Tdoc List
2017-08-11 15:40
Agenda | Topic | TDoc | Title | Source | Type | For | Avail | Treated | Decision | Wdrn | Replaced-by | Replaces |
---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Opening of the Meeting |   | ||||||||||
2 | Approval of Agenda and Meeting Objectives | S3‑171700 | Agenda | WG Chairman | agenda | Yes |
Yes
| approved | No | |||
3 | IPR Reminder |   | ||||||||||
4 | Meeting reports |   | ||||||||||
4.1 | Approval of the report from SA3#87 | S3‑171701 | Report from SA3#87 | MCC | report | Yes |
YesFirst action item was not done (conference call by Nokia) and it will be carried out after the current meeting. China Mobile had held the conference call for the second action item: two contributions were discussed (by China Mobile and KPN). Some open issues with the NAS security when using the USIM. There were input documents for this meeting dealing with this topic.
| approved | No | |||
4.2 | Report from SA #76 | S3‑171703 | Report from last SA meeting | WG Chairman | report | Yes |
YesAlf (NTT-Docomo) attended the meeting as vice-chairman since Anand wasn’t available.
Verizon asked about the LS from SA2 about emergency calls for Rel-15. Does this apply for specific deployments?This was taken offline.
Vodafone thanked Alf for the effort on having the BEST TS approved in the meeting.
| noted | No | |||
4.3 | Report from SA3-LI |   | ||||||||||
5 | Items for early consideration |   | ||||||||||
6 | Reports and Liaisons from other Groups |   | ||||||||||
6.1 | 3GPP Working Groups | S3‑171709 | Reply LS on eDRX Configuration and IMSI-paging | C1-172392 | LS in | Yes |
Yes
| noted | No | |||
S3‑171711 | LS on Security for T8 interface | C3-173330 | LS in | Yes |
YesHuawei had a discussion paper on the subjexct in tdoc 1877, and a Study Item to support it. They were discussed as well and a reply was drafted.
| replied to | No | |||||
S3‑172076 | Reply to: LS on Security for T8 interface | Huawei | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171712 | Reply LS on eDRX Configuration and IMSI-paging | C4-173312 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171757 | proposed response LS to RAN2 - LS to SA3 on security keys in EN-DC and actions upon DRB IP check failure | VODAFONE Group Plc | LS out | Approval | No |
No
| withdrawn | Yes | ||||
S3‑171914 | Reply LS on security aspects with FEC and ROHC over MBMS | S6-171105 | LS in | Yes |
Yes
| noted | No | |||||
6.2 | IETF |   | ||||||||||
6.3 | ETSI SAGE |   | ||||||||||
6.4 | GSMA |   | ||||||||||
6.5 | 3GPP2 |   | ||||||||||
6.6 | OMA |   | ||||||||||
6.7 | TCG | S3‑171768 | TCG progress report | InterDigital, Inc. | other | Information | Yes |
YesAlec (Interdigital) gave an update on the work of TCG.
| noted | No | ||
6.8 | oneM2M |   | ||||||||||
6.9 | TC-CYBER | S3‑171713 | Middlebox Security | ETSI TC CYBER | LS in | Yes |
YesNokia commented that IETF is involved as well and that they are not keen on some topics of Middle Box security. Alex (BT) Commented that TC CYBER will respond to IETF in an LS.
| postponed | No | |||
6.10 | ETSI NFV security |   | ||||||||||
6.11 | Other Groups | S3‑171714 | LS to NGMN and ISG MEC regarding law enforcement requirements in MEC | ETSI TC LI | LS in | Yes |
Yes
| noted | No | |||
S3‑172066 | Update on the status of the work on SSP (Smart Secure Platform) | ETSI TC SCP | LS in | Yes |
YesVodafone commented that the progress in SCP is very slow and doubted about their ability to finish this on time. ORANGE commented that SCP has been warned that their work will not be included in the 3GPP specs if they don't finish on time.
| noted | No | |||||
7 | Work Areas |   | ||||||||||
7.1 | Security Assurance (Rel-15) |   | ||||||||||
7.1.1 | Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW) | S3‑171995 | CR to TS 33.250_Authentication extension validation | NEC Corporation | CR | Agreement | Yes |
Yes
| revised | No | S3‑172119 | |
S3‑172119 | CR to TS 33.250_Authentication extension validation | NEC Corporation | CR | Agreement | Yes |
Yes
| agreed | No | S3‑171995 | |||
S3‑172027 | CR to TS 33.250_Emergency PDN Connection Release | NEC Corporation | CR | Agreement | Yes |
Yes
| revised | No | S3‑172122 | |||
S3‑172122 | CR to TS 33.250_Emergency PDN Connection Release | NEC Corporation | CR | Agreement | Yes |
Yes
| agreed | No | S3‑172027 | |||
S3‑171915 | Resolving two editor’s notes about reuse of Charging ID and TEID | China Mobile, Telecom Italia, China Unicom | CR | Approval | Yes |
YesEricsson agreed with the content but wasn't sure about placing it here. What is the tester doing with this statement?
| revised | No | S3‑172123 | |||
S3‑172123 | Resolving two editor’s notes about reuse of Charging ID and TEID | China Mobile, Telecom Italia, China Unicom | CR | Approval | Yes |
Yes
| agreed | No | S3‑171915 | |||
7.1.2 | Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB) | S3‑171854 | eNB SCAS TS | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑171868 | AS Security Mode Command Procedurey | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑172126 | |||
S3‑172126 | AS Security Mode Command Procedurey | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171868 | |||
S3‑171869 | Bidding down prevention in X2-handovers | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑172127 | |||
S3‑172127 | Bidding down prevention in X2-handovers | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171869 | |||
S3‑171870 | AS Protection algorithm selection in eNB change | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172028 | pCR to TS 33.216_RRC and UP downlink ciphering at the eNB | NEC Corporation | pCR | Approval | Yes |
YesEricsson: the precondition needs to be made similar to the rest of preconditions in the document.
The UE should be simulated.
BT: We need to be very strict to avoid having those keys getting out to the wild.
| revised | No | S3‑172128 | |||
S3‑172128 | pCR to TS 33.216_RRC and UP downlink ciphering at the eNB | NEC Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑172028 | |||
S3‑172124 | Draft TS 33.216 | Huawei | draft TS | Approval | No |
Yes
| approved | No | ||||
S3‑172125 | Cover sheet 33.216 | Huawei | TS or TR cover | Approval | Yes |
Yes
| approved | No | ||||
7.1.3 | Other |   | ||||||||||
7.2 | EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15) | S3‑171719 | LS to SA3 on Counter Check Procedure and SCG SRB integrity check failure | R2-1706161 | LS in | Yes |
Yes
| replied to | No | |||
S3‑172077 | Reply to: LS to SA3 on Counter Check Procedure and SCG SRB integrity check failure | Nokia | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171720 | Reply LS on algorithm selection in E-UTRA-NR Dual Connectivity | R2-1707496 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑172078 | Reply to: Reply LS on algorithm selection in E-UTRA-NR Dual Connectivity | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171721 | LS reply on NR security input parameters | R2-1707498 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑171722 | LS to SA3 on security keys in EN-DC and actions upon DRB IP check failure | R2-1707501 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑172079 | Reply to: LS reply on NR security input parameters | Qualcomm | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑172080 | Reply to: LS to SA3 on security keys in EN-DC and actions upon DRB IP check failure | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171840 | Discussion on the handling of NR security capability | Huawei; Hisilicon | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑171841 | Correction to living document of S3-171487 | Huawei; Hisilicon | other | Approval | Yes |
Yes
| merged | No | S3‑172149 | |||
S3‑172052 | CR to TS 33.401_Update of CR on EN-DC | NEC Corporation | other | Approval | Yes |
Yes
| merged | No | S3‑172149 | |||
S3‑172056 | Updates to S3-171487 (CR to TS 33.401 for Option 3/3a/3x dual connectivity | VODAFONE Group Plc | draftCR | Approval | Yes |
Yes
| revised | No | S3‑172067 | S3‑171487 | ||
S3‑172067 | revision of Updates to S3-171487 (CR to TS 33.401 for Option 3/3a/3x dual connectivity following comments | VODAFONE Group Plc | draftCR | Approval | Yes |
YesEricsson didn’t agree with the X2 interface in figure E.1.2-1.
Vodafone: RAN3 latest agreements confirm this. This was taken offline.
Qualcomm: the eNodeB to support potential inputs to the same core block? This would be a premature decision and we need to discuss it with RAN2.
| revised | No | S3‑172149 | S3‑172056 | ||
S3‑172149 | revision of Updates to S3-171487 (CR to TS 33.401 for Option 3/3a/3x dual connectivity following comments | VODAFONE Group Plc | draftCR | Approval | Yes |
Yes
| approved | No | S3‑172067 | |||
S3‑171923 | Discussion on the signalling and negotiation of the NR security capabilities | Ericsson | discussion | Endorsement | Yes |
Yes
| noted | No | ||||
S3‑171925 | Mechanism for NR security capabilities signalling and negotiation | Ericsson | other | Approval | Yes |
YesNokia: why do we need translation in the eNodeB?
Ericsson: we want to avoid SgNB doing some kind of mapping to 5G language.
Nokia doubted that a translation would be needed in phase one.
Huawei: we need a LTE traditional procedure to support MeNodeB. They supported Nokia.
Ericsson:The algorithms in 5G will be different from the ones in 4G, at least they will change in name.
| noted | No | ||||
S3‑171998 | Adding bidding down security based on AS signalling to the EN-DC draft CR | Qualcomm Incorporated | other | Approval | Yes |
YesQualcomm questioned combining LTE/NR in the same signalling as Ericsson proposed. They would support a negotiation where it is indicated the algorithms supported for LTE and for NR.
Nokia: maybe we are creating a problem by defining two sets.
The Chair clarified that cryptographic algortihms are the same in NR.
Qualcomm: inputs to NR are not the same as in LTE since the bearer IDs are different. We should have separate bits to say these algos support LTE and these support NR.
Qualcomm: Happy to do the /NAS based solution as long as we have separate bits for the NR capability and for the LTE capability.
Ericsson: in the case the issue is that the legacy eNodeB doesn’t understand the new capabilities.All eNodeBs would need to be upgraded.
Huawei: the NAS solution is the way to go.
How do you transfer the capabilities to the MeNodeB? If you come to the Ericsson: MeNodeB from a legacy eNodeB handover (x2 interface) you will not get this information.
Huawei: the legacy issue is not a priority now.
The Chair commented that the general feeling is going for an AS based solution, but the Qualcomm proposal needed to be commented offline.
| noted | No | ||||
S3‑171924 | Reply LS proposal on algorithm selection in E-UTRA-NR Dual Connectivity | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171999 | Proposed response LS on algorithm selection in E-UTRA-NR Dual Connectivity | Qualcomm Incorporated | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171866 | Discussion on the third key used for common PDCP | Huawei; Hisilicon | pCR | Approval | Yes |
YesEricsson: the fact that the option one is not secure, or that they plan to use two keys, it's Huawei's interpretation but not what RAN2 implies.
Ericsson: SgNodeB does not transfer any key from the MeNodeB.
| noted | No | ||||
S3‑172054 | Draft Reply LS to R2-1707501 | NEC Corporation | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑172032 | Security Keys in EN-DC | Samsung | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172035 | [DRAFT] Response LS on security keys in EN-DC and actions upon DRB IP check failure | Ericsson | LS out | Decision | Yes |
YesEricsson: it would be acceptable if the eNodeB didn’t have integrity protection. We haven't agreed to make eNodeB user plane integrity mandatory, but it should be OK for the 5G core, packets are dropped. RAN2 may specify some recovery mechanisms for recovery of the dropped packets.
| noted | No | ||||
S3‑171920 | [DRAFT] Reply LS to RAN2 on security keys in EN-DC and actions upon DRB IP check failure | China Mobile | LS out | Yes |
Yes
| noted | No | |||||
S3‑172002 | Discussion on the choice of keying method and impact of failed integrity protection check for UP traffic | Qualcomm Incorporated | other | Approval | Yes |
Yes
| merged | No | S3‑172149 | |||
S3‑171814 | Discussion on i/c LS R2-1706151 ENDC Security | Nokia | discussion | Endorsement | Yes |
Yes
| noted | No | ||||
S3‑172069 | Further comments to Nokia S3-171814 Discussion on i/c LS R2-1706151 on DC bearers | Nokia | discussion | Endorsement | Yes |
YesNokia: option one is pure Rel-13 dual connectivity.
Ericsson: it's ok to use the same key as long as you don’t change the termination point; this was agreed in SA3 and in you are contradicting this decision here.
Nokia: UE performance is affected when rekeying. Ericsson didn’t understand this issue: There weren't performance issues in the dual connectivity. There is no disruption of the service.
Verizon: performance impact is not to be decided in SA3. RAN2 wants a good security solution.We should go for option 3.
Qualcomm: option 3 has more complexity from the security perspective.
Nokia: the number of keys exchanged is reduced and the performance is improved.
Huawei pointed out that RAN2 would like a transparent process.
Qualcomm: the transparent exchange cannot be achieved in terms of option 2 and option 3.
Ericsson: transparency means that the network indicates the UE when to change the key. We have a different understanding of option one despite that most companies seem to go for this option.
China Mobile: different keys for LTE PDCP and NR PDCP?
Qualcomm: the algorithm is the same in both LTE and PDCP, it's only the message that changes.
Ericsson: all three options are possible, but the principle in option one is the most important from the security point of view. Nokia agreed but leaving the door open for using the other two options in a specific circumstance. Qualcomm didn’t see the security gain for having the possibility of using the other two options.
