing.
Nokia commented that it was better to wait until we have other solutions since it would be strange to have different solutions for V2X and 5G for example.
Vodafone: we may end up predetermining something in 5G because we used it in LTE.
Apple: this is affecting an actual problem, there is some emergency.
Vodafone: solutions exist, but no standard solutions exist, so there is no such emergency.
It was decided to wait a bit and make a decision when V2X and 5G progress further.
Qualcomm: IMSI privacy problem also exists when the UE connects in the cellular network. E.g. false base station attack.
| noted | No | ||
S3‑161665 | Privacy Protection for EAP-AKA and EAP-AKA’ | Apple (UK) Limited | CR | Approval | Yes |
Yes
| revised | No | S3‑161666 | |||
S3‑161666 | Privacy Protection for EAP-AKA | Apple (UK) Limited | CR | Approval | Yes |
Yes
| not pursued | No | S3‑161665 | |||
S3‑161799 | Correcting LWA-ID derivation mismatch | Qualcomm Incorporated | CR | Yes |
Yes
| agreed | No | |||||
S3‑161891 | Usage of Tuak | Gemalto N.V. | discussion | Decision | Yes |
YesVodafone: current mechanisms allow to choose the algorithm to use.
Gemalto: specify the values of the IMF to allow the algorithm seleciton.
Vodafone: this is not within the scope of 3GPP, to choose what algorithms to use. Nokia agreed.
Gemalto: why is this restriction here?
Ericsson: Tuak doesn’t need to be mentioned.
Gemalto: no objection to enable input key longer than 128 bits.
Heiko (Morpho) commented that this is just a discussion document, we need to agree on the CRs that come afterwards.
Nokia: no working agreement until we see the CRs.
| noted | No | ||||
7.6.2 | IP Multimedia Subsystem (IMS) Security |   | ||||||||||
7.6.3 | Network Domain Security (NDS) | S3‑161907 | 3GPP security profile update – IPsec | Ericsson | discussion | Discussion | Yes |
Yes
| noted | No | ||
S3‑161908 | 3GPP security profile update – IPsec | Ericsson | CR | Agreement | Yes |
YesMCC pointed out that redefining "support" for this spec was not appropiate since it is a well known term in standards language and changing its definition would lead to confusion and errors.
| revised | No | S3‑162007 | |||
S3‑162007 | 3GPP security profile update – IPsec | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161908 | |||
S3‑161918 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162008 | |||
S3‑162008 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161918 | |||
S3‑161919 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162009 | |||
S3‑162009 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161919 | |||
S3‑161909 | 3GPP security profile update – Certificates and CRLs | Ericsson | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161910 | 3GPP security profile update – Certificates and CRLs | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162010 | |||
S3‑162010 | 3GPP security profile update – Certificates and CRLs | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161910 | |||
S3‑161911 | 3GPP security profile updates – TLS | Ericsson | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161912 | 3GPP security profile update – TLS | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162011 | |||
S3‑162011 | 3GPP security profile update – TLS | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161912 | |||
S3‑161913 | 3GPP security profile updates – Remaining issues and new updates | Ericsson | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161914 | 3GPP security profile update – 33.220 | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162012 | |||
S3‑162012 | 3GPP security profile update – 33.220 | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161914 | |||
S3‑161915 | 3GPP security profile update – 33.221 | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162013 | |||
S3‑162013 | 3GPP security profile update – 33.221 | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161915 | |||
S3‑161916 | 3GPP security profile update – 33.234 | Ericsson | CR | Agreement | Yes |
No
| withdrawn | Yes | ||||
S3‑161917 | 3GPP security profile update – 33.320 | Ericsson | CR | Agreement | Yes |
Yes
| revised | No | S3‑162014 | |||
S3‑162014 | 3GPP security profile update – 33.320 | Ericsson | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161917 | |||
S3‑161948 | 3GPP security profile update – 43.318 | Ericsson | draftCR | Yes |
Yes
| revised | No | S3‑162015 | ||||
S3‑162015 | 3GPP security profile update – 43.318 | Ericsson | draftCR | - | Yes |
YesThis draftCR will be sent to RAN6 as endorsed by SA3 in a LS. CRs will be created in RAN6 with the same content and agreed at RAN6 level.
| endorsed | No | S3‑161948 | |||
S3‑162016 | LS on 3GPP security profile update | Ericsson | LS out | Approval | Yes |
Yes
| approved | No | ||||
7.6.4 | UTRAN Network Access Security | S3‑161925 | LS on Legacy Security Issues | C1-164579 | LS in | Yes |
YesPostponed due to the lack of contributions to give input in a response.
| postponed | No | |||
S3‑161936 | Response LS on Legacy Security Issues | R6-160125 | LS in | Yes |
YesPostponed due to the lack of contributions to give input in a response.
| postponed | No | |||||
7.6.5 | GERAN Network Access Security |   | ||||||||||
7.6.6 | Generic Authentication Architecture (GAA) |   | ||||||||||
7.6.7 | Multimedia Broadcast/Multicast Service (MBMS) | S3‑161928 | LS response to SA4 on progress of FS_xMBMS study item | C3-162236 | LS in | Yes |
Yes
| noted | No | |||
S3‑161939 | Response on LS on progress of FS_xMBMS study item | S1-162535 | LS in | Yes |
Yes
| noted | No | |||||
S3‑161941 | Response to LS S2-164299 from CT WG3 on progress of FS_xMBMS study item and to LS S2-164288 from SA WG4 also on progress of FS_xMBMS study item | S2-165435 | LS in | Yes |
Yes
| noted | No | |||||
7.6.8 | Security Aspects of Home(e)NodeB (H(e)NB) |   | ||||||||||
7.6.9 | Security Aspects related to Machine-Type Communication ((e)MTC) |   | ||||||||||
7.6.10 | Security Aspects of Isolated E-UTRAN Operation for Public Safety (IOPS) |   | ||||||||||
7.6.11 | Security of MCPTT (MCPTT) | S3‑161937 | Reply LS on questions on discreet listening and recording for MCPTT | S1-162264 | LS in | Yes |
YesCESG observed: Is this a problem for SA3-LI or SA3?
| noted | No | |||
S3‑161946 | Reply LS to SA3 on discreet listening and recording for MCPTT | S6-161229 | LS in | Yes |
Yes
| noted | No | |||||
S3‑161926 | LS on protection of RTCP transported media control messages, RTCP APP transported pre-established session control messages and MBMS subchannel control messages | C1-164680 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑161997 | Reply to: LS on protection of RTCP transported media control messages, RTCP APP transported pre-established session control messages and MBMS subchannel control messages | CESG | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑161653 | [MCPTT] Clarifying the protection of media control within 33.179 | CESG (NCSC) | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑161862 | Discussion on the need and on the potential mechanisms for the protection of MBMS subchannel control messages | Ericsson LM | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161865 | Protection of MBMS subchannel control messages | Ericsson LM | CR | Agreement | Yes |
YesCESG didn't agree with having this for Rel-13. Ericsson commented that CT1 ias asking for this to be in Rel-13. MCC commented that Rel-13 is frozen and that Cat-B CRs are not allowed anymore, just corrections.
It was commented that since this is a correction to be made to avoid a security vulnerability this can be considered as cat- F and hence acceptable in Rel-13. This was agreed by the group.
| revised | No | S3‑161998 | |||
S3‑161998 | Protection of MBMS subchannel control messages | Ericsson LM | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161865 | |||
S3‑161786 | Aligning XML encryption mechanism with CT WG agreements | Samsung | CR | Agreement | Yes |
YesCESG would rather use a stage 2 text instead of referencing a stage 3 spec. Samsung agreed.
| revised | No | S3‑161999 | |||
S3‑161999 | Aligning XML encryption mechanism with CT WG agreements | Samsung, Airbus DS SLC, Motorola Solutions, Nokia | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161786 | |||
S3‑161792 | Aligning XML Integrity protection mechanism with CT WG agreements | Samsung | CR | Agreement | Yes |
YesAirbus preferred not to have a reference to a stage 3 spec, and asked for some stage 2 wording instead.
| revised | No | S3‑162000 | |||
S3‑162000 | Aligning XML Integrity protection mechanism with CT WG agreements | Samsung , Airbus DS SLC, CESG (NCSC), Nokia | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161792 | |||
S3‑161652 | Clarification on the use of MKFC | CESG (NCSC) | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑161861 | Correction of TS 33.220 references | Samsung | CR | Agreement | Yes |
Yes
| agreed | No | ||||
7.6.12 | Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3) |   | ||||||||||
7.6.13 | Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM) | S3‑161722 | Alignment with stage 3 implementation of GPRS integrity protection | Intel Corporation (UK) Ltd | CR | Approval | Yes |
Yes
| merged | No | S3‑162085 | |
S3‑161724 | Alignment with stage 3 implementation of GPRS integrity protection | Intel Corporation (UK) Ltd | CR | Approval | Yes |
Yes
| merged | No | S3‑162084 | |||
S3‑161901 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Agreement | Yes |
Yes
| revised | No | S3‑162084 | |||
S3‑162084 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161901 | |||
S3‑161902 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Approval | Yes |
Yes
| revised | No | S3‑162085 | |||
S3‑162085 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Approval | Yes |
Yes
| agreed | No | S3‑161902 | |||
S3‑161927 | LS on LLC updates for EC-GSM-IOT enhanced security | C1-164853 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑162086 | Reply to: LS on LLC updates for EC-GSM-IOT enhanced security | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
7.6.14 | Security Aspects of Narrowband IOT (CIoT) | S3‑161654 | draft_CR to 33.401 Correct Reference to NAS Spec in 8.2 | Nokia | CR | Yes |
Yes
| revised | No | S3‑162090 | ||
S3‑162090 | draft_CR to 33.401 Correct Reference to NAS Spec in 8.2 | Nokia | CR | - | Yes |
Yes
| agreed | No | S3‑161654 | |||
S3‑161655 | draft_reply LS to R2-167293 using S-TMSI in RAN Paging | Nokia | LS out | Approval | Yes |
YesNTT-Docomo: is this the same as regular paging? Now it's using the IMSI.
| noted | No | ||||
S3‑161656 | draft_reply LS to R2-167296 RRC Connection Re-Establishment for NB-IoT (DoNAS) | Nokia | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑161657 | draft_ Reply LS to R3-162642 on Light Connection | Nokia | LS out | Approval | Yes |
Yes
| revised | No | S3‑162087 | |||
S3‑162087 | Reply LS to R3-162642 on Light Connection | Nokia, Intel | LS out | Approval | Yes |
YesDeutsche Telekom: the message from SA3 is replay protection for the message coming from the eNodeB. No need to go into details.
This was taken offline.
| approved | No | S3‑161657 | |||
S3‑161717 | Security of RRC Connection re-establishment of NB-IOT for CP Solution | Intel Corporation (UK) Ltd | discussion | Discussion | Yes |
YesEricsson: the token is only used in the uplink. If the downlink is not integrity protected the UE would not know if it is attached to the eNodeB or not. I welcome opinions on this better than discussing the threat.
| revised | No | S3‑162089 | |||
S3‑162089 | Security of RRC Connection re-establishment of NB-IOT for CP Solution | Intel Corporation (UK) Ltd | discussion | Discussion | No |
Yes
| noted | No | S3‑161717 | |||
S3‑161720 | Discussion on RAN2 LS pertaining to Light Connection | Intel Corporation (UK) Ltd | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161879 | draft reply-LS on S-TMSI in RAN paging | Ericsson | LS out | Yes |
YesDeutsche Telekom: I don’t understand the issue of using the S-TMSI.
NTT-Docomo: If S-TMSI is used for RAN paging would it limit the number of re-allocations? I don’t understand the paging mechanism.
Nokia: we need to agree on whether there is a risk when using S-TMSI.
Deutsche Telekom: our ability to update the S-TMSI frequently would be limited according to the second bullet.
Nokia: there is an opportunity of changing the S-TMSI when the RAN paging is successful and it results in a NAS connection, the updated wouldn't be so limited.
Alf (NTT Docomo): where is this described?
