Tdoc List
2018-01-26 14:57
Agenda | Topic | TDoc | Title | Source | Type | For | Avail | Treated | Decision | Wdrn | Replaced-by | Replaces |
---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Opening of the meeting |   | ||||||||||
2 | Approval of Agenda and Meeting Objectives | S3‑180000 | Agenda | WG Chairman | agenda | Yes |
Yes
| approved | No | |||
3 | IPR and Anti-Trust Law Reminder |   | ||||||||||
4 | Meeting Reports |   | ||||||||||
4.1 | Approval of the report from previous SA3 meeting(s) | S3‑180001 | Report from SA3#89 | MCC | report | Yes |
YesHuawei commented that S3-173137 had been not treated instead of "rejected".This was fixed.
| revised | No | S3‑180365 | ||
S3‑180365 | Report from SA3#89 | MCC | report | - | Yes |
Yes
| approved | No | S3‑180001 | |||
4.2 | Report from SA Plenary | S3‑180003 | Report from last SA meeting | WG Chairman | report | Yes |
Yes
| noted | No | |||
4.3 | Report from SA3-LI |   | ||||||||||
5 | Items for early consideration | S3‑180204 | a new WID for 5G SCAS | Huawei, Hisilicon | WID new | Approval | Yes |
Yes
| revised | No | S3‑180334 | |
S3‑180334 | a new WID for 5G SCAS | Huawei, Hisilicon,Ericsson | WID new | Approval | Yes |
Yes
| revised | No | S3‑180335 | S3‑180204 | ||
S3‑180223 | LS to CT3 CT4 on SBI Design and its Security Implications | Deutsche Telekom AG | LS out | Approval | Yes |
YesDT commented that the security is best done at application layer level and tracing data should be protected. This needed a joint discussion with CT4.
Vodafone: this release should secure a subset, and secure the whole thing properly in the next release. It is too rushed.
Nokia: We don’t want to limit the progress of CT4's work. Nokia also preffered to have discussions with CT4.
NTT-Docomo: delaying the work would not be advisable in this case.
Vodafone: nobody will use this spec until the end of the next release, as seen with interconnect contacts. A single meeting cannot cover this whole work.
The parties involved took the matter offline.
| revised | No | S3‑180389 | |||
S3‑180389 | LS to CT3 CT4 on SBI Design and its Security Implications | Deutsche Telekom AG | LS out | Approval | Yes |
YesSent to CT3 and CT4 during the meeting.
Joint meeting between SA3,CT3 and CT4:
SA3 has agreed on securing individual elements in the interconnect with different security levels.
No security in the transport layer, as concluded in SA3, hence security in the application layer.
Alf: all info stuck in JSON objects would be easier for us, instead of spreading this info.
Question: will the SEPP be application/message content aware? RESTful API design you include parameters in the URI, SUPI is one example of such parameters. DT answered that the SEPP will not be content agnostic.
Tim (VF): the SUPI will need to be protected separately for example.
Nagendra (Nokia): SEPP has to be HTTP aware.If CT4 follows API conventions it should be easy for us.
Alf (Docomo): it would be nice to have it as agnostic as possible. It needs help from the interface to know what data is being transported. IPX providers should help with this to the operators, it depends on the business models.
CT3/CT4 person: portions of the URI are a parameter, as for REST design. Everytime you update the structure of the API you need to update the SEPP, it's a strong requirement.
Ericsson: it's aboutd ynamically informing the SEPP about where the info is and what can be protected.
In CT4,UID is a generic element that may contain SUPI in some cases, it’s a very challenging requirement what SA3 needs.
CT4 Chair: In the security for interconnection you don’t need to be application aware.
Jesus: other info elements like session IDs are parts of the URI that can be subject of potential attacks and need protection.
It was asked whether the IPX providers were trustable. KPN answered that they are not necessarily trust entities.
Vodafone: even in your network there are different levels of trust.
The CT Chair commented that the SEPP being updated all the time with the different applications can cause a bottleneck in the communications.Ericsson replied that the bottleneck would be in the control plane, so the impact would be "less horrific".
DT: avoid duplicate IEs in JSON objects.
CT Chair: these requirements are pretty restrictive for a RESTful/HTPP approach. It would be good to re-think this.
DT: it's still possible to have duplicated IEs but not the same parameter duplicated in the same message.
Jesus: we never put two elements of the same name in a flat structure, so this is easy to achieve.
Docomo suggested conference calls or SBA meetings between groups since there was some work needed between the groups. Minimize the potential impact and come up with a list of information elements that need to be available for the IPX providers.
CT4 Chair: we can the collect the set of requirements and design guidelines for the groups involved in SBA. This would be under control of CT3/CT4.
It wa ssuggested to have a list of sensitive items at the end of each release, as it is done with SA5.