Nokia: we agreed and implemented option 1 in Rel-12. We should also agree at least on option 2. Huawei agreed.
| noted | No | ||||
S3‑171867 | Draft LS reply R2-1707501 | Huawei; Hisilicon | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑172003 | Proposed response LS on security keys in EN-DC and actions upon DRB IP check failure | Qualcomm Incorporated | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171837 | Discussion on DRB integrity protection check failure | Huawei; Hisilicon | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑171985 | Discussion on i/c LS R2-1706161 on DRB IP failure and counter check | Nokia | discussion | Approval | Yes |
Yes
| noted | No | ||||
S3‑172000 | Discussion on the details of the NR security algorithms | Qualcomm Incorporated | other | Approval | Yes |
YesVodafone: SAGE would like to have requests the earlier the better. Conference calls with them, with decision power, would ease the process.
| revised | No | S3‑172083 | |||
S3‑172083 | Discussion on the details of the NR security algorithms | Qualcomm Incorporated | other | Approval | Yes |
Yes
| approved | No | S3‑172000 | |||
S3‑172001 | Proposed reponse LS on NR security input parameters | Qualcomm Incorporated | LS out | Approval | Yes |
YesEricsson: this is still being discussed, not decided in RAN2 yet. If this is changed, we need to know fast, we should tell RAN2. It's a bit early to involve SAGE now.
Nokia: it's still OK to let SAGE know about this possible change of the number of bits.
The sentence will be reworded to transfer the message to SAGE in any case.
The Chair commented that it's better to be proactive and tell SAGE about the implications of RAN2's work given the timing implications.
Nokia: there is no drastic change in the algorithms, it’s just a change of the range of a parameter. Don't involve SAGE yet.
Ericsson: just put them in copy in the LS.
Nokia: SAGE will know about this anyway, they will know through Vodafone about these discussions.
| noted | No | ||||
S3‑172055 | Clarifications to the user plane integrity requirements in ENDC (option 3) | Ericsson | other | Approval | Yes |
YesNTT-Docomo: eNodeBs in the future may need user plane integrity protection. The wording in E.1.2 should be changed. Ericsson agreed.
| revised | No | S3‑172085 | |||
S3‑172085 | Clarifications to the user plane integrity requirements in ENDC (option 3) | Ericsson | other | Approval | Yes |
Yes
| approved | No | S3‑172055 | |||
S3‑172084 | DraftCR on EN-DC | Qualcomm,NEC,Ericsson,Huawei, HiSilicon | draftCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172188 | Solution for dual connectivity between MeNB and SgNB | Qualcomm,NEC,Ericsson,Huawei, HiSilicon,Nokia, Samsung, NTT-Docomo,Vodafone,BT | CR | Agreement | Yes |
Yes
| agreed | No | ||||
7.3 | Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15) | S3‑171708 | LS on Closed Subscriber Group in 5GS | S1-172425 | LS in | Yes |
Yes
| noted | No | |||
S3‑171723 | Reply LS on Closed Subscriber Group in 5GS | RP-171479 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171730 | Response LS on Support for fake gNB detection mechanisms | R1-1711997 | LS in | Yes |
YesNokia: we can’t decide which way to go since RAN2 hasn’t replied, only RAN1.
It was decided to wait for RAN2's work.
| noted | No | |||||
S3‑171726 | Reply to LS on State of SA3 discussions on NG security architecture | S2-174073 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171734 | LS reply on NAS SM integrity protection | S2-175289 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171735 | Reply LS on 5GS Security aspects seeking resolution | S2-175309 | LS in | Yes |
YesQualcomm: we need to discuss the second requirement on the inclusion of NSSAI in unprotected RRC signallling.
There weren't any agreements on this issue so the LS was postponed.
Ericsson commented that SA2 will complete their LS for their next meeting.
| postponed | No | |||||
S3‑172089 | Reply to: Reply LS on 5GS Security aspects seeking resolution | Qualcomm | LS out | approval | No |
No
| withdrawn | Yes | ||||
S3‑171728 | LS on secure platform requirements | SP-170581 | LS in | Yes |
YesORANGE saw several problems with the definitions given in the CR for the SA1 TS. Besides, the requirement for 3GPP subscription credential is much wider in SA3. SA3 should send a LS to SA1 pointing out this.
Vodafone commented that they had offered this CR, but personally, Tim commented that giving security terms and solutions in a SA1 specification seems to be very strange.Tim preferred that SA1 referred to a SA3 specification or to 21.905.
Ericsson: the SA1 TS doesn’t belong to any phase. It's ok to specify these terms, we are going towards that direction anyway.
Oberthur: SA1 decided already not to refer to SA3 specs in this case.
Vodafone: SA plenary didn’t agree with SA1 and that was the reason why the CR was not accepted.
Oberthur: if we do nothing, this will be a maintained working assumption. The plenary asked to finalise the work, so the requirement cannot be removed. If it is removed, the work won’t be complete. ORANGE commented that SA1 and SA3 should coordinate, so the result is to remove this requirement.
| replied to | No | |||||
S3‑172086 | Reply to: LS on secure platform requirements | ORANGE | LS out | approval | Yes |
YesEricsson was concerned that this would re-open long discussions in SA1. The SA1 TS is not phase specific.They have agreed on this topic and they were worried that SA3 would be bringing this phase approach to SA1.
Ericsson asked to have minuted that they disagreed with the removal of the definition of subscription credential from the SA1 TS as this LS proposes. Sony had the same objection.
| approved | No | ||||
S3‑171729 | Reply LS to IEEE 802.11 Requesting Status and Information on WLAN integration in 3GPP NextGen System | SP-170585 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171731 | LS on 5G Registration via Untrusted Non-3GPP Access | S2-174887 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑172091 | Reply to: LS on 5G Registration via Untrusted Non-3GPP Access | Lenovo | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171732 | LS on Impacts of using User Identity confidentiality | S2-175263 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑172090 | Reply to: LS on Impacts of using User Identity confidentiality | Qualcomm | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171733 | LS on PLMN and RAT selection policies for roaming | S2-175286 | LS in | Yes |
YesORANGE asked to postpone the LS until an answer is reveiced from CT1.
Vodafone: this exists already. SA1 will challenge it.
BT: the big issue is how to identify securely identify the beacon that tells us in which network we are in. Vodafone: this is about the network being able to move their subscribers for commercial reasons.
Ericsson preferred to wait for the SA2 procedure before making a decision.
The LS was postponed.
| postponed | No | |||||
S3‑171882 | LS on Undetectability of LI Data stored in a UDSF | S3i170259 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171883 | Address Mapping Requirements | S3i170260 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171912 | LIAISON STATEMENT ON ZUC-256 algorithm | CCSA | LS in | Yes |
Yes
| noted | No | |||||
S3‑172068 | Response to CCSA liaison statement ZUC-256 algorithm (S3-171912) | ETSI SAGE | LS in | Yes |
YesAlex (BT): we already have 256 bits, but we are not using them. Interfaces are for 128 bits.
Ericsson:the key length is 256 bits but the algorithms need to be specified for 256 bits.
There is a proposal from AT&T for a study (1773). It was concluded to check this document before deciding on a reponse.
Interdigital: let's limit it to the radio access.
| replied to | No | |||||
S3‑172098 | Reply LS on 256-bit algorithms for 5G | AT&T | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171796 | Algorithm Identifier Values | Huawei, Hisilicon, CATR, CATT | pCR | Approval | Yes |
YesKPN didn't agree with the requirements on individual elements like UE and gN ("shall implement..").
NTT-Docomo preferred the original structure like KPN.
Nokia: this needs a proper paper to support this discussion. Better to postpone for the next meeting.
Qualcomm: include only what's agreed in the TR (remove the requirements after "0011").
NTT-Docomo queried about having bit patterns. Why do we need this? It is stage 3.
It was agreed to keep the bit pattern in order to have more control of this, as proposed by BT and Qualcomm.
| revised | No | S3‑172092 | |||
S3‑172092 | Algorithm Identifier Values | Huawei, Hisilicon, CATR, CATT | pCR | Approval | Yes |
Yes
| approved | No | S3‑171796 | |||
S3‑171904 | pCR to TS33.501 - security requirements on subscription identifiers | CATT | pCR | Approval | Yes |
YesVodafone: configurable by whom?
CATT: by the operator.
It was agreed to add this.
Nokia: why should it be configurable? It doesn’t affect any interoperability scenario.
NTT-Docomo: the MNO can decide about the refresh frequency.
BT: does the first requirement imply integrity protection mandatory?
Ericsson: privacy will be optional for the operator. SUPIs are never sent in clear text. Vodafone and China Mobile agreed.
Interdigital: is the whole SUPI or the ID part of the SUPI being sent?
It was agreed to have that SUPI should not transferred in clear air text over 5G RAN.
Second requirement was removed.
| revised | No | S3‑172115 | |||
S3‑172115 | pCR to TS33.501 - security requirements on subscription identifiers | Ericsson, Telecom Italia,CATT | pCR | Approval | Yes |
Yes
| revised | No | S3‑172173 | S3‑171904 | ||
S3‑172173 | pCR to TS33.501 - security requirements on subscription identifiers | Ericsson, Telecom Italia,CATT | pCR | Approval | Yes |
Yes
| approved | No | S3‑172115 | |||
S3‑171905 | pCR to TS33.501 - skeleton and text for slice security clause | CATT | pCR | Approval | Yes |
YesThe Chair asked the attendees whether slicing was part of phase two.Huawei said phase one, but Vodafone recalled having it for phase two,
ORANGE: SUPI privacy has priority.
Vodafone: slicing is being considered in other groups and we have been asked about NSSAI by LS.
| noted | No | ||||
S3‑171952 | TS - Requirements on privacy management added to clause 5 | Nokia | pCR | Decision | Yes |
YesVodafone: it looks like we are mandating privacy in 5G.
Ericsson: we don’t need to specify databases and interfaces for privacy issues. ORANGE supported this and Vodafone's comment.
Ericsson: there are other ways to implement this. We can just put it in a informative annex.
Vodafone: not clear what is mandatory and what is optional.
ORANGE: some requirements are implementation specific.
BT objected to this contribution. Qualcomm as well.
| noted | No | ||||
S3‑171777 | Privacy: Skeleton proposal for privacy related sub-clauses | Ericsson, Telecom Italia | pCR | Approval | Yes |
YesIt was also commented that privacy is also about personal data of a human being, and this wasn't covered here.
Ericsson agreed but they mentioned having this in another contribution. They commented that it was better by starting like this and then mentioning the human factor.
Huawei: find a better name for privacy key.
ORANGE: privacy key is solution specific. Remove the definition.
The Chair commented that it's more than just a key.
ORANGE: the definition will be fine if we agree on the Ericsson's solution. We have to agree on that firstly.
There were long discussions on the terminology to use: e.g. SUCI, SUPI identifier, etc.. This had to be taken offline.
| revised | No | S3‑172150 | |||
S3‑172150 | Privacy: Skeleton proposal for privacy related sub-clauses | Ericsson, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | S3‑171777 | |||
S3‑171776 | Privacy: Storage, processing and provisioning of the HN public key | Ericsson | pCR | Approval | Yes |
YesDiscussed with 2087 and 2021.
Ericsson: The current agreement is that the public key in the tamper resistant component, processing in the ME. Storage not supported, then there would be no privacy. Legacy Ues would be able to be used in this case.
| revised | No | S3‑172151 | |||
S3‑172151 | Privacy: Storage, processing and provisioning of the HN public key | Ericsson, Orange, Oberthur Technologies, Morpho, Gemalto, China Mobile, Vodafone | pCR | Approval | Yes |
YesQualcomm: we cannot allow the geneation of the SUCI in the tamper resistant component.
ORANGE: Mandatory support of the new scheme has been agreed in another document. Nokia disagreed.
Vodafone: subscription privacy is optional in 5G. Otherwise 5G won't be deployed in certain countries.
Nokia: how often are you going to do this? This is adding complexity to lots of network components. NOTE 1 should be an editor's note. It is FFS.
BT agreed with Vodafone: this may cause that 5G won't be deployed in certain parts of the World.
China Mobile and BT supported to study further the legacy aspect.It was asked to be minuted the following statement from China Mobile:
| approved | No | S3‑171776 | |||
S3‑171787 | Privacy: SUCI null-scheme normative Annex | Ericsson, Vodafone | pCR | Approval | Yes |
YesDeutsche Telekom: in which cases the SUPI doesn’t need to be encrypted?
Ericsson: some regulators could ask this.
KPN: It should be optional for operators to deploy this.
ORANGE: who is deciding to use the new scheme?
BT: the LI requirement does not imply the encryption ON/OFF in the air interface. The VPLM's choice is whether to have it on/off and the HPLMN would act on it (procceed to switch off, or drop the session).
Interdigital: this scheme is not required.
All the comments were captured in editors' notes.
| revised | No | S3‑172105 | |||
S3‑172105 | Privacy: SUCI null-scheme normative Annex | Ericsson, Vodafone | pCR | Approval | Yes |
Yes
| approved | No | S3‑171787 | |||
S3‑171788 | Privacy: SUCI ECIES scheme normative Annex | Ericsson | pCR | Approval | Yes |
YesBT: is this quantum safe?
Vodafone: we discussed before about quantum timescales being an issue. It's not an issue here.
It was argued whether this could be optional or mandatory to support. This depended on the conclusions in other contributions.
Ericsson: we need feedback from ETSI SAGE. We prpose to send an LS.
Nokia: we need feedback from ETSI SAGE before adding this to an annex. Gemalto agreed.
It was noted since companies agreed not to include this in the TS until some feedback was received from ETSI SAGE.
| noted | No | ||||
S3‑171789 | Privacy: [DRAFT] LS on Security aspects of ECIES for concealing IMSI or SUPI | Ericsson | LS out | Approval | Yes |
Yes
| revised | No | S3‑172106 | |||
S3‑172106 | LS on Security aspects of ECIES for concealing IMSI or SUPI | Ericsson | LS out | Approval | Yes |
YesGemalto:ask ETSI SAGE to improve the efficiency.
