Tdoc List
2016-11-14 11:07
TDoc | Title | Source | Type | For | Agenda | Avail | Treated | Decision | Wdrn | Replaced-by | Replaces |
---|---|---|---|---|---|---|---|---|---|---|---|
S3‑161600 | Agenda | WG Chairman | report |
2Approval of Agenda and Meeting Objectives
| Yes |
YesGuenther (Nokia) commented that Rel-14 for stage 2 has been finished. 5G topics are headed towards Rel-15 to be more precise.
| revised | No | S3‑161963 | ||
S3‑161601 | Report from SA3#84 | MCC | report |
4.1Approval of the report from SA3#84 and SA3#84 bis
| Yes |
Yes
| approved | No | |||
S3‑161602 | Report from SA3 Adhoc NextGen | MCC | report |
4.1Approval of the report from SA3#84 and SA3#84 bis
| Yes |
Yes
| revised | No | S3‑161964 | ||
S3‑161603 | SA3 Work Plan | MCC | Work Plan |
9Review and Update of Work Plan
| Yes |
Yes
| noted | No | |||
S3‑161604 | Report from last SA meeting | WG Chairman | report |
4.2Report from SA #73
| Yes |
Yes
| noted | No | |||
S3‑161605 | SA3 meeting calendar | MCC | other |
10Future Meeting Dates and Venues
| Yes |
YesMCC pointed out that the 2018 dates should be decided during the next SA3 meeting.
| noted | No | |||
S3‑161606 | Work Plan input from Rapporteurs | MCC | other |
9Review and Update of Work Plan
| Yes |
Yes
| revised | No | S3‑162125 | ||
S3‑161607 | pCR adding the security requirements of minimized kernel network functions in the section 4.3.3.1.2 of TS33.250 | CATR | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| approved | No | |||
S3‑161608 | Solution for independent RAN keys | ZTE Corporation | pCR | Approval |
8.6.3Security context and key management
| Yes |
YesTIM proposed to add an editor's note on whether CA is needed for this solution.
Nokia: Performance problems when having an additional AKA process.
Nokia didn’t see the purpose of using a public key ( figure 5.3.4.y.2.1-1). They questioned the requirement on which this is based. There is no such requirement.
Deutsche Telekom commented that the key issue addresses a different problem. Stefan agreed with Guenther.
| noted | No | ||
S3‑161609 | Adding the security requirements of user plane traffic differentiation | ZTE Corporation | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesTIM: the desccription could be better described, otherwise it will be difficult to reproduce the test case. An editor's note was agreed to address this issue later.
NEC: expected format of evidence TBD.
Nokia had a problem with the requirement mentioning APNs. Is this coming from a SA2 spec?
It was agreed to add an editor's note on the pending reference to SA2.
| revised | No | S3‑162050 | |
S3‑161610 | pCR 33.880 MCVideo proposal | Motorola Solutions Danmark A/S | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
YesMCC commented that the text in the spec should release agnostic regardless of it being a TR. All references to Releases need to be removed.
Tim (Motorola) warned that any change in the Rel-13 version of MCPTT will have to be taken to Rel-14 with pCRs.
| revised | No | S3‑162001 | |
S3‑161611 | Key issue #7.y: Need to protect entire Permanent Identifier | INTERDIGITAL, THALES | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesVodafone and Qualcomm didn’t agree with this.
Thales: this key issue covers a very important issue in 5G.
Vodafone: it's already in the document.
Ericsson: some solutions didn’t cover the routing information. Vodafone was fine with this.
Nokia: all solutions that protect the country code would be out of the table if we accept this. An editor's note was added for this.
Alf (NTT Docomo): what kind of attack is it in here?
Interdigital: passive attack over the air.
Qualcomm: too early to agree on this requirement. Wait for evaluation.
| revised | No | S3‑162100 | S3‑161455 |
S3‑161612 | Skeleton of TS 33.180 | CESG (NCSC) | draft TS | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161613 | pCR 33.180 clause 3 | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161614 | pCR 33.180 clause 6 | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161615 | pCR 33.180 Annex B | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| revised | No | S3‑162030 | |
S3‑161616 | pCR 33.180 Annex C | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161617 | pCR 33.180 pCR clause 5 | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| revised | No | S3‑161969 | |
S3‑161618 | Solution #6.x: Dynamic Authorization by Operator/MNO | INTERDIGITAL COMMUNICATIONS | pCR | Agreement |
8.6.6Authorization
| Yes |
YesNokia: hard to have this in the current architecture being defined in SA2.
It was agreed to add an editor's note on the flow.
Qualcomm: example of dynamic service?
Interdigital: you are attached in a slice, you request a new service and then you attach to another slice.
| revised | No | S3‑162097 | |
S3‑161619 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Agreement |
8.6.6Authorization
| Yes |
Yes
| revised | No | S3‑162076 | |
S3‑161620 | pCR for adding solution to key issue #7.2 : Concealing permanent or long-term subscriber identifier with opportunistic encryption | THALES | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161405 | |
S3‑161621 | pCR 33.880 MCVideo and MCPTT common requirements | Motorola Solutions Danmark A/S | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑161622 | Adding BEST Service to TS 33.401 | KPN, Vodafone | CR | Agreement |
7.3 Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
| Yes |
Yes
| revised | No | S3‑161849 | |
S3‑161623 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161624 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161625 | pCR to TR 33 899 Initial attach procedure for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | ||
S3‑161626 | pCR to TR 33.899 Security Mode procedure for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
YesEricsson: Termination point for NAS protocol is still in the end function and now we propose to take it to the SEAF.
Orange didn’t have it clear either and it was decided to note the document.
| noted | No | ||
S3‑161627 | pCR to TR 33.899 Update of Key Issue 13.1 Security for Handover | NEC EUROPE LTD | pCR | Approval |
8.6.13Interworking and migration
| No |
No
| withdrawn | Yes | ||
S3‑161628 | pCR to TR 33.899 Handover procedure for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.13Interworking and migration
| Yes |
YesEricsson: there are points out of scope of SA3, they belong to RAN.
Mandatory key change during handover seems to be mandated, this should be studied.
The terminology should also be aligned with the RAN groups (NG (R) AN).
| revised | No | S3‑162133 | |
S3‑161629 | pCR to TR 33.899: Proposal of key issue and solution for option 3 | NEC EUROPE LTD | pCR | Approval |
8.6.13Interworking and migration
| Yes |
YesOrange: Reason for having always the UP always integrity protected?
The requirement mentioning this was removed.
Ericsson: option 3 belongs already to RAN's key issues. Many parts of the solution are more in RAN scope than SA3 scope.
| revised | No | S3‑162131 | |
S3‑161630 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | ||
S3‑161631 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
YesNokia: keep the second editor's note (end of document). NEC agreed.
Changes in the table as proposed by Morpho.
Isolation aspect was taken offline.
| revised | No | S3‑161980 | |
S3‑161632 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
YesNokia: we need to keep open the editors note on RAN slicing if they are still discussing it.
Oberthur didn’t agree with removing the last editor's note (RAN network slicing).
First editor's note gets extended, third one comes back.
The fourth editor's note had to be taken offline.
| revised | No | S3‑161977 | |
S3‑161633 | pCR to TR 33 899 Attach procedure for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
YesThis wasn't clear to several companies like Nokia and Huawei. LG proposed to associate a key issue with this proposal.
There wasn't much support finally and it was noted.
| noted | No | ||
S3‑161634 | Adding requirement on unpredictable Charging ID | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesEricsson: the concept of unpredictable is not defined in the spec. This should be clarified.
Huawei proposed to use "random" instead.
TIM: bringing "random" causes certain issues that we want to avoid.
| noted | No | ||
S3‑161635 | Adding test case on the uniqueness of the Charging ID deriving from the 3GPP specifications | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| revised | No | S3‑162051 | |
S3‑161636 | Adding requirement within 3GPP TR 33.250 on unpredictable TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesEricsson pointed out the unpredictability as previous contributions.
Ericsson: we don’t have a threat. Should we write the requirement and then find the threat? Is this the process?
TIM: start a threat analysis to find whether the requirement is correct.
TIM will bring a description for the next time. This was noted.
| noted | No | ||
S3‑161637 | Adding requirement on the uniqueness of GTP TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesEricsson pointed out the TEID uniqueness issue and others that were already found in TIM's previous contributions.
| revised | No | S3‑162052 | |
S3‑161638 | Detailing clauses 4.2.1, 4.2.3.1 and 4.3.1 | TELECOM ITALIA S.p.A. | CR | Approval |
7.1.1Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3)
| Yes |
Yes
| revised | No | S3‑162049 | |
S3‑161639 | pCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-term identifiers based on channel estimation | THALES | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesVodafone: biggest problem of changing identifiers is that some system don’t bother changing them. This is about generating random numbers. Not in the scope of 3GPP to define how to generate a random number.
Ericsson: some processing is needed here, not good.
Add an editor's note on further clarification needed, how the process can improve the refreshment time of the temporal identifier.
Vodafone: the advantage of this over existing mechanishms is for further study.
Huawei: An attacker near the received can have a good channel estimation.
| revised | No | S3‑162101 | S3‑161404 |
S3‑161640 | Discussion on key-free secured pairing and protected radio access to network | THALES | discussion |
8.6.18Other
| Yes |
Yes
| not treated | No | S3‑161427 | ||
S3‑161641 | New privacy solution for concealing permanent subscriber identifier | TELECOM ITALIA S.p.A., Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesColin (CESG) commented that this is related to the LS from TC CYBER, which could be noted.
Alex (BT): add in the second bullet of the evaluation clause "this is subject to the correct key provided to the serving network".
| revised | No | S3‑162108 | |
S3‑161642 | Adding support of EAP Re-Authentication Protocol for WLAN Interworking (TWAN) | ORANGE | CR | Agreement |
7.4Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP)
| Yes |
YesAlf: Lack of normative verbs: shalls and shoulds.
Orange: This CR is for trusted access.
Ericsson: are we to widen up to WLAN?
Nokia: this is beyond the scope of our WID.
Ericsson: Is this run by IKEv2?
| revised | No | S3‑162020 | |
S3‑161643 | [MC_Sec] Baseline for 33.180 | CESG (NCSC) | draft TS | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161644 | [MCX] Proposed Mapping of 33.179 into 33.180 | CESG (NCSC) | discussion | Discussion |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| noted | No | ||
S3‑161645 | [MC_Sec] Scope for 33.180 | CESG (NCSC) | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161646 | [MC_Sec] Clean up of Clause 5.2 | CESG (NCSC) | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| No |
No
| withdrawn | Yes | ||
S3‑161647 | [MC_Sec] Key Issue on Multiple Security Domains | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| revised | No | S3‑161985 | |
S3‑161648 | [MC_Sec] Solution on Multiple Security Domains | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| revised | No | S3‑161986 | |
S3‑161649 | [MC_Sec] Key Issue on MCData SDS Security | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑161650 | [MC_Sec] Solution for MCData SDS key management within signalling | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑161651 | [MC_Sec] Solution for MCData SDS key management alongside messages | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| revised | No | S3‑162004 | |
S3‑161652 | Clarification on the use of MKFC | CESG (NCSC) | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | ||
S3‑161653 | [MCPTT] Clarifying the protection of media control within 33.179 | CESG (NCSC) | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | ||
S3‑161654 | draft_CR to 33.401 Correct Reference to NAS Spec in 8.2 | Nokia | CR |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| revised | No | S3‑162090 | ||
S3‑161655 | draft_reply LS to R2-167293 using S-TMSI in RAN Paging | Nokia | LS out | Approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesNTT-Docomo: is this the same as regular paging? Now it's using the IMSI.
| noted | No | ||
S3‑161656 | draft_reply LS to R2-167296 RRC Connection Re-Establishment for NB-IoT (DoNAS) | Nokia | LS out | Approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| noted | No | ||
S3‑161657 | draft_ Reply LS to R3-162642 on Light Connection | Nokia | LS out | Approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| revised | No | S3‑162087 | |
S3‑161658 | Discussion paper on broadcast messages with digital signature | Nokia | discussion | Discussion |
8.6.4RAN security
| Yes |
Yes
| noted | No | ||
S3‑161659 | Verification of gNB using UL monitoring and System Query | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162083 | |
S3‑161660 | Evaluation of digital signature solution 5.4.4.1 | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| approved | No | ||
S3‑161661 | Evaluation of digital signature solution 5.4.4.2 | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162130 | |
S3‑161662 | Additions to Security aspects of dual connectivity | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| approved | No | ||
S3‑161663 | Small data security solution connectionless access | Nokia | pCR | Approval |
8.6.14Small data
| Yes |
Yes
| not treated | No | ||
S3‑161664 | Privacy Protection for EAP-AKA and EAP-AKA’ | Apple (UK) Limited | discussion | Discussion |
7.6.1SAE/LTE Security
| Yes |
YesVodafone: we should think of other solutions.
Apple: we are not changing the routing.
Nokia commented that it was better to wait until we have other solutions since it would be strange to have different solutions for V2X and 5G for example.
Vodafone: we may end up predetermining something in 5G because we used it in LTE.
Apple: this is affecting an actual problem, there is some emergency.
Vodafone: solutions exist, but no standard solutions exist, so there is no such emergency.
It was decided to wait a bit and make a decision when V2X and 5G progress further.
Qualcomm: IMSI privacy problem also exists when the UE connects in the cellular network. E.g. false base station attack.
| noted | No | ||
S3‑161665 | Privacy Protection for EAP-AKA and EAP-AKA’ | Apple (UK) Limited | CR | Approval |
7.6.1SAE/LTE Security
| Yes |
Yes
| revised | No | S3‑161666 | |
S3‑161666 | Privacy Protection for EAP-AKA | Apple (UK) Limited | CR | Approval |
7.6.1SAE/LTE Security
| Yes |
Yes
| not pursued | No | S3‑161665 | |
S3‑161667 | Clarification on Solution#1.1 and #1.3 | Huawei, Hisilicon | pCR |
8.6.1Security architecture
| Yes |
Yes
| revised | No | S3‑161975 | ||
S3‑161668 | Introduce D-H algorithm negotiation method in Solution #3.1 | Huawei, Hisilicon | pCR |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | |||
S3‑161669 | Add a new requirement in KI 2.1 | Huawei; Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesVodafone didn’t agree with the change proposed here. We already satisfy this requirement in 3G, this is not needed in a 5G study.
Huawei: we don’t have the concept of phase one or two in SA3, so this is still applicable.