It looked like companies needed to study more the background of this. This was taken offline.
| noted | No | |||||
S3‑161920 | RLF for CP NB-IoT | Ericsson | discussion | Yes |
Yes
| noted | No | |||||
S3‑161933 | LS on S-TMSI in RAN paging | R2-167293 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑162123 | Reply to: LS on S-TMSI in RAN paging | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑161934 | Security aspects of RRC Connection Re-Establishment for NB-IoT (DoNAS) | R2-167296 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑162088 | Reply to: Security aspects of RRC Connection Re-Establishment for NB-IoT (DoNAS) | Intel | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑161935 | LS on Light connection | R3-162642 | LS in | Yes |
Yes
| replied to | No | |||||
7.6.15 | Other work items | S3‑161922 | LS on I-WLAN specification referencing within CT6 | C6-160408 | LS in | Yes |
YesLG commented that SA3 should send CRs for CT6 to check. The references are for Rel-12, not Rel-13.
It was confirmed that Rel-12 for I-WLAN will stay, rel-13 was withdrawn.
Heiko commented that the only solution found in CT6 was to refer to the Rel-12 version. If SA3 moves things to 33.402 CT6 needs to take this into account to refer to this spec.
| replied to | No | |||
S3‑162017 | Reply to: LS on I-WLAN specification referencing within CT6 | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑161940 | Reply LS on I-WLAN handling and specification withdrawal | S2-165026 | LS in | Yes |
Yes
| noted | No | |||||
S3‑161876 | I-WLAN specification withdrawal | Ericsson | discussion | Yes |
Yes
| noted | No | |||||
S3‑161878 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | Yes |
YesIt was commented that it is an exception to refer to a specific Release of a spec, in the context of I-WLAN. Normally the latest Release available or the same release as the the current one.
It was also pointed out that this is a Cat C CR for Rel-13 and this would be an exception as well.
| revised | No | S3‑162018 | ||||
S3‑162018 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | - | Yes |
Yes
| agreed | No | S3‑161878 | |||
S3‑161885 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | Yes |
Yes
| revised | No | S3‑162021 | ||||
S3‑162021 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | - | Yes |
Yes
| agreed | No | S3‑161885 | |||
S3‑161882 | Alignment according to withdrawal of I-WLAN feature | Ericsson | draftCR | Yes |
Yesthe CR will be brought into RAN6.
| endorsed | No | |||||
S3‑161883 | Alignment according to withdrawal of I-WLAN feature | Ericsson | draftCR | Yes |
Yes
| endorsed | No | |||||
S3‑161892 | Unauthenticated Emergency services over TWAN | Nokia | CR | Agreement | Yes |
Yes
| revised | No | S3‑162091 | |||
S3‑162091 | Unauthenticated Emergency services over trusted WLAN | Nokia | CR | Agreement | Yes |
YesSome changes proposed by Ericsson.
| agreed | No | S3‑161892 | |||
S3‑161895 | Unauthenticated Emergency services over untrusted WLAN | Nokia | CR | Agreement | Yes |
Yes
| revised | No | S3‑162092 | |||
S3‑162092 | Unauthenticated Emergency services over untrusted WLAN | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | S3‑161895 | |||
S3‑161898 | KDF for Unauthenticated emergency services over WLAN | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | ||||
8.1 | Study on Security for Proximity-based Services (FS_ProSe_Sec) | S3‑161860 | Solution against spatial replay attacks based on a new coordinate grid | Ericsson LM | pCR | Approval | Yes |
YesThis will go to a living document, then its content eventually transferred to the TR.
| revised | No | S3‑162093 | |
S3‑162093 | Solution against spatial replay attacks based on a new coordinate grid | Ericsson LM | other | Endorsement | Yes |
YesLiving document.
| endorsed | No | S3‑161860 | |||
S3‑161921 | Update of TR 33.833 after review by EditHelp | Qualcomm Incorporated | pCR | Approval | Yes |
YesThe TR will be sent for approval in SA#75.
| approved | No | ||||
S3‑162094 | TR 33.833 | Qualcomm | draft TR | Approval | No |
Yes
| left for email approval | No | ||||
S3‑162095 | Cover sheet 33.833 | Qualcomm | TS or TR cover | Approval | No |
Yes
| left for email approval | No | ||||
8.2 | TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR) |   | ||||||||||
8.3 | Study on EGPRS Access Security Enhancements with relation to cellular IoT (FS_EASE_IoT) |   | ||||||||||
8.4 | Study on IMS Enhanced Spoofed Call Prevention and Detection (FS_ESCAPADES) |   | ||||||||||
8.5 | Study on security aspects for LTE support of V2X services (FS_V2XLTE) | S3‑161766 | New WID on security aspect of architecture enhancements for LTE support of V2X services | Huawei, HiSilicon | WID new | Yes |
YesNormative work for V2X piggybacked in the SA2 WID proposal.
It was commented that deadline for Rel-14 was March 2017, although the spec would be approved by June 2017 (Rel 15 dates). The dates were to be seen later.
Nokia: reformulate the objectives. Nokia supports this WID as well.
| revised | No | S3‑162058 | ||
S3‑162058 | New WID on security aspect of architecture enhancements for LTE support of V2X services | Huawei, HiSilicon | WID new | - | Yes |
Yes
| agreed | No | S3‑161766 | |||
S3‑161760 | V2X security architecture based on the new security elements | Huawei, Hisilicon | pCR | Yes |
YesEricsson: you are proposing a solution here, but I'm fine with it if you move it to the right place of the spec.
Nokia: is this aligned with sA2?
Huawei: if they agree on this solution they will have to go for this one.
| revised | No | S3‑162059 | ||||
S3‑162059 | V2X security architecture based on the new security elements | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161760 | |||
S3‑161938 | Reply LS on Clarification to privacy requirements | S1-162531 | LS in | Yes |
Yes
| noted | No | |||||
S3‑161829 | Update on V2X UE Privacy key issue | Nokia | pCR | Approval | Yes |
YesMCC pointed out that it is not possible to refer to 3GPP working groups inside the specifications. This was changed.
The last editor's note was removed.
| revised | No | S3‑162060 | |||
S3‑162060 | Update on V2X UE Privacy key issue | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161829 | |||
S3‑161830 | Privacy solution | Nokia | pCR | Approval | Yes |
YesEricsson: this is not very specific. I would like to see here where to support LI requirements.
Alex (BT): put a note saying that LI is not supported in the PLMN. This was agreed.
Qualcomm: it is not working for the home network case when roaming. It was agreed to add an editor's note addressing this comment.
| revised | No | S3‑162061 | |||
S3‑162061 | Privacy solution | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161830 | |||
S3‑161831 | V2X Annex on privacy by regulation EU | Nokia | pCR | Approval | Yes |
Yes831 and 832 were presented in SA3#84, but people required time to learn about regulations.
Ericsson: include a reference to the report on UE regulation on the user information consent.
LG: there can be other regulations rather than the EU.
Alex (BT): privacy regulations are written on people and not physical devices. I agree with this going in for reference but remember that applying anything to physical assets will affect LI requirements.
| revised | No | S3‑162062 | |||
S3‑162062 | V2X Annex on privacy by regulation EU | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161831 | |||
S3‑161832 | V2X Annex on privacy by regulation US | Nokia | pCR | Approval | Yes |
YesAlex (BT): this refers to a report whereas 831 refers to hard regulation, so 831 and 832 cannot be treated equally.This is guidance expecting to become regulation.
It was confirmed that there is work on this going for regulation. A note on this was added.
| revised | No | S3‑162063 | |||
S3‑162063 | V2X Annex on privacy by regulation US | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161832 | |||
S3‑161845 | Discussion on the UE tracking threat with V2V/V2I communication | Ericsson LM | discussion | Endorsement | Yes |
YesIt was proposed to add this discussion into the TR. This was agreed.
| endorsed | No | ||||
S3‑161846 | Solution against UE tracking based on PC5 autonomous mode | Ericsson LM | pCR | Approval | Yes |
YesNokia: Are there still discussions in SA2 about this?
Ericsson: this is already specified.
How to pre-provision these parameters is an open aspect that could be noted in an editor's note.
| revised | No | S3‑162064 | |||
S3‑162064 | Solution against UE tracking based on PC5 autonomous mode | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | S3‑161846 | |||
S3‑161848 | Solution for V-UE pseudonymity based on a V2X MVNO | Ericsson LM | pCR | Approval | Yes |
YesAlex (BT): add a note on the LI issues in here.
This note was agreed.
Qualcomm: roaming case brings privacy issues. An editor's note was agreed.
| revised | No | S3‑162065 | |||
S3‑162065 | Solution for V-UE pseudonymity based on a V2X MVNO | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | S3‑161848 | |||
S3‑161751 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR | Yes |
YesHuawei clarified that this works for a single operator network.
Ericsson: not clear the use case for the homomorphic encryption. An editor's note was inserted for further clarification of this.
Alex (BT): an editor's note on how this solution would support LI in the HPLMN is for further study.
CESG: fallback case is needed when re-provisioning is required. Editor's note added for this.
| revised | No | S3‑162066 | ||||
S3‑162066 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161751 | |||
S3‑161814 | Enhancements to solution 6.9 on encrypting IMSI to provide privacy from the serving network | Qualcomm Incorporated | pCR | Approval | Yes |
YesCESG: fallback step as in 2066.
Ericsson: not sure about encrypting the Avs. This addresses a very rare case.
Alex (BT): this is not practical. Not clear how the triggering in the serving network works. It looks like the home network is telling the serving network what to intercept. I suggest that Qualcomm presents this in LI for evaluation.
Ericsson: strong requirements from SA1 on privacy are confronted against strong requirements from SA3-LI here.
Alex(BT): there is not contradiction. The LI issue applies to communications not to the UE .Requirement on using V2X subscription on anything other than safe messages.
Nokia proposed to add text on the evaluation and this was agreed.
The document was taken for offline discussions.
| revised | No | S3‑162067 | |||
S3‑162067 | Enhancements to solution 6.9 on encrypting IMSI to provide privacy from the serving network | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161814 | |||
S3‑161796 | Clarification of V2X UE source IP address for TS 23.285 | LG Electronics France | discussion | Discussion | Yes |
YesEricsson: it's too early for sending the LS since we don’t know what solutions we find at the application layer.
Ericsson: the IP addresses may not be changed but randomised.
It was also agreed that all identifiers need to be changes at the same time.
It was agreed to send the LS to SA2.
| noted | No | ||||
S3‑161798 | Draft LS on V2X UE IP address change | LG Electronics France | LS out | Approval | Yes |
Yes
| revised | No | S3‑162068 | |||
S3‑162068 | LS on V2X UE IP address change | LG Electronics France | LS out | Approval | Yes |
Yes
| approved | No | S3‑161798 | |||
S3‑161820 | Adding details to the reattach procedure in solution 6.5 | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson: not reasonable. Every 5 min we re-attach, and it's very bad for user experience (it interrupts services).
Qualcomm: this is used only for V2X, it won’t interrupt other services. It's not worth sacrifying privacy over safety.
Ericsson: no need to re-attach when off-coverage.
It was agreed to have an editor's note with more details on this issue.
Alex(BT): consider randomization on the timers on lower density scenarios, it may work better.
Huawei: if the car is on the highway the randomization is not enough, it is still predictable.
MCC proposed to remove the reference to "RAN2 agreements" since this should be a reference to a spec and not a working group. This was moved to an editor's note.
| revised | No | S3‑162069 | |||
S3‑162069 | Adding details to the reattach procedure in solution 6.5 | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161820 | |||
S3‑161821 | LS on eNB-specific reattach boundary time for V2X UEs using Uu mode | Qualcomm Incorporated | LS out | Approval | Yes |
YesEricsson: this is very solution specific.
Orange and Nokia agreed with Ericsson.
LG agreed to send an LS with this content.
| noted | No | ||||
S3‑161779 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR | Yes |
YesLG: how to do certificate revocation is FFS. This should be added in an editor's note.