What if companies bring a new scheme next meeting?
Ericsson: this is open.
IT was pointed out that the LS clarifies that this is a possible candidate.
| approved | No | S3‑171789 | |||
S3‑171779 | Privacy: Text proposal in Clause 5.4 (visibility and configurability) | Ericsson, Telecom Italia | pCR | Approval | Yes |
YesIt was agreed to send a LS to SA1 on the privacy aspects of SUPI privacy and 5G-GUTI privacy.
Vodafone: the text in 5.4.2 needs rewording.
Ericsson: it is taken from 5.4.1. It is existing text. It was agreed to enhance the wording.
| revised | No | S3‑172107 | |||
S3‑172107 | Privacy: Text proposal in Clause 5.4 (visibility and configurability) | Ericsson, Telecom Italia,Qualcomm,Huawei,LG | pCR | Approval | Yes |
YesBT and Vodafone: on what basis are you displaying to the user?
| approved | No | S3‑171779 | |||
S3‑172020 | pCR : Security visibility and Configurability | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson didn’t agree with the user plane being negotiated on a per radio bearer basis. This hadn't been agreed by the group.This was removed.
Discussed together with 897 from Huawei, that overlapped with the same topic.They were finally merged with 779.
| merged | No | S3‑172107 | |||
S3‑171778 | Privacy: Requirements related to SUPI and SUCI | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
Yes
| revised | No | S3‑172116 | |||
S3‑172116 | Privacy: Requirements related to SUPI and SUCI | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | S3‑171778 | |||
S3‑171781 | Privacy: proposed changes to authentication procedures (6.1.2, 6.1.3) | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
Yes
| revised | No | S3‑172117 | |||
S3‑172117 | Privacy: proposed changes to authentication procedures (6.1.2, 6.1.3) | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | S3‑171781 | |||
S3‑172021 | pCR : 5GS Subscription Privacy General aspects | Qualcomm Incorporated | pCR | Approval | Yes |
YesVodafone: storage of the key in the ME, you are not mentioning any security whatsoever, which is similar to the Ericsson contribution that I objected to.
There are no reliable, cheap methods to update the mobile handset.
Qualcomm: there are operators who think differently from Vodafone.
China Mobile: the public key can be put in the ME.
Ericsson: the public key is public by definition, why do we need to protect it?
| merged | No | S3‑172151 | |||
S3‑171830 | UE sends SEAF Concealed IMSI during Primary Authentication | Huawei, Hisilicon | pCR | Approval | Yes |
YesORANGE: we are encrypting IMSI again, this has been encrypted already. NAS encryption enabled will do it.
Huawei: when NAS encryption is disabled, we need to encrypt it.
ORANGE: in that case we don’t care about privacy.
Ericsson: this annex is too complex.
No one agreed with this contribution.
| noted | No | ||||
S3‑171782 | Privacy: proposed content to 6.8.1 (SUPI) | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
YesORANGE opposed to having the editor's note on Privacy provisioning. Gemalto went for having only the first sentence in the editor's note. This was finally agreed.
Huawei commented that the clause was more about the SUCI than the SUPI. It was decided to find an appropiate title for 6.8.1.
| revised | No | S3‑172118 | |||
S3‑172118 | Privacy: proposed content to 6.8.1 (SUPI) | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
Yes
| approved | No | S3‑171782 | |||
S3‑171899 | CR to 33.501: Privacy of the Subscriber permanent identifier | Intel Corporation (UK) Ltd | pCR | Yes |
No
| withdrawn | Yes | |||||
S3‑171783 | Privacy: 5G-GUTI related requirements and security procedures (6.8.2, 5.1, 5.3) | Ericsson, Telecom Italia | pCR | Approval | Yes |
YesORANGE: the part about the tampering-resistant hardware needs to go away.
Gemalto: ECIES, not decided whether it is mandatory or optional. It should go away too.
Disagreement on the architecture of AUSF and SIDF in 5.Y.1. This part was removed.
Merged with 904.
| merged | No | S3‑172115 | |||
S3‑171903 | Secure paging using scrambling temporary subscriber identifier | Intel Corporation (UK) Ltd | pCR | Yes |
No
| withdrawn | Yes | |||||
S3‑171784 | Privacy: proposed content to 6.8.3 (identification procedure) | Ericsson, Vodafone, Telecom Italia | pCR | Approval | Yes |
YesORANGE: the last note is normative, it shouldn't be a note. Is it a "may" or a "shall"?
NTT-Docomo: this may not be required.
Qualcomm commented that this is not required and that they had a contribution on this last note. It was an open issue.
| noted | No | ||||
S3‑171785 | Privacy: [DRAFT] Reply LS on Impacts of using User Identity confidentiality | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑172017 | Impacts of IMSI/SUPI privacy on UE Identity handling procedures | Qualcomm Incorporated | other | Approval | Yes |
YesEricsson: the procedure doesn't have security concerns. Let SA2 deal with this.
Verizon: there are security concerns when sending the SUPI.
Nokia: SA2 has defined the registration procedure with the SUPI. They have to adapt their procedure accordingly to what SA3 proposes. We don’t need an extra message as Ericsson proposes since it's already there.
Huawei: if the AMF doesn’t need the message with the temporary ID it has to request the identity of the user. Something needs to be done.
Qualcomm: in that scenario in 4G it's a reject from the MME. So a new attach is performed. That's what the AMF will do, reject so the process restarts.
Nokia: SA2 can use the identity request procedure as well, but they may not want it for non-3GPP networks.
| noted | No | ||||
S3‑172018 | Proposed Reply LS on Impacts of using User Identity confidentiality | Qualcomm Incorporated | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171786 | Privacy: SUCI format and generation | Ericsson, Vodafone | pCR | Approval | Yes |
YesORANGE: we don’t need to mention the privacy key here, the text remains consistent.
| revised | No | S3‑172143 | |||
S3‑172143 | Privacy: SUCI format and generation | Ericsson, Vodafone | pCR | Approval | Yes |
Yes
| approved | No | S3‑171786 | |||
S3‑171946 | TS - LI compliance when applying subscriber privacy | Nokia | pCR | Decision | Yes |
Yes
| revised | No | S3‑172082 | |||
S3‑172082 | TS - LI compliance when applying subscriber privacy | Nokia | pCR | Decision | No |
YesNTT-Docomo wasn't sure whether this worked for the already proposed schemes. An editor's note was proposed to warn about this.
Ericsson: it's simpler is to send the SUPI when the NAS security is turned ON. Huawei supported this.
Ericsson: Let's not make a decision in this meeting and analyze how to fulfil the LI requirement for the next meeting.
NTT-Docomo: keep the headline to have a placeholder. Arguments for a solution should be brought for the next meeting.
Nokia: keep the assumption. Some companies disagreed with this.
| noted | No | S3‑171946 | |||
S3‑171790 | Privacy: Discussion for drafting reply to S2-175309, relates NSSAI privacy | Ericsson | discussion | Agreement | Yes |
YesBT commented that the concept of slice is not fully understood in SA3, so this should go for phase 2. ORANGE suppported this. Ericsson, Nokia, Oberthur, Intel,KPN, China Mobile, LG,NEC wanted this for phase 2 as well.
Interigital, Qualcomm,CATT, Gemalto and AT&T preferred to treat this in phase one.
NTT-Docomo: if we don’t do protection in phase one, can we do it in phase two? ORANGE commented that we needed to know what was being protected, and SA3 didn’t have information about that.
Nokia: they are still discussing the business models in SA1.
Qualcomm: why are SA1 and SA2 including the NSSAI parameter in phase one then?this is puzzling.
AT&T: we are defining the 5G core in phase one. This would mean that we would be having slices without security, and this is not acceptable.
Nokia: the registration procedure in slicing becomes a very complicated procedure, this is currently being discussed in SA2.
| noted | No | ||||
S3‑172062 | NSSAI privacy clarification | LG Electronics | discussion | Endorsement | Yes |
YesQualcomm: if some operators wants privacy protection, why should they wait for phase two?
CATT supported Qualcomm.
| noted | No | ||||
S3‑172004 | Discussion on the privacy considerations of NSSAI | Qualcomm Incorporated | pCR | Approval | Yes |
YesBT: either encrypt all or encrypt nothing, otherwise you allow to correlate stuff.
| noted | No | ||||
S3‑171950 | TS - NSSAI privacy | Nokia | pCR | Decision | Yes |
YesCATT didn’t agree with this contribution.
| noted | No | ||||
S3‑172005 | Proposed response LS on 5GS Security aspects seeking resolution | Qualcomm Incorporated | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171791 | Privacy: [DRAFT] Reply to Reply LS on 5GS Security aspects seeking resolution | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑172022 | Some corrections and clarification to the authentication text | Qualcomm Incorporated | pCR | Approval | Yes |
YesMerged with 970.
| revised | No | S3‑172145 | |||
S3‑172145 | Some corrections and clarification to the authentication text | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑172022 | |||
S3‑171984 | Rename EPS AKA* to 5G AKA | Nokia | pCR | Yes |
YesIt was decided to rename it to 5G AKA.
| approved | No | |||||
S3‑171857 | Clarification on authentication method selection in AUSF | Huawei; Hisilicon | pCR | Approval | Yes |
YesNokia: we are having discussions for non-3GPP accesses. It is possible that EPS AKA* will also go for non-3GPP accesses as currentlty discussed in SA2. Add an editor's note about this.
Qualcomm: we have an interim agreement, don’t add the editor's note now.
NTT-Docomo: why are we having these requirements here instead of in a requirements clause?
It was decxided to postpone it.
| postponed | No | ||||
S3‑171970 | Need for key left at the AUSF | Nokia, Ericsson | pCR | Yes |
YesORANGE preferred to remove the feature.
Merged with 2022.
| merged | No | S3‑172145 | ||||
S3‑171972 | Computation of key left at the AUSF for EPS AKA* | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑171973 | Computation of key left at the AUSF for EAP-AKA’ | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑172006 | Providing details on the calculation of keys for the AUSF and SEAF | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson supported the changes in the editor's notes.
Nokia: you are creating an intermediate layer and move everything to the AUSF. This organization seems dubious.Ericsson supported Nokia.
Huawei supported this contribution.
Offline discussions were needed to procceed.
| noted | No | ||||
S3‑171982 | Granularity of anchor key binding | Nokia | pCR | Yes |
Yes
| revised | No | S3‑172186 | ||||
S3‑172186 | Granularity of anchor key binding | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑171982 | |||
S3‑171958 | EPS AKA* to be used over all access network types – clause 6 | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑171967 | Clarification on how the authentication method, and the variant is chosen between AUSF and UDM/ARPF | Ericsson | pCR | Approval | Yes |
YesORANGE: remove the note on the Annex B.
Nokia: first sentence in the removed note should stay.
| revised | No | S3‑172146 | |||
S3‑172146 | Clarification on how the authentication method, and the variant is chosen between AUSF and UDM/ARPF | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171967 | |||
S3‑171759 | Lightweight secure way for protecting anchor key transmitting - EAP-AKA’ | ZTE Corporation | pCR | Approval | Yes |
YesNokia, NTT-Docomo didn’t agree with the document, especially on the AUSF computing the generated encoding key that is described here.
China Mobile agreed with this being a lightweight solution. They have contribution 935 related to this one.
Ericsson didn’t see how this worked.
Both documents were noted.
| noted | No | ||||
S3‑171935 | pCR Security enhancement to the EAP-AKA' | China Mobile | pCR | Yes |
Yes
| noted | No | |||||
S3‑171983 | Derivation of anchor key for EAP-AKA’ | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑172037 | pCR to TS 33.501_Update to EAP-AKA’ | NEC Corporation | pCR | Approval | Yes |
YesNokia: this doesn’t work for EAP-AKA'.
| noted | No | ||||
S3‑171940 | pCR Adding Editor’s note to the EPS-AKA* and EAP-AKA' | China Mobile | pCR | Yes |
YesNokia: I'm not convinced that we can do anything about this.
Vodafone: I don’t want to leave an editor's note like this in the document but I would rather see solutions directly.
| noted | No | |||||
S3‑171802 | AKAstar discussion of options 1 and 2 | Huawei & Hisilicon | discussion | Discussion | Yes |
YesCommented in 2072.
BT: this can also apply to 4G.
Huawei: The UE not present attack exists in 3G and 4G networks so we should retro fit it to them.
Nokia: it doesn’t work given the assumption from the last meeting.
KPN: it's only about authentication. The operator drops you to 4G/3G. The attack still happens. It might not be needed.
Interdigital: how's the complexity increased?
Huawei: compared to EAPS-AKA, the interface between the UE and ASF doesn't change.Compared to EAPS-AKA*, no hashes in option 1. Option 2 is comparable, roughly the same as EAPS-AKA*.
Nokia asked whether some other company felt the need to change the current solution in the TS. Either way seemed to be fine for the rest.
Huawei commented that the purpose was to have a working agreement and bring a pCR for the next meeting.
The documents were noted; the Chair welcomed more input for the next meetings to continue the discussions.
Huawei proposed to have a conference call on this topic in 2072 and 802, chaired by Qualcomm. This was agreed.
| noted | No | ||||
S3‑171803 | AKAstar pCR for option 1 | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171804 | AKAstar pCR for option 2 | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172072 | Comments on S3-171802, 03, 04 by Huawei on 'EPS AKAstar procedure' | Nokia | discussion | Yes |
Yes
| noted | No | |||||
S3‑171938 | pCR Security enhancement to the EPS-AKA* | China Mobile | pCR | Yes |
YesNokia: similar to the previous ones. The anchor is masked, but the mask can be computed by an attacker listening to the air interface.
Vodafone recommended to have a more detailed review of the documents dealing with this issue by having a conference call.