Broadcom: this is part of phase one.
| noted | No | |||
S3‑161670 | A solution for un-trusted non-3GPP access | Huawei; Hisilicon | pCR |
8.6.2Authentication
| Yes |
Yes
| revised | No | S3‑161992 | ||
S3‑161671 | Clarify the meaning of “no interworking with GSM/GPRS, UMTS” | Huawei, Hisilicon | pCR |
8.6.13Interworking and migration
| Yes |
YesHuawei: the interworking is not clear.
The Chair commented that in case SA2 decided to go this way SA3 should tell them to be careful.
ORANGE: where is this written?
The Chair commented that this is not essential now. Huawei should show this to the other groups before SA3 can take action on it.
| noted | No | |||
S3‑161672 | introduce algorithms negotiation call flow | HUAWEI TECHNOLOGIES Co. Ltd. | pCR |
8.6.3Security context and key management
| Yes |
YesBroadcom: what is SSF?
Huawei: currently defined in SA2. This is defined in one of their solutions.
Nokia: Details on Security capabilities sent in the auth response are needed. This was added in an editor's note.
| revised | No | S3‑162036 | ||
S3‑161673 | A solution for key negotiation in dual connectivity scenario | Huawei, HiSilicon | pCR |
8.6.3Security context and key management
| Yes |
YesNokia didn't agree with this proposal: there is overhead on this solution.
Alf: Not enough details on the Random numbers to be sent in the D-H. This also may need a bigger computational power.
TIM: the D-H could have an impact on the radio.
| revised | No | S3‑162037 | ||
S3‑161674 | Security of NAS signallings before security activation | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| Yes |
Yes
| approved | No | |||
S3‑161675 | Add details, threads and requirements to key issue #1.5 on security of NAS signallings before security activation | Huawei, Hisilicon | pCR |
8.6.1Security architecture
| Yes |
Yes
| approved | No | |||
S3‑161676 | DoS from External Network | Huawei, HiSilicon | pCR |
8.6.18Other
| Yes |
Yes
| revised | No | S3‑162136 | ||
S3‑161677 | A security solution for small user data transfer via control plane | Huawei, HiSilicon | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161678 | Flexible security policies negotiation in control plane | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| Yes |
YesAlf: (NTT Docomo): delete references to quantum computing.
Orange: UE aspects should be brought overall in this document. It was agreed to add an editor's note on this.
| revised | No | S3‑161973 | ||
S3‑161679 | A solution for KDF negotiation between UE and ARPF | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| Yes |
Yes
| noted | No | |||
S3‑161680 | Requirements for NG-UE | Huawei, HiSilicon | pCR |
8.6.5Security within NG-UE
| Yes |
YesOrange: still under discussion in SA1, whether to have different types of devices or not. It needs to be aligned with SA1 agreements.
Orange: what are security capabilities? Can you be more precise?
Vodafone: I don’t see having a class being an advantage.
Huawei: different devices need to have different capabilities.
Vodafone: have a class where all the devices can be tight in one place, to avoid having a huge market variation.
Huawei: hard to achieve all requirements in a single device.
Orange: we define mandatory and optional requirements.
Ericsson: add an editor's note on the progress in SA1.
NTT-Docomo: I like that the network can reject Ues based on the lack of security capabilities.
Vodafone: this exists already.
Orange didn’t agree with the threat, who says that the device doesn’t have all the security capabilities.
Klaus: IoT is for the next phase, we shouldn't go on with that.
The Chair decided to allow some reqriting and put an editor's note on alignment with SA1 to go ahead.
| revised | No | S3‑162048 | ||
S3‑161681 | Update requirement on long term identifier aspect of key issue 7.2 | Huawei, HiSilicon | pCR |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | |||
S3‑161682 | Reducing Signalling with Group Authentication | Huawei, HiSilicon | pCR |
8.6.2Authentication
| Yes |
YesOrange queried whether the gateway was a relay UE. Huawei: The gateway could be a relay UE in one of the cases.
Orange: relay Ues are in phase two in SA2, so they won’t work in phase One.
Qualcomm: note the contributions that refer to phase two, there is no time for these and we must prioritise phase one.
The Chair commented that by noting it means that they will just not be treated.
| noted | No | |||
S3‑161683 | A Ticket-Based Solution for Small Data Transmission in User Plane | Huawei, HiSilicon | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161684 | Authorization requirements for communication between network elements | Huawei, Hisilicon | pCR |
8.6.10Network domain security
| Yes |
No
| withdrawn | Yes | |||
S3‑161685 | Multiplex Authentication and Reduce NAS signalling | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesThe Chair commented that Massive IoT is in phase two.
There wasn't much support so this was noted.
| noted | No | |||
S3‑161686 | MASA supports 4G USIM | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesNokia: what is a 4G USIM?
Huawei: it's a LTE USIM.
Nokia: in LTE we can use R99/UMTS SIMs. Which one do you refer to exactly?You don’t need additional functionality to make the USIM work in LTE. Add an editor's note on the need for clarification for the term 4G USIM.
Orange: there is no HSS in 5G (looking at the figure). How does it work?
This had to be clarified in the revision.
| revised | No | S3‑161994 | ||
S3‑161687 | MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | discussion |
8.6.2Authentication
| Yes |
Yes
| noted | No | |||
S3‑161688 | pCR to TR33.899 MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesNokia had a problem with this contribution, nobody seemed to support it.
| revised | No | S3‑162022 | ||
S3‑161689 | MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| noted | No | ||
S3‑161690 | pCR to TR33.899 MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| revised | No | S3‑162023 | |
S3‑161691 | MASA NG-UE Security Capabilities Negotiation | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesOrange: Efficiency of the protocol is FFS. Lot of info is being sent to the HSS. This causes an impact by design.
| revised | No | S3‑162024 | ||
S3‑161692 | MASA - Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| Yes |
YesNoted without presentation.
| noted | No | ||
S3‑161693 | MASA - Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| No |
No
| withdrawn | Yes | ||
S3‑161694 | Value in sending NG-UE Security Capabilities to HSS | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| Yes |
YesNoted without presentation.
| noted | No | ||
S3‑161695 | A mutual authentication and session key generation scheme between remote UE and Network over the relay | Huawei, HiSilicon | pCR | Approval |
8.6.9Relay security
| Yes |
YesThis topic will go for phase 2.
| noted | No | ||
S3‑161696 | Potential security requirements on Relay | Huawei, HiSilicon | pCR | Approval |
8.6.9Relay security
| Yes |
YesThis topic will go for phase 2.
| noted | No | ||
S3‑161697 | Potential security requirements on gNB | Huawei, HiSilicon | pCR |
8.6.4RAN security
| Yes |
YesInterdigital: add root of trust to the definitions. I disagree with the second requirement, it's not only the boot-up that needs to be integrity protected. Help of root of trust doesn't need to be here. Gemalto agreed with this, it's a solution not a requirement.
Nokia: this should go to the security assurance specification, not here.
Qualcomm agreed with Gemalto: some rewording is needed in the requirements.
Deutsche Telekom suggested to use existing requirements in 33.401.
This was taken offline.
| revised | No | S3‑162041 | ||
S3‑161698 | Clarification of requirements for preventing user plane DoS attack | Huawei, HiSilicon | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161699 | Security Key Refresh Triggered by UE | Huawei, HiSilicon | pCR |
8.6.3Security context and key management
| Yes |
YesVodafone and Orange addressed the case of UE roaming in a contry that doesn’t allow confidentiality would not be allowed to use the network.
Nokia: step 4 doesn't clarify whether it is integrity protected (the policy of the home network).
Vodafone: we have the UICC and an OMA secure process for managing objects in the UE. Two processes for managing objects securely, do we need a third one?
Interdigital: is this real time? An editor's note was added on this issue.
| revised | No | S3‑162038 | ||
S3‑161700 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161701 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161702 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| Yes |
YesOrange: This is contradicting Doc 1873 agreed in proposal 2.
Nokia:it's not clear if this figure refers to the roaming case or not.
Ericsson commented that Huawei argues that the ARPF could be in the third party network.
Heiko: third party ARPF has same functionality as the normal ARPF? Does it have the same interface or we have to define a new one?
Nokia: ARPF can be in the third party session by definition.
NEC: where is the SCMF in the figures? There was no answer to this, so it was taken offline. Afterwards, the figure were changed and the text accordingly.
| revised | No | S3‑161981 | ||
S3‑161703 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161704 | Additional requirements for storage of identities | Intel Corporation (UK) Ltd | pCR | Approval |
8.6.5Security within NG-UE
| Yes |
Yes
| noted | No | ||
S3‑161705 | Clarification for Editor’s notes in Solution #2.13 | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesOrange: what is a third party ARPF? Remove" third party".
| revised | No | S3‑161993 | ||
S3‑161706 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| Yes |
YesEricsson: moving the termination point from the access network to the core network is an architecture issue that should be consulted with SA2.
Deutsche Telekom: all we care about is whether it is in the base station or not. It doesn't matter if it is the access or the core network. Double encryption was a waste of resources in LTE. Stefan agreed with these changes.
Florin (Broadcom) commented that deeper encryption for access is all right.
Nokia wanted the editor's note in 5.1.3.15.3 to stay since this was a huge decision that needs to be done by SA3. Ericsson agreed. This editor's note stayed since many companies supported it.
Broadcom discussed offline with Huawei the heterogeneous access termination point since they didn't fully agree with it.
| revised | No | S3‑161971 | ||
S3‑161707 | Additional Storage Requirements for Credentials | Intel Corporation (UK) Ltd | pCR |
8.6.5Security within NG-UE
| Yes |
YesOverlapping with 1737, 2006,1868.
Orange only agreed partly with the second last requirement.
| noted | No | |||
S3‑161708 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161709 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR |
8.6.1Security architecture
| Yes |
YesOrange didn’t agree with the second editor's note.
Huawei: the definition for flow exists in the SA2 TR.
Orange: it doesn’t, it's not precise.
Nokia: there is room for clarifications in the SA2 TR, we should keep the second editor's note.
It was agreed to keep the second editor's note.
| revised | No | S3‑161972 | ||
S3‑161710 | Updates to remote credential provisioning using captive portal technique | Intel Corporation (UK) Ltd | pCR | Approval |
8.6.12Credential provisioning
| Yes |
YesOrange: one way authentication defined by SA2?
Intel: it refers to attach procedure, not authentication.
| revised | No | S3‑162118 | |
S3‑161711 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | |||
S3‑161712 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesNokia: a separate entity like this that centralizes all policy decisions should remain as an implementation option. I don’t agree with the change now.
Orange: remove note on AUSF selection.
| revised | No | S3‑161987 | ||
S3‑161713 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR |
8.6.2Authentication
| No |
No
| withdrawn | Yes | |||
S3‑161714 | Updates to Remote credential provisioning – Add Headless IoT device to existing user’s MNO subscription | Intel Corporation (UK) Ltd | pCR | Approval |
8.6.12Credential provisioning
| Yes |
YesNokia: the device needs to be configured with a certificate. This was added.
Added an editor's note on the evolution part as proposed by Dragan from Oberthur: impact on low power devices.
| revised | No | S3‑162117 | |
S3‑161715 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR |
8.6.7Subscription privacy
| Yes |
YesEricsson: a key issue cannot be promoted into a solution, remove the references.
Nokia: no backwards compatibility?allowing the UE fall back to 4G wouldn’t help for backwards compatibility.
| revised | No | S3‑162107 | ||
S3‑161716 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR |
8.6.7Subscription privacy
| No |
No
| withdrawn | Yes | |||
S3‑161717 | Security of RRC Connection re-establishment of NB-IOT for CP Solution | Intel Corporation (UK) Ltd | discussion | Discussion |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesEricsson: the token is only used in the uplink. If the downlink is not integrity protected the UE would not know if it is attached to the eNodeB or not. I welcome opinions on this better than discussing the threat.
| revised | No | S3‑162089 | |
S3‑161718 | Possible Handover scenarios within NextGen networks | NEC EUROPE LTD | discussion | Information |
8.6.13Interworking and migration
| Yes |
Yes
| noted | No | ||
S3‑161719 | Authentication and Key Agreement for non-3GPP access | Intel Corporation (UK) Ltd | pCR |
8.6.3Security context and key management
| Yes |
YesNokia, Qualcomm and Samsung had many issues with the proposal. This was discussed offline.
| revised | No | S3‑162080 | ||
S3‑161720 | Discussion on RAN2 LS pertaining to Light Connection | Intel Corporation (UK) Ltd | discussion | Discussion |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| noted | No | ||
S3‑161721 | pCR_Update Solution #2.14 for non-AKA based Authentication | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesJuniper wanted an editor's note clarifying the last figure (especially step 5). This was agreed.
Orange: impact on the charging system is FFS. This was added in an editor's note.
| revised | No | S3‑162026 | ||
S3‑161722 | Alignment with stage 3 implementation of GPRS integrity protection | Intel Corporation (UK) Ltd | CR | Approval |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| merged | No | S3‑162085 | |
S3‑161723 | Update Solution for Security Context Management for UE with Multiple Access Technologies | Huawei, HiSilicon, CATR | pCR |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | |||
S3‑161724 | Alignment with stage 3 implementation of GPRS integrity protection | Intel Corporation (UK) Ltd | CR | Approval |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| merged | No | S3‑162084 | |
S3‑161725 | Identity-based authentication for service provider connectivity | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesNTT-Docomo: One key gone missing the whole thing is broken.
No key revocation.
Too many open issues.
| noted | No | |||
S3‑161726 | Remote Provisioning for IoT devices without Initial Credentials | Huawei, Hisilicon, CATR | pCR |
8.6.12Credential provisioning
| Yes |
YesNumerous comments from Nokia and Vodafone. This was noted.
| noted | No | |||
S3‑161727 | Remote Provisioning for IoT devices without Initial Credentials | Huawei, Hisilicon, CATR | pCR |
8.6.12Credential provisioning
| No |
No
| withdrawn | Yes | |||
S3‑161728 | Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming | Qualcomm Incorporated | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| revised | No | S3‑161978 | |
S3‑161729 | Isolation of slices using UP security terminating in the network | Qualcomm Incorporated | pCR | Approval |
8.6.8Network slicing security
| Yes |
YesHuawei: How the subscription profile is made is ffs. Created an editor's note.
Nokia: underlying trust model needs to be clarified. Added editor's note.
On another Nokia's comments:
Second editor's note on SMF making its decision.