Huawei: this exists already in other clauses, we can take it from there.
| revised | No | S3‑162070 | ||||
S3‑162070 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161779 | |||
S3‑161754 | Alternative security procedure for data transfer between UE and V2X Control Function | Huawei, Hisilicon | pCR | Yes |
YesQualcomm: how tdoes he solution work when you are not connected to the 3GPP network? An editor's note was added for this.
Another editor's note on GBA was added.
| revised | No | S3‑162071 | ||||
S3‑162071 | Alternative security procedure for data transfer between UE and V2X Control Function | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161754 | |||
S3‑161828 | V2X security between V2X AS and LTE network | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161822 | Including V2X AS as instantiation of GCS AS | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑161767 | Optimized certificate-based security solution for PC5 LTE-V2X communication | Huawei, HiSilicon | pCR | Yes |
YesQualcomm didn’t agree with this contribution since some of the issues were not correct. Nokia agreed.
| noted | No | |||||
S3‑161756 | correction of the text in the clause 6.1.1.1.2.1 | Huawei, Hisilicon | pCR | Yes |
Yes
| approved | No | |||||
S3‑161758 | The format definition of PDCP layer based on existing solutions for protecting the broadcast messages on PC5 interface. | Huawei, Hisilicon | pCR | Yes |
YesHuawei: not a new solution, this is using PDCP.
Qualcomm: not good to say that 3GPP doesn’t like what is done in other SDOs (ETSI ITS and others) and create a disruptive solution.
| approved | No | |||||
S3‑161762 | Authorization procedure for V-UE acquiring radio resource from eNB | Huawei, Hisilicon | pCR | Yes |
YesEricsson: this is not needed, the UE is already authenticated. Qualcomm agreed.
Nokia: impact on the existing existing eNodeB specification needs to be evaluated.
| noted | No | |||||
S3‑161850 | Split of solution #7 for authorization and accountability | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161764 | addition of recommendation section | Huawei, HiSilicon | pCR | Yes |
YesQualcomm: the solution is complete, it's already definded by another SDOs since 10 years ago.
Ericsson: are we doing evaluation on solutions in this part? This should be in the evaluation clause, this looks like you are doing an evaluation of the solutions in the TR.
Nokia: we have open issues, it's still early for this.
Alex (BT) objected to this contribution.
| noted | No | |||||
S3‑161815 | Conclusion of V2X communication security | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson commented that the conclusion was too early.
Nokia proposed to have this conclusion as an intermediate agreement. We agree on some principles but we are not excluding anything.
| revised | No | S3‑162072 | |||
S3‑162072 | Conclusion of V2X communication security | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161815 | |||
S3‑161816 | Conclusion of the V3 interface security | Qualcomm Incorporated | pCR | Approval | Yes |
YesAdding the interim agreement.
| revised | No | S3‑162073 | |||
S3‑162073 | Conclusion of the V3 interface security | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161816 | |||
S3‑161817 | Conclusion on security of the interfaces between network entities for V2X | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑162074 | |||
S3‑162074 | Conclusion on security of the interfaces between network entities for V2X | Qualcomm Incorporated | pCR | Approval | Yes |
YesAdding the interim agreement.
| approved | No | S3‑161817 | |||
S3‑161818 | Update and conclusion on solution 6.6 on UE privacy due to data traversing the network | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson: there is no conclusion on privacy yet.This was taken out.
| revised | No | S3‑162075 | |||
S3‑162075 | Update and conclusion on solution 6.6 on UE privacy due to data traversing the network | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161818 | |||
S3‑161819 | Conclusion on UE privacy from the MNO for V2X | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson: still too many open issues. BT objected to the contribution too.
| noted | No | ||||
S3‑161960 | Comments by Nokia on V2X privacy conclusion of S3-161819 | Nokia | pCR | Approval | Yes |
YesBT didn’t agree with this editor's note.
| noted | No | ||||
S3‑161962 | Discussion on V2V communication data confidentiality | LG Electronics France | pCR | Approval | Yes |
Yes
| merged | No | S3‑162072 | S3‑161801 | ||
S3‑161749 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161752 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161780 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161801 | Discussion on V2V communication data confidentiality | LG Electronics France | pCR | Approval | Yes |
Yes
| revised | No | S3‑161962 | |||
S3‑162077 | TR 33.885 | Huawei | draft TR | Approval | No |
YesIt was agreed to send it for information.
| left for email approval | No | ||||
S3‑162078 | Cover sheet TR 33.885 | Huawei | TS or TR cover | Approval | No |
Yes
| left for email approval | No | ||||
8.6.1 | Security architecture | S3‑161873 | SA3 decisions on security architecture needed by SA2 | Nokia | discussion | Yes |
YesThe content was to be included in an LS to SA2 to be drafted by Nokia.
Every point of this paper was presented to see if it could be included in the LS. Some companies had contributions that touched some of the points so their agreement had to go through those papers first (for example co-locating SEAF and SCMF was still controversial).
| revised | No | S3‑162047 | ||
S3‑162047 | SA3 decisions on security architecture needed by SA2 | Nokia | discussion | - | No |
Yes
| noted | No | S3‑161873 | |||
S3‑161826 | Termination point for user plane security | Ericsson LM | pCR | Approval | Yes |
YesTim commented that UP gateway is for network end. The editor's note is confusing.
Huawei didn’t agree with the editor's note either. Architectural questions are to be solved in the TS architectural work.
Nokia agreed with the intention of the editor's note, the questions were valid for them.
It was commented that a clarification of the requirements were needed here.
| revised | No | S3‑161970 | |||
S3‑161970 | Termination point for user plane security | Ericsson LM | pCR | Approval | Yes |
Yes
| noted | No | S3‑161826 | |||
S3‑161675 | Add details, threads and requirements to key issue #1.5 on security of NAS signallings before security activation | Huawei, Hisilicon | pCR | Yes |
Yes
| approved | No | |||||
S3‑161706 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR | Yes |
YesEricsson: moving the termination point from the access network to the core network is an architecture issue that should be consulted with SA2.
Deutsche Telekom: all we care about is whether it is in the base station or not. It doesn't matter if it is the access or the core network. Double encryption was a waste of resources in LTE. Stefan agreed with these changes.
Florin (Broadcom) commented that deeper encryption for access is all right.
Nokia wanted the editor's note in 5.1.3.15.3 to stay since this was a huge decision that needs to be done by SA3. Ericsson agreed. This editor's note stayed since many companies supported it.
Broadcom discussed offline with Huawei the heterogeneous access termination point since they didn't fully agree with it.
| revised | No | S3‑161971 | ||||
S3‑161971 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161706 | |||
S3‑161709 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR | Yes |
YesOrange didn’t agree with the second editor's note.
Huawei: the definition for flow exists in the SA2 TR.
Orange: it doesn’t, it's not precise.
Nokia: there is room for clarifications in the SA2 TR, we should keep the second editor's note.
It was agreed to keep the second editor's note.
| revised | No | S3‑161972 | ||||
S3‑161972 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161709 | |||
S3‑161678 | Flexible security policies negotiation in control plane | Huawei, HiSilicon | pCR | Yes |
YesAlf: (NTT Docomo): delete references to quantum computing.
Orange: UE aspects should be brought overall in this document. It was agreed to add an editor's note on this.
| revised | No | S3‑161973 | ||||
S3‑161973 | Flexible security policies negotiation in control plane | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161678 | |||
S3‑161747 | pCR to TR 33.899, radio interface user plane integrity, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| revised | No | S3‑161974 | |||
S3‑161974 | pCR to TR 33.899, radio interface user plane integrity, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
YesAddressing Nokia's and NTT-Docomo's comments.
| approved | No | S3‑161747 | |||
S3‑161750 | pCR to TR 33.899, radio interface user plane encryption, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
YesDiscussed with 667.
| approved | No | ||||
S3‑161667 | Clarification on Solution#1.1 and #1.3 | Huawei, Hisilicon | pCR | Yes |
Yes
| revised | No | S3‑161975 | ||||
S3‑161975 | Clarification on Solution#1.1 and #1.3 | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161667 | |||
S3‑161748 | pCR to TR 33.899, periodic local authentication and packet count check, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| revised | No | S3‑161976 | |||
S3‑161976 | pCR to TR 33.899, periodic local authentication and packet count check, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161748 | |||
S3‑161632 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR | Approval | Yes |
YesNokia: we need to keep open the editors note on RAN slicing if they are still discussing it.
Oberthur didn’t agree with removing the last editor's note (RAN network slicing).
First editor's note gets extended, third one comes back.
The fourth editor's note had to be taken offline.
| revised | No | S3‑161977 | |||
S3‑161977 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR | Approval | Yes |
Yes
| approved | No | S3‑161632 | |||
S3‑161728 | Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑161978 | |||
S3‑161978 | Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson needed some clarification on the new key hierarchy figure.
| approved | No | S3‑161728 | |||
S3‑161735 | pCR update of solution # 1.6 to include more details on the roaming scenario | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑161979 | |||
S3‑161979 | pCR update of solution # 1.6 to include more details on the roaming scenario | Qualcomm Incorporated | pCR | Approval | Yes |
YesCooperation with SA2 and RAN will be needed. Added in an editor's note.
| approved | No | S3‑161735 | |||
S3‑161631 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval | Yes |
YesNokia: keep the second editor's note (end of document). NEC agreed.
Changes in the table as proposed by Morpho.
Isolation aspect was taken offline.
| revised | No | S3‑161980 | |||
S3‑161980 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval | Yes |
Yes
| approved | No | S3‑161631 | |||
S3‑161702 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | Yes |
YesOrange: This is contradicting Doc 1873 agreed in proposal 2.
Nokia:it's not clear if this figure refers to the roaming case or not.
Ericsson commented that Huawei argues that the ARPF could be in the third party network.
Heiko: third party ARPF has same functionality as the normal ARPF? Does it have the same interface or we have to define a new one?
Nokia: ARPF can be in the third party session by definition.
NEC: where is the SCMF in the figures? There was no answer to this, so it was taken offline. Afterwards, the figure were changed and the text accordingly.
| revised | No | S3‑161981 | ||||
S3‑161981 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161702 | |||
S3‑161674 | Security of NAS signallings before security activation | Huawei, HiSilicon | pCR | Yes |
Yes
| approved | No | |||||
S3‑161870 | Single termination point for NAS security | Nokia | pCR | Yes |
YesVodafone: SA2 hasn't gone too far with this yet.
Nokia: if SA2 goes forward with this solution, this is SA3 input.
Qualcomm: additional security aspects in the evaluation part (e.g. moving Ues).
Huawei: sliced security isolation for FFS.
Editor's notes were agreed to address these comments.
| revised | No | S3‑161982 | ||||
S3‑161982 | Single termination point for NAS security | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑161870 | |||
S3‑161769 | pCR to TR33.899 - Solutions for Low Latency Security Issues | VODAFONE Group Plc | pCR | Approval | Yes |
YesInterdigital: secure component is hardware or software..?
Vodafone: it's irrelevant to the solution.
An editor's note was agreed to be added.
| revised | No | S3‑161983 | |||
S3‑161983 | pCR to TR33.899 - Solutions for Low Latency Security Issues | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161769 | |||
S3‑161761 | pCR to TR33.899, Use of a Non removable USIM for all UE security | VODAFONE Group Plc | pCR | Approval | Yes |
YesMCC comented that the USIM should be called "NextGen" to be aligned with the rest of the spec TR 33.899, and better start using the term "5G" for future work.
Deutsche Telekom: the solution is incomplete. An editor's note was added about identity.
Gemalto: mention quantum safe cryptography.
Qualcomm pointed out that it is referencing an ETSI SCP draft document, not formally approved. This should be taken into account in the reference.
Nokia: what is 5G NR USIM?
Vodafone: we will use NextGen USIM.
These issues were addressed offline in the revision.
| revised | No | S3‑161984 | |||
S3‑161984 | pCR to TR33.899, Use of a Non removable USIM for all UE security | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161761 | |||
S3‑161679 | A solution for KDF negotiation between UE and ARPF | Huawei, HiSilicon | pCR | Yes |
Yes
| noted | No | |||||
S3‑161633 | pCR to TR 33 899 Attach procedure for NextGen | NEC EUROPE LTD | pCR | Approval | Yes |
YesThis wasn't clear to several companies like Nokia and Huawei. LG proposed to associate a key issue with this proposal.