The document was finally noted.
| noted | No | |||||
S3‑171990 | More than one authentication vector may be sent to SEAF | Nokia | pCR | Yes |
YesMCC commented that the NOTE should be plain text since a recommendation is being given. "It is recommended…" has the same meaning as a "you should.." so this would be normative language contained in an informative note. Nokia commented that this was taken literally from 4G, and MCC replied that it would be better to change it now.
The Chair commented that this case has appeared often and that this could be taken offline and considered in a later review.
| approved | No | |||||
S3‑171991 | Linking increased home control to subsequent procedures | Nokia | pCR | Yes |
YesEricsson: this is not urgent. We can postpone a decision given that there are potentially better solutions.
BT considered important since it could affect the QoS for the subscribers.
Deutsche Telekom: it needs to be somewhere. Let's agree on this and keep it until something else shows up. Otherwise we will stand here suffering from fake location updates with no apparent solution given. ORANGE, KPN, NTT-Docomo supported DT.
| approved | No | |||||
S3‑171986 | Security messages on N12 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑171989 | Security messages on N13 | Nokia | pCR | Yes |
Yes
| merged | No | S3‑172146 | ||||
S3‑171797 | Key setting during primary authentication | Huawei & Hisilicon | pCR | Approval | Yes |
YesDiscussed with 922.
| noted | No | ||||
S3‑171962 | Update of clause 8.1.1.1 ‘5G-RAN key setting during primary authentication in TS 33.501 | Ericsson | pCR | Approval | Yes |
YesNTT-Docomo: Raised the question: Take from 33.401 and do the modifications like Ericsson proposes or we do a fresh start instead in 33.501?
Huawei: if there is anything in 33.401 applicable in 501 just bring a contribution. We don’t need to bring everything from 401.
Nokia: fresh start is too cumbersome and there is not time, let's bring the 401 approach. NEC supported it.
NTT-Docomo pointed out to fix the normative language mistakes that are coming from 401 so as not to make the same errors. The proposal would be to bring things from 33.401, but instead of copying directly into the TS have a running pCR to be able to adjust the language firstly. New language is merged into this running pCR.
| noted | No | ||||
S3‑171860 | Discussion on non-3GPP solutions | Huawei; Hisilicon | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑171864 | Draft LS reply S2-174887 | Huawei; Hisilicon | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171959 | EPS AKA* to be used over all access network types – clause 11 | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑172015 | Analysis of the solutions proposed in SA2 LS for Registration over untrusted n3gpp | Qualcomm Incorporated | other | Approval | Yes |
YesMotorola: Qualcomm's solution was rejected in SA2, let's discuss only the issues agreed in SA2.
ORANGE: Qualcomm's solution is in our TR. Why doesn't this work?
Motorola commented that they were not involved personally in the discussion and that they would have to check with their colleagues.
Qualcomm pointed out that SA2 is waiting for SA3's response, the solution is not rejected.
Verizon: Let's send SA2 our security concerns for SA2 solutions and comment what SA2 should do.
Nokia: SA2 cannot address the detailed security concerns.
Intel commented that SA3 should understand why the Qualcomm solution doesn't work given that it is in our TR.
Ericsson: SA2 is asking to assess the security solutions they propose and SA3 should reply to that. Afterwards we can decide whether the existing solution is better.
An evening drafting session was created to try to merge all the contributions related to the LS from SA2.
| noted | No | ||||
S3‑171957 | How to use EPS AKA* for untrusted non-3GPP access | Nokia | discussion | Yes |
Yes
| noted | No | |||||
S3‑171865 | move non-3GPP solution from TR 33.899 to TS 33.501 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172019 | pCR : Security for Non-3GPP access to 5GC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171846 | pCR to 33501_some editoral revisions | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171942 | Adding ENs to clause 11 of TS 33.501 | Nokia | pCR | Yes |
Yes
| noted | No | |||||
S3‑172016 | Proposed Reply LS on 5G Registration via Untrusted Non-3GPP Access | Qualcomm Incorporated | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171922 | Overall presentation of skeleton updates for mapping content under clause 7 in TS 33.401 to clause 8 in TS 33.501 | Ericsson | discussion | Approval | Yes |
YesDiscussed with 931,2038
| noted | No | ||||
S3‑171931 | Update for skeleton of clause 8 on Security Procedures between UE and 5G Access Network Functions | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑172152 | |||
S3‑172152 | Update for skeleton of clause 8 on Security Procedures between UE and 5G Access Network Functions | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171931 | |||
S3‑171861 | Discussion on Radio Access network protection | Huawei; Hisilicon | discussion | Discussion | Yes |
YesEricsson: can we agree on the integrity activation for this meeting and continue on the next? Algorithms and confidentiality would go for the next meeting.
Nokia mentioned the agreed points in the evening sessions:
- How to activate integrity confidentiality.
- Granularity.
- Integrity should be subject to the process, it's open whether the confidentiality too.
- Use of algorithms should be flexible?
It was proposed to fix these topics into a document that could be agreed as the next step forward: 164
| noted | No | ||||
S3‑171862 | Initial AS security context establishemt | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171863 | Procedures for Radio security | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171888 | AS algo. initial context (8.1.2.1.1 ) | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171889 | AS algo negotiation during Xn-handover (8.1.2.1.2) | Ericsson | pCR | Approval | Yes |
YesAn editor's note was proposed to check with RAN that the procedure on RRC connection reconfiguration detailed here is correct.
Huawei commented that it was coming from LTE and that it was reasonable.
Another editor's note was added on the mechanism to be verified as well.
| revised | No | S3‑172165 | |||
S3‑172165 | AS algo negotiation during Xn-handover (8.1.2.1.2) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171889 | |||
S3‑171890 | AS algo negotiation during N2-handover (8.1.2.1.3) | Ericsson | pCR | Approval | Yes |
YesEPS security context has been replaced by 5GS security context. This will be replaced by 5G security context.
| revised | No | S3‑172166 | |||
S3‑172166 | AS algo negotiation during N2-handover (8.1.2.1.3) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171890 | |||
S3‑171891 | AS algo negotiation during intra-gNB handover (8.1.2.1.4) | Ericsson | pCR | Approval | Yes |
YesHuawei: clarfy what is intra-gNB. An editor's note was added for this.
| revised | No | S3‑172167 | |||
S3‑172167 | AS algo negotiation during intra-gNB handover (8.1.2.1.4) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171891 | |||
S3‑171892 | AS security mode command procedure (8.1.2.2) | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑172168 | |||
S3‑172168 | AS security mode command procedure (8.1.2.2) | Ericsson | pCR | Approval | No |
Yes
| noted | No | S3‑171892 | |||
S3‑171798 | UP security mechanisms | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑172169 | |||
S3‑172169 | UP security mechanisms | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171798 | |||
S3‑171833 | pCR to 33.501: Security Aspects of SMS over NAS | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑172170 | |||
S3‑172170 | pCR to 33.501: Security Aspects of SMS over NAS | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171833 | |||
S3‑171926 | Update of clause 6.2 on NAS security | Ericsson | pCR | Approval | Yes |
YesDiscussed with 819.
NTT-Docomo preferred this version.
Both contributions had to be discussed offline.
| approved | No | ||||
S3‑171960 | Re-ordering of clause 6 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑171819 | Clause 6.2 NAS Security | Nokia | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172007 | Protecting the initial NAS messages | Qualcomm Incorporated | pCR | Approval | Yes |
YesNokia: it contains details still being discussed like NSSAI.
Ericsson: it maybe disaligned with the SMS protection solution that has been agreed.
Two editor's notes were added, some of the language needed to be normative.
With this modifications the document was approved.
| revised | No | S3‑172171 | |||
S3‑172171 | Protecting the initial NAS messages | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑172007 | |||
S3‑171927 | Update of content of clause 6.3 on security negotiation | Ericsson | pCR | Approval | Yes |
YesOverlapping with 2033, 1834
| revised | No | S3‑172172 | |||
S3‑172172 | Update of content of clause 6.3 on security negotiation | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑171927 | |||
S3‑171930 | Update of clause 6.3 skeleton on Security negotiation | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171795 | Requirements of security algorithms selection | Huawei & Hisilicon | pCR | Approval | Yes |
YesDiscusssed with 932.
| noted | No | ||||
S3‑171964 | Update of clause 5.4.1 ‘Requirements for algorithm selection‘ in TS 33.501 | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171834 | pCR to 33.501: Initial NAS security algorithm establishment | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑172172 | |||
S3‑171835 | pCR to 33.501: NAS algorithm handling when AMF change | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑172172 | |||
S3‑172033 | pCR to TS 33.501_NAS SMC procedure | NEC Corporation, AT&T | pCR | Approval | Yes |
Yes
| merged | No | S3‑172172 | |||
S3‑171836 | pCR to 33.501: NAS security mode command procedure | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑172172 | |||
S3‑171858 | update the skeleton of TS 33.501 | Huawei; Hisilicon | pCR | Approval | Yes |
YesThe content depends on the reply from the LS to SA2 on the service architecture.
| postponed | No | ||||
S3‑171932 | Update of clause 5 skeleton on Security Requirements and Features | Ericsson | pCR | Approval | Yes |
YesOverlaps with 795. It is aligned with that contribution so this was noted.
| noted | No | ||||
S3‑171992 | Requirements on core network interconnection security | Nokia | pCR | Yes |
YesEricsson: heavily assumed that we will use Diameter: end-to-end confidentiality and integrity protection requirement.
China Mobile: where is the threat?
Nokia: we have the TR 33.899 for that, we don't put them in the TS.
Ericsson: this is very solution-specific.
Deutsche Telekom supported this contribution.
Ericsson wasn't convinced to have the requirements for the solutions, given that they may be found by GSMA or with the help of GSMA.
| revised | No | S3‑172174 | ||||
S3‑172174 | Requirements on core network interconnection security | Nokia | pCR | - | Yes |
Yes
| approved | No | S3‑171992 | |||
S3‑171993 | Draft LS on 3GPP Requirements on Core Network Interconnection Security | Nokia | LS out | Yes |
Yes
| revised | No | S3‑172175 | ||||
S3‑172175 | LS on 3GPP Requirements on Core Network Interconnection Security | Nokia | LS out | - | No |
Yes
| approved | No | S3‑171993 | |||
S3‑172013 | pCR on adding bidding down protection requirement in Phase 1 for features that may be added later | Qualcomm Incorporated | pCR | Approval | Yes |
YesMCC and Ericsson: no mention of future releases or phases in the specification.
It was agreed to add an editor's note on the necessity of rephrasing this to accommodate the 3GPP drafting rules.
LG: what features? Security features? All features?
It was agreed to have "security features".
| revised | No | S3‑172176 | |||
S3‑172176 | pCR on adding bidding down protection requirement in Phase 1 for features that may be added later | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑172013 | |||
S3‑172051 | Clarifications to the user plane integrity requirements in TS 33.501 | Ericsson | pCR | Approval | Yes |
YesORANGE: I don’t see the intention of the second NOTE. This is not purely informative. I don’t want a guidance of the usage of this for the operator.
Qualcomm supported having this note.
Huawei: why "..that are not confidentiality protected"?
MCC pointed out that the first note was written as a requirement, not an informative statement. Besides, both notes included the word "must" that cannot be used in 3GPP specifications.
| revised | No | S3‑172187 | |||
S3‑172187 | Clarifications to the user plane integrity requirements in TS 33.501 | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑172051 | |||
S3‑171895 | UP Security on gNB internal interface | Huawei; Hisilicon | pCR | Approval | Yes |
YesConfiguration and authentication of gNBs needed to be clarified according to Nokia. This was added in an editor's note.
| revised | No | S3‑172177 | S3‑171848 | ||
S3‑172177 | UP Security on gNB internal interface | Huawei; Hisilicon | pCR | Approval | No |
Yes
| approved | No | S3‑171895 | |||
S3‑171823 | update gNB security requirement | Huawei, Hisilicon, China Mobile | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171900 | UP Security on gNB internal interface | Huawei; Hisilicon | pCR | Approval | Yes |
YesNokia: we are adding requirements to an interface that hasn't been standardized.
ORANGE: they haven't decided whether to specify this interface.
Ericsson: this interface is being specified in RAN.
| revised | No | S3‑172178 | S3‑171848 | ||
S3‑172178 | UP Security on gNB internal interface | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171900 | |||
S3‑172010 | pCR to provide a normative text for the AMF key derivation/refresh | Qualcomm Incorporated | pCR | Approval | Yes |
YesThis contribution clashed with 1961, 1968.
| noted | No | ||||
S3‑172012 | pCR to provide a normative text for AS key hierarchy | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171961 | Key hierarchy | Nokia | pCR | Yes |
Yes
| not treated | No | |||||
S3‑172030 | pCR to TS 33.501_5G Key Hierarchy | NEC Corporation, AT&T | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171822 | Potential key hierarchy in 5G phase 1 | Huawei & Hisilicon | pCR | Yes |
Yes
| not treated | No | |||||
S3‑171928 | Update of clause 6.6 on key hierarchy | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171820 | Annex A on Key derivation | Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171966 | Security handling in state transitions | Nokia | pCR | Yes |
Yes
| not treated | No | |||||
S3‑171929 | Update of clause 6.7 on security contexts | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171963 | Handling security contexts within the serving network | Nokia | pCR | Yes |
Yes
| not treated | No | |||||
S3‑171965 | Distribution of security contexts | Nokia | pCR | Yes |
Yes
| not treated | No | |||||
S3‑171933 | Update of clause 8.1.1.2 ‘5G-RAN key identification‘ in TS 33.501 | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171934 | Update of clause 8.1.1.3 ‘5G-RAN key lifetimes‘ in TS 33.501 | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171968 | Security handling in mobility | Nokia | pCR | Yes |
Yes
| not treated | No | |||||
S3‑172038 | pCR to TS 33.501_Skeleton for security handling in mobility | NEC Corporation | pCR | Approval | Yes |
YesOverlaps with 1968.