Third editor's note on relation between the MMS and slices needs further clarification according to the response LS.
| revised | No | S3‑162110 | |
S3‑161730 | Update of solution #2.19 to clarify some editor’s notes | Qualcomm Incorporated | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | ||
S3‑161731 | pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities | Qualcomm Incorporated | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| revised | No | S3‑162039 | S3‑161437 |
S3‑161732 | pCR to update solution #7.4: Privacy enhanced Mobile Subscriber Identifier (PMSI) | Qualcomm Incorporated | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161436 | |
S3‑161733 | pCR solution to Key Issue # 4.6 User plane DoS attacks | Qualcomm Incorporated | pCR | Approval |
8.6.4RAN security
| Yes |
YesInterdigital suggested to add an editor's note on other key distribution methods could work with this solution.
MCC suggested to revise the second sentence of NOTE 1 since it includes a requirement (never to be included in informative notes) and references to 3GPP working methods. This was agreed.
KPN: the key issue here seems to be massive IoT.SA3 had agreed to postpone this topic due to lack of time. This had to be discussed offline.
| revised | No | S3‑162045 | S3‑161435 |
S3‑161734 | pCR solution to Key Issue # 3.2 on refreshing keys | Qualcomm Incorporated | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| merged | No | S3‑162035 | S3‑161434 |
S3‑161735 | pCR update of solution # 1.6 to include more details on the roaming scenario | Qualcomm Incorporated | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| revised | No | S3‑161979 | |
S3‑161736 | Enhancements to solution 3.4 | Qualcomm Incorporated | pCR | Approval |
8.6.3Security context and key management
| Yes |
YesBroadcom: the whole authentication should be detailed in a different way from what is shown here. They didn't want to have it as a separate solution.
Nokia was fine with the solution, it just needed some more sentences.
| revised | No | S3‑162040 | |
S3‑161737 | Security requirements for Key Issue # 5.1 | Qualcomm Incorporated | pCR | Approval |
8.6.5Security within NG-UE
| Yes |
Yes
| noted | No | ||
S3‑161738 | Updates to Device Certificate Enrollment in solution 2.10 | Qualcomm Incorporated | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| revised | No | S3‑162027 | |
S3‑161739 | Discussion on provisioning of credentials | Qualcomm Incorporated | discussion | Discussion |
8.6.12Credential provisioning
| Yes |
YesVodafone: add also bootstrap credentials. A profile that is in there for the purpose of pre-provision.
Orange: does this impact the SA2 architecture?
Qualcomm: this is triggered by a LS from SA2. It's irrelevant to this paper.
Alf (NTT-Docomo: this will impact SA2 architecture. Attach procedure should include authentication.
Intel: no common understanding of what SA1 meant with "no provision".
Vodafone: it doesn't mean that the provision is not there.
The Chair commented that it was understood here that the UE needs to be authenticated, just include that in the response LS.
| noted | No | ||
S3‑161740 | Solution for Security Mechanism Differentiation for Network Slices | HUAWEI TECHNOLOGIES Co. Ltd. | pCR |
8.6.8Network slicing security
| Yes |
YesUsing a similar editor's note as in 987.
| revised | No | S3‑162111 | ||
S3‑161741 | Network authentication supporting network slices | Huawei, Hisilicon | pCR |
8.6.8Network slicing security
| Yes |
YesNokia: It should aligned with the SA2 architecture solution. An editor's note was agreed for this.
| revised | No | S3‑162112 | ||
S3‑161742 | New SID on security aspect of architecture enhancements to ProSe UE-to-Network Relay | Huawei, Hisilicon | SID new |
8.8.4Other study items
| Yes |
Yes
| revised | No | S3‑162104 | ||
S3‑161743 | Allocation of FC values for BEST | KPN, Vodafone | CR | Agreement |
7.3 Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
| Yes |
Yes
| postponed | No | ||
S3‑161744 | Requirement of preventing the RRC connection resource exhausted from DOS attacks | Huawei, Hisilicon | pCR |
8.6.4RAN security
| Yes |
YesNokia: this is for massive IoT, we agreed to postpone these kind od contributions. It was agreed to note it for this reason.
| noted | No | |||
S3‑161745 | Security Architecture for Network Slicing | CATT, CATR | pCR | Approval |
8.6.8Network slicing security
| Yes |
YesIt was commented that the Visited network/Home network instead of third party is a competition for the current MVNO solutions, and also a more costly alternative.
Nokia: there are assumptions here that depend on what is decided in SA2. An editor's note for this was added.
| revised | No | S3‑162114 | |
S3‑161746 | Restrict frequency and amount of small data | Huawei, Hisilicon | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161747 | pCR to TR 33.899, radio interface user plane integrity, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| revised | No | S3‑161974 | |
S3‑161748 | pCR to TR 33.899, periodic local authentication and packet count check, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| revised | No | S3‑161976 | |
S3‑161749 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| No |
No
| withdrawn | Yes | |||
S3‑161750 | pCR to TR 33.899, radio interface user plane encryption, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
YesDiscussed with 667.
| approved | No | ||
S3‑161751 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesHuawei clarified that this works for a single operator network.
Ericsson: not clear the use case for the homomorphic encryption. An editor's note was inserted for further clarification of this.
Alex (BT): an editor's note on how this solution would support LI in the HPLMN is for further study.
CESG: fallback case is needed when re-provisioning is required. Editor's note added for this.
| revised | No | S3‑162066 | ||
S3‑161752 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| No |
No
| withdrawn | Yes | |||
S3‑161753 | pCR to TR 33.899, updating long term secret key, improvement and evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
YesMCC commented that parts of the text need to be reworded in "standards language" (use of "we", or "I" for example). Also use of "NextGen" instead of 5G.
| revised | No | S3‑162028 | |
S3‑161754 | Alternative security procedure for data transfer between UE and V2X Control Function | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesQualcomm: how tdoes he solution work when you are not connected to the 3GPP network? An editor's note was added for this.
Another editor's note on GBA was added.
| revised | No | S3‑162071 | ||
S3‑161755 | pCR to TR 33.899, session key exchange protocol, improvement and evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | ||
S3‑161756 | correction of the text in the clause 6.1.1.1.2.1 | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | |||
S3‑161757 | pCR to TR 33.899, UE requests key refresh, refinement and evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.3Security context and key management
| Yes |
YesAlf (NTT-Docomo): The requirements are operational, not security requirements.
Vodafone: we are trying to address the editor's notes, we would be happy to remove the requirements and editor's note associated.
It was agreed to add an editor's note that other solutions rather than dropping the connection should be investigated.
Qualcomm's contribution 1734 proposed an alternative that was discussed as well. It was merged with this contribution.
These changes and others proposed by NTT-Docomo were agreed.
| revised | No | S3‑162035 | |
S3‑161758 | The format definition of PDCP layer based on existing solutions for protecting the broadcast messages on PC5 interface. | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesHuawei: not a new solution, this is using PDCP.
Qualcomm: not good to say that 3GPP doesn’t like what is done in other SDOs (ETSI ITS and others) and create a disruptive solution.
| approved | No | |||
S3‑161759 | pCR to TR 33.899, UE requests temporary identifier refresh, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161760 | V2X security architecture based on the new security elements | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: you are proposing a solution here, but I'm fine with it if you move it to the right place of the spec.
Nokia: is this aligned with sA2?
Huawei: if they agree on this solution they will have to go for this one.
| revised | No | S3‑162059 | ||
S3‑161761 | pCR to TR33.899, Use of a Non removable USIM for all UE security | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
YesMCC comented that the USIM should be called "NextGen" to be aligned with the rest of the spec TR 33.899, and better start using the term "5G" for future work.
Deutsche Telekom: the solution is incomplete. An editor's note was added about identity.
Gemalto: mention quantum safe cryptography.
Qualcomm pointed out that it is referencing an ETSI SCP draft document, not formally approved. This should be taken into account in the reference.
Nokia: what is 5G NR USIM?
Vodafone: we will use NextGen USIM.
These issues were addressed offline in the revision.
| revised | No | S3‑161984 | |
S3‑161762 | Authorization procedure for V-UE acquiring radio resource from eNB | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: this is not needed, the UE is already authenticated. Qualcomm agreed.
Nokia: impact on the existing existing eNodeB specification needs to be evaluated.
| noted | No | |||
S3‑161763 | pCR to 33.899 - enhanced USIM features for 5G | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| No |
No
| withdrawn | Yes | ||
S3‑161764 | addition of recommendation section | Huawei, HiSilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesQualcomm: the solution is complete, it's already definded by another SDOs since 10 years ago.
Ericsson: are we doing evaluation on solutions in this part? This should be in the evaluation clause, this looks like you are doing an evaluation of the solutions in the TR.
Nokia: we have open issues, it's still early for this.
Alex (BT) objected to this contribution.
| noted | No | |||
S3‑161765 | pCR adding the introduction in the section 4.1 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| revised | No | S3‑162053 | |
S3‑161766 | New WID on security aspect of architecture enhancements for LTE support of V2X services | Huawei, HiSilicon | WID new |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesNormative work for V2X piggybacked in the SA2 WID proposal.
It was commented that deadline for Rel-14 was March 2017, although the spec would be approved by June 2017 (Rel 15 dates). The dates were to be seen later.
Nokia: reformulate the objectives. Nokia supports this WID as well.
| revised | No | S3‑162058 | ||
S3‑161767 | Optimized certificate-based security solution for PC5 LTE-V2X communication | Huawei, HiSilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesQualcomm didn’t agree with this contribution since some of the issues were not correct. Nokia agreed.
| noted | No | |||
S3‑161768 | pCR to TR 33.899: Evaluation of Solution #1.2, Periodic local authentication and packet count check | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| No |
No
| withdrawn | Yes | ||
S3‑161769 | pCR to TR33.899 - Solutions for Low Latency Security Issues | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
YesInterdigital: secure component is hardware or software..?
Vodafone: it's irrelevant to the solution.
An editor's note was agreed to be added.
| revised | No | S3‑161983 | |
S3‑161770 | pCR to TR33.899 - Evaluation of Solution #2.3 | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
YesNokia: Is this solution adequate for Massive IoT?
Vodafone: can't recall who put this solution, this is just an evaluation.
Nokia: Massive IoT would go for phase 2. Is the solution needed now?
It wasn't clear whether this would apply for Massive IoT.
| approved | No | ||
S3‑161771 | pCR adding the security requirements of traffic separation in the section 4.3.5 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesNokia, DT and Telecom Italia suggested to change the requirement.
| revised | No | S3‑162054 | |
S3‑161772 | pCR to TR33,899 - Revision of the evaluation for Solution #2.6 | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| revised | No | S3‑162029 | |
S3‑161773 | pCR adding the security functional requirements on the PGW deriving from 3GPP specifications | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesTIM:the requirement cannot be understood here.
MCC reminded about adding references to the specs that are mentioned (23.401, 33.117 and so on).
| revised | No | S3‑162055 | |
S3‑161774 | pCR to TR33.899 - new solution - Identity-based Authentication of Equipment | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
YesVodafone: no long term identification in this solution.
NTT-Docomo didn’t agree with the solution, Nokia supported NTT-Docomo.
NTT-Docomo: This solution requires pushing tokens to all devices regularly.
| revised | No | S3‑162025 | |
S3‑161775 | pCR Security enhancement to the attach procedure without relying on PKI | China Mobile Com. Corporation, Thales | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesEricsson: this is not solving the issue.
China Mobile: this is not an active attack.
| revised | No | S3‑162105 | |
S3‑161776 | pCR Security enhancement to the attach procedure relying on PKI | China Mobile Com. Corporation | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesNokia: mention the key issue.
Added also an editor's note.
| revised | No | S3‑162106 | |
S3‑161777 | Prevent UP DoS Attack over Air Interface | Huawei, HiSilicon | pCR |
8.6.4RAN security
| Yes |
YesNokia: this is for IoT small devices. I suggest to postpone it.
Huawei: small data solutions are part of phase one.
Nokia: SA2 will decide where small data is going to during their next meeting.
It had to be discussed offline whether this document was about Massive IoT or about small data in order to have it treated.
| revised | No | S3‑162079 | ||
S3‑161778 | pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition | China Mobile Com. Corporation | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162032 | |
S3‑161779 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesLG: how to do certificate revocation is FFS. This should be added in an editor's note.
Huawei: this exists already in other clauses, we can take it from there.
| revised | No | S3‑162070 | ||
S3‑161780 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| No |
No
| withdrawn | Yes | |||
S3‑161781 | Small Data Protection | Huawei, HiSilicon, | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161782 | Protect the Permanent or Long Termn User Identity with Public Key Techologies | Huawei, HiSilicon | pCR |
8.6.7Subscription privacy
| Yes |
YesEricsson: more clarification on the roaming case.
| revised | No | S3‑162103 | ||
S3‑161783 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesNokia: An interface between AUSF and ARPF would be very difficult to define.
This requirement was pending from an answer for the LS of SA2. An editor's note was added.
| revised | No | S3‑162081 | ||
S3‑161784 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR |
8.6.2Authentication
| No |
No
| withdrawn | Yes | |||
S3‑161785 | Group Provisioning for IoT devices via a Companion UE | Huawei, Hisilicon | pCR |
8.6.12Credential provisioning
| Yes |
YesWithin scope of phase 2. For the sake of priority this topic will be treated in a later stage.
| noted | No | |||
S3‑161786 | Aligning XML encryption mechanism with CT WG agreements | Samsung | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
YesCESG would rather use a stage 2 text instead of referencing a stage 3 spec. Samsung agreed.
| revised | No | S3‑161999 | |
S3‑161787 | adding the new key issue in the section 5.16.3 of TR33.899 v0.3 | China Mobile Com. Corporation | pCR | Approval |
8.6.16 Management Security
| Yes |
YesVodafone: we support the filtering of child pornography but this is out of scope of SA3. This is content filtering.
The definition of what should be filtered is also out of scope.
Orange: The calling ID requirement is related to an IMS feature,not 5G.
| noted | No | ||
S3‑161788 | Clarifications on the Solutions for Network Slicing Security | LG Electronics France | pCR | Approval |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | ||
S3‑161789 | Slice authentication | Huawei, Hisilicon | pCR |
8.6.8Network slicing security
| Yes |
Yes
| revised | No | S3‑162113 | ||
S3‑161790 | Discussion on a method to prevent fake base stations | China Mobile Com. Corporation | discussion | Discussion |
8.8.4Other study items
| Yes |
Yes
| not treated | No | ||
S3‑161791 | UE configuration of key and identifier refresh | LG Electronics France | pCR | Approval |
8.6.11Security visibility and configurability
| Yes |
YesEricsson proposed an editor's note on the malfunctioning of the UE overrifdign the network settings.