There wasn't much support finally and it was noted.
| noted | No | ||||
S3‑161626 | pCR to TR 33.899 Security Mode procedure for NextGen | NEC EUROPE LTD | pCR | Approval | Yes |
YesEricsson: Termination point for NAS protocol is still in the end function and now we propose to take it to the SEAF.
Orange didn’t have it clear either and it was decided to note the document.
| noted | No | ||||
S3‑161623 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161624 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161625 | pCR to TR 33 899 Initial attach procedure for NextGen | NEC EUROPE LTD | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161630 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161700 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161701 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161703 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161708 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161711 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161768 | pCR to TR 33.899: Evaluation of Solution #1.2, Periodic local authentication and packet count check | VODAFONE Group Plc | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161968 | LS on state of SA3 discussions on NG security architecture | Nokia | LS out | Approval | Yes |
YesThe approved tdoc 2081 contains a contradictory statement with 1.6. Co-locating AUSF and APRF was agreed there, on an editor's note.
This note in 2081 says that the interface between AUSF and APRF depends on a SA2 decision, whereas in this LS it says that it could not be agreed in SA3.
The Chair commented that SA3 needs to ask SA2 about this.
Huawei proposed the Editor's note: The need for standardising the interface between these two depend on SA2 and SA3 decisions.
| approved | No | ||||
8.6.2 | Authentication | S3‑161712 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR | Yes |
YesNokia: a separate entity like this that centralizes all policy decisions should remain as an implementation option. I don’t agree with the change now.
Orange: remove note on AUSF selection.
| revised | No | S3‑161987 | ||
S3‑161987 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161712 | |||
S3‑161783 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | Yes |
YesNokia: An interface between AUSF and ARPF would be very difficult to define.
This requirement was pending from an answer for the LS of SA2. An editor's note was added.
| revised | No | S3‑162081 | ||||
S3‑162081 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | - | Yes |
Yes
| revised | No | S3‑162124 | S3‑161783 | ||
S3‑162124 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | - | Yes |
YesRevised to reword the editor's note according to the LS S3-161968.
| approved | No | S3‑162081 | |||
S3‑161888 | Placing AUSF always in the home network | Nokia | pCR | Yes |
YesEricsson and Huawei didn’t agree with the change.
Nokia commented that this would be need to be raised as an open issue to SA2. An LS will be sent for this issue.
| noted | No | |||||
S3‑161886 | Comments on termination of EAP method in the VPLMN for solution 2.9 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑161669 | Add a new requirement in KI 2.1 | Huawei; Hisilicon | pCR | Yes |
YesVodafone didn’t agree with the change proposed here. We already satisfy this requirement in 3G, this is not needed in a 5G study.
Huawei: we don’t have the concept of phase one or two in SA3, so this is still applicable.
Broadcom: this is part of phase one.
| noted | No | |||||
S3‑161807 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR | Yes |
YesOrange: they don’t talk about third party but about slices in SA1.
| revised | No | S3‑161991 | ||||
S3‑161991 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161807 | |||
S3‑161875 | New key issue "Increasing home control in roaming situations" | Nokia | pCR | Yes |
YesDiscussed together with 877.
The second requirement was reworded as proposed by Ericsson.
Huawei didn’t agree with this requirement (they proposed a "may" instead of a "shall"). This wasn't agreed.
The document was revised to leave just the agreed parts.
| revised | No | S3‑161988 | ||||
S3‑161988 | New key issue "Increasing home control in roaming situations" | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑161875 | |||
S3‑161877 | Linking location update with authentication confirmation | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑161881 | EPS AKA enhanced with UE authentication confirmation | Nokia | pCR | Yes |
YesHuawei didn’t agree with the "commercially unattractive" sentence, but it was generally agreed by the group (with a comment from Deutsche Telekom addressed in the revision).
| revised | No | S3‑161989 | ||||
S3‑161989 | EPS AKA enhanced with UE authentication confirmation | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑161881 | |||
S3‑161884 | Introducing EPS AKA* to authentication framework in solution 2.7 | Nokia | pCR | Yes |
YesTerminology needs to be reviewed as proposed by Broadcom.
MCC asked to remove the mention to CT4 in the alternative 1b.
Ericsson proposed to add an editor's note about Increasing home control in roaming situations.
| revised | No | S3‑161990 | ||||
S3‑161990 | Introducing EPS AKA* to authentication framework in solution 2.7 | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑161884 | |||
S3‑161670 | A solution for un-trusted non-3GPP access | Huawei; Hisilicon | pCR | Yes |
Yes
| revised | No | S3‑161992 | ||||
S3‑161992 | A solution for un-trusted non-3GPP access | Huawei; Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161670 | |||
S3‑161682 | Reducing Signalling with Group Authentication | Huawei, HiSilicon | pCR | Yes |
YesOrange queried whether the gateway was a relay UE. Huawei: The gateway could be a relay UE in one of the cases.
Orange: relay Ues are in phase two in SA2, so they won’t work in phase One.
Qualcomm: note the contributions that refer to phase two, there is no time for these and we must prioritise phase one.
The Chair commented that by noting it means that they will just not be treated.
| noted | No | |||||
S3‑161685 | Multiplex Authentication and Reduce NAS signalling | Huawei, Hisilicon | pCR | Yes |
YesThe Chair commented that Massive IoT is in phase two.
There wasn't much support so this was noted.
| noted | No | |||||
S3‑161725 | Identity-based authentication for service provider connectivity | Huawei, Hisilicon | pCR | Yes |
YesNTT-Docomo: One key gone missing the whole thing is broken.
No key revocation.
Too many open issues.
| noted | No | |||||
S3‑161774 | pCR to TR33.899 - new solution - Identity-based Authentication of Equipment | VODAFONE Group Plc | pCR | Approval | Yes |
YesVodafone: no long term identification in this solution.
NTT-Docomo didn’t agree with the solution, Nokia supported NTT-Docomo.
NTT-Docomo: This solution requires pushing tokens to all devices regularly.
| revised | No | S3‑162025 | |||
S3‑162025 | pCR to TR33.899 - new solution - Identity-based Authentication of Equipment | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161774 | |||
S3‑161890 | Combining solutions 2.2 and 10.2 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑161705 | Clarification for Editor’s notes in Solution #2.13 | Huawei, Hisilicon | pCR | Yes |
YesOrange: what is a third party ARPF? Remove" third party".
| revised | No | S3‑161993 | ||||
S3‑161993 | Clarification for Editor’s notes in Solution #2.13 | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161705 | |||
S3‑161686 | MASA supports 4G USIM | Huawei, Hisilicon | pCR | Yes |
YesNokia: what is a 4G USIM?
Huawei: it's a LTE USIM.
Nokia: in LTE we can use R99/UMTS SIMs. Which one do you refer to exactly?You don’t need additional functionality to make the USIM work in LTE. Add an editor's note on the need for clarification for the term 4G USIM.
Orange: there is no HSS in 5G (looking at the figure). How does it work?
This had to be clarified in the revision.
| revised | No | S3‑161994 | ||||
S3‑161994 | MASA supports 4G USIM | Huawei, Hisilicon | pCR | - | Yes |
YesMCC commented that there is no"4G" term in 3GPP specifications. It was agreed to add an editor's note for clarification of the "4G USIM".
| approved | No | S3‑161686 | |||
S3‑161687 | MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | discussion | Yes |
Yes
| noted | No | |||||
S3‑161688 | pCR to TR33.899 MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | pCR | Yes |
YesNokia had a problem with this contribution, nobody seemed to support it.
| revised | No | S3‑162022 | ||||
S3‑162022 | pCR to TR33.899 MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161688 | |||
S3‑161689 | MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑161690 | pCR to TR33.899 MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑162023 | |||
S3‑162023 | pCR to TR33.899 MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval | Yes |
YesAdding an editor's note on the evaluation as proposed by Nokia.
| approved | No | S3‑161690 | |||
S3‑161691 | MASA NG-UE Security Capabilities Negotiation | Huawei, Hisilicon | pCR | Yes |
YesOrange: Efficiency of the protocol is FFS. Lot of info is being sent to the HSS. This causes an impact by design.
| revised | No | S3‑162024 | ||||
S3‑162024 | MASA NG-UE Security Capabilities Negotiation | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161691 | |||
S3‑161692 | MASA - Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval | Yes |
YesNoted without presentation.
| noted | No | ||||
S3‑161694 | Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval | Yes |
YesNoted without presentation.
| noted | No | ||||
S3‑161721 | pCR_Update Solution #2.14 for non-AKA based Authentication | Huawei, Hisilicon | pCR | Yes |
YesJuniper wanted an editor's note clarifying the last figure (especially step 5). This was agreed.
Orange: impact on the charging system is FFS. This was added in an editor's note.
| revised | No | S3‑162026 | ||||
S3‑162026 | pCR_Update Solution #2.14 for non-AKA based Authentication | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161721 | |||
S3‑161738 | Updates to Device Certificate Enrollment in solution 2.10 | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑162027 | |||
S3‑162027 | Updates to Device Certificate Enrollment in solution 2.10 | Qualcomm Incorporated | pCR | Approval | Yes |
YesFourth bullet removed as petitioned by Nokia.
| approved | No | S3‑161738 | |||
S3‑161753 | pCR to TR 33.899, updating long term secret key, improvement and evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
YesMCC commented that parts of the text need to be reworded in "standards language" (use of "we", or "I" for example). Also use of "NextGen" instead of 5G.
| revised | No | S3‑162028 | |||
S3‑162028 | pCR to TR 33.899, updating long term secret key, improvement and evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161753 | |||
S3‑161755 | pCR to TR 33.899, session key exchange protocol, improvement and evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161770 | pCR to TR33.899 - Evaluation of Solution #2.3 | VODAFONE Group Plc | pCR | Approval | Yes |
YesNokia: Is this solution adequate for Massive IoT?
Vodafone: can't recall who put this solution, this is just an evaluation.
Nokia: Massive IoT would go for phase 2. Is the solution needed now?
It wasn't clear whether this would apply for Massive IoT.
| approved | No | ||||
S3‑161772 | pCR to TR33,899 - Revision of the evaluation for Solution #2.6 | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| revised | No | S3‑162029 | |||
S3‑162029 | pCR to TR33,899 - Revision of the evaluation for Solution #2.6 | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161772 | |||
S3‑161797 | Resolving Editor’s Note on AAA proxy in Solution #2.8 | Samsung | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161800 | Updates to Solution #2.8 to introduce EAP-TLS authentication | Samsung | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161852 | Adding details to solution 2.5 | KPN | pCR | Approval | Yes |
Yesnoted without presentation.
| noted | No | ||||
S3‑161854 | Modifications to solution 2.11 | KPN | pCR | Approval | Yes |
Yesnoted without presentation
| noted | No | ||||
S3‑161889 | Removing option of AUSF in visited network for solution 2.7 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑161899 | Update to solution #2.9: adding EAP-TTLS | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161900 | Update to solution #2.9: Fast re-authentication with ERP | Ericsson LM | pCR | Approval | Yes |
YesNokia suggested to add an editor's note; this was accepted. Other comments from Nokia were also addressed in the revision.
| revised | No | S3‑162031 | |||
S3‑162031 | Update to solution #2.9: Fast re-authentication with ERP | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | S3‑161900 | |||
S3‑161730 | Update of solution #2.19 to clarify some editor’s notes | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161693 | MASA - Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161713 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161763 | pCR to 33.899 - enhanced USIM features for 5G | VODAFONE Group Plc | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑161784 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161806 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
S3‑161808 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
8.6.3 | Security context and key management | S3‑161833 | Key issue on security key and context identification | Nokia | pCR | Approval | Yes |
YesVodafone:Can we confidentiallity protect in every country?
Nokia: it's a should for confidentiality.
Ericsson: even for integrity.
| revised | No | S3‑162033 | |
S3‑162033 | Key issue on security key and context identification | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161833 | |||
S3‑161834 | Solution on security key and context identification | Nokia | pCR | Approval | Yes |
YesBroadcom: how do you send the NAS command?