Nokia: the NAS doesn’t see anything about the HO preparation.
Huawei: tdoc 1931 is the preferred way for clause 8.3
| noted | No | ||||
S3‑172011 | pCR to provide a normative text for AS key derivation | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171824 | Updates security handling in mobility | Huawei, Hisilicon, Deutsche Telekom AG | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑172009 | Security handling for interworking between NextGen Core and EPC | Qualcomm Incorporated | other | Approval | Yes |
Yes
| not treated | No | ||||
S3‑172014 | pCR to provide a solution for interworking between NextGen Core and EPC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑172034 | Securing the Network Steering Information | Samsung | pCR | Approval | Yes |
YesPostponed together with the associated LS.
Vodafone noted that they will reject the solution in the next meeting.
| postponed | No | ||||
S3‑171806 | ID linkage verification in secondary authentication | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171807 | Secondary authentication for multiple PDU sessions | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171873 | pCR to TS 33.501 clause 12: Update text with Service operations used to carry EAP messages | Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171871 | pCR to TS 33.501 Clause 12.1.2: Resolve EN on Normative language | Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171872 | pCR to TS 33.501 - Resolve 2nd and 3rd ENs in clause 12.1.2 on Secondary authentication | Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171901 | CR to 33.501: Secondary Re-Authentication | Intel Corporation (UK) Ltd | pCR | Yes |
Yes
| not treated | No | |||||
S3‑172008 | Identifying a problem with secondary authentication | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171805 | DN authorization grant and revocation | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171996 | Security Procedures with EAP-TLS | Huawei, Hisilicon | pCR | Yes |
Yes
| not treated | No | S3‑171812 | ||||
S3‑171801 | Security policy determination | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171875 | A security solution for service based architecture | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171780 | Privacy: [DRAFT] LS on visibility of privacy aspects | Ericsson, Telecom Italia | LS out | Approval | Yes |
Yes
| not treated | No | ||||
S3‑171897 | configuration and visibilityfeatures in TS 33.401 should be reused in 5G. | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑172107 | S3‑171849 | ||
S3‑171812 | Security procedure for EAP-TLS | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑171996 | |||
S3‑171894 | Discussion on 5G Registration via Untrusted Non-3GPP Access | Motorola Mobility, Lenovo, Broadcom, Brocade | discussion | Endorsement | Yes |
Yes
| noted | No | ||||
S3‑171943 | Observations on the solution for untrusted non-3GPP access in S2-174885 | Nokia | discussion | Yes |
Yes
| noted | No | |||||
S3‑171944 | Observations on the solution for untrusted non-3GPP access in S2-174886 | Nokia | discussion | Yes |
Yes
| noted | No | |||||
S3‑171954 | TS - Privacy requirement for gNB | Nokia | pCR | Decision | Yes |
YesHuawei queried what triggered the requirements in 5.2.8. They didn't think it was necessary. Qualcomm supported this.
Alf (NTT-Docomo): this is not a requirement,although I agree with the principles.
| noted | No | ||||
S3‑171956 | Draft reply LS on 5G Registration via Untrusted Non-3GPP Access | Nokia | LS out | Yes |
Yes
| noted | No | |||||
S3‑172065 | pCR to 33501_some editoral revisions | Huawei; Hisilicon | pCR | Approval | No |
No
| withdrawn | Yes | ||||
S3‑172071 | comments to S3-171776 on HN public key | Gemalto N.V. | pCR | Yes |
Yes
| revised | No | S3‑172087 | ||||
S3‑172087 | comments to S3-171776 on HN public key | Gemalto N.V.,ORANGE, Oberthur Technologies, Morpho | pCR | - | Yes |
YesBT: if the operator is the only one allowed to provide the handsets this works, but when they are out of their of their control we agree with Vodafone.
Qualcomm: there will be operators who will choose to store in the UICC, and there will be operators who will have control over the handset distribution model and they can choose to store in the ME. Why do we standardise to avoid operators having this option?
Vodafone: the disagreement on the ME part relies on the provisioning, not the security. Let's add an editor's note on this.
| merged | No | S3‑172151 | S3‑172071 | ||
S3‑171884 | LS on Impacts of using User Identity confidentiality | S2-175263 | LS in | Yes |
No
| withdrawn | Yes | |||||
S3‑171885 | Reply LS on 5GS Security aspects seeking resolution | S2-175309 | LS in | Yes |
No
| withdrawn | Yes | |||||
S3‑172097 | LS on service based architecture | ORANGE | LS out | Approval | No |
Yes
| approved | No | ||||
S3‑172147 | Draft TS 33.501 | NTT-Docomo | draft TS | Approval | No |
Yes
| left for email approval | No | ||||
S3‑172164 | Agreements and open issues on Radio Access network protection | NTT-Docomo | discussion | Endorsement | Yes |
Yes
| endorsed | No | ||||
7.4 | Security of the Mission Critical Service (MCSec) (Rel-14) | S3‑171760 | [MCSec] 33180 CR Ambient listening and viewing | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| agreed | No | ||
S3‑171761 | [MCSec] 33180 CR Broadcast and emergency security | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| revised | No | S3‑172113 | |||
S3‑172113 | [MCSec] 33180 CR Broadcast and emergency security | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| agreed | No | S3‑171761 | |||
S3‑171762 | [MCSec] 33180 CR Group Regroup fix | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| merged | No | S3‑172108 | |||
S3‑171763 | [MCSec] 33180 CR IdM token exchange fix | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
No
| withdrawn | Yes | ||||
S3‑171764 | [MCSec] 33180 CR IdM token response fix | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171765 | [MCSec] 33180 CR token revocation | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171766 | [MCSec] 33180 CR User location security | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
No
| withdrawn | Yes | ||||
S3‑171767 | [MCSec] 33180 CR Video push and pull | Motorola Solutions Danmark A/S | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑172046 | Corrections to MCData security procedures | Samsung, NCSC | CR | Approval | Yes |
Yes
| revised | No | S3‑172130 | |||
S3‑172130 | Corrections to MCData security procedures | Samsung, NCSC | CR | Approval | Yes |
Yes
| agreed | No | S3‑172046 | |||
S3‑172058 | [MCSEC] General corrections to TS 33.180 | NCSC | CR | Agreement | Yes |
Yes
| revised | No | S3‑172108 | |||
S3‑172108 | General Corrections to TS 33.180 | NCSC,Motorola Solutions,NCSC | CR | Agreement | Yes |
Yes
| agreed | No | S3‑172058 | |||
S3‑172060 | [MCSEC] MCData payload authentication correction | NCSC | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171919 | Clarification of key period calculation | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171921 | Clarification of security domain parameters and UK-ID | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171936 | Clarifications and editorial corrections related to SRTCP protection | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑172114 | |||
S3‑172114 | Clarifications and editorial corrections related to SRTCP protection | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | S3‑171936 | |||
S3‑171937 | Encryption parameter clarification for group call | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑172109 | |||
S3‑172109 | Correction of parameters for use of MIKEY-SAKKE | Motorola Solutions UK Ltd.,NCSC | CR | Agreement | Yes |
Yes
| agreed | No | S3‑171937 | |||
S3‑171939 | Encryption parameters clarification for private call | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| merged | No | S3‑172109 | |||
7.5 | Mission Critical Security Enhancements (eMCSec) (Rel-15) | S3‑171710 | Reply LS on FEC and ROHC for mission critical services over MBMS | C3-173315 | LS in | Yes |
Yes
| noted | No | |||
S3‑172057 | LS on ‘Temporary group call – user regroup’ security | NCSC | LS out | Approval | Yes |
Yes
| revised | No | S3‑172110 | |||
S3‑172110 | LS on ‘Temporary group call – user regroup’ security | NCSC | LS out | Approval | Yes |
Yes
| approved | No | S3‑172057 | |||
S3‑172059 | LS on configuration data for protection of signalling | NCSC | LS out | Approval | Yes |
YesMotorola: is this for Rel-14?
NCSC: it is for Rel-15 only.
| revised | No | S3‑172131 | |||
S3‑172131 | LS on configuration data for protection of signalling | NCSC | LS out | Approval | Yes |
Yes
| approved | No | S3‑172059 | |||
7.6 | Other work areas |   | ||||||||||
7.6.1 | SAE/LTE Security | S3‑171717 | LS reply to CT1 on GERAN redirection | R2-1706149 | LS in | Yes |
YesSuresh (Nokia) commented that LTE call redirection could be discussed in the conference call. Ericsson commented that in 7.6.1 there were two documents dealing with this issue for the current meeting, so this would be discussed later.
| noted | No | |||
S3‑171718 | LS on encrypting broadcasted positioning data | R2-1706150 | LS in | Yes |
YesNokia commented that this work is scheduled for March 2018 and that could be treated in SA3's next meeting.
There are documents in 7.6.1 dealing with this issue.
| replied to | No | |||||
S3‑172134 | Reply to: LS on encrypting broadcasted positioning data | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171774 | Discussion paper on redirection to GERAN | Qihoo 360 | discussion | Discussion | No |
No
| withdrawn | Yes | ||||
S3‑171775 | Discussion paper on redirection to GERAN | Qihoo 360 | discussion | Discussion | Yes |
YesEricsson: why is this warning message added to current Ues?
Qi360: changing the software of the UE.
BT: a warning message won’t be enough.
An emeeting will be created in order to agree on a LS about this issue.
| noted | No | ||||
S3‑171813 | Discussion on LS R2-1706150 encrypting positioning data | Nokia | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑171874 | CR to 33.402: Clarification on Unauthenticated Emergency services over untrusted WLAN | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑171987 | Discussion on LTE redirection to GERAN | Ericsson | discussion | Endorsement | Yes |
YesNokia proposed a conference call after the meeting to discuss this issue.Huawei agreed.
Ericsson: we need the solution discussed in RAN2/CT1.
Nokia: what's a legacy UE?
Ericsson: the one that is in the field right now.
| noted | No | ||||
S3‑172024 | Proposed reply LS on encrypting broadcasted positioning data | Qualcomm Incorporated | LS out | Approval | Yes |
YesErisson: we should not tell them which method to use. E-SMLC is not more secure than cyphering by an eNB. Ask for more information.
The LS was replied in 134.
| noted | No | ||||
S3‑172025 | Ciphering of Broadcast Assistance Data | Qualcomm Incorporated | discussion | Decision | Yes |
Yes
| noted | No | ||||
S3‑172053 | Encryption of positioning broadcast information | Ericsson Inc. | discussion | Endorsement | Yes |
Yes
| noted | No | ||||
7.6.2 | IP Multimedia Subsystem (IMS) Security |   | ||||||||||
7.6.3 | Network Domain Security (NDS) |   | ||||||||||
7.6.4 | UTRAN Network Access Security |   | ||||||||||
7.6.5 | GERAN Network Access Security |   | ||||||||||
7.6.6 | Generic Authentication Architecture (GAA) |   | ||||||||||
7.6.7 | Multimedia Broadcast/Multicast Service (MBMS) | S3‑171727 | Reply LS on external interface for TV services | S4-170725 | LS in | Yes |
YesThere are some contributions dealing with this in 7.6.7.
| replied to | No | |||
S3‑172135 | Reply to: Reply LS on external interface for TV services | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑172023 | Corrections to xMB security aspects | Qualcomm Incorporated | CR | Agreement | Yes |
Yes
| not pursued | No | ||||
7.6.8 | Security Aspects of Home(e)NodeB (H(e)NB) |   | ||||||||||
7.6.9 | Security Aspects related to Machine-Type Communication ((e)MTC) | S3‑171877 | Discussion on security of SCEF Northbound API interfaces | Huawei, Hisilicon | discussion | Discussion | Yes |
Yes
| noted | No | ||
S3‑171878 | New WID for Northbound APIs Security for SCEF - SCSAS Interworking (NAPS_Sec) | Huawei, Hisilicon | WID new | Agreement | Yes |
YesEricsson pointed out that the discussion proposes a study but this is a work item proposal.
Huawei commented that this is a short WID and that’s the intention. Ericsson supported this.
BT commented that the scope misses security functions that pass on the interface. Not clear whether this is for Rel-15/ 5G. Status of the underliying 3GPP access network to be inclluded in the scope in order to support this WID.
Nokia commented that the dates proposed were wrong (they don’t show SA dates and what it shows in SA3 dates is very unrealistic).
Vodafone commented that the entities to be secured need to be identified: what do they mean with "users" here? The scope needs to be more specific.
MCC commented that the output should be CRs impacting TS 33.187. The wrong table was filled up.
MCC commented that in section 8 no 3GPP working groups should be added since the will not be involved in the SA3 WID work.
| revised | No | S3‑172075 | |||
S3‑172075 | New WID for Northbound APIs Security for SCEF - SCSAS Interworking (NAPS_Sec) | Huawei, Hisilicon | WID new | Agreement | Yes |
YesVodafone,BT: restrict the scope to securing the interface (they wanted the bullet points in the objective back). If the scope is too wide make it a study item.
ORANGE preferred a wider scope (removing the bullet points in the objective), also a study item instead of a work item.
Nokia: the WID is progressing in SA2, we received an LS and we replied to them. This is beyond a study item.
This was taken offline and an agreement was made.
| agreed | No | S3‑171878 | |||
7.6.10 | Security Aspects of Isolated E-UTRAN Operation for Public Safety (IOPS) | S3‑171725 | LS on Security Aspects Related to IOPS network with Limited Backhaul | S2-174071 | LS in | Yes |
YesVodafone: do we need a WID for this?
The Chair commented that it depended on the amount of work. If they are small changes, no need for it.
ORANGE: the macro network HSS wasn't covered by the study in SA3.