CT Chair: the document should be in both places, CT4 and CT4, like when it was done with AKA. We are most likely to inform other groups like SA6.
Jesus: for IFs designed towards external parties, the security has been taken care of.
CT Chair: we need something to report to plenary in March. Conference calls should be set up.
CT3 Chair: do we need to answer the questions in the LS before the conference calls? SA3 agreed that this would be helpful.
It was agreed to have the LS as a start for the conference calls.
| approved | No | S3‑180223 | |||
S3‑180339 | Commenting contribution on draft LS to CT3, CT4 (S3-180223) | Nokia | discussion | Approval | Yes |
Yes
| noted | No | ||||
S3‑180341 | Comment contribution to S3-180223 (LS to CT3 CT4 on SBI Design and its Security Implications) | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑180340 | Comment contribution to S3-180223 (LS to CT3 CT4 on SBI Design and its Security Implications) | Ericsson | LS out | Approval | No |
Yes
| withdrawn | Yes | ||||
6 | Reports and Liaisons from other Groups |   | ||||||||||
6.1 | 3GPP Working Groups | S3‑180030 | Reply LS on LTE call redirection to GERAN | C1-175377 | LS in | Yes |
Yes
| noted | No | |||
S3‑180031 | Reply LS on LTE call redirection to GERAN | R2-1714121 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180032 | Response LS on LTE call redirection to GERAN | R3-175030 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180041 | Reply LS on clarification on Restricted Operator Services | S1-174604 | LS in | Yes |
YesVodafone: SA1 is making security assumptions without consulting SA3.
BT commented that SA3 had sent an LS to SA1 in March 2017 on this issue and didn't get any response.
Vodafone commented that they would check internally with the SA1 colleagues. Qualcomm commented that the intention was that the UE would only accept non integrity protected messages when they wanted to make an RLOS call.
| replied to | No | |||||
S3‑180347 | Reply LS on clarification on Restricted Operator Services | Vodafone | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑180042 | Response to LS on encrypting broadcasted positioning data and LS on provisioning of positioning assistance data via LPPa for broadcast | S2-179617 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180047 | LS on Extension of USAT Application Pairing mechanism | C6-170737 | LS in | Yes |
YesBT: We can have multiple ISIMs in the same UICC, what’s the impact of this?
Qualcomm: what's the use case for the ISIM?
Gemalto: VoLTE relying on the IMS would be the use case, not M2M specific.
Gemalto proposed to respond that there was no requirement but that SA3 would look at it.
| replied to | No | |||||
S3‑180415 | Reply to: LS on Extension of USAT Application Pairing mechanism | Gemalto | LS out | approval | Yes |
Yes
| approved | No | ||||
6.2 | IETF |   | ||||||||||
6.3 | ETSI SAGE |   | ||||||||||
6.4 | GSMA |   | ||||||||||
6.5 | 3GPP2 |   | ||||||||||
6.6 | OMA |   | ||||||||||
6.7 | TCG | S3‑180009 | TCG progress report | InterDigital, Inc. | other | Information | Yes |
Yes
| noted | No | ||
6.8 | oneM2M |   | ||||||||||
6.9 | TC-CYBER |   | ||||||||||
6.10 | ETSI NFV security |   | ||||||||||
6.11 | Other Groups |   | ||||||||||
7 | Work Areas |   | ||||||||||
7.1 | EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15) | S3‑180146 | Change the support of NIA0 in SgNB for ENDC | Huawei, Hisilicon | CR | Approval | Yes |
YesVodafone: we had decided to keep this in the last meeting. Nokia commented that there was no need to disable it.
Unauthenticated emergency calls may change this based on some LS responses that SA3 is waiting for, so we would have to change this in any case. Better to wait until we get the feedback from SA2 and others.
Postponed for the next meeting.
| postponed | No | ||
S3‑180209 | Reply LS on algorithm selection in E-UTRA-NR Dual Connectivity | R2-1714124 | LS in | No |
Yes
| withdrawn | Yes | |||||
7.2 | Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15) |   | ||||||||||
7.2.1 | Key hierarchy |   | ||||||||||
7.2.1.1 | Miscellaneous | S3‑180124 | Discussion on deleting KSEAF from key hierarchy | Huawei, Hisilicon | discussion | Endorsement | Yes |
YesQualcomm and DT disagreed.China Mobile supported this contribution.
Nokia commented that they assume that SA2 doesn’t want a standalone SEAF.
ORANGE: send an LS to SA2, as we are speculating what they are doing with SEAF and AMF in phase two.
The Chair asked for a show of hands for this document:
In favour of 124:
China Mobile, Ericsson, Huawei,ZTE,Nokia
Opposed to 124:
DT, Qualcomm, Docomo, BT, KPN,NCSC, NEC
This had to be taken offline for conversations with SA2.