The Chair commented that this text was agreed already, it’s not part of the contribution.
Ericsson: the problem comes when removing CCNF. It was agreed to keep CCNF.
| revised | No | S3‑162034 | |||
S3‑162034 | Solution on security key and context identification | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161834 | |||
S3‑161757 | pCR to TR 33.899, UE requests key refresh, refinement and evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
YesAlf (NTT-Docomo): The requirements are operational, not security requirements.
Vodafone: we are trying to address the editor's notes, we would be happy to remove the requirements and editor's note associated.
It was agreed to add an editor's note that other solutions rather than dropping the connection should be investigated.
Qualcomm's contribution 1734 proposed an alternative that was discussed as well. It was merged with this contribution.
These changes and others proposed by NTT-Docomo were agreed.
| revised | No | S3‑162035 | |||
S3‑162035 | pCR to TR 33.899, UE requests key refresh, refinement and evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑161757 | |||
S3‑161608 | Solution for independent RAN keys | ZTE Corporation | pCR | Approval | Yes |
YesTIM proposed to add an editor's note on whether CA is needed for this solution.
Nokia: Performance problems when having an additional AKA process.
Nokia didn’t see the purpose of using a public key ( figure 5.3.4.y.2.1-1). They questioned the requirement on which this is based. There is no such requirement.
Deutsche Telekom commented that the key issue addresses a different problem. Stefan agreed with Guenther.
| noted | No | ||||
S3‑161672 | introduce algorithms negotiation call flow | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | Yes |
YesBroadcom: what is SSF?
Huawei: currently defined in SA2. This is defined in one of their solutions.
Nokia: Details on Security capabilities sent in the auth response are needed. This was added in an editor's note.
| revised | No | S3‑162036 | ||||
S3‑162036 | introduce algorithms negotiation call flow | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | - | Yes |
Yes
| approved | No | S3‑161672 | |||
S3‑161673 | A solution for key negotiation in dual connectivity scenario | Huawei, HiSilicon | pCR | Yes |
YesNokia didn't agree with this proposal: there is overhead on this solution.
Alf: Not enough details on the Random numbers to be sent in the D-H. This also may need a bigger computational power.
TIM: the D-H could have an impact on the radio.
| revised | No | S3‑162037 | ||||
S3‑162037 | A solution for key negotiation in dual connectivity scenario | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161673 | |||
S3‑161699 | Security Key Refresh Triggered by UE | Huawei, HiSilicon | pCR | Yes |
YesVodafone and Orange addressed the case of UE roaming in a contry that doesn’t allow confidentiality would not be allowed to use the network.
Nokia: step 4 doesn't clarify whether it is integrity protected (the policy of the home network).
Vodafone: we have the UICC and an OMA secure process for managing objects in the UE. Two processes for managing objects securely, do we need a third one?
Interdigital: is this real time? An editor's note was added on this issue.
| revised | No | S3‑162038 | ||||
S3‑162038 | Security Key Refresh Triggered by UE | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161699 | |||
S3‑161719 | Authentication and Key Agreement for non-3GPP access | Intel Corporation (UK) Ltd | pCR | Yes |
YesNokia, Qualcomm and Samsung had many issues with the proposal. This was discussed offline.
| revised | No | S3‑162080 | ||||
S3‑162080 | Authentication and Key Agreement for non-3GPP access | Intel Corporation (UK) Ltd | pCR | - | Yes |
Yes
| approved | No | S3‑161719 | |||
S3‑161731 | pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑162039 | S3‑161437 | ||
S3‑162039 | pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161731 | |||
S3‑161959 | Comments on S3-161731 "pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities" by Qualcomm Incorporated | Nokia | pCR | Yes |
Yes
| merged | No | S3‑162039 | ||||
S3‑161734 | pCR solution to Key Issue # 3.2 on refreshing keys | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| merged | No | S3‑162035 | S3‑161434 | ||
S3‑161894 | Evaluating solution #2.6 against key issue 3.1 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑161668 | Introduce D-H algorithm negotiation method in Solution #3.1 | Huawei, Hisilicon | pCR | Yes |
Yes
| approved | No | |||||
S3‑161723 | Update Solution for Security Context Management for UE with Multiple Access Technologies | Huawei, HiSilicon, CATR | pCR | Yes |
Yes
| approved | No | |||||
S3‑161736 | Enhancements to solution 3.4 | Qualcomm Incorporated | pCR | Approval | Yes |
YesBroadcom: the whole authentication should be detailed in a different way from what is shown here. They didn't want to have it as a separate solution.
Nokia was fine with the solution, it just needed some more sentences.
| revised | No | S3‑162040 | |||
S3‑162040 | Enhancements to solution 3.4 | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161736 | |||
8.6.4 | RAN security | S3‑161697 | Potential security requirements on gNB | Huawei, HiSilicon | pCR | Yes |
YesInterdigital: add root of trust to the definitions. I disagree with the second requirement, it's not only the boot-up that needs to be integrity protected. Help of root of trust doesn't need to be here. Gemalto agreed with this, it's a solution not a requirement.
Nokia: this should go to the security assurance specification, not here.
Qualcomm agreed with Gemalto: some rewording is needed in the requirements.
Deutsche Telekom suggested to use existing requirements in 33.401.
This was taken offline.
| revised | No | S3‑162041 | ||
S3‑162041 | Potential security requirements on gNB | Huawei, HiSilicon,Interdigital | pCR | - | Yes |
Yes
| approved | No | S3‑161697 | |||
S3‑161662 | Additions to Security aspects of dual connectivity | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161864 | Details on Key issue #4.4: Security aspects of intra-NR mobility | Ericsson | pCR | Yes |
Yes
| approved | No | S3‑161415 | ||||
S3‑161863 | Details on Key issue #4.5: Security aspects of WLAN aggregation | Ericsson | pCR | Yes |
Yes
| revised | No | S3‑162042 | S3‑161418 | |||
S3‑162042 | Details on Key issue #4.5: Security aspects of WLAN aggregation | Ericsson | pCR | - | Yes |
YesIncludes some modifications suggested by Broadcom, relating this to the RAN and changing the editor's note.
| approved | No | S3‑161863 | |||
S3‑161744 | Requirement of preventing the RRC connection resource exhausted from DOS attacks | Huawei, Hisilicon | pCR | Yes |
YesNokia: this is for massive IoT, we agreed to postpone these kind od contributions. It was agreed to note it for this reason.
| noted | No | |||||
S3‑161805 | Resolving Editor’s Note on UE behaviour in reading the SIB | Samsung | pCR | Approval | Yes |
Yes
| revised | No | S3‑162043 | |||
S3‑162043 | Resolving Editor’s Note on UE behaviour in reading the SIB | Samsung | pCR | Approval | Yes |
Yes
| approved | No | S3‑161805 | |||
S3‑161778 | pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition | China Mobile Com. Corporation | pCR | Approval | Yes |
Yes
| revised | No | S3‑162032 | |||
S3‑162032 | pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition | China Mobile Com. Corporation | pCR | Approval | Yes |
YesEricsson: this is subject to agreements in RAN.It was agreed to add an editor's note.
| approved | No | S3‑161778 | |||
S3‑161897 | Resolving Editor’s Note on provisioning of public keys to the UE | Samsung | pCR | Approval | Yes |
Yes
| revised | No | S3‑162044 | |||
S3‑162044 | Resolving Editor’s Note on provisioning of public keys to the UE | Samsung | pCR | Approval | Yes |
Yes
| approved | No | S3‑161897 | |||
S3‑161658 | Discussion paper on broadcast messages with digital signature | Nokia | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑161659 | Verification of gNB using UL monitoring and System Query | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑162083 | |||
S3‑162083 | Verification of gNB using UL monitoring and System Query | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161659 | |||
S3‑161660 | Evaluation of digital signature solution 5.4.4.1 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161661 | Evaluation of digital signature solution 5.4.4.2 | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑162130 | |||
S3‑162130 | Evaluation of digital signature solution 5.4.4.2 | Nokia | pCR | Approval | Yes |
YesAdding an editor'd note as proposed by Samsung.
| approved | No | S3‑161661 | |||
S3‑161733 | pCR solution to Key Issue # 4.6 User plane DoS attacks | Qualcomm Incorporated | pCR | Approval | Yes |
YesInterdigital suggested to add an editor's note on other key distribution methods could work with this solution.
MCC suggested to revise the second sentence of NOTE 1 since it includes a requirement (never to be included in informative notes) and references to 3GPP working methods. This was agreed.
KPN: the key issue here seems to be massive IoT.SA3 had agreed to postpone this topic due to lack of time. This had to be discussed offline.
| revised | No | S3‑162045 | S3‑161435 | ||
S3‑162045 | pCR solution to Key Issue # 4.6 User plane DoS attacks | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | S3‑161733 | |||
S3‑161777 | Prevent UP DoS Attack over Air Interface | Huawei, HiSilicon | pCR | Yes |
YesNokia: this is for IoT small devices. I suggest to postpone it.
Huawei: small data solutions are part of phase one.
Nokia: SA2 will decide where small data is going to during their next meeting.
It had to be discussed offline whether this document was about Massive IoT or about small data in order to have it treated.
| revised | No | S3‑162079 | ||||
S3‑162079 | Prevent UP DoS Attack over Air Interface | Huawei, HiSilicon | pCR | - | Yes |
YesNokia commented that small data was decided to be postponed, but the Chair commented that this had been opened and commented.
| approved | No | S3‑161777 | |||
8.6.5 | Security within NG-UE | S3‑161707 | Additional Storage Requirements for Credentials | Intel Corporation (UK) Ltd | pCR | Yes |
YesOverlapping with 1737, 2006,1868.
Orange only agreed partly with the second last requirement.
| noted | No | |||
S3‑161737 | Security requirements for Key Issue # 5.1 | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑161958 | Comments to S3-161737 | ORANGE, Vodafone, Telecom Italia, Oberthur Technologies | pCR | Approval | Yes |
YesVodafone: we don’t mandate the protection storage in a confidential integrity protected way, it's poorly written here. Storage should be in a tampered resistant hardware. This was agreed.
NTT-Docomo: integrity protection of the algorithm or the key?
Huawei: how do we store the algorithm?
Vodafone: software.
Huawei: just say it, but this looks like a solution.
Integrity protection of algorithms:
Interdigital: stored in tamper resistant doesn’t mean it cannot be changed. It has to be integrity protected, otherwise anyone can go and change it. It's a requirement for the storage.
Deutsche Telekom: acccessibility of parameters requirement covers this already.
KPN: integrity protection is the generic requirement, protection against manipulation in a tamper resistant storage is just one possible solution. Intel agreed.
Orange: the tamper resistant storage ensures that the algorithm and keys cannot be reached.
Qualcomm: algorithm storage? What is it?
Vodafone: tamper resistant, you cannot change the software, what is the point of integrity protection?
Alf: tamper resistant hardware says that you cannot access the software but it does not refer to the access to the algorithm. Ensure that the algorithm is the one selected by the operator and can be changed by it, not someone else.
Vodafone: if I want to put different USIMs in a device I don’t see why 3GPP does not allow me that.
The Chair clarified that when an algorithm cannot be changed: integrity protection. Qualcomm disagreed.
Gemalto commented that the algorithm can be updated, it's possible that this happens in the future. Klaus agreed.
Vodafone: AKA to EAP, this is a 5G use case. Security of storage and operation are the points.
Ericsson: no need of the word "hardware" in the context of tamper resistant.
Orange: state of the art is like this, we have to use hardware.
KPN:: perhaps someone will come with a solution that comes with an equal security. This is evaluation of the solution. If the Cloud is a solution equally secure, KPN would agree to that, for example.
Qualcomm: in the key issue details there are no references to the algorithm part.
Orange: no storage no processing no protection of the algorithm to be discussed then.
Blackberry agreed with KPN. Also, no need to mention hardware. Huawei agreed with Blackberry with the hardware issue.
TIM; tamper resistance and hardware can be there, no contradiction.
Vodafone: it is right to mention the word hardware.