Nokia: what do we have to say something beyond the security provided by the network? An UE can say that I have app that "needs this security parameters and if your network doesn't support this capability I wont connect to it". An editor's note was added to address this issue.
Vodafone:"ability to trigger a refresh of security keys". What keys? I don’t want to apply it to all keys.
LG: it's copied from a key issue. The original key issue must be changed as well, then.
Deutsche Telekom: change the radio interface keys for something more clear.
It was decided to state that the original key issue needed to be fixed.
| revised | No | S3‑162116 | |
S3‑161792 | Aligning XML Integrity protection mechanism with CT WG agreements | Samsung | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
YesAirbus preferred not to have a reference to a stage 3 spec, and asked for some stage 2 wording instead.
| revised | No | S3‑162000 | |
S3‑161793 | pCR to TR 33.899: Temporary Identity refresh parameters | VODAFONE Group Plc | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesEricsson: too solution specific for being a requirement.
Nokia: no need to give implementation details like here.Vodafone replied that he changed it from a requirement to a solution.
Deutsche Telekom: second potential requirement should stay.
| approved | No | ||
S3‑161794 | A Client-Puzzle-Based Dos Attack Defense Approach for mIoT Infrequent Small Data Transmission | Huawei, Hisilicon, | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161795 | A Client-Puzzle-Based Dos Attack Defense Approach for mIoT Infrequent Small Data Transmission | Huawei, Hisilicon, | pCR |
8.6.14Small data
| No |
No
| withdrawn | Yes | |||
S3‑161796 | Clarification of V2X UE source IP address for TS 23.285 | LG Electronics France | discussion | Discussion |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: it's too early for sending the LS since we don’t know what solutions we find at the application layer.
Ericsson: the IP addresses may not be changed but randomised.
It was also agreed that all identifiers need to be changes at the same time.
It was agreed to send the LS to SA2.
| noted | No | ||
S3‑161797 | Resolving Editor’s Note on AAA proxy in Solution #2.8 | Samsung | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | ||
S3‑161798 | Draft LS on V2X UE IP address change | LG Electronics France | LS out | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| revised | No | S3‑162068 | |
S3‑161799 | Correcting LWA-ID derivation mismatch | Qualcomm Incorporated | CR |
7.6.1SAE/LTE Security
| Yes |
Yes
| agreed | No | |||
S3‑161800 | Updates to Solution #2.8 to introduce EAP-TLS authentication | Samsung | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | ||
S3‑161801 | Discussion on V2V communication data confidentiality | LG Electronics France | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| revised | No | S3‑161962 | |
S3‑161802 | Updates to Solution #12.4 on Provisioning server location | Samsung | pCR | Approval |
8.6.12Credential provisioning
| Yes |
Yes
| approved | No | ||
S3‑161803 | Updates to Solution #12.4 to detail EAP-TLS authentication procedure | Samsung | pCR | Approval |
8.6.12Credential provisioning
| Yes |
YesVodafone: the clause is quite messy. Lot of wrong terms here. And we are adding more mess here. An editor's note on the need for reworking this was added.
Added a second Editor's note as proposed by Nokia.
| revised | No | S3‑162119 | |
S3‑161804 | Update of key issue #6.y: Accounting and non-repudiation | Huawei, Hisilicon | pCR |
8.6.6Authorization
| Yes |
YesInterdigital: Extend it to non random access.
| revised | No | S3‑162096 | ||
S3‑161805 | Resolving Editor’s Note on UE behaviour in reading the SIB | Samsung | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162043 | |
S3‑161806 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR |
8.6.2Authentication
| No |
No
| withdrawn | Yes | |||
S3‑161807 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR |
8.6.2Authentication
| Yes |
YesOrange: they don’t talk about third party but about slices in SA1.
| revised | No | S3‑161991 | ||
S3‑161808 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR |
8.6.2Authentication
| No |
No
| withdrawn | Yes | |||
S3‑161809 | Network slice life-cycle security | Huawei, Hisilicon | pCR |
8.6.16 Management Security
| Yes |
YesVodafone: addition of key issues and security areas. Adding new key issues in this Release isn't going to be closing this specification. We don’t have time.
Orange: where are the APIs coming from? Any SA2 spec?
Huawei couldn’t find the reference. It was decided to add an editor's note.
| revised | No | S3‑162134 | ||
S3‑161810 | Network slice life-cycle security | Huawei, Hisilicon | pCR |
8.6.16 Management Security
| No |
No
| withdrawn | Yes | |||
S3‑161811 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
No
| withdrawn | Yes | |||
S3‑161812 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesNoted without presentation.
Huawei commented that a Threat analysis is needed.
| noted | No | |||
S3‑161813 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
No
| withdrawn | Yes | |||
S3‑161814 | Enhancements to solution 6.9 on encrypting IMSI to provide privacy from the serving network | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesCESG: fallback step as in 2066.
Ericsson: not sure about encrypting the Avs. This addresses a very rare case.
Alex (BT): this is not practical. Not clear how the triggering in the serving network works. It looks like the home network is telling the serving network what to intercept. I suggest that Qualcomm presents this in LI for evaluation.
Ericsson: strong requirements from SA1 on privacy are confronted against strong requirements from SA3-LI here.
Alex(BT): there is not contradiction. The LI issue applies to communications not to the UE .Requirement on using V2X subscription on anything other than safe messages.
Nokia proposed to add text on the evaluation and this was agreed.
The document was taken for offline discussions.
| revised | No | S3‑162067 | |
S3‑161815 | Conclusion of V2X communication security | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson commented that the conclusion was too early.
Nokia proposed to have this conclusion as an intermediate agreement. We agree on some principles but we are not excluding anything.
| revised | No | S3‑162072 | |
S3‑161816 | Conclusion of the V3 interface security | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesAdding the interim agreement.
| revised | No | S3‑162073 | |
S3‑161817 | Conclusion on security of the interfaces between network entities for V2X | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| revised | No | S3‑162074 | |
S3‑161818 | Update and conclusion on solution 6.6 on UE privacy due to data traversing the network | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: there is no conclusion on privacy yet.This was taken out.
| revised | No | S3‑162075 | |
S3‑161819 | Conclusion on UE privacy from the MNO for V2X | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: still too many open issues. BT objected to the contribution too.
| noted | No | ||
S3‑161820 | Adding details to the reattach procedure in solution 6.5 | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: not reasonable. Every 5 min we re-attach, and it's very bad for user experience (it interrupts services).
Qualcomm: this is used only for V2X, it won’t interrupt other services. It's not worth sacrifying privacy over safety.
Ericsson: no need to re-attach when off-coverage.
It was agreed to have an editor's note with more details on this issue.
Alex(BT): consider randomization on the timers on lower density scenarios, it may work better.
Huawei: if the car is on the highway the randomization is not enough, it is still predictable.
MCC proposed to remove the reference to "RAN2 agreements" since this should be a reference to a spec and not a working group. This was moved to an editor's note.
| revised | No | S3‑162069 | |
S3‑161821 | LS on eNB-specific reattach boundary time for V2X UEs using Uu mode | Qualcomm Incorporated | LS out | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: this is very solution specific.
Orange and Nokia agreed with Ericsson.
LG agreed to send an LS with this content.
| noted | No | ||
S3‑161822 | Including V2X AS as instantiation of GCS AS | Nokia | CR | Agreement |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| agreed | No | ||
S3‑161823 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
No
| withdrawn | Yes | |||
S3‑161824 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
No
| withdrawn | Yes | |||
S3‑161825 | adding the security requirements of IP address reallocation interval | Huawei; Hisilicon; China Mobile | pCR |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesNoted without presentation.
Huawei commented that a threat analysis is needed.
| noted | No | |||
S3‑161826 | Termination point for user plane security | Ericsson LM | pCR | Approval |
8.6.1Security architecture
| Yes |
YesTim commented that UP gateway is for network end. The editor's note is confusing.
Huawei didn’t agree with the editor's note either. Architectural questions are to be solved in the TS architectural work.
Nokia agreed with the intention of the editor's note, the questions were valid for them.
It was commented that a clarification of the requirements were needed here.
| revised | No | S3‑161970 | |
S3‑161827 | Solution for UE authorization based on a secondary authentication with a third party server | Ericsson LM | pCR | Approval |
8.6.6Authorization
| Yes |
YesEricsson: this applies to all solutions.
An editor's note for alignment with SA2 was agreed to be added. Key issue 6.3 removed.
Vodafone: we don’t like the signalling going through the user plane. The evaluation is not such, it should be deleted.
Nokia: remove references to current mechanisms in the justification.
Also added an editor's note.
| revised | No | S3‑162099 | |
S3‑161828 | V2X security between V2X AS and LTE network | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | ||
S3‑161829 | Update on V2X UE Privacy key issue | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesMCC pointed out that it is not possible to refer to 3GPP working groups inside the specifications. This was changed.
The last editor's note was removed.
| revised | No | S3‑162060 | |
S3‑161830 | Privacy solution | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesEricsson: this is not very specific. I would like to see here where to support LI requirements.
Alex (BT): put a note saying that LI is not supported in the PLMN. This was agreed.
Qualcomm: it is not working for the home network case when roaming. It was agreed to add an editor's note addressing this comment.
| revised | No | S3‑162061 | |
S3‑161831 | V2X Annex on privacy by regulation EU | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes831 and 832 were presented in SA3#84, but people required time to learn about regulations.
Ericsson: include a reference to the report on UE regulation on the user information consent.
LG: there can be other regulations rather than the EU.
Alex (BT): privacy regulations are written on people and not physical devices. I agree with this going in for reference but remember that applying anything to physical assets will affect LI requirements.
| revised | No | S3‑162062 | |
S3‑161832 | V2X Annex on privacy by regulation US | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesAlex (BT): this refers to a report whereas 831 refers to hard regulation, so 831 and 832 cannot be treated equally.This is guidance expecting to become regulation.
It was confirmed that there is work on this going for regulation. A note on this was added.
| revised | No | S3‑162063 | |
S3‑161833 | Key issue on security key and context identification | Nokia | pCR | Approval |
8.6.3Security context and key management
| Yes |
YesVodafone:Can we confidentiallity protect in every country?
Nokia: it's a should for confidentiality.
Ericsson: even for integrity.
| revised | No | S3‑162033 | |
S3‑161834 | Solution on security key and context identification | Nokia | pCR | Approval |
8.6.3Security context and key management
| Yes |
YesBroadcom: how do you send the NAS command?
The Chair commented that this text was agreed already, it’s not part of the contribution.
Ericsson: the problem comes when removing CCNF. It was agreed to keep CCNF.
| revised | No | S3‑162034 | |
S3‑161835 | Commenting solution 7 3 and proposal to split from LI was S3-161447 | Nokia, Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
YesAlex (BT):ffs whether this solution needs the PLMN non assistance requirements.
| revised | No | S3‑162102 | |
S3‑161836 | Commenting solution 7.4 was S3-161388 | Nokia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161837 | 5G Privacy Pseudonym-IMSI - intro solution was S3-161463 | Nokia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161838 | 5G Privacy Pseudonym-IMSI - process steps was S3-161464 | Nokia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161839 | 5G Privacy Pseudonym-IMSI evaluation was S3-161466 | Nokia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161840 | Update on security area interworking and migration | Nokia | pCR | Approval |
8.6.13Interworking and migration
| Yes |
Yes
| revised | No | S3‑162121 | |
S3‑161841 | Additional EN on requirement because of LI aspect of key issue 7.1 was S3-161445 | Nokia, Ericsson, LG Electronics | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| noted | No | ||
S3‑161842 | Additional requirement on transmission of identifiers in key issue 7.6 was S3-161446 | Nokia, Ericsson, LG Electronics | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161843 | Need of LS regarding effects of LI requirement on privacy solutions | Nokia, Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| noted | No | ||
S3‑161844 | 5G interworking - key issue on bidding down attack was S3-161394 | Nokia | pCR | Approval |
8.6.13Interworking and migration
| Yes |
YesEricsson: formulate the requirements less solution centric.
Second requirement goes away, the first requirement had some part of it moved to the solutions.
| revised | No | S3‑162132 | |
S3‑161845 | Discussion on the UE tracking threat with V2V/V2I communication | Ericsson LM | discussion | Endorsement |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesIt was proposed to add this discussion into the TR. This was agreed.
| endorsed | No | ||
S3‑161846 | Solution against UE tracking based on PC5 autonomous mode | Ericsson LM | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesNokia: Are there still discussions in SA2 about this?
Ericsson: this is already specified.
How to pre-provision these parameters is an open aspect that could be noted in an editor's note.
| revised | No | S3‑162064 | |
S3‑161847 | The Impact of Quantum Computers and Post Quantum Cryptography | Ericsson | discussion | Discussion |
8.6.17Cryptographic algorithms
| Yes |
Yes
| noted | No | ||
S3‑161848 | Solution for V-UE pseudonymity based on a V2X MVNO | Ericsson LM | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesAlex (BT): add a note on the LI issues in here.
This note was agreed.
Qualcomm: roaming case brings privacy issues. An editor's note was agreed.
| revised | No | S3‑162065 | |
S3‑161849 | Adding BEST Service to TS 33.401 | KPN, Vodafone | CR | Agreement |
7.3 Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
| Yes |
Yes
| postponed | No | S3‑161622 | |
S3‑161850 | Split of solution #7 for authorization and accountability | Ericsson LM | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | ||
S3‑161851 | Update of Key issue #17.2: Quantum safe cryptography | Ericsson | pCR | Approval |
8.6.17Cryptographic algorithms
| Yes |
Yes
| revised | No | S3‑162135 | |
S3‑161852 | Adding details to solution 2.5 | KPN | pCR | Approval |
8.6.2Authentication
| Yes |
Yesnoted without presentation.
| noted | No | ||
S3‑161853 | Updating solution #7.3 | Ericsson, Telecom Italia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161854 | Modifications to solution 2.11 | KPN | pCR | Approval |
8.6.2Authentication
| Yes |
Yesnoted without presentation
| noted | No | ||
S3‑161855 | Privacy-enhanced LTE-style mechanism for temporary identifier assignment | Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| revised | No | S3‑162109 | |
S3‑161856 | Encrypting IMSI based on ECIES | Ericsson, Telecom Italia | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161857 | Optimized Re-authentication mechanism | KPN | pCR | Approval |
8.6.14Small data
| Yes |
Yes
| not treated | No | ||
S3‑161858 | Refreshing CN short-term subscriber identifiers | Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | ||
S3‑161859 | New solution: Network access for credentials provisioning | Ericsson | pCR |
8.6.12Credential provisioning
| Yes |
YesVodafone: how is this preeventing DoS attacks?I'd like to see that.I need to know some clarifications and benefits of this solution. I'm not against the solution.