It was finally noted, may be considered later in phase two.
| noted | No | ||
S3‑180076 | Resolving editors notes in clause on key hierarchy | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180447 | |||
S3‑180447 | Resolving editors notes in clause on key hierarchy | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑180076 | |||
S3‑180138 | Clean up the EN in 6.2.1 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180448 | |||
S3‑180448 | Clean up the EN in 6.2.1 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180138 | |||
S3‑180221 | Adding details of K’AMF to clause 6.2.1 | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| revised | No | S3‑180449 | |||
S3‑180449 | Adding details of K’AMF to clause 6.2.1 | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| approved | No | S3‑180221 | |||
S3‑180174 | pCR for overview of 5G security architecture | Huawei, Hisilicon, China Mobile, CATR, ZTE | pCR | Approval | Yes |
YesVodafone: it's not readable in black and white.
Nokia: not a clear representation and it's misleading. Dragan(IDEMIA) agreed.
Huawei: we are just showing the main points.
The figure was not clear enough for the companies.
Nokia clarified that there was a similar picture in 33.401.
The consensus was that such figure could be welcome but some discussions were needed to agree on a figure.
| noted | No | ||||
S3‑180176 | Modification of Kausf | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| merged | No | S3‑180395 | |||
S3‑180178 | Key distribution and key derivation scheme | Huawei, Hisilicon, | pCR | Approval | Yes |
YesDocomo: the note is a definition and it needs to be checked if the definition applies to the whole spec.
There were some issues as well with the figure 6.2.2-1.
| revised | No | S3‑180450 | |||
S3‑180450 | Key distribution and key derivation scheme | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| approved | No | S3‑180178 | |||
S3‑180308 | Assignment of KSIamf | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180430 | |||
S3‑180292 | On feature set relevance for independent SEAF deployment | Ericsson | discussion | Approval | No |
Yes
| withdrawn | Yes | ||||
7.2.1.2 | Editorials |   | ||||||||||
7.2.2 | Key derivation |   | ||||||||||
7.2.2.1 | Key derivation mobility related |   | ||||||||||
7.2.2.2 | Key derivation NAS related | S3‑180021 | Handling of user-related keys – key setting | ZTE Corporation | pCR | Approval | Yes |
Yes
| merged | No | ||
S3‑180053 | Adding context on key setting | CATT | pCR | Approval | Yes |
Yes
| merged | No | S3‑180430 | |||
7.2.2.3 | Key derivation AS related |   | ||||||||||
7.2.2.4 | Miscellaneous | S3‑180098 | Clause 6.2.3 Handling of user related keys | Nokia | pCR | Approval | Yes |
Yes
| merged | No | S3‑180430 | |
S3‑180323 | Storage of key material in the UE | Gemalto, IDEMIA | pCR | Approval | Yes |
Yes
| revised | No | S3‑180452 | |||
S3‑180452 | Storage of key material in the UE | Gemalto, IDEMIA,Qualcomm | pCR | Approval | Yes |
Yes
| approved | No | S3‑180323 | |||
S3‑180257 | Keys in the UE | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| merged | No | S3‑180452 | |||
S3‑180322 | Handling of 5G security contexts in the UE | Gemalto, IDEMIA | pCR | Approval | Yes |
YesVodafonel replace UICC with USIM.
ORANGE: The same with the related contributions that will merge.
| merged | No | S3‑180452 | |||
7.2.2.5 | Editorials |   | ||||||||||
7.2.3 | Mobility |   | ||||||||||
7.2.3.1 | Key derivations during handovers | S3‑180104 | Flexible retaining AS keys solution | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
YesNokia didn’t agree with these changes. The first paragraph was new to them.
Ericsson opposed to this as well, so it was finally noted.
| noted | No | ||
S3‑180105 | Intra-gNB retaining AS keys exception | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
YesThis was taken offline as Ericsson had some issues with the changes.
| revised | No | S3‑180433 | |||
S3‑180433 | Intra-gNB retaining AS keys exception | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
Yes
| approved | No | S3‑180105 | |||
7.2.3.2 | Security in AMF change between AMF sets | S3‑180328 | Clause 6.9 (policy dependent horizontal K_AMF derivation) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑180320 | Clause 6.9.2.3 (horizontal K_AMF derivation at N2-Handover) | Ericsson, Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180230 | KAMF Derivation when AMF set changes during idle mode mobility | Huawei; Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180434 | |||
S3‑180321 | Clause 6.9.3 (horizontal K_AMF derivation at mobility registration update) | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180434 | |||
S3‑180434 | Clause 6.9.3 (horizontal K_AMF derivation at mobility registration update) | Ericsson,Huawei | pCR | Approval | Yes |
Yes
| approved | No | S3‑180321 | |||
S3‑180330 | Clause 6.9 and new Annex (input parameter for horizontal K_AMF derivation) | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180434 | |||
7.2.3.3 | Security in AMF change within an AMF set | S3‑180125 | Clarification on security in AMF change within an AMF set | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||
7.2.3.4 | Resolving Editor’s Notes in Section 8.3 (Access Stratum) |   | ||||||||||
7.2.3.5 | Parameter/Message Name alignment |   | ||||||||||
7.2.3.6 | Miscellaneous | S3‑180139 | Procedures for security context transfer in idle mode mobility | Huawei, Hisilicon | pCR | Approval | Yes |
YesNokia: this needs a terminology cleanup.