The LS was postponed for the next meeting.
| postponed | No | |||
7.6.11 | Security of MCPTT (MCPTT) |   | ||||||||||
7.6.12 | Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3) |   | ||||||||||
7.6.13 | Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM) |   | ||||||||||
7.6.14 | Security Aspects of Narrowband IOT (CIoT) | S3‑171997 | Security for the RLFs for UEs doing user plane over control plane using NAS level security | Qualcomm Incorporated | CR | Agreement | Yes |
YesNokia: UL/XDL_NAS_MAC are defined anywhere?
Qualcomm implied that was not necessary, it's well explained in the clause.
| revised | No | S3‑172137 | S3‑171325 |
S3‑172137 | Security for the RLFs for UEs doing user plane over control plane using NAS level security | Qualcomm Incorporated | CR | Agreement | Yes |
Yes
| agreed | No | S3‑171997 | |||
S3‑172026 | KeNB calculation at initisation of S1-U DRBs for UEs using control plane optimisations | Qualcomm Incorporated | CR | Agreement | Yes |
YesNokia had a problem with the note. It was decided to remove it.
Vodafone: the first paragraph is a very long sentence.
It was agreed to reword the first paragraph to make it simpler to read and understand.
| revised | No | S3‑172138 | |||
S3‑172138 | KeNB calculation at initisation of S1-U DRBs for UEs using control plane optimisations | Qualcomm Incorporated | CR | Agreement | Yes |
Yes
| agreed | No | S3‑172026 | |||
7.6.15 | Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) | S3‑171715 | LS on LI requirements for CIOT services including BEST services | ETSI TC LI | LS in | Yes |
YesVodafone: They have confused using BEST in a roaming scenario.
It was postponed together with the SA3-LI LS.
| postponed | No | |||
S3‑171716 | Reply LS on security for RLF for DoNAS Ues | R2-1705939 | LS in | Yes |
Yes
| noted | No | |||||
S3‑171881 | Reply LS on LI Requirements for CIoT services including BEST services | S3i170239 | LS in | Yes |
YesBT: End-to-end media IMS could apply here.
Verizon: just have integrity protection in this situation.
KPN: we would be happy to transport data for Vodafone. No need to change the service. The regulation in Netherlands is going towards device manipulation. If the UE is moving towards end-to-end encryption we don’t need to act further. Everything can be solved in the roaming agreement.
Vodafone: Location of the customer is ON. No impact in LI if running only integrity protection.
ORANGE: the LI requirement in the VPLMN needs to be fulfilled without the help of the HPLMN.
Vodafone: the VPLMN needs to ask HPLMN not to allow cyphering. We tell the customer that the traffic will not be encrypted in certain countries. We have the tools to know where the customer is and act on it. This is all covered in the TR.
ORANGE: TC LI and SA3-LI are not proposing what needs to be done. SA3 doesn’t have the right skills to understand the LI requirements.
BT: SA3-LI should not act on the service architecture either. SA3 should give feedback on the way the think it should be done with the minimum impact. Confidentiality is fine enough.
Vodafone proposed to have conference calls to discuss the response LS.
ORANGE: SA3-LI is meeting before Reno, we need to respond before.
| postponed | No | |||||
S3‑171747 | Collection of changes to BEST TS as a result of implementations | VODAFONE Group Plc | CR | Agreement | Yes |
Yes
| revised | No | S3‑172139 | |||
S3‑172139 | Collection of changes to BEST TS as a result of implementations | VODAFONE Group Plc | CR | Agreement | No |
Yes
| agreed | No | S3‑171747 | |||
S3‑171748 | Disscussion on issues found during implementation of BEST and their fixes | VODAFONE Group Plc | discussion | Information | Yes |
Yes
| noted | No | ||||
S3‑171746 | Discussion document on the LS from TC CYBER regarding BEST | VODAFONE Group Plc | discussion | Information | No |
No
| withdrawn | Yes | ||||
7.6.16 | New GPRS algorithms for EASE (EASE_ALGOs_SA3) (Rel-13) |   | ||||||||||
7.6.17 | Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14) |   | ||||||||||
7.6.18 | Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3) |   | ||||||||||
7.6.19 | Security Assurance Specification for 3GPP network product classes (MME, TS 33.116) (SCAS-SA3) |   | ||||||||||
7.6.20 | Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14) | S3‑171724 | Reply LS on the support of Unicast and Groupcast transmission over PC5 for eV2X | S2-173610 | LS in | Yes |
Yes
| noted | No | |||
S3‑171853 | GBA use in LTE V2X | Huawei; Hisilicon | draftCR | Approval | Yes |
YesThis should have been a CR, so a new tdoc was given to include this content.
| noted | No | ||||
S3‑172142 | GBA use in LTE V2X | Huawei | CR | Agreement | Yes |
Yes
| agreed | No | ||||
7.6.21 | Other work items | S3‑171773 | Support of 256-bit Keys and Algorithms in 5G | AT&T, US Dept. of Commerce, Interdigital, MITRE | discussion | Decision | Yes |
YesORANGE: Do we move completely to the new lengths or we will have coexistence of them?
Interdigital: there will be coexistence.
Gemalto: which release is this heading to?
AT&T: Rel-15 for the study and normative in Rel-16.
Gemalto: the result of the study will be for phase two then.
Vodafone: the study item should be extended to Rel-16, given the load of work. Both study and normative can be done in parallel.
CCSA supported the study.
Vodafone commented that the work can be sped up with conference calls in order to involve SAGE as soon as possible.
NTT-Docomo: 48 bytes for the PDU in PDCP seems to be quite a lot of overhead. AT&T commented that this needed to be studied.
The companies welcomed the initiative and encouraged to bring a Study Item for the next meeting to be agreed.
BT pointed out that the admininistrative procedures in the French government could delay the inclusion of this work in Rel-16.
AT&T: the intention is to bring this into the next meeting in Singapore.
| noted | No | ||
S3‑171792 | Proposal for Disabling Legacy Radio Access | MITRE, AT&T, Interdigital | discussion | Discussion | Yes |
YesChina Mobile: thye objected to the contribution. This is not work for SA3, it's RAN specific.
Vodafone: ability to select RANs is in a SA1 spec. It is right to make statements so other groups can take action. Current phones cannot restrict access to 2G/3G.
BT agreed with this. The user should be aware about this. Emergency calls that can be made only in 2G, what happens?
Sprint: SA1 will deal with this. It’s related to regulatory aspects.
Vodafone: action should be taken in SA1.
AT&T was happy with this feedback. Sending an LS to SA1 was agreed.
| noted | No | ||||
S3‑171896 | CR for modify the text format of X5.2 in TS 33.203 - R14 | Huawei, Hisilicon | CR | Approval | Yes |
Yes
| revised | No | S3‑172141 | |||
S3‑172141 | CR for modify the text format of X5.2 in TS 33.203 - R14 | Huawei, Hisilicon | CR | Approval | Yes |
YesMCC noted that editorial changes are only allowed in Rel-15, so the CR was changed to this Release.
| agreed | No | S3‑171896 | |||
S3‑171898 | CR for modify the text format of X5.2 in TS 33.203 - R13 | Huawei, Hisilicon | CR | Approval | Yes |
Yes
| not pursued | No | ||||
S3‑171969 | xMB interface security | Ericsson | discussion | Yes |
Yes
| noted | No | |||||
S3‑171971 | User-based authorization for xMB | Ericsson LM | CR | Yes |
Yes
| revised | No | S3‑172136 | ||||
S3‑172136 | User-based authorization for xMB | Ericsson LM | CR | - | Yes |
Yes
| agreed | No | S3‑171971 | |||
S3‑172144 | LS to SA1 on selective disabling of Legacy Radio Access | AT&T | LS out | Approval | Yes |
Yes
| approved | No | ||||
8 | Studies |   | ||||||||||
8.1 | Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14) | S3‑172041 | [eMCSEC]: Key Issue on Edge Security for TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑172042 | [eMCSEC]: Solution for Signalling Proxy for TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| revised | No | S3‑172133 | |||
S3‑172133 | [eMCSEC]: Solution for Signalling Proxy for TR 33.880 | NCSC | pCR | Approval | No |
Yes
| approved | No | S3‑172042 | |||
S3‑172043 | [eMCSEC]: Modification of Key Issue #1.4 TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172044 | [eMCSEC]: Solution for Signalling Authentication for TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| revised | No | S3‑172111 | |||
S3‑172111 | [eMCSEC]: Solution for Signalling Authentication for TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| approved | No | S3‑172044 | |||
S3‑172045 | [eMCSEC]: Modification of Solution #1.1 in TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| revised | No | S3‑172112 | |||
S3‑172112 | [eMCSEC]: Modification of Solution #1.1 in TR 33.880 | NCSC | pCR | Approval | Yes |
Yes
| approved | No | S3‑172045 | |||
S3‑172132 | Draft TR 33.880 | NCSC | draft TR | Approval | Yes |
Yes
| approved | No | ||||
8.2 | Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15) | S3‑171706 | Reply LS on UE-to-NW relaying | S2-170398 | LS in | Yes |
Yes
| replied to | No | |||
S3‑171707 | LS on PC5 Secure Communication | S2-171621 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑172153 | Reply to: LS on PC5 Secure Communication and UE-to-NW relaying | Intel | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑171988 | Reply LS on connection establishment over PC5 | Huawei; Hisilicon | LS out | Approval | Yes |
YesKPN: we can use the reply to the other LS in here too.
| noted | No | ||||
S3‑171908 | Discussion for PC5 Security between Remote UE and Relay UE | Intel Corporation (UK) Ltd | discussion | Yes |
Yes
| noted | No | |||||
S3‑171909 | Reply LS on PC5 Secure Communication | Intel Corporation (UK) Ltd | LS out | Yes |
Yes
| noted | No | |||||
S3‑171994 | Reply LS on PC5 Secure Communication | Huawei; Hisilicon | LS out | Approval | Yes |
YesIntel: too soon to say that we shall provide integrity and confidentiality protection, we need to study these attacks.
KPN, ORANGE: let's study the attacks in our TR and come back later with some conclusions.
Ericsson: these attacks could be relevant, at least answer SA2 with the attacks we find relevant to study.
| noted | No | ||||
S3‑171975 | Title Modification for Key Issue #5 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171976 | Overview of REAR | Huawei; Hisilicon | pCR | Approval | Yes |
YesKPN: some text in the architecture clause doesn't belong there. They should be moved to the scope clause.
MCC: "use "this document" instead of "this study".
ORANGE: simply refer to the architecture in SA2. This was agreed.
ORANGE: the introduction is giving a solution already.Remove the second paragraph.
MCC: reword the "shall"s in there.
| revised | No | S3‑172155 | |||
S3‑172155 | Overview of REAR | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171976 | |||
S3‑171736 | Modification and resolution of Editor's Note of Key Issue #1 | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171737 | Modification and resolution of Editor's Note of Key Issue #2 | KPN | pCR | Approval | Yes |
Yes
| revised | No | S3‑172156 | |||
S3‑172156 | Modification and resolution of Editor's Note of Key Issue #2 | KPN | pCR | Approval | Yes |
Yes
| approved | No | S3‑171737 | |||
S3‑171738 | Clarification of Key Issue #3 | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
YesIt was agreed to add an editor's note on permanent identities and authorization as proposed by NCSC. They were worried about the possibility of the creation of a chain where the eremote UE is another relay.
| revised | No | S3‑172157 | |||
S3‑172157 | Clarification of Key Issue #3 | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171738 | |||
S3‑171739 | New Key Issue on Service Continuity | KPN | pCR | Approval | Yes |
YesNokia: add an editor's note on these service continuity scenarios being considered in RAN2 and SA2. Ericsson agreed.
| revised | No | S3‑172158 | |||
S3‑172158 | New Key Issue on Service Continuity | KPN | pCR | Approval | Yes |
Yes
| approved | No | S3‑171739 | |||
S3‑171974 | Key Issue on Authentication of eRemote UE during one-to-one Communication Establishement | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE: the real requirement is the authentication of the remote UE and the network.
Huawei: the key issue is the authentication of the remote UE and UE before the remote UE authenticates in the network.
Nokia agreed with ORANGE and found the requirement too ambiguous.
It was decided to remove the requirements and add an editor's note stating the need of clarifying the key issue.
| revised | No | S3‑172181 | |||
S3‑172181 | Key Issue on Authentication of eRemote UE during one-to-one Communication Establishement | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171974 | |||
S3‑171741 | New key issue on authentication of eRelay-UE | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171742 | New key issue on protection of UP between eRemote-UE and eNB | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
YesNokia: If the PC5 is protected since Rel-12, do these threats apply?
KPN: this only applies between UE and eNB.
| approved | No | ||||
S3‑171743 | New solution on authentication of eRemote-UE via eRelay-UE | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171911 | eRemote-UE Authentication with MITM detection | Intel Corporation (UK) Ltd | pCR | Yes |
YesSony: this is protection for the control plane only, not the user plane.
This was agreed.
Huawei: the first step in the figure does not correspond to the text.
This was agreed to be fixed.
Nokia: secure channel in step d? Is it IPSec? An editor's note was added.
ORANGE: this is a LTE study item, and you are mentioning gNB. This was agreed to be fixed.
ORANGE doubted that this solution was solving the introduced the issue.
ORANGE asked to add the assumption that the channel eRemoteUE and eRelay UE is encrypted.
| revised | No | S3‑172180 | ||||
S3‑172180 | eRemote-UE Authentication with MITM detection | Intel Corporation (UK) Ltd | pCR | - | Yes |
Yes
| approved | No | S3‑171911 | |||
S3‑171744 | New solution on authentication of eRelay-UE | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171981 | Enhancement of Setting up Connection between eRemote UE and eRelay UE | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE didn’t get the key issue.Besides, there's a lot of exchange before securing PC5 and during that the attack is still possible.
Ericsson: this is using basically Prose?
Huawei: the deviation from ProSe is in step 3 and 4.
According to ORANGE, the key issue in 1974 wasn't clear enough to justify this solution.