Gemalto: is this a massive IoT topic? Vodafone: remote provisioning is a Massive IoT topic.
Several companies denied this.
Ericsson agreed to add more details for Vodafone.
Ericsson: remote provisioning is generic, where is it pinpointed that this belongs to Massive IoT.
Vodafone: key issue is from the factory use case, IoT related. Ericsson commented that these are two different use cases.
The Chair commented that IoT can be either a massive IoT topic or not. And those which do not belong to Massive IoT are handled with higher priority,in this phase. It was noted that the next conference call would clarify the work in phases.
| revised | No | S3‑162120 | ||
S3‑161860 | Solution against spatial replay attacks based on a new coordinate grid | Ericsson LM | pCR | Approval |
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
| Yes |
YesThis will go to a living document, then its content eventually transferred to the TR.
| revised | No | S3‑162093 | |
S3‑161861 | Correction of TS 33.220 references | Samsung | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | ||
S3‑161862 | Discussion on the need and on the potential mechanisms for the protection of MBMS subchannel control messages | Ericsson LM | discussion | Discussion |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| noted | No | ||
S3‑161863 | Details on Key issue #4.5: Security aspects of WLAN aggregation | Ericsson | pCR |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162042 | S3‑161418 | |
S3‑161864 | Details on Key issue #4.4: Security aspects of intra-NR mobility | Ericsson | pCR |
8.6.4RAN security
| Yes |
Yes
| approved | No | S3‑161415 | ||
S3‑161865 | Protection of MBMS subchannel control messages | Ericsson LM | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
YesCESG didn't agree with having this for Rel-13. Ericsson commented that CT1 ias asking for this to be in Rel-13. MCC commented that Rel-13 is frozen and that Cat-B CRs are not allowed anymore, just corrections.
It was commented that since this is a correction to be made to avoid a security vulnerability this can be considered as cat- F and hence acceptable in Rel-13. This was agreed by the group.
| revised | No | S3‑161998 | |
S3‑161866 | FS_NSA: solution for credentials provisioning | Gemalto N.V. | pCR | Approval |
8.6.12Credential provisioning
| Yes |
YesVodafone: it seems to me that it is out of scope of 3GPP.
Gemalto: steps 3,4,5 and 6 shows that it is within scope.
Vodafone: this is what we are already doing in a network attach with the current IMSI, not a change whatsoever.
Heiko (Morpho): pre- deployment in the manufacturer phase, what is the benefit here instead of providing with the normal 3GPP subscription?
Klaus: I don’t see the benefit of this either.
NTT-Docomo: I would rather note this, but we can have an editor's note in the evaluation.
Orange: I cannot agree with this kind of solution due to business implications.
Gemalto: but that is part of the evaluation part.
| noted | No | ||
S3‑161867 | New key issue #5.y: Storage and processing of credentials and identifiers for the massive Internet of Things | Ericsson | pCR |
8.6.5Security within NG-UE
| Yes |
YesKPN pointed out that it’s been agreed not to go for Massive IoT during this time. This was noted then.
| noted | No | |||
S3‑161868 | Requirements for NG-UE | Ericsson | pCR |
8.6.5Security within NG-UE
| Yes |
Yes
| noted | No | |||
S3‑161869 | Security solution for Infrequent Small Data | Ericsson | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161870 | Single termination point for NAS security | Nokia | pCR |
8.6.1Security architecture
| Yes |
YesVodafone: SA2 hasn't gone too far with this yet.
Nokia: if SA2 goes forward with this solution, this is SA3 input.
Qualcomm: additional security aspects in the evaluation part (e.g. moving Ues).
Huawei: sliced security isolation for FFS.
Editor's notes were agreed to address these comments.
| revised | No | S3‑161982 | ||
S3‑161871 | Key issue for Small data | Ericsson | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161872 | Small data security area introduction | Ericsson | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161873 | SA3 decisions on security architecture needed by SA2 | Nokia | discussion |
8.6.1Security architecture
| Yes |
YesThe content was to be included in an LS to SA2 to be drafted by Nokia.
Every point of this paper was presented to see if it could be included in the LS. Some companies had contributions that touched some of the points so their agreement had to go through those papers first (for example co-locating SEAF and SCMF was still controversial).
| revised | No | S3‑162047 | ||
S3‑161874 | Key issues in Small data | Ericsson | pCR |
8.6.14Small data
| Yes |
Yes
| not treated | No | |||
S3‑161875 | New key issue "Increasing home control in roaming situations" | Nokia | pCR |
8.6.2Authentication
| Yes |
YesDiscussed together with 877.
The second requirement was reworded as proposed by Ericsson.
Huawei didn’t agree with this requirement (they proposed a "may" instead of a "shall"). This wasn't agreed.
The document was revised to leave just the agreed parts.
| revised | No | S3‑161988 | ||
S3‑161876 | I-WLAN specification withdrawal | Ericsson | discussion |
7.6.15Other work items
| Yes |
Yes
| noted | No | |||
S3‑161877 | Linking location update with authentication confirmation | Nokia | pCR |
8.6.2Authentication
| Yes |
Yes
| approved | No | |||
S3‑161878 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR |
7.6.15Other work items
| Yes |
YesIt was commented that it is an exception to refer to a specific Release of a spec, in the context of I-WLAN. Normally the latest Release available or the same release as the the current one.
It was also pointed out that this is a Cat C CR for Rel-13 and this would be an exception as well.
| revised | No | S3‑162018 | ||
S3‑161879 | draft reply-LS on S-TMSI in RAN paging | Ericsson | LS out |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesDeutsche Telekom: I don’t understand the issue of using the S-TMSI.
NTT-Docomo: If S-TMSI is used for RAN paging would it limit the number of re-allocations? I don’t understand the paging mechanism.
Nokia: we need to agree on whether there is a risk when using S-TMSI.
Deutsche Telekom: our ability to update the S-TMSI frequently would be limited according to the second bullet.
Nokia: there is an opportunity of changing the S-TMSI when the RAN paging is successful and it results in a NAS connection, the updated wouldn't be so limited.
Alf (NTT Docomo): where is this described?
It looked like companies needed to study more the background of this. This was taken offline.
| noted | No | |||
S3‑161880 | BEST: Clarifying potential impact of Solution 8 on PGW | Nokia, Vodafone | CR | Approval |
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
| Yes |
Yes
| not treated | No | ||
S3‑161881 | EPS AKA enhanced with UE authentication confirmation | Nokia | pCR |
8.6.2Authentication
| Yes |
YesHuawei didn’t agree with the "commercially unattractive" sentence, but it was generally agreed by the group (with a comment from Deutsche Telekom addressed in the revision).
| revised | No | S3‑161989 | ||
S3‑161882 | Alignment according to withdrawal of I-WLAN feature | Ericsson | draftCR |
7.6.15Other work items
| Yes |
Yesthe CR will be brought into RAN6.
| endorsed | No | |||
S3‑161883 | Alignment according to withdrawal of I-WLAN feature | Ericsson | draftCR |
7.6.15Other work items
| Yes |
Yes
| endorsed | No | |||
S3‑161884 | Introducing EPS AKA* to authentication framework in solution 2.7 | Nokia | pCR |
8.6.2Authentication
| Yes |
YesTerminology needs to be reviewed as proposed by Broadcom.
MCC asked to remove the mention to CT4 in the alternative 1b.
Ericsson proposed to add an editor's note about Increasing home control in roaming situations.
| revised | No | S3‑161990 | ||
S3‑161885 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR |
7.6.15Other work items
| Yes |
Yes
| revised | No | S3‑162021 | ||
S3‑161886 | Comments on termination of EAP method in the VPLMN for solution 2.9 | Nokia | pCR |
8.6.2Authentication
| Yes |
Yes
| approved | No | |||
S3‑161887 | discussion document on Ease Algorithm specifications | VODAFONE Group Plc | discussion | Discussion |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
YesFrench government requires us to know who has the copies. ETSI must license the specifications.
The algorithms content were seen by the SA3 group in a non-public area of the local server. The files were seen anyway back in the Mexico meeting.
Vodafone noted that these files come from ETSI SAGE, not a company contribution from Vodafone.
SA3 agreed with the procedure of going ahead with the redacted documents going to the Plenary.
| noted | No | ||
S3‑161888 | Placing AUSF always in the home network | Nokia | pCR |
8.6.2Authentication
| Yes |
YesEricsson and Huawei didn’t agree with the change.
Nokia commented that this would be need to be raised as an open issue to SA2. An LS will be sent for this issue.
| noted | No | |||
S3‑161889 | Removing option of AUSF in visited network for solution 2.7 | Nokia | pCR |
8.6.2Authentication
| Yes |
Yes
| approved | No | |||
S3‑161890 | Combining solutions 2.2 and 10.2 | Nokia | pCR |
8.6.2Authentication
| Yes |
Yes
| approved | No | |||
S3‑161891 | Usage of Tuak | Gemalto N.V. | discussion | Decision |
7.6.1SAE/LTE Security
| Yes |
YesVodafone: current mechanisms allow to choose the algorithm to use.
Gemalto: specify the values of the IMF to allow the algorithm seleciton.
Vodafone: this is not within the scope of 3GPP, to choose what algorithms to use. Nokia agreed.
Gemalto: why is this restriction here?
Ericsson: Tuak doesn’t need to be mentioned.
Gemalto: no objection to enable input key longer than 128 bits.
Heiko (Morpho) commented that this is just a discussion document, we need to agree on the CRs that come afterwards.
Nokia: no working agreement until we see the CRs.
| noted | No | ||
S3‑161892 | Unauthenticated Emergency services over TWAN | Nokia | CR | Agreement |
7.6.15Other work items
| Yes |
Yes
| revised | No | S3‑162091 | |
S3‑161893 | pCR to TR 33.899: Quantum safe cryptography solutions | VODAFONE Group Plc | pCR | Approval |
8.6.17Cryptographic algorithms
| Yes |
YesGemalto: OTA is mentioned, we also have remote management defined by GSMA.
Vodafone: the GSMA one is not mentioned in 3GPP documents.
| approved | No | ||
S3‑161894 | Evaluating solution #2.6 against key issue 3.1 | Nokia | pCR |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | |||
S3‑161895 | Unauthenticated Emergency services over untrusted WLAN | Nokia | CR | Agreement |
7.6.15Other work items
| Yes |
Yes
| revised | No | S3‑162092 | |
S3‑161896 | Resolving EN in solution 10.2 | Nokia | pCR |
8.6.10Network domain security
| Yes |
Yes
| revised | No | S3‑162115 | ||
S3‑161897 | Resolving Editor’s Note on provisioning of public keys to the UE | Samsung | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| revised | No | S3‑162044 | |
S3‑161898 | KDF for Unauthenticated emergency services over WLAN | Nokia | CR | Agreement |
7.6.15Other work items
| Yes |
Yes
| agreed | No | ||
S3‑161899 | Update to solution #2.9: adding EAP-TTLS | Ericsson LM | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | ||
S3‑161900 | Update to solution #2.9: Fast re-authentication with ERP | Ericsson LM | pCR | Approval |
8.6.2Authentication
| Yes |
YesNokia suggested to add an editor's note; this was accepted. Other comments from Nokia were also addressed in the revision.
| revised | No | S3‑162031 | |
S3‑161901 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Agreement |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| revised | No | S3‑162084 | |
S3‑161902 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Approval |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| revised | No | S3‑162085 | |
S3‑161903 | PCO based User Authentication and authorization for Slice access | Nokia | pCR | Approval |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | ||
S3‑161904 | Draft TS Skeleton for 33.216 | Huawei Tech.(UK) Co., Ltd | draft TS | Approval |
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
| Yes |
Yes
| approved | No | ||
S3‑161905 | Scope of TS 33.216 | Huawei Tech.(UK) Co., Ltd | pCR | Approval |
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
| Yes |
Yes
| approved | No | ||
S3‑161906 | Adding Reference to TS 33.216 | Huawei Tech.(UK) Co., Ltd | pCR | Approval |
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
| Yes |
Yes
| approved | No | ||
S3‑161907 | 3GPP security profile update – IPsec | Ericsson | discussion | Discussion |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| noted | No | ||
S3‑161908 | 3GPP security profile update – IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
YesMCC pointed out that redefining "support" for this spec was not appropiate since it is a well known term in standards language and changing its definition would lead to confusion and errors.
| revised | No | S3‑162007 | |
S3‑161909 | 3GPP security profile update – Certificates and CRLs | Ericsson | discussion | Discussion |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| noted | No | ||
S3‑161910 | 3GPP security profile update – Certificates and CRLs | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162010 | |
S3‑161911 | 3GPP security profile updates – TLS | Ericsson | discussion | Discussion |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| noted | No | ||
S3‑161912 | 3GPP security profile update – TLS | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162011 | |
S3‑161913 | 3GPP security profile updates – Remaining issues and new updates | Ericsson | discussion | Discussion |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| noted | No | ||
S3‑161914 | 3GPP security profile update – 33.220 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162012 | |
S3‑161915 | 3GPP security profile update – 33.221 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162013 | |
S3‑161916 | 3GPP security profile update – 33.234 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
No
| withdrawn | Yes | ||
S3‑161917 | 3GPP security profile update – 33.320 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162014 | |
S3‑161918 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162008 | |
S3‑161919 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162009 | |
S3‑161920 | RLF for CP NB-IoT | Ericsson | discussion |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| noted | No | |||
S3‑161921 | Update of TR 33.833 after review by EditHelp | Qualcomm Incorporated | pCR | Approval |
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
| Yes |
YesThe TR will be sent for approval in SA#75.
| approved | No | ||
S3‑161922 | LS on I-WLAN specification referencing within CT6 | C6-160408 | LS in |
7.6.15Other work items
| Yes |
YesLG commented that SA3 should send CRs for CT6 to check. The references are for Rel-12, not Rel-13.
It was confirmed that Rel-12 for I-WLAN will stay, rel-13 was withdrawn.