| revised | No | S3‑180435 | |
S3‑180435 | Procedures for security context transfer in idle mode mobility | Huawei, Hisilicon | pCR | Approval | Yes |
YesAdding an editor's note.
| approved | No | S3‑180139 | |||
S3‑180014 | Remaining restructuring of Clause 6.9 (Security handling in mobility) | Ericsson, NEC Corporation | pCR | Yes |
Yes
| approved | No | |||||
7.2.3.7 | Editorials |   | ||||||||||
7.2.4 | AS security |   | ||||||||||
7.2.4.1 | Userplane open issues | S3‑180287 | Clause 6 (user plane security – non-activation of integrity protection) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑180288 | Annex D.1 (user plane security – null-integrity not allowed for DRBs) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180056 | Proposal for UP integrity protection activation | CATT | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180175 | UP policy | Huawei, Hisilicon, | pCR | Approval | Yes |
YesDiscussed with 286.
Ericsson: some aspects are still ongoing work in SA2 and they can be fixed later.
Merged with 286.
| revised | No | S3‑180423 | |||
S3‑180423 | UP policy | Huawei, Hisilicon,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180175 | |||
S3‑180256 | User plane integrity protection granularity | Qualcomm Incorporated | pCR | Approval | Yes |
YesNoted as it was simialr to 286.
| noted | No | ||||
S3‑180286 | Clause 6 (user plane security – security policy) | Ericsson | pCR | Approval | Yes |
YesQualcomm preferred this contribution to 175 since it was more detailed.
It was decided to merge both contributions.
| merged | No | S3‑180423 | |||
S3‑180289 | Clause 6 (user plane security – conflict between RAN and CN) | Ericsson | pCR | Approval | Yes |
YesHuawei didn't agree with this proposal. Integrity protection will be dropped as well in any congestion situation.
Ericsson: we don’t mention congestion.
Huawei: The RAN will never overrule the security policy coming from the core network. The RAN knows how to deal with the resources in case of congestion.
Qualcomm: The core network will tell when to disable the integrity protection.
Huawei: what happens when the RAN cannot fulfil the integrity protection during a congestion?
Huawei: RAN complies with the user plane policy security and will handle the congestion by itself. No need for negotiation, it will never override the CN policy.
Ericsson: agreements don't mention congestion.
The discussion was taken offline and the agreements recorded in 424.
| revised | No | S3‑180424 | |||
S3‑180424 | Clause 6 (user plane security – conflict between RAN and CN) | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180289 | |||
7.2.4.2 | Userplane security | S3‑180099 | Security Algorithms Negotiation for Initial AS security context | Huawei; HiSilicon;China Mobile | pCR | Approval | Yes |
YesDiscussed with 271.
| merged | No | S3‑180425 | |
S3‑180271 | Clause 6.7.3.0 (user plane and RRC security - initial AS security context establishment) | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180425 | |||
S3‑180425 | Clause 6.7.3.0 (user plane and RRC security - initial AS security context establishment) | Ericsson,Huawei,HiSilicon,China Mobile | pCR | Approval | Yes |
Yes
| approved | No | S3‑180271 | |||
S3‑180100 | AS Security Negotiation and Activation | Huawei; HiSilicon | pCR | Approval | Yes |
YesNokia: Don’t specify what is cyphered. Huawei agreed to remove this part.
| revised | No | S3‑180426 | |||
S3‑180426 | AS Security Negotiation and Activation | Huawei; HiSilicon,Ericsson | pCR | Approval | Yes |
YesKPN commented that the SMC AS procedure leads to newly agreed keys and will bring a contribution for the next meeting clarifying this aspect.
| approved | No | S3‑180100 | |||
S3‑180270 | Clause 6.7.4 (user plane and RRC security - AS SMC procedure) | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180426 | |||
S3‑180285 | Clause 6.6.3 (user plane – security activation) | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180426 | |||
7.2.4.3 | RRC security | S3‑180020 | Security aspects of RESUME REJECT in INACTIVE state in NR | ZTE Corporation | discussion | Discussion | Yes |
YesNokia considered that there was a more simple way of doing this.