Deutsche Telekom: it is not the issue whether this is a separate component, and I agree with keeping the word hardware.
Ericsson: hardware is a solution when you mention tamper resistance.
The Chair commented that although Ericsson and the others may be right, many companies still want to keep it.
Vodafone: you will need the hardware to run the software.
The Chair proposed to have tamper resistance environment and then lisitng requirements, but this wasn't agreed.
Intel: what do we mean by hardware here?
Orange: it's a place where we have operations for the credentials.
Intel: UICC?
Orange: didn’t say that. The storage will be defined elsewhere e.g. ETSI SCP, the solution can be found outside 3GPP.
Deutsche Telekom: in 5G we can find alternatives to UICC, I don’t see the reasons to resist to have pure requirements.
Vodafone: as long as it is suitable secure, we are prepared to look at any solution. Tamper resistance software is linked to tamper resistance hardware.
Ericsson: in the requirements clauses we have "ffs" in editor's notes and this is blocking progress and causing confusion. Qualcomm agreed.
NTT-Docomo: I propose requirements derived from security threats and reason why these requirements are coming from them. I agree with Vesa, the reality is that we don’t have agreed security requirements.
The Chair commented that if there is no agreement we can just drop this topic and focus on others.
Orange: let's stick with what we have with regards to the requirements.
Vodafone: all docs have aspects that people can agree with, there is no blockage.
The Chair commented that progress needs to be made and have some agreements, otherwise there is no progress for the next meeting.
Morpho commented if we don’t agree in a solution we stick in 5G with what we have now, the UICC.
Ericsson: no agreement in a radio technology means stick with LTE?
The Chair: fallback is the way out bit probably not what will happen.
| revised | No | S3‑162006 | |||
S3‑162006 | Comments to S3-161737 | ORANGE, Vodafone, Telecom Italia, Oberthur Technologies, Deutsche Telekom, AT&T, Giesecke & Devrient | pCR | Approval | Yes |
YesVodafone: Integrity and confidentiality of the parameters and the same for the algorithm are difference concepts. There is no decision anywhere that there are public algorithms. It's the responsibility of the operator that both algorithm and parameters are confidentiality and integrity protected. This has been out of scope of standards until now and I don’t understand why we go for this here.
Morpho: confidentiality protection weakens what we have today.
Orange: I agree with your comment.
Ericsson argued that this commenting contribution was hard to follow since there were changes on changes and addition of requirements.
| noted | No | S3‑161958 | |||
S3‑161868 | Requirements for NG-UE | Ericsson | pCR | Yes |
Yes
| noted | No | |||||
S3‑161704 | Additional requirements for storage of identities | Intel Corporation (UK) Ltd | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑161680 | Requirements for NG-UE | Huawei, HiSilicon | pCR | Yes |
YesOrange: still under discussion in SA1, whether to have different types of devices or not. It needs to be aligned with SA1 agreements.
Orange: what are security capabilities? Can you be more precise?
Vodafone: I don’t see having a class being an advantage.
Huawei: different devices need to have different capabilities.
Vodafone: have a class where all the devices can be tight in one place, to avoid having a huge market variation.
Huawei: hard to achieve all requirements in a single device.
Orange: we define mandatory and optional requirements.
Ericsson: add an editor's note on the progress in SA1.
NTT-Docomo: I like that the network can reject Ues based on the lack of security capabilities.
Vodafone: this exists already.
Orange didn’t agree with the threat, who says that the device doesn’t have all the security capabilities.
Klaus: IoT is for the next phase, we shouldn't go on with that.
The Chair decided to allow some reqriting and put an editor's note on alignment with SA1 to go ahead.
| revised | No | S3‑162048 | ||||
S3‑162048 | Requirements for NG-UE | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161680 | |||
S3‑161867 | New key issue #5.y: Storage and processing of credentials and identifiers for the massive Internet of Things | Ericsson | pCR | Yes |
YesKPN pointed out that it’s been agreed not to go for Massive IoT during this time. This was noted then.
| noted | No | |||||
8.6.6 | Authorization | S3‑161804 | Update of key issue #6.y: Accounting and non-repudiation | Huawei, Hisilicon | pCR | Yes |
YesInterdigital: Extend it to non random access.
| revised | No | S3‑162096 | ||
S3‑162096 | Update of key issue #6.y: Accounting and non-repudiation | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161804 | |||
S3‑161618 | Solution #6.x: Dynamic Authorization by Operator/MNO | INTERDIGITAL COMMUNICATIONS | pCR | Agreement | Yes |
YesNokia: hard to have this in the current architecture being defined in SA2.
It was agreed to add an editor's note on the flow.
Qualcomm: example of dynamic service?
Interdigital: you are attached in a slice, you request a new service and then you attach to another slice.
| revised | No | S3‑162097 | |||
S3‑162097 | Solution #6.x: Dynamic Authorization by Operator/MNO | INTERDIGITAL COMMUNICATIONS | pCR | Approval | Yes |
Yes
| approved | No | S3‑161618 | |||
S3‑161619 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Agreement | Yes |
Yes
| revised | No | S3‑162076 | |||
S3‑162076 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Approval | Yes |
YesVodafone: unnecessarily complex.Morpho agreed, this is not in line with the requirement from SA1.
China Mobile: auth for the 3rd party should be handled in the third party, not the MNO.Interidgital replied that it was explained in the contribution.
Orange was against the contribution. Vodafone was fine with it until the evaluation was filled in.
| revised | No | S3‑162098 | S3‑161619 | ||
S3‑162098 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Approval | Yes |
YesAdding an editor's note.
| approved | No | S3‑162076 | |||
S3‑161827 | Solution for UE authorization based on a secondary authentication with a third party server | Ericsson LM | pCR | Approval | Yes |
YesEricsson: this applies to all solutions.
An editor's note for alignment with SA2 was agreed to be added. Key issue 6.3 removed.
Vodafone: we don’t like the signalling going through the user plane. The evaluation is not such, it should be deleted.
Nokia: remove references to current mechanisms in the justification.
Also added an editor's note.
| revised | No | S3‑162099 | |||
S3‑162099 | Solution for UE authorization based on a secondary authentication with a third party server | Ericsson LM | pCR | Approval | Yes |
Yes
| approved | No | S3‑161827 | |||
8.6.7 | Subscription privacy | S3‑161611 | Key issue #7.y: Need to protect entire Permanent Identifier | INTERDIGITAL, THALES | pCR | Approval | Yes |
YesVodafone and Qualcomm didn’t agree with this.
Thales: this key issue covers a very important issue in 5G.
Vodafone: it's already in the document.
Ericsson: some solutions didn’t cover the routing information. Vodafone was fine with this.
Nokia: all solutions that protect the country code would be out of the table if we accept this. An editor's note was added for this.
Alf (NTT Docomo): what kind of attack is it in here?
Interdigital: passive attack over the air.
Qualcomm: too early to agree on this requirement. Wait for evaluation.
| revised | No | S3‑162100 | S3‑161455 |
S3‑162100 | Key issue #7.y: Need to protect entire Permanent Identifier | INTERDIGITAL, THALES | pCR | Approval | No |
Yes
| approved | No | S3‑161611 | |||
S3‑161639 | pCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-term identifiers based on channel estimation | THALES | pCR | Approval | Yes |
YesVodafone: biggest problem of changing identifiers is that some system don’t bother changing them. This is about generating random numbers. Not in the scope of 3GPP to define how to generate a random number.
Ericsson: some processing is needed here, not good.
Add an editor's note on further clarification needed, how the process can improve the refreshment time of the temporal identifier.
Vodafone: the advantage of this over existing mechanishms is for further study.
Huawei: An attacker near the received can have a good channel estimation.
| revised | No | S3‑162101 | S3‑161404 | ||
S3‑162101 | pCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-term identifiers based on channel estimation | THALES | pCR | Approval | Yes |
Yes
| approved | No | S3‑161639 | |||
S3‑161793 | pCR to TR 33.899: Temporary Identity refresh parameters | VODAFONE Group Plc | pCR | Approval | Yes |
YesEricsson: too solution specific for being a requirement.
Nokia: no need to give implementation details like here.Vodafone replied that he changed it from a requirement to a solution.
Deutsche Telekom: second potential requirement should stay.
| approved | No | ||||
S3‑161841 | Additional EN on requirement because of LI aspect of key issue 7.1 was S3-161445 | Nokia, Ericsson, LG Electronics | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑161842 | Additional requirement on transmission of identifiers in key issue 7.6 was S3-161446 | Nokia, Ericsson, LG Electronics | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161732 | pCR to update solution #7.4: Privacy enhanced Mobile Subscriber Identifier (PMSI) | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161436 | |||
S3‑161836 | Commenting solution 7.4 was S3-161388 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161835 | Commenting solution 7 3 and proposal to split from LI was S3-161447 | Nokia, Ericsson | pCR | Approval | Yes |
YesAlex (BT):ffs whether this solution needs the PLMN non assistance requirements.
| revised | No | S3‑162102 | |||
S3‑162102 | Commenting solution 7 3 and proposal to split from LI was S3-161447 | Nokia, Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑161835 | |||
S3‑161620 | pCR for adding solution to key issue #7.2 : Concealing permanent or long-term subscriber identifier with opportunistic encryption | THALES | pCR | Approval | Yes |
Yes
| approved | No | S3‑161405 | |||
S3‑161775 | pCR Security enhancement to the attach procedure without relying on PKI | China Mobile Com. Corporation, Thales | pCR | Approval | Yes |
YesEricsson: this is not solving the issue.
China Mobile: this is not an active attack.
| revised | No | S3‑162105 | |||
S3‑162105 | pCR Security enhancement to the attach procedure without relying on PKI | China Mobile Com. Corporation, Thales | pCR | Approval | No |
Yes
| left for email approval | No | S3‑161775 | |||
S3‑161776 | pCR Security enhancement to the attach procedure relying on PKI | China Mobile Com. Corporation | pCR | Approval | Yes |
YesNokia: mention the key issue.
Added also an editor's note.
| revised | No | S3‑162106 | |||
S3‑162106 | pCR Security enhancement to the attach procedure relying on PKI | China Mobile Com. Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑161776 | |||
S3‑161782 | Protect the Permanent or Long Termn User Identity with Public Key Techologies | Huawei, HiSilicon | pCR | Yes |
YesEricsson: more clarification on the roaming case.
| revised | No | S3‑162103 | ||||
S3‑162103 | Protect the Permanent or Long Termn User Identity with Public Key Techologies | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161782 | |||
S3‑161837 | 5G Privacy Pseudonym-IMSI - intro solution was S3-161463 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161838 | 5G Privacy Pseudonym-IMSI - process steps was S3-161464 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161839 | 5G Privacy Pseudonym-IMSI evaluation was S3-161466 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161858 | Refreshing CN short-term subscriber identifiers | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161681 | Update requirement on long term identifier aspect of key issue 7.2 | Huawei, HiSilicon | pCR | Yes |
Yes
| approved | No | |||||
S3‑161843 | Need of LS regarding effects of LI requirement on privacy solutions | Nokia, Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑161759 | pCR to TR 33.899, UE requests temporary identifier refresh, evaluation | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161715 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR | Yes |
YesEricsson: a key issue cannot be promoted into a solution, remove the references.
Nokia: no backwards compatibility?allowing the UE fall back to 4G wouldn’t help for backwards compatibility.
| revised | No | S3‑162107 | ||||
S3‑162107 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161715 | |||
S3‑161853 | Updating solution #7.3 | Ericsson, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161641 | New privacy solution for concealing permanent subscriber identifier | TELECOM ITALIA S.p.A., Ericsson | pCR | Approval | Yes |
YesColin (CESG) commented that this is related to the LS from TC CYBER, which could be noted.