Heiko commented that the only solution found in CT6 was to refer to the Rel-12 version. If SA3 moves things to 33.402 CT6 needs to take this into account to refer to this spec.
| replied to | No | |||
S3‑161923 | Request to SA3 to take the 3GPP TR 33.899 study item forward as a work item for Release 15 | Mobile Manufacturers Forum | LS in |
8.6.18Other
| Yes |
YesNick (Blackberry) presented this contribution.
MMF would like SA3 to progress work in Key Issue 2.4: Equipment Identifier Authentication work and is willing to cooperate with them.
It was commented that there wasn't much to say now, just that SA3 is working on it. Sander (KPN) proposed to check if all these requirements are captured in our key issue for the next meeting.
Blackberry proposed to work on a response.
| replied to | No | |||
S3‑161924 | LS OUT on NFV-based solutions for next generation mobile networks | ETSI ISG NFV | LS in |
8.6.18Other
| Yes |
YesVodafone supported the cooperation with ISG NFV. A response stating that SA3 is looking into it with a study.
Ericsson clarified that SA3 is still looking whether it is worth working on NFV security or not, this should be explained in the response.
Deutsche Telekom: not good to send an LS now since they haven’t started any work and we have no conclusions here.
It was agreed to reply this LS during the next meeting.
Heiko (Morpho) commented that other groups like SA,SA2,SA5 are being sent this LS and they may reply. This will be seen in SA plenary as well and the SA3 Chair will bring up this issue in SA#74 that SA3 will take it into consideration and reply.
| postponed | No | |||
S3‑161925 | LS on Legacy Security Issues | C1-164579 | LS in |
7.6.4UTRAN Network Access Security
| Yes |
YesPostponed due to the lack of contributions to give input in a response.
| postponed | No | |||
S3‑161926 | LS on protection of RTCP transported media control messages, RTCP APP transported pre-established session control messages and MBMS subchannel control messages | C1-164680 | LS in |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| replied to | No | |||
S3‑161927 | LS on LLC updates for EC-GSM-IOT enhanced security | C1-164853 | LS in |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| replied to | No | |||
S3‑161928 | LS response to SA4 on progress of FS_xMBMS study item | C3-162236 | LS in |
7.6.7Multimedia Broadcast/Multicast Service (MBMS)
| Yes |
Yes
| noted | No | |||
S3‑161929 | LS to 3GPP SA3 on PII protection in the mobile and 5G networks | ETSI TC CYBER | LS in |
8.6.18Other
| Yes |
YesColin (CESG) commented that this WID was initiated by Telecom Italia, but they were not present in the meeting. There were no comments to this LS from the delegates.
| noted | No | |||
S3‑161930 | LS-Out to NFV on Target Location | ETSI TC LI | LS in |
6.11Other Groups
| Yes |
YesTarget's location cannot be derived in an NFV environment.
| noted | No | |||
S3‑161931 | NESAS Pilot Release Documents | GSMA SECAG | LS in |
8.8.2Security Assurance Specification for 3GPP network product classes (33.926) (SCAS)
| Yes |
YesIt was encouraged to provide feedback to SA3 or directly to GSMA.
| noted | No | |||
S3‑161932 | LS on eDRX Paging Hyper-frame and PTW_Start Calculation | R2-165935 | LS in |
6.13GPP Working Groups
| Yes |
Yes
| noted | No | |||
S3‑161933 | LS on S-TMSI in RAN paging | R2-167293 | LS in |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| replied to | No | |||
S3‑161934 | Security aspects of RRC Connection Re-Establishment for NB-IoT (DoNAS) | R2-167296 | LS in |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| replied to | No | |||
S3‑161935 | LS on Light connection | R3-162642 | LS in |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| replied to | No | |||
S3‑161936 | Response LS on Legacy Security Issues | R6-160125 | LS in |
7.6.4UTRAN Network Access Security
| Yes |
YesPostponed due to the lack of contributions to give input in a response.
| postponed | No | |||
S3‑161937 | Reply LS on questions on discreet listening and recording for MCPTT | S1-162264 | LS in |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
YesCESG observed: Is this a problem for SA3-LI or SA3?
| noted | No | |||
S3‑161938 | Reply LS on Clarification to privacy requirements | S1-162531 | LS in |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| noted | No | |||
S3‑161939 | Response on LS on progress of FS_xMBMS study item | S1-162535 | LS in |
7.6.7Multimedia Broadcast/Multicast Service (MBMS)
| Yes |
Yes
| noted | No | |||
S3‑161940 | Reply LS on I-WLAN handling and specification withdrawal | S2-165026 | LS in |
7.6.15Other work items
| Yes |
Yes
| noted | No | |||
S3‑161941 | Response to LS S2-164299 from CT WG3 on progress of FS_xMBMS study item and to LS S2-164288 from SA WG4 also on progress of FS_xMBMS study item | S2-165435 | LS in |
7.6.7Multimedia Broadcast/Multicast Service (MBMS)
| Yes |
Yes
| noted | No | |||
S3‑161942 | LS on "Attach procedure for Remote SIM Provisioning” | S2-165437 | LS in |
8.6.18Other
| Yes |
YesTim (Vodafone) commented that there are some solutions in the NextGen TR but SA3 was not ready to give a response to SA2 for this meeting.
Nokia didn’t see clearly what SA2 was asking for. Morpho noted that the wording is a bit confusing.
Orange agreed that the requirement given by SA1 was confusing.
Qualcomm proposed to work on a response for this meeting and see if this could be agreed to be sent.
| replied to | No | |||
S3‑161943 | LS on SeDoC related authentication procedure | S2-165439 | LS in |
6.13GPP Working Groups
| Yes |
YesEricsson: it seems to me that it is a new authentication method for IMS although we have many of those already.
CSI node is a trusted node.
Guenther (Nokia): this looks like a new authentication method that does not clearly fit in the SA3 IMS spec.Not sure that we want that the security policy requires a re-authentication. It was noted that more time was needed to give a response.
| replied to | No | |||
S3‑161944 | LS reply on 5G work alignment | S2-166238 | LS in |
8.6.18Other
| Yes |
YesFloren commented that SA2 will change the attached document, so this should be taken into account.
| noted | No | |||
S3‑161945 | LS on “Next Generation” Security Requirements | SA3-LI | LS in |
8.6.18Other
| Yes |
YesVodafone commented that this would be useful to be included in TR 33.899.
Qualcomm: create a contribution for the next meeting.
Nokia: we have identities other than humans now (e.g. cars), so has LI considered this?
BT: vehicles that cannot be targeted would be not sold in some countries.The requirement does extend to non human entities.
| noted | No | |||
S3‑161946 | Reply LS to SA3 on discreet listening and recording for MCPTT | S6-161229 | LS in |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| noted | No | |||
S3‑161947 | Reply LS on Cooperation on NGS FMC | SP-160743 | LS in |
8.6.18Other
| Yes |
Yes
| noted | No | |||
S3‑161948 | 3GPP security profile update – 43.318 | Ericsson | draftCR |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| revised | No | S3‑162015 | ||
S3‑161949 | Authorization requirements for communication between network elements | Huawei, Hisilicon | pCR |
8.6.10Network domain security
| Yes |
Yes
| approved | No | |||
S3‑161950 | solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | CR |
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
| Yes |
Yes
| revised | No | S3‑161995 | ||
S3‑161951 | How solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | discussion | Discussion |
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
| Yes |
Yes
| not treated | No | ||
S3‑161952 | Draft TS 55.241 - Specification of the GIA4 integrity algorithm for GPRS - GIA4 specification - (Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
YesMCC noted that it should be version 001 since it's an editorial change.
| revised | No | S3‑162126 | |
S3‑161953 | Draft TS 55.242 - Specification of the GIA4 integrity algorithm for GPRS - Implementers test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
Yes
| postponed | No | ||
S3‑161954 | Draft TS 55.243 - Specification of the GIA4 integrity algorithm for GPRS - Design conformance test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
Yes
| postponed | No | ||
S3‑161955 | TS 55.251 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - GEA5 and GIA5 algorithm specification -(Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
YesMCC noted that it should be version 001 since it's an editorial change.
The information of where to find the algorithms will not be written in the spec, but in the ETSI website.
| revised | No | S3‑162128 | |
S3‑161956 | TS 55.252 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - Implementers test data -(Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
Yes
| postponed | No | ||
S3‑161957 | TS 55.253 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - Design conformance test data - (Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| Yes |
Yes
| postponed | No | ||
S3‑161958 | Comments to S3-161737 | ORANGE, Vodafone, Telecom Italia, Oberthur Technologies | pCR | Approval |
8.6.5Security within NG-UE
| Yes |
YesVodafone: we don’t mandate the protection storage in a confidential integrity protected way, it's poorly written here. Storage should be in a tampered resistant hardware. This was agreed.
NTT-Docomo: integrity protection of the algorithm or the key?
Huawei: how do we store the algorithm?
Vodafone: software.
Huawei: just say it, but this looks like a solution.
Integrity protection of algorithms:
Interdigital: stored in tamper resistant doesn’t mean it cannot be changed. It has to be integrity protected, otherwise anyone can go and change it. It's a requirement for the storage.
Deutsche Telekom: acccessibility of parameters requirement covers this already.
KPN: integrity protection is the generic requirement, protection against manipulation in a tamper resistant storage is just one possible solution. Intel agreed.
Orange: the tamper resistant storage ensures that the algorithm and keys cannot be reached.
Qualcomm: algorithm storage? What is it?
Vodafone: tamper resistant, you cannot change the software, what is the point of integrity protection?
Alf: tamper resistant hardware says that you cannot access the software but it does not refer to the access to the algorithm. Ensure that the algorithm is the one selected by the operator and can be changed by it, not someone else.
Vodafone: if I want to put different USIMs in a device I don’t see why 3GPP does not allow me that.
The Chair clarified that when an algorithm cannot be changed: integrity protection. Qualcomm disagreed.
Gemalto commented that the algorithm can be updated, it's possible that this happens in the future. Klaus agreed.
Vodafone: AKA to EAP, this is a 5G use case. Security of storage and operation are the points.
Ericsson: no need of the word "hardware" in the context of tamper resistant.
Orange: state of the art is like this, we have to use hardware.
KPN:: perhaps someone will come with a solution that comes with an equal security. This is evaluation of the solution. If the Cloud is a solution equally secure, KPN would agree to that, for example.
Qualcomm: in the key issue details there are no references to the algorithm part.
Orange: no storage no processing no protection of the algorithm to be discussed then.
Blackberry agreed with KPN. Also, no need to mention hardware. Huawei agreed with Blackberry with the hardware issue.
TIM; tamper resistance and hardware can be there, no contradiction.
Vodafone: it is right to mention the word hardware.
Deutsche Telekom: it is not the issue whether this is a separate component, and I agree with keeping the word hardware.
Ericsson: hardware is a solution when you mention tamper resistance.
The Chair commented that although Ericsson and the others may be right, many companies still want to keep it.
Vodafone: you will need the hardware to run the software.
The Chair proposed to have tamper resistance environment and then lisitng requirements, but this wasn't agreed.
Intel: what do we mean by hardware here?
Orange: it's a place where we have operations for the credentials.
Intel: UICC?
Orange: didn’t say that. The storage will be defined elsewhere e.g. ETSI SCP, the solution can be found outside 3GPP.
Deutsche Telekom: in 5G we can find alternatives to UICC, I don’t see the reasons to resist to have pure requirements.
Vodafone: as long as it is suitable secure, we are prepared to look at any solution. Tamper resistance software is linked to tamper resistance hardware.
Ericsson: in the requirements clauses we have "ffs" in editor's notes and this is blocking progress and causing confusion. Qualcomm agreed.
NTT-Docomo: I propose requirements derived from security threats and reason why these requirements are coming from them. I agree with Vesa, the reality is that we don’t have agreed security requirements.
The Chair commented that if there is no agreement we can just drop this topic and focus on others.
Orange: let's stick with what we have with regards to the requirements.
Vodafone: all docs have aspects that people can agree with, there is no blockage.
The Chair commented that progress needs to be made and have some agreements, otherwise there is no progress for the next meeting.
Morpho commented if we don’t agree in a solution we stick in 5G with what we have now, the UICC.
Ericsson: no agreement in a radio technology means stick with LTE?
The Chair: fallback is the way out bit probably not what will happen.
| revised | No | S3‑162006 | |
S3‑161959 | Comments on S3-161731 "pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities" by Qualcomm Incorporated | Nokia | pCR |
8.6.3Security context and key management
| Yes |
Yes
| merged | No | S3‑162039 | ||
S3‑161960 | Comments by Nokia on V2X privacy conclusion of S3-161819 | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesBT didn’t agree with this editor's note.
| noted | No | ||
S3‑161961 | Comments on contribution S3-161789 | Nokia | discussion | Approval |
8.6.8Network slicing security
| Yes |
YesThe Chair commented that the criteria to put this in phase two hasn't been agreed in SA3.
The goal is organize the network slice topic.
The conference call on NxtGen will also deal with this (prioritization and scope of work).
| noted | No | ||
S3‑161962 | Discussion on V2V communication data confidentiality | LG Electronics France | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| merged | No | S3‑162072 | S3‑161801 |
S3‑161963 | Agenda | WG Chairman | report | - |
2Approval of Agenda and Meeting Objectives
| Yes |
Yes
| approved | No | S3‑161600 | |
S3‑161964 | Report from SA3 Adhoc NextGen | MCC | report | - |
4.1Approval of the report from SA3#84 and SA3#84 bis
| No |
YesRevised to introduce the correct attendees of the meeting.
| approved | No | S3‑161602 | |
S3‑161965 | Reply to: LS on SeDoC related authentication procedure | Deutsche Telekom | LS out | approval |
6.13GPP Working Groups
| No |
Yes
| left for email approval | No | ||
S3‑161966 | Reply to: LS on "Attach procedure for Remote SIM Provisioning” | Qualcomm | LS out | approval |
8.6.18Other
| Yes |
Yes
| approved | No | ||
S3‑161967 | Reply to: Request to SA3 to take the 3GPP TR 33.899 study item forward as a work item for Release 15 | Blackberry | LS out | approval |
8.6.18Other
| No |
Yes
| approved | No | ||
S3‑161968 | LS on state of SA3 discussions on NG security architecture | Nokia | LS out | Approval |
8.6.1Security architecture
| Yes |
YesThe approved tdoc 2081 contains a contradictory statement with 1.6. Co-locating AUSF and APRF was agreed there, on an editor's note.