Huawei was encouraged to clarify the key issue for the next meeting.
| noted | No | ||||
S3‑171977 | Solution of Authorization for Indirect 3GPP Communication | Huawei; Hisilicon | pCR | Approval | Yes |
YesEricsson: not sure that this is part of SA3 scope, since the authorization is discussed in SA2.
Nokia: a security solution is neeeded here, not entirely in the scope of SA2.
Editor's notes were added to address Nokia's and Ericsson's issues.
| revised | No | S3‑172182 | |||
S3‑172182 | Solution of Authorization for Indirect 3GPP Communication | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171977 | |||
S3‑171745 | New solution on protection of UP between eRemote-UE and eNB | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171980 | Solution for Protection of CP between eRemote UE and Network | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171978 | Solution of IMSI privacy for Attach via eRelay UE | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE: we should go back to the requirement and modify it a little bit.
| revised | No | S3‑172183 | |||
S3‑172183 | Solution of IMSI privacy for Attach via eRelay UE | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171978 | |||
S3‑171979 | eRelay Discovery Enhancement | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171740 | New Solutions for Security Service Continuity | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172154 | Draft TR 33.843 | Huawei | draft TR | Approval | No |
Yes
| left for email approval | No | ||||
8.3 | Study on Architecture and Security for Next Generation System (FS_NSA) (Rel-15) |   | ||||||||||
8.3.1 | Security architecture | S3‑171832 | Interim Agreement to Key Issue #1.5 and #1.6 | Huawei; Hisilicon | pCR | Approval | Yes |
YesQualcomm: SMS over NAS will be integrity and confidentiality protected by default. Is this before you activate NAS security?
Huawei: yes, this is the case.
Qualcomm agreed but proposed to reword the questions.
Ericsson: There are cases with security context where there is only integrity protection.This needs to be mentioned.
Nokia: already defined in 33.502, this is not needed.
Vodafone: not clear how far the integrity protection is going, between the UE and the NAS.
It was agreed to refine the wording to address these comments.
| revised | No | S3‑172093 | |
S3‑172093 | Interim Agreement to Key Issue #1.5 and #1.6 | Huawei; Hisilicon | pCR | Approval | No |
Yes
| approved | No | S3‑171832 | |||
S3‑171815 | pCR to 33.899 Security solution for SMS over NAS | Nokia | pCR | Approval | Yes |
YesIt was proposed to carry on without the evaluation due to the lack of time for discussions.
| revised | No | S3‑172184 | |||
S3‑172184 | pCR to 33.899 Security solution for SMS over NAS | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑171815 | |||
S3‑171831 | Interim agreements for forward security during handover | Huawei; Hisilicon | pCR | Approval | Yes |
YesVodafone: forward security mechanism is ambiguous.
Nokia: add a reference to the LTE document where this is defined.
| revised | No | S3‑172094 | |||
S3‑172094 | Interim agreements for forward security during handover | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171831 | |||
S3‑171847 | interim agreement for E.1.7.2 | Huawei; Hisilicon | pCR | Approval | Yes |
YesNokia: the forward security part will bring significant changes. You can always do re-authentication, so it is not needed. I'm fine with backward security.
Ericsson and China Mobile supported Nokia with this. Qualcomm objected to having only backwards security.
This was left open depending on decisions made in the normative part.
| noted | No | ||||
S3‑171843 | interim agreement for KI#1.8 | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE: this is already existing.
Huawei: no agreement whether the public key is needed.
Vodafone: No need to have interim agreements that are in the TS already, this increases the number of documents.
| noted | No | ||||
S3‑171842 | update solutrion #1.40 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171793 | Interim agreement on UP security | Huawei & Hisilicon | pCR | Approval | Yes |
YesVodafone:if you re-authenticate during a session you are changing the protection.
Nokia: the granularity comes down to the radio bearer, cannot apply the policy to all the bearers; it would not be optimal.
Ericsson: just put Yes in the interim agreement.
ORANGE: this doesn’t help at all,we will have the same discussion in the normative part. Qualcomm supported this.
The Chair proposed to not to duplicate topics from the interim agreements in the TR and the TS at the same time. This was agreed.
| noted | No | ||||
S3‑171818 | Interim agreements on key issue#4.17 UP integrity | Nokia | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171859 | Update intrim agreement for section E.4.17 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171794 | UP integrity protection policy determination solution | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171876 | Soltuion for 5G initial NAS message protection | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172040 | pCR to TR 33.899_Discussion on inputs for key derivation | NEC Corporation | pCR | Discussion | Yes |
Yes
| noted | No | ||||
S3‑172047 | pCR to TR 33.899_IA on inputs for key derivation | NEC Corporation | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172039 | pCR to TR 33.899_Update IA KI_1.18_Flexible security policies negotiation in control plane | NEC Corporation | pCR | Approval | Yes |
YesChina Mobile: why more than one KDF?
Nokia: in case there is a risk of bidding down attacks, there may be more than one needed.
Huawei: what kind of risk,high or low? This is undetermined.
| revised | No | S3‑172096 | |||
S3‑172096 | pCR to TR 33.899_Update IA KI_1.18_Flexible security policies negotiation in control plane | NEC Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑172039 | |||
S3‑171941 | AMF vs SEAF in solution 1.49 fo TR 33.899 | Nokia | pCR | Yes |
Yes
| approved | No | |||||
S3‑171855 | Update interim agreement in section E.1.11 | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE: it's confusing what is happening in SA2 in this topic. Deciding to go for the service based architecture will have an impact on the timeline of the work.
Ericsson: they are already considering REST based protocols, and Diameter. We may need to do something more, as Huawei proposes.
China Mobile supported Huawei. We may face different security problems in this case.
ORANGE wasn't sure about how the work with SA2 was going to be carried out. Maybe an LS is needed.
Huawei: maybe a study would be more appropiate.
| approved | No | ||||
S3‑171907 | Security Architecture developed by 5G-ENSURE project | Ericsson, Telecom Italia, Thales, NEC | pCR | Approval | Yes |
YesORANGE objected to this.
Huawei: it’s not a solution, it’s an annex.
Ericsson: this is coming from an EU project, 5G-Ensure, it’s not a solution but information about their work.
ORANGE: this is unrelated to our work, no point to have this in our TR.
BT agreed with ORANGE.
| noted | No | ||||
S3‑171848 | UP Security on gNB internal interface | Huawei; Hisilicon | pCR | Approval | No |
Yes
| revised | No | S3‑171895, S3‑171900 | |||
S3‑171850 | gNB shall support certificate enrolment in TS 33.310 | Huawei; Hisilicon | pCR | Approval | No |
No
| withdrawn | Yes | ||||
8.3.2 | Authentication | S3‑171917 | Q&IA related to the Usability of legacy USIM in key issue #2.1 | China mobile, KPN | pCR | Yes |
YesVodafone: there may be problems when introducing the 5G core. It is up to us to say whether it will be secure to access 5G services with a legacy SIM, not whether the legacy SIM can be used for 5G services.
Vodafone: Rel-8 to Rel-14 would be legacy.
Qualcomm: what is the difference between Rel-8 and Rel-99? They are the same.Vodafone disagreed. Splitting security between the handset and the SIM should not be done.
Qualcomm objected to distinguishing from Releases since they didn’t understand why Rel-99 couldn’t be used.
NTT-Docomo: first question you can use the term LTE USIM.
Ericsson commented that they had contributions for the TS that addressed this question.
| revised | No | S3‑172099 | ||
S3‑172099 | Q&IA related to the Usability of legacy USIM in key issue #2.1 | China mobile, KPN | pCR | - | No |
Yes
| noted | No | S3‑171917 | |||
S3‑172073 | Comments on S3-17917 Q&IA related to the Usability of legacy USIM in key issue #2.1 | OBERTHUR TECHNOLOGIES | pCR | Decision | Yes |
Yes
| noted | No | ||||
S3‑171826 | Deleting EN on MASA handling OUT of Sequence | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171845 | interim agreement for KI#2.4 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑172100 | |||
S3‑172100 | interim agreement for KI#2.4 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171845 | |||
S3‑171816 | Question and Interim Agreement on authentication of the user | Alibaba (China) Group., Ltd. | pCR | Approval | Yes |
YesORANGE: who's the user? How does it impact the core network? I don’t agree with the biometric authentication.
Alibaba: the original conclusion was TBD.
Vodafone: we already have authentication of the user. The question should have been about additional authentication mechanisms in phase one. The asnwer was TBD. The origiinal question is wrong, misleading. Vodafone didn't agree with the document and admitted that the original agreed question was poor.
BT: this implies creating a database for biometric data and it implies a higher seccurity risk. Locally is fine, but trying to centralise it would be risky.
Alibaba: there are solutions available to solve the high security risk of having a centralised database.
Vodafone: we might consider it for phase two, but we don’t have a SID for phase two yet.
| revised | No | S3‑172101 | |||
S3‑172101 | Question and Interim Agreement on authentication of the user | Alibaba (China) Group., Ltd. | pCR | Approval | Yes |
Yes
| approved | No | S3‑171816 | |||
S3‑171817 | Updating security threats, requirements and solutions on key issue #2.8 | Alibaba (China) Group., Ltd. | pCR | Approval | Yes |
YesNokia: totally new authentication framework. We can have it for the phase two study, but not here.
Alibaba: we can remove the solution part.
ORANGE: if we have the key issue only, I don’t agree.
| noted | No | ||||
S3‑171828 | Update solution 2.11 for KI 1.21 | Huawei, Hisilicon | pCR | Approval | Yes |
YesNokia: it is not solving the issue that is being raised. Qualcomm agreed.
| noted | No | ||||
S3‑171821 | Adding a solution on key issue #2.8 | Alibaba (China) Group., Ltd. | pCR | Approval | No |
No
| withdrawn | Yes | ||||
8.3.3 | Security context and key management | S3‑171758 | Interim agreement for protecting anchor key for primary authentication | ZTE Corporation | pCR | Approval | Yes |
YesORANGE: integrity protected instead of "tampering". BT argeed.
It was agreed to modify the question to use "confidentiallity and integrity protected".
| revised | No | S3‑172102 | |
S3‑172102 | Interim agreement for protecting anchor key for primary authentication | ZTE Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑171758 | |||
8.3.4 | RAN security | S3‑171893 | Discussion on rogue gNB detection | Motorola Mobility, Lenovo | pCR | Approval | Yes |
YesEricsson: the introduction reads as an evaluation.
| noted | No | ||
S3‑172036 | Interim Agreements on Key Issue # 4.1: AS security during RRC idle mode | Samsung | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172049 | pCR to TR 33.899_IA on Key refresh during handover with AMF change | NEC Corporation | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171902 | flexible retain key solution | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑171825 | Update Interim Agreements for RAN KI # 4.11 & 4.15 | Huawei, Hisilicon | pCR | Approval | Yes |
YesEricsson: On the third change, this is overlapping with an agreement that we had earlier. HO will follow the LTE procedure. We didn’t agree with pushing it forward.We can improve it during the normative phase.
Fourth change: the response should be TBD as it was before.
| revised | No | S3‑172103 | |||
S3‑172103 | Update Interim Agreements for RAN KI # 4.11 & 4.15 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171825 | |||
S3‑171829 | Conclusion and Comparison of Xn handover solutions | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171838 | Discussion on flexibility of retaining or changing AS security key | Huawei; Hisilicon | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑171839 | Draft LS on Discussion on flexibility of retaining or changing AS security key | Huawei; Hisilicon | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑171856 | Update interim agreement in section E.4.6.12 | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑172050 | pCR to TR 33.899_Verifying gNB | NEC Corporation | pCR | Approval | Yes |
Yes
| approved | No | ||||
8.3.5 | Security within NG-UE |   | ||||||||||
8.3.6 | Authorization |   | ||||||||||
8.3.7 | Subscription privacy | S3‑171951 | TR - agreement - privacy indication | Nokia | pCR | Decision | Yes |
Yes
| noted | No | ||
S3‑171947 | TR - KI - Avoiding IMSI Paging | Nokia | pCR | Decision | Yes |
YesORANGE: no point of having new key issues in the TR.
Nokia: we had agreed on this.
| approved | No | ||||
S3‑171953 | TS - Privacy management service | Nokia | pCR | Decision | Yes |
YesIt was decided to move it to the TR instead of the TS.
Ericsson: this is following the TS format, it’s normative.
| noted | No | ||||
S3‑172070 | Comments to S3-171947 pCR New KI - Avoiding IMSI SUPI Paging | China Mobile | discussion | Yes |
Yes
| noted | No | |||||
S3‑171948 | TR - Privacy Agreement - IMSI Paging | Nokia | pCR | Decision | Yes |
YesEricsson: SA2 is already taking care of this. They agreed on not having an IMSI based paging. Ericsson supported this contribution.
China Mobile: they don't have a document with the official agreement about this.
A note was added on the need of syncronizing with SA2.
| revised | No | S3‑172104 | |||
S3‑172104 | TR - Privacy Agreement - IMSI Paging | Nokia | pCR | Decision | No |
Yes
| approved | No | S3‑171948 | |||
S3‑171844 | interim agreement for KI#7.2 | Huawei; Hisilicon | pCR | Approval | Yes |
YesVodafone: it shall be stored in one or the other.
TBD if stored in the ME.
ORANGE: we don't know how to provision the ME with the public key yet.
China Mobile: storing in the ME is fine with us.
BT: do we want to rule out legacy from this feature?
Vodafone: there are no standards for provisioning handsets. The ones proposed in OMA are not used.
Ericsson: there are contributions about this in the TS.
| noted | No | ||||
S3‑172031 | Interim agreements for key issue #7.2 | Gemalto N.V. | pCR | Approval | Yes |
Yes
| revised | No | S3‑172088 | |||
S3‑172088 | Interim agreements for key issue #7.2 | Gemalto N.V., ORANGE, Oberthur Technologies, Morpho | pCR | Approval | Yes |
Yes
| noted | No | S3‑172031 | |||
S3‑171918 | pCR Security enhancement to the attach procedure relying on the public key of the home network | China Mobile | pCR | Yes |
YesThe evaluation part was removed.