Alex (BT): add in the second bullet of the evaluation clause "this is subject to the correct key provided to the serving network".
| revised | No | S3‑162108 | |||
S3‑162108 | New privacy solution for concealing permanent subscriber identifier | TELECOM ITALIA S.p.A., Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑161641 | |||
S3‑161856 | Encrypting IMSI based on ECIES | Ericsson, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161855 | Privacy-enhanced LTE-style mechanism for temporary identifier assignment | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑162109 | |||
S3‑162109 | Privacy-enhanced LTE-style mechanism for temporary identifier assignment | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑161855 | |||
S3‑161716 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR | No |
No
| withdrawn | Yes | |||||
8.6.8 | Network slicing security | S3‑161788 | Clarifications on the Solutions for Network Slicing Security | LG Electronics France | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑161745 | Security Architecture for Network Slicing | CATT, CATR | pCR | Approval | Yes |
YesIt was commented that the Visited network/Home network instead of third party is a competition for the current MVNO solutions, and also a more costly alternative.
Nokia: there are assumptions here that depend on what is decided in SA2. An editor's note for this was added.
| revised | No | S3‑162114 | |||
S3‑162114 | Security Architecture for Network Slicing | CATT, CATR | pCR | Approval | Yes |
Yes
| approved | No | S3‑161745 | |||
S3‑161729 | Isolation of slices using UP security terminating in the network | Qualcomm Incorporated | pCR | Approval | Yes |
YesHuawei: How the subscription profile is made is ffs. Created an editor's note.
Nokia: underlying trust model needs to be clarified. Added editor's note.
On another Nokia's comments:
Second editor's note on SMF making its decision.
Third editor's note on relation between the MMS and slices needs further clarification according to the response LS.
| revised | No | S3‑162110 | |||
S3‑162110 | Isolation of slices using UP security terminating in the network | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑161729 | |||
S3‑161740 | Solution for Security Mechanism Differentiation for Network Slices | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | Yes |
YesUsing a similar editor's note as in 987.
| revised | No | S3‑162111 | ||||
S3‑162111 | Solution for Security Mechanism Differentiation for Network Slices | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | - | Yes |
Yes
| approved | No | S3‑161740 | |||
S3‑161741 | Network authentication supporting network slices | Huawei, Hisilicon | pCR | Yes |
YesNokia: It should aligned with the SA2 architecture solution. An editor's note was agreed for this.
| revised | No | S3‑162112 | ||||
S3‑162112 | Network authentication supporting network slices | Huawei, Hisilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161741 | |||
S3‑161789 | Slice authentication | Huawei, Hisilicon | pCR | Yes |
Yes
| revised | No | S3‑162113 | ||||
S3‑162113 | Slice authentication | Huawei, Hisilicon | pCR | - | Yes |
YesEditor's note on aligning with the SA2 architecture.
| approved | No | S3‑161789 | |||
S3‑161961 | Comments on contribution S3-161789 | Nokia | discussion | Approval | Yes |
YesThe Chair commented that the criteria to put this in phase two hasn't been agreed in SA3.
The goal is organize the network slice topic.
The conference call on NxtGen will also deal with this (prioritization and scope of work).
| noted | No | ||||
S3‑161903 | PCO based User Authentication and authorization for Slice access | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
8.6.9 | Relay security | S3‑161696 | Potential security requirements on Relay | Huawei, HiSilicon | pCR | Approval | Yes |
YesThis topic will go for phase 2.
| noted | No | ||
S3‑161695 | A mutual authentication and session key generation scheme between remote UE and Network over the relay | Huawei, HiSilicon | pCR | Approval | Yes |
YesThis topic will go for phase 2.
| noted | No | ||||
8.6.10 | Network domain security | S3‑161949 | Authorization requirements for communication between network elements | Huawei, Hisilicon | pCR | Yes |
Yes
| approved | No | |||
S3‑161896 | Resolving EN in solution 10.2 | Nokia | pCR | Yes |
Yes
| revised | No | S3‑162115 | ||||
S3‑162115 | Resolving EN in solution 10.2 | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑161896 | |||
S3‑161684 | Authorization requirements for communication between network elements | Huawei, Hisilicon | pCR | Yes |
No
| withdrawn | Yes | |||||
8.6.11 | Security visibility and configurability | S3‑161791 | UE configuration of key and identifier refresh | LG Electronics France | pCR | Approval | Yes |
YesEricsson proposed an editor's note on the malfunctioning of the UE overrifdign the network settings.
Nokia: what do we have to say something beyond the security provided by the network? An UE can say that I have app that "needs this security parameters and if your network doesn't support this capability I wont connect to it". An editor's note was added to address this issue.
Vodafone:"ability to trigger a refresh of security keys". What keys? I don’t want to apply it to all keys.
LG: it's copied from a key issue. The original key issue must be changed as well, then.
Deutsche Telekom: change the radio interface keys for something more clear.
It was decided to state that the original key issue needed to be fixed.
| revised | No | S3‑162116 | |
S3‑162116 | UE configuration of key and identifier refresh | LG Electronics France | pCR | Approval | Yes |
Yes
| approved | No | S3‑161791 | |||
8.6.12 | Credential provisioning | S3‑161714 | Updates to Remote credential provisioning – Add Headless IoT device to existing user’s MNO subscription | Intel Corporation (UK) Ltd | pCR | Approval | Yes |
YesNokia: the device needs to be configured with a certificate. This was added.
Added an editor's note on the evolution part as proposed by Dragan from Oberthur: impact on low power devices.
| revised | No | S3‑162117 | |
S3‑162117 | Updates to Remote credential provisioning – Add Headless IoT device to existing user’s MNO subscription | Intel Corporation (UK) Ltd | pCR | Approval | Yes |
Yes
| approved | No | S3‑161714 | |||
S3‑161710 | Updates to remote credential provisioning using captive portal technique | Intel Corporation (UK) Ltd | pCR | Approval | Yes |
YesOrange: one way authentication defined by SA2?
Intel: it refers to attach procedure, not authentication.
| revised | No | S3‑162118 | |||
S3‑162118 | Updates to remote credential provisioning using captive portal technique | Intel Corporation (UK) Ltd | pCR | Approval | Yes |
Yes
| approved | No | S3‑161710 | |||
S3‑161802 | Updates to Solution #12.4 on Provisioning server location | Samsung | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161803 | Updates to Solution #12.4 to detail EAP-TLS authentication procedure | Samsung | pCR | Approval | Yes |
YesVodafone: the clause is quite messy. Lot of wrong terms here. And we are adding more mess here. An editor's note on the need for reworking this was added.
Added a second Editor's note as proposed by Nokia.
| revised | No | S3‑162119 | |||
S3‑162119 | Updates to Solution #12.4 to detail EAP-TLS authentication procedure | Samsung | pCR | Approval | Yes |
Yes
| approved | No | S3‑161803 | |||
S3‑161726 | Remote Provisioning for IoT devices without Initial Credentials | Huawei, Hisilicon, CATR | pCR | Yes |
YesNumerous comments from Nokia and Vodafone. This was noted.
| noted | No | |||||
S3‑161785 | Group Provisioning for IoT devices via a Companion UE | Huawei, Hisilicon | pCR | Yes |
YesWithin scope of phase 2. For the sake of priority this topic will be treated in a later stage.
| noted | No | |||||
S3‑161866 | FS_NSA: solution for credentials provisioning | Gemalto N.V. | pCR | Approval | Yes |
YesVodafone: it seems to me that it is out of scope of 3GPP.
Gemalto: steps 3,4,5 and 6 shows that it is within scope.
Vodafone: this is what we are already doing in a network attach with the current IMSI, not a change whatsoever.
Heiko (Morpho): pre- deployment in the manufacturer phase, what is the benefit here instead of providing with the normal 3GPP subscription?
Klaus: I don’t see the benefit of this either.
NTT-Docomo: I would rather note this, but we can have an editor's note in the evaluation.
Orange: I cannot agree with this kind of solution due to business implications.
Gemalto: but that is part of the evaluation part.
| noted | No | ||||
S3‑161859 | New solution: Network access for credentials provisioning | Ericsson | pCR | Yes |
YesVodafone: how is this preeventing DoS attacks?I'd like to see that.I need to know some clarifications and benefits of this solution. I'm not against the solution.
Gemalto: is this a massive IoT topic? Vodafone: remote provisioning is a Massive IoT topic.
Several companies denied this.
Ericsson agreed to add more details for Vodafone.
Ericsson: remote provisioning is generic, where is it pinpointed that this belongs to Massive IoT.
Vodafone: key issue is from the factory use case, IoT related. Ericsson commented that these are two different use cases.
The Chair commented that IoT can be either a massive IoT topic or not. And those which do not belong to Massive IoT are handled with higher priority,in this phase. It was noted that the next conference call would clarify the work in phases.
| revised | No | S3‑162120 | ||||
S3‑162120 | New solution: Network access for credentials provisioning | Ericsson | pCR | - | Yes |
Yes
| approved | No | S3‑161859 | |||
S3‑161739 | Discussion on provisioning of credentials | Qualcomm Incorporated | discussion | Discussion | Yes |
YesVodafone: add also bootstrap credentials. A profile that is in there for the purpose of pre-provision.
Orange: does this impact the SA2 architecture?
Qualcomm: this is triggered by a LS from SA2. It's irrelevant to this paper.
Alf (NTT-Docomo: this will impact SA2 architecture. Attach procedure should include authentication.
Intel: no common understanding of what SA1 meant with "no provision".
Vodafone: it doesn't mean that the provision is not there.
The Chair commented that it was understood here that the UE needs to be authenticated, just include that in the response LS.
| noted | No | ||||
S3‑161727 | Remote Provisioning for IoT devices without Initial Credentials | Huawei, Hisilicon, CATR | pCR | No |
No
| withdrawn | Yes | |||||
8.6.13 | Interworking and migration | S3‑161718 | Possible Handover scenarios within NextGen networks | NEC EUROPE LTD | discussion | Information | Yes |
Yes
| noted | No | ||
S3‑161671 | Clarify the meaning of “no interworking with GSM/GPRS, UMTS” | Huawei, Hisilicon | pCR | Yes |
YesHuawei: the interworking is not clear.
The Chair commented that in case SA2 decided to go this way SA3 should tell them to be careful.
ORANGE: where is this written?
The Chair commented that this is not essential now. Huawei should show this to the other groups before SA3 can take action on it.
| noted | No | |||||
S3‑161840 | Update on security area interworking and migration | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑162121 | |||
S3‑162121 | Update on security area interworking and migration | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161840 | |||
S3‑161629 | pCR to TR 33.899: Proposal of key issue and solution for option 3 | NEC EUROPE LTD | pCR | Approval | Yes |
YesOrange: Reason for having always the UP always integrity protected?
The requirement mentioning this was removed.
Ericsson: option 3 belongs already to RAN's key issues. Many parts of the solution are more in RAN scope than SA3 scope.
| revised | No | S3‑162131 | |||
S3‑162131 | pCR to TR 33.899: Proposal of key issue and solution for option 3 | NEC EUROPE LTD | pCR | Approval | No |
Yes
| left for email approval | No | S3‑161629 | |||
S3‑161844 | 5G interworking - key issue on bidding down attack was S3-161394 | Nokia | pCR | Approval | Yes |
YesEricsson: formulate the requirements less solution centric.
Second requirement goes away, the first requirement had some part of it moved to the solutions.
| revised | No | S3‑162132 | |||
S3‑162132 | 5G interworking - key issue on bidding down attack was S3-161394 | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑161844 | |||
S3‑161628 | pCR to TR 33.899 Handover procedure for NextGen | NEC EUROPE LTD | pCR | Approval | Yes |
YesEricsson: there are points out of scope of SA3, they belong to RAN.
Mandatory key change during handover seems to be mandated, this should be studied.