Ericsson: this brings additional overhead and signalling.We have an alternative in 342.
| noted | No | S3‑173072 | |
S3‑180131 | Discussion on security during Resume reject in INACTIVE state in NR | Huawei, Hisilicon | discussion | Endorsement | Yes |
YesEricsson: check with RAN2 the signalling of the figure.We cannot require additional signalling for a situation that is not critical.
Intel: keep the solution simple.RAN doesn’t want to add integrity check to reduce the additional load in the network.
Huawei: we have to tell RAN that there is a security issue and propose a solution. They will decide if there is too much signalling or not.
Nokia: don't load the gNodeB with more signalling.
| noted | No | ||||
S3‑180130 | Draft Reply LS on security during Resume reject in INACTIVE state in NR | Huawei, Hisilicon | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑180194 | Discussion on Security Issues with RRC Reject for INACTIVE Mode | Intel | discussion | Discussion | Yes |
YesEricsson: this doesn’t solve the problem.
Intel: proposal 2 is an option, we recommend proposal one.
Ericsson didn’t see any viable solution to be sent to RAN2. There are threats and we are aware of them, we can reply with this.
Intel: RAN2 is not asking for a solution, it's just asking if there is any concern from SA3.
It was decided to go for the reply LS in 349 and note the related documents here.
| noted | No | ||||
S3‑180193 | draft Reply LS on security during Resume reject in INACTIVE state in NR | Intel | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑180342 | Draft reply LS to R2-1712052 = S3-173023 on security during Resume reject in INACTIVE state in NR (to: RAN2; cc: -; contact: Ericsson) | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | S3‑173389 | |||
S3‑180149 | pCR to TS 33.501 Key Handing at Transitions between RRC-INACTIVE to RRC-CONNECTED states | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180272 | Clause 6.8.2.1 (key handling – RRC INACTIVE/CONNECTED state transition) | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180150 | pCR to TS 33.501 Key Handing during mobility in RRC-INACTIVE state | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180273 | Clause 6.8.2.2 (key handling – RRC INACTIVE mobility) | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180129 | pCR to TS 33.501 Security Handling for RRC Connection Re-establishment Procedure | Huawei, Hisilicon | pCR | Approval | Yes |
YesEricsson: postpone this since it's a new feature, different from LTE and may be better to present it in RAN. Nokia agreed.
This topic was postponed and it will be brought back in the next meetings after offline discussion.
| noted | No | ||||
S3‑180297 | Signalling procedure for periodic local authentication | Samsung | pCR | Approval | Yes |
Yes
| revised | No | S3‑180428 | |||
S3‑180428 | Signalling procedure for periodic local authentication | Samsung | pCR | Approval | Yes |
Yes
| approved | No | S3‑180297 | |||
7.2.4.4 | Miscellaneous | S3‑180103 | Adding Forward & Backward Security definition | Huawei, Hisilicon | pCR | Approval | Yes |
YesEricsson had a proposal to generalize these definitions, instead of a KgNB.
MCC commented that requirements were not allowed in definitions so the shall had to go.
| revised | No | S3‑180429 | |
S3‑180429 | Adding Forward & Backward Security definition | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180103 | |||
S3‑180106 | Address EN in requirements for gNB setup and configuration | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180107 | Requirements for UP and CP for the gNB | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
Yes
| revised | No | S3‑180456 | |||
S3‑180456 | Requirements for UP and CP for the gNB | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
Yes
| approved | No | S3‑180107 | |||
S3‑180135 | pCR to TS 33.501 key identification | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180430 | |||
S3‑180430 | pCR to TS 33.501 key identification | Huawei, Hisilicon,ZTE, CATT,Nokia,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180135 | |||
S3‑180136 | pCR to TS 33.501 key lifetimes | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180430 | |||
S3‑180145 | Delete the mandatory implementation of NIA0 in gNB | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180431 | |||
S3‑180431 | Delete the mandatory implementation of NIA0 in gNB | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180145 | |||
S3‑180151 | pCR to TS 33.501 AS algorithm selection in state transitions between RRC-INACTIVE to RRC-CONNECTED states | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180181 | Replay protection for UP, RRC and NAS | Huawei, Hisilicon, | pCR | Approval | Yes |
YesNokia: Replay protection is built-in in the protocol, no need to add this.
China Mobile: replay protection is a different requirement so we agree with Huawei.
| approved | No | ||||
S3‑180246 | Discussion on the use of the serving network identity to generate keys that are used in the AUSF | Qualcomm Incorporated | discussion | Discussion | Yes |
YesNo one saw an issue in the key derivation in the AUSF. The document was noted.
| noted | No | ||||
S3‑180248 | Adding requirements on CU-DU split based on the key derivation used | Qualcomm Incorporated | pCR | Approval | Yes |
YesEricsson didn’t agree with the requirement.