This note in 2081 says that the interface between AUSF and APRF depends on a SA2 decision, whereas in this LS it says that it could not be agreed in SA3.
The Chair commented that SA3 needs to ask SA2 about this.
Huawei proposed the Editor's note: The need for standardising the interface between these two depend on SA2 and SA3 decisions.
| approved | No | ||
S3‑161969 | pCR 33.180 pCR clause 5 | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
YesCESG was fine with the document but they wanted to send an LS to SA6 on the terminology.
| approved | No | S3‑161617 | |
S3‑161970 | Termination point for user plane security | Ericsson LM | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| noted | No | S3‑161826 | |
S3‑161971 | Resolving ENs in key issue #1.15 Termination point of UP security | Huawei, HiSilicon | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161706 | |
S3‑161972 | Resolving the Editor’s notes in Key Issue#1.16 | Huawei, Hisilicon | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161709 | |
S3‑161973 | Flexible security policies negotiation in control plane | Huawei, HiSilicon | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161678 | |
S3‑161974 | pCR to TR 33.899, radio interface user plane integrity, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
YesAddressing Nokia's and NTT-Docomo's comments.
| approved | No | S3‑161747 | |
S3‑161975 | Clarification on Solution#1.1 and #1.3 | Huawei, Hisilicon | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161667 | |
S3‑161976 | pCR to TR 33.899, periodic local authentication and packet count check, evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161748 | |
S3‑161977 | pCR to TR 33.899: Update of a solution #1.4 on key hierarchy for 5G security | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161632 | |
S3‑161978 | Alternative architecture for storage of a key in the HMPLN when the NG-UE is roaming | Qualcomm Incorporated | pCR | Approval |
8.6.1Security architecture
| Yes |
YesEricsson needed some clarification on the new key hierarchy figure.
| approved | No | S3‑161728 | |
S3‑161979 | pCR update of solution # 1.6 to include more details on the roaming scenario | Qualcomm Incorporated | pCR | Approval |
8.6.1Security architecture
| Yes |
YesCooperation with SA2 and RAN will be needed. Added in an editor's note.
| approved | No | S3‑161735 | |
S3‑161980 | pCR to TR 33 899 Updated Solution 1.8 Key hierarchy for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161631 | |
S3‑161981 | Terminologies update and modification on key hierarchy in solution #1.9 | Huawei, HiSilicon | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161702 | |
S3‑161982 | Single termination point for NAS security | Nokia | pCR | - |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161870 | |
S3‑161983 | pCR to TR33.899 - Solutions for Low Latency Security Issues | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161769 | |
S3‑161984 | pCR to TR33.899, Use of a Non removable USIM for all UE security | VODAFONE Group Plc | pCR | Approval |
8.6.1Security architecture
| Yes |
Yes
| approved | No | S3‑161761 | |
S3‑161985 | [MC_Sec] Key Issue on Multiple Security Domains | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | S3‑161647 | |
S3‑161986 | [MC_Sec] Solution on Multiple Security Domains | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | S3‑161648 | |
S3‑161987 | Definition and Clarification for Security Policy Control Function | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161712 | |
S3‑161988 | New key issue "Increasing home control in roaming situations" | Nokia | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161875 | |
S3‑161989 | EPS AKA enhanced with UE authentication confirmation | Nokia | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161881 | |
S3‑161990 | Introducing EPS AKA* to authentication framework in solution 2.7 | Nokia | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161884 | |
S3‑161991 | Update of Key issue #2.10. Authorization alternative | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161807 | |
S3‑161992 | A solution for un-trusted non-3GPP access | Huawei; Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161670 | |
S3‑161993 | Clarification for Editor’s notes in Solution #2.13 | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161705 | |
S3‑161994 | MASA supports 4G USIM | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
YesMCC commented that there is no"4G" term in 3GPP specifications. It was agreed to add an editor's note for clarification of the "4G USIM".
| approved | No | S3‑161686 | |
S3‑161995 | solutions 11 & 12 guarantee one-to-one mapping of GUTI and current Ks | Huawei, Hisilicon | CR | - |
8.8.3Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices
| Yes |
Yes
| not treated | No | S3‑161950 | |
S3‑161996 | TS 33.180 | CESG | draft TS | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑161997 | Reply to: LS on protection of RTCP transported media control messages, RTCP APP transported pre-established session control messages and MBMS subchannel control messages | CESG | LS out | approval |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| approved | No | ||
S3‑161998 | Protection of MBMS subchannel control messages | Ericsson LM | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | S3‑161865 | |
S3‑161999 | Aligning XML encryption mechanism with CT WG agreements | Samsung, Airbus DS SLC, Motorola Solutions, Nokia | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | S3‑161786 | |
S3‑162000 | Aligning XML Integrity protection mechanism with CT WG agreements | Samsung , Airbus DS SLC, CESG (NCSC), Nokia | CR | Agreement |
7.6.11 Security of MCPTT (MCPTT)
| Yes |
Yes
| agreed | No | S3‑161792 | |
S3‑162001 | pCR 33.880 MCVideo proposal | Motorola Solutions Danmark A/S | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | S3‑161610 | |
S3‑162002 | Alignment with Rel-13 | CESG | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑162003 | LS on MC data prioritization and questions | Motorola Solutions | LS out | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑162004 | [MC_Sec] Solution for MCData SDS key management alongside messages | CESG (NCSC) | pCR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | S3‑161651 | |
S3‑162005 | TR 33.880 | CESG | draft TR | Approval |
8.7Study on Mission Critical Security Enhancements (FS_MC_Sec)
| Yes |
Yes
| approved | No | ||
S3‑162006 | Comments to S3-161737 | ORANGE, Vodafone, Telecom Italia, Oberthur Technologies, Deutsche Telekom, AT&T, Giesecke & Devrient | pCR | Approval |
8.6.5Security within NG-UE
| Yes |
YesVodafone: Integrity and confidentiality of the parameters and the same for the algorithm are difference concepts. There is no decision anywhere that there are public algorithms. It's the responsibility of the operator that both algorithm and parameters are confidentiality and integrity protected. This has been out of scope of standards until now and I don’t understand why we go for this here.
Morpho: confidentiality protection weakens what we have today.
Orange: I agree with your comment.
Ericsson argued that this commenting contribution was hard to follow since there were changes on changes and addition of requirements.
| noted | No | S3‑161958 | |
S3‑162007 | 3GPP security profile update – IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161908 | |
S3‑162008 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161918 | |
S3‑162009 | 3GPP security profile update - IPsec | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161919 | |
S3‑162010 | 3GPP security profile update – Certificates and CRLs | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161910 | |
S3‑162011 | 3GPP security profile update – TLS | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161912 | |
S3‑162012 | 3GPP security profile update – 33.220 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161914 | |
S3‑162013 | 3GPP security profile update – 33.221 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161915 | |
S3‑162014 | 3GPP security profile update – 33.320 | Ericsson | CR | Agreement |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| agreed | No | S3‑161917 | |
S3‑162015 | 3GPP security profile update – 43.318 | Ericsson | draftCR | - |
7.6.3Network Domain Security (NDS)
| Yes |
YesThis draftCR will be sent to RAN6 as endorsed by SA3 in a LS. CRs will be created in RAN6 with the same content and agreed at RAN6 level.
| endorsed | No | S3‑161948 | |
S3‑162016 | LS on 3GPP security profile update | Ericsson | LS out | Approval |
7.6.3Network Domain Security (NDS)
| Yes |
Yes
| approved | No | ||
S3‑162017 | Reply to: LS on I-WLAN specification referencing within CT6 | Ericsson | LS out | approval |
7.6.15Other work items
| Yes |
Yes
| approved | No | ||
S3‑162018 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | - |
7.6.15Other work items
| Yes |
Yes
| agreed | No | S3‑161878 | |
S3‑162019 | Use Cases from TR 22.862 (Enablers for Critical Communications) | 3GPP SA1 | discussion | Presentation |
8.6.18Other
| Yes |
YesSlides from the joint session between SA1 and SA3.
| noted | No | ||
S3‑162020 | Adding support of EAP Re-Authentication Protocol for WLAN Interworking (TWAN) | ORANGE, Broadcom, Ericsson | CR | Agreement |
7.4Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP)
| Yes |
Yes
| agreed | No | S3‑161642 | |
S3‑162021 | Alignment according to withdrawal of I-WLAN feature | Ericsson | CR | - |
7.6.15Other work items
| Yes |
Yes
| agreed | No | S3‑161885 | |
S3‑162022 | pCR to TR33.899 MASA Guarantees the Serving Network Public Key Authenticty | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161688 | |
S3‑162023 | pCR to TR33.899 MASA Details of Mutual Authentication | Huawei, Hisilicon | pCR | Approval |
8.6.2Authentication
| Yes |
YesAdding an editor's note on the evaluation as proposed by Nokia.
| approved | No | S3‑161690 | |
S3‑162024 | MASA NG-UE Security Capabilities Negotiation | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161691 | |
S3‑162025 | pCR to TR33.899 - new solution - Identity-based Authentication of Equipment | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161774 | |
S3‑162026 | pCR_Update Solution #2.14 for non-AKA based Authentication | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161721 | |
S3‑162027 | Updates to Device Certificate Enrollment in solution 2.10 | Qualcomm Incorporated | pCR | Approval |
8.6.2Authentication
| Yes |
YesFourth bullet removed as petitioned by Nokia.
| approved | No | S3‑161738 | |
S3‑162028 | pCR to TR 33.899, updating long term secret key, improvement and evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161753 | |
S3‑162029 | pCR to TR33,899 - Revision of the evaluation for Solution #2.6 | VODAFONE Group Plc | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161772 | |
S3‑162030 | pCR 33.180 Annex B | Motorola Solutions Danmark A/S | pCR | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | S3‑161615 | |
S3‑162031 | Update to solution #2.9: Fast re-authentication with ERP | Ericsson LM | pCR | Approval |
8.6.2Authentication
| Yes |
Yes
| approved | No | S3‑161900 | |
S3‑162032 | pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition | China Mobile Com. Corporation | pCR | Approval |
8.6.4RAN security
| Yes |
YesEricsson: this is subject to agreements in RAN.It was agreed to add an editor's note.
| approved | No | S3‑161778 | |
S3‑162033 | Key issue on security key and context identification | Nokia | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161833 | |
S3‑162034 | Solution on security key and context identification | Nokia | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161834 | |
S3‑162035 | pCR to TR 33.899, UE requests key refresh, refinement and evaluation | VODAFONE Group Plc | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161757 | |
S3‑162036 | introduce algorithms negotiation call flow | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | - |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161672 | |
S3‑162037 | A solution for key negotiation in dual connectivity scenario | Huawei, HiSilicon | pCR | - |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161673 | |
S3‑162038 | Security Key Refresh Triggered by UE | Huawei, HiSilicon | pCR | - |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161699 | |
S3‑162039 | pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities | Qualcomm Incorporated | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161731 | |
S3‑162040 | Enhancements to solution 3.4 | Qualcomm Incorporated | pCR | Approval |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161736 | |
S3‑162041 | Potential security requirements on gNB | Huawei, HiSilicon,Interdigital | pCR | - |
8.6.4RAN security
| Yes |
Yes
| approved | No | S3‑161697 | |
S3‑162042 | Details on Key issue #4.5: Security aspects of WLAN aggregation | Ericsson | pCR | - |
8.6.4RAN security
| Yes |
YesIncludes some modifications suggested by Broadcom, relating this to the RAN and changing the editor's note.
| approved | No | S3‑161863 | |
S3‑162043 | Resolving Editor’s Note on UE behaviour in reading the SIB | Samsung | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| approved | No | S3‑161805 | |
S3‑162044 | Resolving Editor’s Note on provisioning of public keys to the UE | Samsung | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| approved | No | S3‑161897 | |
S3‑162045 | pCR solution to Key Issue # 4.6 User plane DoS attacks | Qualcomm Incorporated | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| noted | No | S3‑161733 | |
S3‑162047 | SA3 decisions on security architecture needed by SA2 | Nokia | discussion | - |
8.6.1Security architecture
| No |
Yes
| noted | No | S3‑161873 | |
S3‑162048 | Requirements for NG-UE | Huawei, HiSilicon | pCR | - |
8.6.5Security within NG-UE
| Yes |
Yes
| approved | No | S3‑161680 | |
S3‑162049 | Detailing clauses 4.2.1, 4.2.3.1 and 4.3.1 | TELECOM ITALIA S.p.A. | CR | Approval |
7.1.1Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3)
| No |
YesChanged the reference to the 800 series TR to the TS (since the 800 series cannot be referenced).
| agreed | No | S3‑161638 | |
S3‑162050 | Adding the security requirements of user plane traffic differentiation | ZTE Corporation | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| approved | No | S3‑161609 | |
S3‑162051 | Adding test case on the uniqueness of the Charging ID deriving from the 3GPP specifications | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesIt removes a pre-condition as proposed by Ericsson.