The terminology should also be aligned with the RAN groups (NG (R) AN).
| revised | No | S3‑162133 | |||
S3‑162133 | pCR to TR 33.899 Handover procedure for NextGen | NEC EUROPE LTD | pCR | Approval | No |
Yes
| left for email approval | No | S3‑161628 | |||
S3‑161627 | pCR to TR 33.899 Update of Key Issue 13.1 Security for Handover | NEC EUROPE LTD | pCR | Approval | No |
No
| withdrawn | Yes | ||||
8.6.14 | Small data | S3‑161872 | Small data security area introduction | Ericsson | pCR | Yes |
Yes
| not treated | No | |||
S3‑161698 | Clarification of requirements for preventing user plane DoS attack | Huawei, HiSilicon | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161874 | Key issues in Small data | Ericsson | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161871 | Key issue for Small data | Ericsson | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161781 | Small Data Protection | Huawei, HiSilicon, | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161663 | Small data security solution connectionless access | Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑161746 | Restrict frequency and amount of small data | Huawei, Hisilicon | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161677 | A security solution for small user data transfer via control plane | Huawei, HiSilicon | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161683 | A Ticket-Based Solution for Small Data Transmission in User Plane | Huawei, HiSilicon | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161794 | A Client-Puzzle-Based Dos Attack Defense Approach for mIoT Infrequent Small Data Transmission | Huawei, Hisilicon, | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161857 | Optimized Re-authentication mechanism | KPN | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑161869 | Security solution for Infrequent Small Data | Ericsson | pCR | Yes |
Yes
| not treated | No | |||||
S3‑161795 | A Client-Puzzle-Based Dos Attack Defense Approach for mIoT Infrequent Small Data Transmission | Huawei, Hisilicon, | pCR | No |
No
| withdrawn | Yes | |||||
8.6.15 | Broadcast/Multicast security |   | ||||||||||
8.6.16 | Management Security | S3‑161787 | adding the new key issue in the section 5.16.3 of TR33.899 v0.3 | China Mobile Com. Corporation | pCR | Approval | Yes |
YesVodafone: we support the filtering of child pornography but this is out of scope of SA3. This is content filtering.
The definition of what should be filtered is also out of scope.
Orange: The calling ID requirement is related to an IMS feature,not 5G.
| noted | No | ||
S3‑161809 | Network slice life-cycle security | Huawei, Hisilicon | pCR | Yes |
YesVodafone: addition of key issues and security areas. Adding new key issues in this Release isn't going to be closing this specification. We don’t have time.
Orange: where are the APIs coming from? Any SA2 spec?
Huawei couldn’t find the reference. It was decided to add an editor's note.
| revised | No | S3‑162134 | ||||
S3‑162134 | Network slice life-cycle security | Huawei, Hisilicon | pCR | - | No |
Yes
| left for email approval | No | S3‑161809 | |||
S3‑161810 | Network slice life-cycle security | Huawei, Hisilicon | pCR | No |
No
| withdrawn | Yes | |||||
8.6.17 | Cryptographic algorithms | S3‑161847 | The Impact of Quantum Computers and Post Quantum Cryptography | Ericsson | discussion | Discussion | Yes |
Yes
| noted | No | ||
S3‑161851 | Update of Key issue #17.2: Quantum safe cryptography | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑162135 | |||
S3‑162135 | Update of Key issue #17.2: Quantum safe cryptography | Ericsson | pCR | Approval | No |
YesUS Chamber of Commerce: we cannot wait until the quantum computers arrive.
Huawei: UE capabilities should be taken into consideration.
| left for email approval | No | S3‑161851 | |||
S3‑161893 | pCR to TR 33.899: Quantum safe cryptography solutions | VODAFONE Group Plc | pCR | Approval | Yes |
YesGemalto: OTA is mentioned, we also have remote management defined by GSMA.
Vodafone: the GSMA one is not mentioned in 3GPP documents.
| approved | No | ||||
8.6.18 | Other | S3‑161944 | LS reply on 5G work alignment | S2-166238 | LS in | Yes |
YesFloren commented that SA2 will change the attached document, so this should be taken into account.
| noted | No | |||
S3‑161947 | Reply LS on Cooperation on NGS FMC | SP-160743 | LS in | Yes |
Yes
| noted | No | |||||
S3‑161924 | LS OUT on NFV-based solutions for next generation mobile networks | ETSI ISG NFV | LS in | Yes |
YesVodafone supported the cooperation with ISG NFV. A response stating that SA3 is looking into it with a study.
Ericsson clarified that SA3 is still looking whether it is worth working on NFV security or not, this should be explained in the response.
Deutsche Telekom: not good to send an LS now since they haven’t started any work and we have no conclusions here.
It was agreed to reply this LS during the next meeting.
Heiko (Morpho) commented that other groups like SA,SA2,SA5 are being sent this LS and they may reply. This will be seen in SA plenary as well and the SA3 Chair will bring up this issue in SA#74 that SA3 will take it into consideration and reply.
| postponed | No | |||||
S3‑161929 | LS to 3GPP SA3 on PII protection in the mobile and 5G networks | ETSI TC CYBER | LS in | Yes |
YesColin (CESG) commented that this WID was initiated by Telecom Italia, but they were not present in the meeting. There were no comments to this LS from the delegates.
| noted | No | |||||
S3‑161942 | LS on "Attach procedure for Remote SIM Provisioning” | S2-165437 | LS in | Yes |
YesTim (Vodafone) commented that there are some solutions in the NextGen TR but SA3 was not ready to give a response to SA2 for this meeting.
Nokia didn’t see clearly what SA2 was asking for. Morpho noted that the wording is a bit confusing.
Orange agreed that the requirement given by SA1 was confusing.
Qualcomm proposed to work on a response for this meeting and see if this could be agreed to be sent.
| replied to | No | |||||
S3‑161966 | Reply to: LS on "Attach procedure for Remote SIM Provisioning” | Qualcomm | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑161945 | LS on “Next Generation” Security Requirements | SA3-LI | LS in | Yes |
YesVodafone commented that this would be useful to be included in TR 33.899.
Qualcomm: create a contribution for the next meeting.
Nokia: we have identities other than humans now (e.g. cars), so has LI considered this?
BT: vehicles that cannot be targeted would be not sold in some countries.The requirement does extend to non human entities.
| noted | No | |||||
S3‑161923 | Request to SA3 to take the 3GPP TR 33.899 study item forward as a work item for Release 15 | Mobile Manufacturers Forum | LS in | Yes |
YesNick (Blackberry) presented this contribution.
MMF would like SA3 to progress work in Key Issue 2.4: Equipment Identifier Authentication work and is willing to cooperate with them.
It was commented that there wasn't much to say now, just that SA3 is working on it. Sander (KPN) proposed to check if all these requirements are captured in our key issue for the next meeting.
Blackberry proposed to work on a response.
| replied to | No | |||||
S3‑161967 | Reply to: Request to SA3 to take the 3GPP TR 33.899 study item forward as a work item for Release 15 | Blackberry | LS out | approval | No |
Yes
| approved | No | ||||
S3‑161676 | DoS from External Network | Huawei, HiSilicon | pCR | Yes |
Yes
| revised | No | S3‑162136 | ||||
S3‑162136 | DoS from External Network | Huawei, HiSilicon | pCR | - | Yes |
Yes
| approved | No | S3‑161676 | |||
S3‑161640 | Discussion on key-free secured pairing and protected radio access to network | THALES | discussion | Yes |
Yes
| not treated | No | S3‑161427 | ||||
S3‑162019 | Use Cases from TR 22.862 (Enablers for Critical Communications) | 3GPP SA1 | discussion | Presentation | Yes |
YesSlides from the joint session between SA1 and SA3.
| noted | No | ||||
S3‑162122 | Base document for discussion of priorisation of key issues Zugenmaier, Alf tdoc number 09:30 18 KB | NTT-Docomo | discussion | discussion | Yes |
YesConference calls to be held:
- RAN2 light connection. Nokia takes the lead.
- DONAS.
- BEST normative work. Vodafone.
- NSA topics after the prioritzation call.
Calls to be held by End of November, beginning of December.
This document will be discussed during the conference calls.
| noted | No | ||||
S3‑162137 | Minutes from joint SA1/SA3 meeting | MCC | report | Information | No |
Yes
| noted | No | ||||
S3‑162138 | TR 33.899 | Ericsson | draft TR | Approval | No |
Yes
| left for email approval | No | ||||
S3‑162139 | Short notes from Joint session SA1-SA3 | SA1 WG Chair | report | Information | No |
Yes
| noted | No | ||||
8.7 | Study on Mission Critical Security Enhancements (FS_MC_Sec) | S3‑161647 | [MC_Sec] Key Issue on Multiple Security Domains | CESG (NCSC) | pCR | Approval | Yes |
Yes
| revised | No | S3‑161985 | |
S3‑161985 | [MC_Sec] Key Issue on Multiple Security Domains | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | S3‑161647 | |||
S3‑161648 | [MC_Sec] Solution on Multiple Security Domains | CESG (NCSC) | pCR | Approval | Yes |
Yes
| revised | No | S3‑161986 | |||
S3‑161986 | [MC_Sec] Solution on Multiple Security Domains | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | S3‑161648 | |||
S3‑161621 | pCR 33.880 MCVideo and MCPTT common requirements | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161610 | pCR 33.880 MCVideo proposal | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
YesMCC commented that the text in the spec should release agnostic regardless of it being a TR. All references to Releases need to be removed.
Tim (Motorola) warned that any change in the Rel-13 version of MCPTT will have to be taken to Rel-14 with pCRs.
| revised | No | S3‑162001 | |||
S3‑162001 | pCR 33.880 MCVideo proposal | Motorola Solutions Danmark A/S | pCR | Approval | Yes |
Yes
| approved | No | S3‑161610 | |||
S3‑161649 | [MC_Sec] Key Issue on MCData SDS Security | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161650 | [MC_Sec] Solution for MCData SDS key management within signalling | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑161651 | [MC_Sec] Solution for MCData SDS key management alongside messages | CESG (NCSC) | pCR | Approval | Yes |
Yes
| revised | No | S3‑162004 | |||
S3‑162004 | [MC_Sec] Solution for MCData SDS key management alongside messages | CESG (NCSC) | pCR | Approval | Yes |
Yes
| approved | No | S3‑161651 | |||
S3‑162002 | Alignment with Rel-13 | CESG | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑162003 | LS on MC data prioritization and questions | Motorola Solutions | LS out | Approval | Yes |
Yes
| approved | No | ||||
S3‑162005 | TR 33.880 | CESG | draft TR | Approval | Yes |
Yes
| approved | No | ||||
8.8.1 | Study on Subscriber Privacy Impact in 3GPP (SPI) |   | ||||||||||
8.8.2 | Security Assurance Specification for 3GPP network product classes (33.926) (SCAS) | S3‑161931 | NESAS Pilot Release Documents | GSMA SECAG | LS in | Yes |
YesIt was encouraged to provide feedback to SA3 or directly to GSMA.
| noted | No | |||
8.8.3 | Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices | S3‑161880 | BEST: Clarifying potential impact of Solution 8 on PGW | Nokia, Vodafone | CR | Approval | Yes |
Yes
| not treated | No | ||
S3‑161950 | solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | CR | Yes |
Yes
| revised | No | S3‑161995 | ||||
S3‑161995 | solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | CR | - | Yes |
Yes
| not treated | No | S3‑161950 | |||
S3‑161951 | How solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | discussion | Discussion | Yes |
Yes
| not treated | No | ||||
8.8.4 | Other study items | S3‑161742 | New SID on security aspect of architecture enhancements to ProSe UE-to-Network Relay | Huawei, Hisilicon | SID new | Yes |
Yes
| revised | No | S3‑162104 | ||
S3‑162104 | New SID on security aspect of architecture enhancements to ProSe UE-to-Network Relay | Huawei, Hisilicon | SID new | - | No |
Yes
| not treated | No | S3‑161742 | |||
S3‑161790 | Discussion on a method to prevent fake base stations | China Mobile Com. Corporation | discussion | Discussion | Yes |
Yes
| not treated | No | ||||
9 | Review and Update of Work Plan | S3‑161603 | SA3 Work Plan | MCC | Work Plan | Yes |
Yes
| noted | No | |||
S3‑161606 | Work Plan input from Rapporteurs | MCC | other | Yes |
Yes
| revised | No | S3‑162125 | ||||
S3‑162125 | Work Plan input from Rapporteurs | MCC | other | - | No |
Yes
| noted | No | S3‑161606 | |||
10 | Future Meeting Dates and Venues | S3‑161605 | SA3 meeting calendar | MCC | other | Yes |
YesMCC pointed out that the 2018 dates should be decided during the next SA3 meeting.
| noted | No | |||
11 | Any Other Business |   |