This was taken offline.
| noted | No | ||||
S3‑180432 | Adding requirements on CU-DU split based on the key derivation used | Qualcomm Incorporated | pCR | Approval | No |
Yes
| withdrawn | Yes | ||||
7.2.4.5 | Editorials | S3‑180007 | Corrections to clause 5.2 Requirements on the gNB | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| merged | No | S3‑180422 | |
S3‑180182 | Integrity for UP, RRC and NAS | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| merged | No | S3‑180422 | |||
S3‑180183 | Confidentiality for UP, RRC and NAS | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| merged | No | S3‑180422 | |||
7.2.5 | NAS security |   | ||||||||||
7.2.5.1 | Requirements | S3‑180276 | New requirements for algorithm selection in TS 33.501 | Ericsson | pCR | Approval | Yes |
YesQualcomm: c) is a solution.
Ericsson: this is coming from 33.401, but we need to check there to see if it is the same.
NTT-Docomo: if it is a solution we don’t need to put it. We endorse it.
Qualcomm: what does "endorse" mean here? Just remove it.
ORANGE commented that these requirements were not necessary.
The Chair decided to note it eventually.
| noted | No | ||
7.2.5.2 | Protection of initial NAS message | S3‑180133 | Discussion on Protection of initial NAS message | Huawei, Hisilicon | discussion | Endorsement | Yes |
YesKPN,Vodafone and Qualcomm disagreed with this contribution.
| noted | No | ||
S3‑180134 | pCR to TS 33.501 delete protection of initial NAS message | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180277 | Clause 6.4.6 (rectifying partial protection aspects) | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180242 | Removal of the hashing method from NAS SMC as security covered by the initial NAS message protection | Qualcomm Incorporated | pCR | Approval | Yes |
YesHuawei and Ericsson didn’t support this. Nokia had some issues as well.
Vodafone was in favour of this contribution.
DT supported this contribution since it protects the information as much as possible.
There was no consensus on this contribution hence it was noted.
| noted | No | ||||
7.2.5.3 | NAS algorithm selection |   | ||||||||||
7.2.5.4 | NAS integrity and confidentiality mechanisms | S3‑180111 | Adding content to NAS security | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180400 | |
S3‑180275 | (Clause 6.4 ) Multiple active NAS connections in the same PLMN’s serving network | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180400 | |||
7.2.5.5 | NAS Security Mode Command | S3‑180215 | Enhancing the security of the key KAMF | China Mobile,Huawei, Hisilicon; Deutsche Telekom AG | discussion | Discussion | Yes |
Yes
| noted | No | ||
S3‑180217 | Enhance the security of the key KAMF in the NAS SMC procedure | China Mobile; Huawei; Hisilicon; Deutsche Telekom AG | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑180219 | Updating NAS security mode command procedure | China Mobile,Huawei, Hisilicon, Deutsche Telekom AG | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180220 | Annex-DH usage modes, DH capability identifier and the calculation of KAMF' | China Mobile, Huawei, Hisilicon, Deutsche Telekom AG | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180241 | Removing allowed NSSAI from NAS Security Mode procedure | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180132 | Delete allowed NSSAI in NAS SMC | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
7.2.5.6 | NAS security handling during state-transitions | S3‑180310 | Registration state transitions in TS 33.501 | Ericsson, Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180397 | |
S3‑180397 | Registration state transitions in TS 33.501 | Ericsson, Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180310 | |||
S3‑180311 | Connection state transitions in TS 33.501 | Ericsson, Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
7.2.5.7 | Multi-NAS security | S3‑180008 | NAS security conference call notes | NEC Telecom MODUS Ltd. | report | Information | Yes |
Yes
| noted | No | ||
S3‑180203 | Add a new requirement in scenario when UE has multiple registration in different PLMNs | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180398 | |||
S3‑180398 | Add a new requirement in scenario when UE has multiple registration in different PLMNs | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180203 | |||
S3‑180284 | Multiple registrations in different PLMNs serving networks | Ericsson | pCR | Approval | Yes |
YesDiscussed together with 259 (Qualcomm).
| merged | No | S3‑180398 | |||
S3‑180244 | Discussion on the whether there is a need for one NAS SMC to change the security context on both 3GPP and non-3GPP access in the same PLMN | Qualcomm Incorporated | discussion | Endorsement | Yes |
YesEricsson and Nokia commented that there many more details behind.
Huawei: it's not clear enough, too generic.