It was reminded that contributions that introduce new parts should have revision marks.
ORANGE:we are seeing solutions that don’t solve the problems.
Nokia also had many issues with this contribution.
| noted | No | |||||
S3‑171945 | TR - LI compliance | Nokia | pCR | Decision | Yes |
Yes
| revised | No | S3‑172081 | |||
S3‑172081 | TR - LI compliance | Nokia | pCR | Decision | Yes |
Yes
| approved | No | S3‑171945 | |||
S3‑171799 | Interim agreement for PDCP SN refreshment | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171827 | Conclusion for generation effective temporary or short-term subscription identifiers | Huawei, Hisilicon, China Mobile | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171800 | PDCP SN refereshment solution | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171906 | Evaluation for Securing and refreshing the temporary subscriber identifiers. | Intel Corporation (UK) Ltd | pCR | Yes |
Yes
| noted | No | |||||
S3‑171910 | Update diagrams for Securing and refreshing the temporary subscriber identifiers. | Intel Corporation (UK) Ltd | pCR | Yes |
Yes
| approved | No | |||||
S3‑171913 | pCR to 33.899: Updates to Solution #7.2 | Intel Corporation (UK) Ltd | pCR | Yes |
Yes
| revised | No | S3‑172185 | ||||
S3‑172185 | pCR to 33.899: Updates to Solution #7.2 | Intel Corporation (UK) Ltd | pCR | - | Yes |
YesRemoving the evaluation part.
| approved | No | S3‑171913 | |||
S3‑171949 | TR - discussion and agreement - NSSAI | Nokia | pCR | Decision | Yes |
Yes
| noted | No | ||||
8.3.8 | Network slicing security | S3‑171769 | Questions and interim agreements for KI #8.3-Slice Authentication | CATT | pCR | Approval | Yes |
YesORANGE: no slice authentication in phase one.
| noted | No | ||
S3‑171770 | Questions and interim agreements for KI #8.3-NSSAI Security | CATT | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171771 | Questions and interim agreements for KI #8.2-Security Differentiation | CATT | pCR | Approval | Yes |
YesSupported by ORANGE.
| approved | No | ||||
S3‑171772 | Evaluation for Network Slicing Security Solution #8.14 | CATT | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171808 | Discussion paper on slice authentication | Huawei & Hisilicon | discussion | Approval | Yes |
YesORANGE: no phases in SA1, so slice authentication doesn’t fit right now in phase one of the SA3 work.
Huawei: secondary authentication is mandatory.
ORANGE: this is specific to some use cases.
Huawei: we haven't agreed on anything about this topic yet. We need authentication after primary authentication.
ORANGE: this is not needed and it has been discussed several times.
Gemalto: other groups are working in slicing, we cannot skip them.
ORANGE: slice specific authentication is not being considered in the other groups.
Gemalto and China Mobile supported the proposal of having the slice authentication.
Ericsson didn’t see that this fit anywhere. Who will be doing this authentication on behalf of the operator? The operator itself to access their own slices after the primary authentication?
ORANGE: there is no assumption in SA2 for phase one in the slice authentication topic.
The Chair commented that he wasn't sure about having slice authentication for SA3's phase one.
| noted | No | ||||
S3‑171809 | Interim agreements for KI8.3 | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑171810 | Interim agreement for KI8.2 | Huawei & Hisilicon | pCR | Approval | Yes |
YesVodafone: waste of time since this is phase two material.
| noted | No | ||||
S3‑171916 | Questions and interim agreements for KI #8.3 | China Mobile, China Unicom | pCR | Yes |
Yes
| noted | No | |||||
8.3.9 | Relay security |   | ||||||||||
8.3.10 | Network domain security |   | ||||||||||
8.3.11 | Security visibility and configurability | S3‑171849 | configuration and visibility features in TS 33.401 should be reused in 5G. | Huawei; Hisilicon | pCR | Approval | No |
Yes
| revised | No | S3‑171897 | |
S3‑171886 | Key Issue #11.3: User control of security | China Unicom | pCR | Yes |
YesLG didn’t support this.
Ericsson: we should have a proper discussion on this. Vodafone agreed.
| noted | No | |||||
S3‑171887 | Key Issue #11.2: User awareness of security | China Unicom | pCR | Yes |
Yes
| noted | No | |||||
S3‑172063 | Questions for security area #11 | LG Electronics | pCR | Approval | Yes |
YesVodafone: an application should not be able to drop a call based on its own privacy requirements.
| noted | No | ||||
S3‑172064 | Conclusion of security area #11 | LG Electronics | pCR | Approval | Yes |
YesORANGE didn’t agree with this. Ericsson supported it.
| noted | No | ||||
8.3.12 | Credential provisioning |   | ||||||||||
8.3.13 | Interworking and migration | S3‑172048 | pCR to TR 33.899_Solution to KI #13.1 | NEC Corporation | pCR | Approval | Yes |
Yes
| revised | No | S3‑172148 | |
S3‑172148 | pCR to TR 33.899_Solution to KI #13.1 | NEC Corporation | pCR | Approval | Yes |
Yes
| approved | No | S3‑172048 | |||
8.3.14 | Small data |   | ||||||||||
8.3.15 | Broadcast/Multicast security |   | ||||||||||
8.3.16 | Management Security |   | ||||||||||
8.3.17 | Cryptographic algorithms |   | ||||||||||
8.3.18 | Other | S3‑172095 | Draft TR 33.899 | Ericsson | draft TR | Approval | No |
YesThe Chair commented that the plan was not to present this TR for approval. A note will be added to state that there are no evaluations in the specification.
MCC clarified that the Study Item would be stopped, the latest draft approved by the WG but the specification would not be approved at SA level.
The interim agreements in this TR will be followed by the group in the normative work.
| left for email approval | No | ||
8.4 | Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15) | S3‑171749 | Draft skeleton document for TR on Long Term Key Update (LTKUP) following conf calls | VODAFONE Group Plc | draft TR | Approval | Yes |
YesORANGE: adding key issues without content? I'd rather treat the content before having a skeleton advancing empty clauses that haven't been approved yet.
Vodafone: there is content in the following documents.
This was approved conditionally. The next version will introduced the agreed modifications.
| approved | No | ||
S3‑171750 | pCR TR33.XXX LTKUP - update to sections 4 5 and 6 as discussed on conf calls | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| revised | No | S3‑172160 | |||
S3‑172160 | pCR TR33.XXX LTKUP - update to sections 4 5 and 6 as discussed on conf calls | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑171750 | |||
S3‑171751 | pCR to TR 33.xxx - LTKUP - re-organisation of Key issues section into Key Issues and evaluation criteria | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| revised | No | S3‑172161 | |||
S3‑172161 | pCR to TR 33.xxx - LTKUP - re-organisation of Key issues section into Key Issues and evaluation criteria | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑171751 | |||
S3‑171752 | pCR to TR 33.xxx - LTKUP - addition of key issue content | VODAFONE Group Plc | pCR | Approval | Yes |
YesGemalto: Don’t use the term SIM, use the term UICC.
Gemalto: remove key issue on OTA Keys exposed. ORANGE supported this and it was agreed.
| revised | No | S3‑172162 | |||
S3‑172162 | pCR to TR 33.xxx - LTKUP - addition of key issue content | VODAFONE Group Plc | pCR | Approval | Yes |
Yes
| approved | No | S3‑171752 | |||
S3‑171879 | GSMA eUICC based solution for LTKUP | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE: confirm the descriptions with GSMA (SGP.22). Add an editor's note about this.
Vodafone: is it OK to reference to a GSMA document? Copyright issues and so on.
It was confirmed that SGP.22 was a GSMA public document so it was correct to reference to it.
MCC commented that the paragraph "In the latest version of SGP.22 when drafting this TR,.." should be removed as no mentioning of the time when the spec was drafted should be put into a specification. Vodafone agreed to replace it with a reference to SGP.22 as Rapporteur's work.
| revised | No | S3‑172163 | |||
S3‑172163 | GSMA eUICC based solution for LTKUP | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑171879 | |||
S3‑171880 | Revised eUICC solution for LTKUP | Huawei; Hisilicon | pCR | Approval | Yes |
YesORANGE and BT objected to this document.
Vodafone: it is described as a GSMA solution that doesn't exist.
Nokia: isn’t it correct in a 3GPP study to take a GSMA solution and propose a modification? Vodafone disagreed with this.
KPN agreed with Vodafone.
MCC commented that they felt uncomfortable with taking a solution from GSMA and modifying it.Mirko would check this internally.
Vodafone: create a solution and don’t mention GSMA.
NTT-Docomo: outcome of the study could go to GSMA and propose a modification.
There was no agreement and the document had to be noted.
| noted | No | ||||
S3‑172159 | Draft TR 33.834 | Vodafone | draft TR | Approval | Yes |
Yes
| approved | No | ||||
8.5 | Other study areas |   | ||||||||||
8.5.1 | Security Assurance Specification for 3GPP network product classes (33.926) (SCAS) | S3‑172029 | pCR to TR 33.926_Inactive Emergency PDN Connection Release | NEC Corporation | draftCR | Approval | Yes |
Yes
| revised | No | S3‑172121 | |
S3‑172121 | pCR to TR 33.926_Inactive Emergency PDN Connection Release | NEC Corporation | draftCR | Approval | Yes |
Yes
| approved | No | S3‑172029 | |||
S3‑171852 | draft CR TR 33.926 PGW Annex | Huawei; Hisilicon | draftCR | Approval | Yes |
YesEricsson: P-GW app and P-GW software difference?
MCC queried about referencing to Rel-8 TS 24.401.
BT also had their doubts on having to reference to Rel-8 only.
| approved | No | ||||
S3‑171851 | draft CR TR 33.926 eNB Annex | Huawei; Hisilicon | draftCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑172120 | Adding P-GW annex | Huawei | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑172129 | Adding eNB Annex to support SCAS_eNB | Huawei | CR | Agreement | No |
Yes
| agreed | No | ||||
8.5.2 | Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices (FS_BEST_MTC_Sec) |   | ||||||||||
8.5.3 | Study on Security for Proximity-based Services (FS_ProSe_Sec) |   | ||||||||||
8.5.4 | TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR) |   | ||||||||||
8.5.5 | Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14) | S3‑171955 | Discussion of open issues in TR 33.885 | Nokia | discussion | Discussion | Yes |
Yes
| noted | No | ||
S3‑172140 | V2X TR correction | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | ||||
8.5.6 | Other study items | S3‑171753 | pCR to 33.xxx - LTKUP - addition of evaluation criteria | VODAFONE Group Plc | other | Approval | No |
No
| withdrawn | Yes | ||
S3‑171754 | pCR to TR33.xxx - LTKUP - addition of soultion - multiple long term keys | VODAFONE Group Plc | other | Approval | No |
No
| withdrawn | Yes | ||||
S3‑171755 | pCR to 33.xxx - LTKUP - addition of solution - Diffe-helman key negotiation | VODAFONE Group Plc | other | Approval | No |
No
| withdrawn | Yes | ||||
S3‑171756 | pCR to 33.xxx - LTKUP - addition of a solution - eSIM | VODAFONE Group Plc | other | Approval | No |
No
| withdrawn | Yes | ||||
S3‑171811 | New SID on security aspect of 5G network slicing provisioning | Huawei, Hisilicon, ZTE, CATR, CATT,China Mobile,China Unicom | SID new | Agreement | Yes |
YesNokia: we approved a WID in 2075 about this on Northbound API security.
Huawei: that is not an interface in the management plane.
Huawei: the list of participants in this document is not correct.
ORANGE: exposure to third parties is not clear. Huawei agreed to refine this.
ORANGE added that external work can be added in the objectives without mentioning the other 3GPP groups.
The Chair commented that December 2017 was too ambitious given the current workload. Besides, ORANGE mentioned that there was no meeting before September 2017 so presenting this for information was impossible.
ORANGE: we are bound to other work items, we may have to wait for their results and delay the work.
| revised | No | S3‑172179 | |||
S3‑172179 | New SID on security aspect of 5G network slicing provisioning | Huawei, Hisilicon, ZTE, CATR, CATT,China Mobile,China Unicom | SID new | Agreement | Yes |
Yes
| agreed | No | S3‑171811 | |||
S3‑172061 | New SID for eV2X security | LG Electronics | SID new | Agreement | Yes |
YesNokia: last time we had asked for an analysis for the security relevance of this topic.
CATT: this is too early.
LG: this is only for LTE, not 5G.
ORANGE: we don’t have an architecture as a basis for this work.
There was no support for this. The Chair recommended LG to discuss this offline since it was not clear to people what needed to be done. Since the dates are for late 2018, the study can be made to be more concrete. The Chair warned that the 5G work may limit the work on other study items during the physical meetings.
| noted | No | ||||
9 | Review and Update of Work Plan | S3‑171702 | SA3 Work Plan | MCC | Work Plan | Yes |
Yes
| noted | No | |||
S3‑171705 | Work Plan input from Rapporteurs | MCC | other | Yes |
Yes
| revised | No | S3‑172074 | ||||
S3‑172074 | Work Plan input from Rapporteurs | MCC | other | - | Yes |
Yes
| noted | No | S3‑171705 | |||
10 | Future Meeting Dates and Venues | S3‑171704 | SA3 meeting calendar | MCC | other | Yes |
YesDates 2019:
Vodafone commented that co-locating with SA2,SA1 would make it more inefficient since it was better to meet after them.
The Chair commented that the dates were not fine with SA3 and that more discussions would be needed. This will be the answer sent to the SA Chair.
February 2018 location will be San Diego (hosted by Qualcomm).
| noted | No | |||
11 | Any Other Business |   |