DT:step two at least 10000 according to the current power of the processors.
| approved | No | S3‑161635 | |
S3‑162052 | Adding requirement on the uniqueness of GTP TEID generated by the PGW and related test case. | TELECOM ITALIA S.p.A. | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| approved | No | S3‑161637 | |
S3‑162053 | pCR adding the introduction in the section 4.1 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
YesSome minor editorial changes pointed out by MCC.
| approved | No | S3‑161765 | |
S3‑162054 | pCR adding the security requirements of traffic separation in the section 4.3.5 of TS33.250 | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| Yes |
Yes
| approved | No | S3‑161771 | |
S3‑162055 | pCR adding the security functional requirements on the PGW deriving from 3GPP specifications | China Mobile Com. Corporation, Huawei, ZTE, CATR | pCR | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
Yes
| Left for email approval | No | S3‑161773 | |
S3‑162056 | TS 33.250 | China Mobile | draft TS | Approval |
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
| No |
Yes
| left for email approval | No | ||
S3‑162057 | TS 33.216 | Huawei | draft TS | Approval |
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
| Yes |
Yes
| approved | No | ||
S3‑162058 | New WID on security aspect of architecture enhancements for LTE support of V2X services | Huawei, HiSilicon | WID new | - |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| agreed | No | S3‑161766 | |
S3‑162059 | V2X security architecture based on the new security elements | Huawei, Hisilicon | pCR | - |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161760 | |
S3‑162060 | Update on V2X UE Privacy key issue | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161829 | |
S3‑162061 | Privacy solution | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161830 | |
S3‑162062 | V2X Annex on privacy by regulation EU | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161831 | |
S3‑162063 | V2X Annex on privacy by regulation US | Nokia | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161832 | |
S3‑162064 | Solution against UE tracking based on PC5 autonomous mode | Ericsson LM | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161846 | |
S3‑162065 | Solution for V-UE pseudonymity based on a V2X MVNO | Ericsson LM | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161848 | |
S3‑162066 | A Vehicle UE Privacy Protection Framework with Homomorphic Encryption | Huawei, HiSilicon | pCR | - |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161751 | |
S3‑162067 | Enhancements to solution 6.9 on encrypting IMSI to provide privacy from the serving network | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161814 | |
S3‑162068 | LS on V2X UE IP address change | LG Electronics France | LS out | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161798 | |
S3‑162069 | Adding details to the reattach procedure in solution 6.5 | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161820 | |
S3‑162070 | Solution for UE Security Credential Provisioning and Tracing with Identity based Cryptography | Huawei, Hisilicon | pCR | - |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161779 | |
S3‑162071 | Alternative security procedure for data transfer between UE and V2X Control Function | Huawei, Hisilicon | pCR | - |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161754 | |
S3‑162072 | Conclusion of V2X communication security | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161815 | |
S3‑162073 | Conclusion of the V3 interface security | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161816 | |
S3‑162074 | Conclusion on security of the interfaces between network entities for V2X | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
YesAdding the interim agreement.
| approved | No | S3‑161817 | |
S3‑162075 | Update and conclusion on solution 6.6 on UE privacy due to data traversing the network | Qualcomm Incorporated | pCR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| Yes |
Yes
| approved | No | S3‑161818 | |
S3‑162076 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Approval |
8.6.6Authorization
| Yes |
YesVodafone: unnecessarily complex.Morpho agreed, this is not in line with the requirement from SA1.
China Mobile: auth for the 3rd party should be handled in the third party, not the MNO.Interidgital replied that it was explained in the contribution.
Orange was against the contribution. Vodafone was fine with it until the evaluation was filled in.
| revised | No | S3‑162098 | S3‑161619 |
S3‑162077 | TR 33.885 | Huawei | draft TR | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| No |
YesIt was agreed to send it for information.
| left for email approval | No | ||
S3‑162078 | Cover sheet TR 33.885 | Huawei | TS or TR cover | Approval |
8.5Study on security aspects for LTE support of V2X services (FS_V2XLTE)
| No |
Yes
| left for email approval | No | ||
S3‑162079 | Prevent UP DoS Attack over Air Interface | Huawei, HiSilicon | pCR | - |
8.6.4RAN security
| Yes |
YesNokia commented that small data was decided to be postponed, but the Chair commented that this had been opened and commented.
| approved | No | S3‑161777 | |
S3‑162080 | Authentication and Key Agreement for non-3GPP access | Intel Corporation (UK) Ltd | pCR | - |
8.6.3Security context and key management
| Yes |
Yes
| approved | No | S3‑161719 | |
S3‑162081 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
Yes
| revised | No | S3‑162124 | S3‑161783 |
S3‑162082 | Ls on terminology used y SA6 | CESG | LS out | Approval |
7.5Security of the Mission Critical Service (MCSec)
| Yes |
Yes
| approved | No | ||
S3‑162083 | Verification of gNB using UL monitoring and System Query | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
Yes
| approved | No | S3‑161659 | |
S3‑162084 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Agreement |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| agreed | No | S3‑161901 | |
S3‑162085 | Clarification related to the LLC acknowledge mode | Ericsson LM | CR | Approval |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| agreed | No | S3‑161902 | |
S3‑162086 | Reply to: LS on LLC updates for EC-GSM-IOT enhanced security | Ericsson | LS out | approval |
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
| Yes |
Yes
| approved | No | ||
S3‑162087 | Reply LS to R3-162642 on Light Connection | Nokia, Intel | LS out | Approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
YesDeutsche Telekom: the message from SA3 is replay protection for the message coming from the eNodeB. No need to go into details.
This was taken offline.
| approved | No | S3‑161657 | |
S3‑162088 | Reply to: Security aspects of RRC Connection Re-Establishment for NB-IoT (DoNAS) | Intel | LS out | approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| approved | No | ||
S3‑162089 | Security of RRC Connection re-establishment of NB-IOT for CP Solution | Intel Corporation (UK) Ltd | discussion | Discussion |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| No |
Yes
| noted | No | S3‑161717 | |
S3‑162090 | draft_CR to 33.401 Correct Reference to NAS Spec in 8.2 | Nokia | CR | - |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| agreed | No | S3‑161654 | |
S3‑162091 | Unauthenticated Emergency services over trusted WLAN | Nokia | CR | Agreement |
7.6.15Other work items
| Yes |
YesSome changes proposed by Ericsson.
| agreed | No | S3‑161892 | |
S3‑162092 | Unauthenticated Emergency services over untrusted WLAN | Nokia | CR | Agreement |
7.6.15Other work items
| Yes |
Yes
| agreed | No | S3‑161895 | |
S3‑162093 | Solution against spatial replay attacks based on a new coordinate grid | Ericsson LM | other | Endorsement |
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
| Yes |
YesLiving document.
| endorsed | No | S3‑161860 | |
S3‑162094 | TR 33.833 | Qualcomm | draft TR | Approval |
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
| No |
Yes
| left for email approval | No | ||
S3‑162095 | Cover sheet 33.833 | Qualcomm | TS or TR cover | Approval |
8.1Study on Security for Proximity-based Services (FS_ProSe_Sec)
| No |
Yes
| left for email approval | No | ||
S3‑162096 | Update of key issue #6.y: Accounting and non-repudiation | Huawei, Hisilicon | pCR | - |
8.6.6Authorization
| Yes |
Yes
| approved | No | S3‑161804 | |
S3‑162097 | Solution #6.x: Dynamic Authorization by Operator/MNO | INTERDIGITAL COMMUNICATIONS | pCR | Approval |
8.6.6Authorization
| Yes |
Yes
| approved | No | S3‑161618 | |
S3‑162098 | Solution #6.y: Dynamic Authorization by Trusted 3-rd Party | INTERDIGITAL COMMUNICATIONS | pCR | Approval |
8.6.6Authorization
| Yes |
YesAdding an editor's note.
| approved | No | S3‑162076 | |
S3‑162099 | Solution for UE authorization based on a secondary authentication with a third party server | Ericsson LM | pCR | Approval |
8.6.6Authorization
| Yes |
Yes
| approved | No | S3‑161827 | |
S3‑162100 | Key issue #7.y: Need to protect entire Permanent Identifier | INTERDIGITAL, THALES | pCR | Approval |
8.6.7Subscription privacy
| No |
Yes
| approved | No | S3‑161611 | |
S3‑162101 | pCR for adding solution for key issues #7.4 and #7.7: effective generation of temporary or short-term identifiers based on channel estimation | THALES | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161639 | |
S3‑162102 | Commenting solution 7 3 and proposal to split from LI was S3-161447 | Nokia, Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161835 | |
S3‑162103 | Protect the Permanent or Long Termn User Identity with Public Key Techologies | Huawei, HiSilicon | pCR | - |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161782 | |
S3‑162104 | New SID on security aspect of architecture enhancements to ProSe UE-to-Network Relay | Huawei, Hisilicon | SID new | - |
8.8.4Other study items
| No |
Yes
| not treated | No | S3‑161742 | |
S3‑162105 | pCR Security enhancement to the attach procedure without relying on PKI | China Mobile Com. Corporation, Thales | pCR | Approval |
8.6.7Subscription privacy
| No |
Yes
| left for email approval | No | S3‑161775 | |
S3‑162106 | pCR Security enhancement to the attach procedure relying on PKI | China Mobile Com. Corporation | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161776 | |
S3‑162107 | Identity privacy and backwards compatibility | Huawei, HiSilicon | pCR | - |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161715 | |
S3‑162108 | New privacy solution for concealing permanent subscriber identifier | TELECOM ITALIA S.p.A., Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161641 | |
S3‑162109 | Privacy-enhanced LTE-style mechanism for temporary identifier assignment | Ericsson | pCR | Approval |
8.6.7Subscription privacy
| Yes |
Yes
| approved | No | S3‑161855 | |
S3‑162110 | Isolation of slices using UP security terminating in the network | Qualcomm Incorporated | pCR | Approval |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | S3‑161729 | |
S3‑162111 | Solution for Security Mechanism Differentiation for Network Slices | HUAWEI TECHNOLOGIES Co. Ltd. | pCR | - |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | S3‑161740 | |
S3‑162112 | Network authentication supporting network slices | Huawei, Hisilicon | pCR | - |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | S3‑161741 | |
S3‑162113 | Slice authentication | Huawei, Hisilicon | pCR | - |
8.6.8Network slicing security
| Yes |
YesEditor's note on aligning with the SA2 architecture.
| approved | No | S3‑161789 | |
S3‑162114 | Security Architecture for Network Slicing | CATT, CATR | pCR | Approval |
8.6.8Network slicing security
| Yes |
Yes
| approved | No | S3‑161745 | |
S3‑162115 | Resolving EN in solution 10.2 | Nokia | pCR | - |
8.6.10Network domain security
| Yes |
Yes
| approved | No | S3‑161896 | |
S3‑162116 | UE configuration of key and identifier refresh | LG Electronics France | pCR | Approval |
8.6.11Security visibility and configurability
| Yes |
Yes
| approved | No | S3‑161791 | |
S3‑162117 | Updates to Remote credential provisioning – Add Headless IoT device to existing user’s MNO subscription | Intel Corporation (UK) Ltd | pCR | Approval |
8.6.12Credential provisioning
| Yes |
Yes
| approved | No | S3‑161714 | |
S3‑162118 | Updates to remote credential provisioning using captive portal technique | Intel Corporation (UK) Ltd | pCR | Approval |
8.6.12Credential provisioning
| Yes |
Yes
| approved | No | S3‑161710 | |
S3‑162119 | Updates to Solution #12.4 to detail EAP-TLS authentication procedure | Samsung | pCR | Approval |
8.6.12Credential provisioning
| Yes |
Yes
| approved | No | S3‑161803 | |
S3‑162120 | New solution: Network access for credentials provisioning | Ericsson | pCR | - |
8.6.12Credential provisioning
| Yes |
Yes
| approved | No | S3‑161859 | |
S3‑162121 | Update on security area interworking and migration | Nokia | pCR | Approval |
8.6.13Interworking and migration
| Yes |
Yes
| approved | No | S3‑161840 | |
S3‑162122 | Base document for discussion of priorisation of key issues Zugenmaier, Alf tdoc number 09:30 18 KB | NTT-Docomo | discussion | discussion |
8.6.18Other
| Yes |
YesConference calls to be held:
- RAN2 light connection. Nokia takes the lead.
- DONAS.
- BEST normative work. Vodafone.
- NSA topics after the prioritzation call.
Calls to be held by End of November, beginning of December.
This document will be discussed during the conference calls.
| noted | No | ||
S3‑162123 | Reply to: LS on S-TMSI in RAN paging | Ericsson | LS out | approval |
7.6.14Security Aspects of Narrowband IOT (CIoT)
| Yes |
Yes
| approved | No | ||
S3‑162124 | Amendment to the Terms for the Authentication | Huawei, Hisilicon | pCR | - |
8.6.2Authentication
| Yes |
YesRevised to reword the editor's note according to the LS S3-161968.
| approved | No | S3‑162081 | |
S3‑162125 | Work Plan input from Rapporteurs | MCC | other | - |
9Review and Update of Work Plan
| No |
Yes
| noted | No | S3‑161606 | |
S3‑162126 | Draft TS 55.241 - Specification of the GIA4 integrity algorithm for GPRS - GIA4 specification - (Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| No |
Yes
| left for email approval | No | S3‑161952 | |
S3‑162127 | Cover sheet for TS 55.241 | Vodafone | TS or TR cover | Approval |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| No |
Yes
| left for email approval | No | ||
S3‑162128 | TS 55.251 - Specification of the GEA5 encryption and GIA5 integrity algorithms for GPRS - GEA5 and GIA5 algorithm specification -(Release 14) | VODAFONE Group Plc | draft TS | Agreement |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| No |
Yes
| left for email approval | No | S3‑161955 | |
S3‑162129 | Cover sheet TS 55.251 | Vodafone | TS or TR cover | Approval |
7.2New GPRS algorithms for EASE (EASE_ALGOs_SA3)
| No |
Yes
| left for email approval | No | ||
S3‑162130 | Evaluation of digital signature solution 5.4.4.2 | Nokia | pCR | Approval |
8.6.4RAN security
| Yes |
YesAdding an editor'd note as proposed by Samsung.
| approved | No | S3‑161661 | |
S3‑162131 | pCR to TR 33.899: Proposal of key issue and solution for option 3 | NEC EUROPE LTD | pCR | Approval |
8.6.13Interworking and migration
| No |
Yes
| left for email approval | No | S3‑161629 | |
S3‑162132 | 5G interworking - key issue on bidding down attack was S3-161394 | Nokia | pCR | Approval |
8.6.13Interworking and migration
| Yes |
Yes
| approved | No | S3‑161844 | |
S3‑162133 | pCR to TR 33.899 Handover procedure for NextGen | NEC EUROPE LTD | pCR | Approval |
8.6.13Interworking and migration
| No |
Yes
| left for email approval | No | S3‑161628 | |
S3‑162134 | Network slice life-cycle security | Huawei, Hisilicon | pCR | - |
8.6.16 Management Security
| No |
Yes
| left for email approval | No | S3‑161809 | |
S3‑162135 | Update of Key issue #17.2: Quantum safe cryptography | Ericsson | pCR | Approval |
8.6.17Cryptographic algorithms
| No |
YesUS Chamber of Commerce: we cannot wait until the quantum computers arrive.
Huawei: UE capabilities should be taken into consideration.
| left for email approval | No | S3‑161851 | |
S3‑162136 | DoS from External Network | Huawei, HiSilicon | pCR | - |
8.6.18Other
| Yes |
Yes
| approved | No | S3‑161676 | |
S3‑162137 | Minutes from joint SA1/SA3 meeting | MCC | report | Information |
8.6.18Other
| No |
Yes
| noted | No | ||
S3‑162138 | TR 33.899 | Ericsson | draft TR | Approval |
8.6.18Other
| No |
Yes
| left for email approval | No | ||
S3‑162139 | Short notes from Joint session SA1-SA3 | SA1 WG Chair | report | Information |
8.6.18Other
| No |
Yes
| noted | No |