The Chair saw that in general people agreed on this but a more detailed statement would be needed.
| noted | No | ||||
S3‑180290 | On the need for multiple NAS SMC procedures | Ericsson | discussion | Approval | Yes |
Yes
| noted | No | ||||
S3‑180022 | Discussion on multi-NAS in same PLMN – structure of 5G security context | ZTE Corporation, Huawei, Hisilicon | discussion | Discussion | Yes |
YesThe group decided to endorse for proposal one the following statement: same NAS keys and NAS algorithms can be used to protect NAS connections terminated in the same AMF.
Also endorsed for proposal two: each NAS connection will be assigned an unique identifier.
Proposal three was not agreed.
| noted | No | ||||
S3‑180093 | Multiple NAS Security Discussion | Nokia | discussion | Agreement | Yes |
YesThese proposals were agreed earlier.
| noted | No | ||||
S3‑180095 | Clause 6.3.4.2 Multiple Registration in same PLMN | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180399 | |||
S3‑180399 | Clause 6.3.4.2 Multiple Registration in same PLMN | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑180095 | |||
S3‑180274 | (Clause 6.3.4) Multiple registrations in the same PLMN’s serving network | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180026 | Multi-NAS in same PLMN - structure of 5G security context | ZTE Corporation | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180202 | Add context for multiple registrations in the same PLMN | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180096 | Clause 6.4.2.2 Multiple active NAS connections in same PLMN | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180400 | |||
S3‑180400 | Clause 6.4.2.2 Multiple active NAS connections in same PLMN | Nokia,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180096 | |||
S3‑180097 | Clause 6.4.5 Handling of NAS counts | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180421 | |||
S3‑180421 | Clause 6.4.5 Handling of NAS counts | Nokia | pCR | Approval | Yes |
YesSA3 expressed their preference for a token-based solution (instead of a static one).
| approved | No | S3‑180097 | |||
S3‑180094 | Clause Annex D | Nokia | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180023 | Discussion on multi-NAS in same PLMN – NAS message handling after first registration procedure | ZTE Corporation | discussion | Discussion | Yes |
YesEricsson didn’t agree with the observation. This was ignored.
Proposal one:
Vodafone commented that more information was needed.
Qualcomm: if you have a fulll context you shall use it.
Detailed discussions were needed for this document so it was decided to note ir and try to solve it offline.
| noted | No | ||||
S3‑180024 | Discussion on multi-NAS in same PLMN – concurrent NAS message handling | ZTE Corporation | discussion | Discussion | Yes |
YesVodafone: easy DoS attack if according to proposal one.
Proposal 2:
Ericsson commented that they agreed with the issue but they didn’t agree with the proposals. The issue in this document was valid as agreed by the group but there was no consensus with the proposals.
| noted | No | ||||
S3‑180027 | Multi-NAS in same PLMN - NAS message handling after first registration procedure | ZTE Corporation | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180025 | Discussion on multi-NAS in same PLMN – re-authentication handling | ZTE Corporation | discussion | Discussion | No |
Yes
| withdrawn | Yes | ||||
7.2.5.8 | SMS over NAS |   | ||||||||||
7.2.5.9 | Miscellaneous | S3‑180087 | Preventing bidding down between 5G releases - was S3-173128 | Nokia, KPN, LG Electronics | pCR | Approval | Yes |
Yes
| noted | No | S3‑173128 | |
S3‑180243 | Adding a generic bid down solution to the 5G TS | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180343 | Comment contribution to S3-180087 and S3-180243 | Ericsson Limited | discussion | Endorsement | Yes |
YesNo need for having another mechanism for bidding down attacks. Not clear why the existing mechanisms don’t work for 5G.
Docomo: we want to protect network capabilities, not UE capabilities.
Ericsson: why does the network need to send to the UE what the support of SEAF? There are no security reasons for this.
China Mobile: in phase two SEAF and AMF are co-located so we should postpone this issue for phase two.
Qualcomm: SEAF controls what security features are used.
Interdigital: if the AMF is trusted, Ericsson is correct.
Ericsson: there is a phase one of AMFs connected with SEAF, and in the phae two AMFs will be connected to the SEAF. You’re assuming that the SEAF is introduced totally new without a transition.
Docomo: if the AMF+ is not trusted it may not send the correct information to the UE.
This had to be taken offline.
The Chair queried whether this was a problem to be solved at phase one.
This issue was taken to the conference call.
| noted | No | ||||
S3‑180278 | Exception lists of NAS and RRC message to be integrity protected and encrypted | Ericsson | pCR | Approval | Yes |
YesThis was taken offline for discussion with the CT1 colleagues and finally agreed by Qualcomm.
| approved | No | ||||
7.2.5.10 | Editorials | S3‑180006 | Corrections to clause 5.3 Requirements on the AMF | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
YesOverlapping with 182 and 183, which had the same changes.
| revised | No | S3‑180422 | |
S3‑180422 | Corrections to clause 5.3 Requirements on the AMF | NEC Telecom MODUS Ltd.,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180006 | |||
S3‑180141 | Corrections on NAS security mode command procedure (subclause 6.7.2) | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
7.2.6 | Security context |   | ||||||||||
7.2.6.1 | Multiple registrations | S3‑180259 | pCR: Multiple Registrations in different PLMNs using K_AUSF (Updated) | Qualcomm Incorporated | pCR | Approval | Yes |
YesDiscussed together with 284.
Ericsson: the whole solution is really complex and totally new, for being optional.
Ericsson: this is an optimization that can be used later in phase two. Huawei and Intel supported this view.
| noted | No | ||
7.2.6.2 | KDF agility |   | ||||||||||
7.2.6.3 | Intra-serving network handling |   | ||||||||||
7.2.6.4 | UE handling | S3‑180313 | New UE requirement to store two 5G security contexts in TS 33.501 | Ericsson, Qualcomm Incorporated | pCR | Approval | Yes |
YesGemalto: why is the storage at the power-off? It’s different from the EPS.
Qualcomm: it includes the de-registration, we can clarify it.
Gemalto: CT6 defines the different types of services: support of 5G security context and others. Qualcomm disagreed.
Dragan (IDEMIA): we need to stay general, not to focus on 5G security context. We need to mention 5G security services.
It was agreed to reword this sentence in the revision and text from 33.401.
| revised | No | S3‑180445 | |
S3‑180445 | New UE requirement to store two 5G security contexts in TS 33.501 | Ericsson, Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑180313 | |||
7.2.6.5 | Emergency call |   | ||||||||||
7.2.6.6 | Miscellaneous | S3‑180055 | Clarification on 5G security context | CATT | pCR | Approval | Yes |
Yes
| revised | No | S3‑180446 | |
S3‑180446 | Clarification on 5G security context | CATT | pCR | Approval | Yes |
Yes
| approved | No | S3‑180055 | |||
7.2.6.7 | Editorials |   | ||||||||||
7.2.7 | Visibility and Configurability |   | ||||||||||
7.2.7.1 | Miscellaneous | S3‑180333 | Discussion of security visibility | NTT DOCOMO INC. | discussion | Endorsement | Yes |
YesBT: API design is not out of scope.
Docomo: better an API written in the language of the applications than a 3GPP API.
BT: find security features that need to be indicated; e.g. type of authentication, privacy and so on. We cannot do this at this meeting.
Docomo clarified that this is visibility of security features from the UE side. Configurability is done elsewhere.
Huawei: details of what should be there, will come next meeting.
ORANGE supported the contribution, also commented that if there is no support of this there will be no visibility at all.
Ericsson: this doesn’t have implications on the network architecture, should we do this in phase two?
Qualcomm wasn't sure about the practical value of proposal 2.
DT supported this contribution.
The group had a general understanding of this issue but was not in the situation to endorse the whole paper.
| noted | No | ||
S3‑180200 | Clarification of security visibility | LG Electronics | pCR | Approval | Yes |
Yes
| revised | No | S3‑180453 | |||
S3‑180453 | Clarification of security visibility | LG Electronics | pCR | Approval | Yes |
Yes
| approved | No | S3‑180200 | |||
S3‑180085 | Authorization of SN by UE - was S3-173125 | Nokia, LG Electronics | pCR | Decision | Yes |
YesORANGE: in the case of roaming, if the UE has selected cyphering as compulsory and the visited network has no cyphering, the UE will not connect to any network. This is hard to sell.
AT&T: tell the user that they are going to connect in a non-secure way. He can have the choice.
| revised | No | S3‑180454 | S3‑173125 | ||
S3‑180454 | Authorization of SN by UE - was S3-173125 | Nokia, LG Electronics | pCR | Approval | Yes |
Yes
| approved | No | S3‑180085 | |||
S3‑180086 | Visibility and configurability supporting serving network authorization - was S3-173126 | Nokia, LG Electronics | pCR | Approval | Yes |
YesEricsson: why having a list of countries in the USIM? Countries split and change all the time.
Docomo: countries seem to be reasonably stable, it's not so often that they change.
Vodafone: this has been in the SIM card since Rel-5. Country codes and network names are already recorded there. This has been used regularly. I don’t agree with having the user turning it off.
| merged | No | S3‑180454 | S3‑173126 | ||
7.2.7.2 | Editorials |   | ||||||||||
7.2.8 | Primary authentication |   | ||||||||||
7.2.8.1 | 5G AKA over 3gpp/non3gpp access | S3‑180092 | Clause 6 Corrections for 5G AKA over n3gpp access | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑180295 | Construction of serving network name with 5G AKA and EAP-AKA’ | Ericsson | pCR | Approval | Yes |
YesKPN didn’t understand the need for this, so it was taken offline.They didn't agree with the separation character either.Vodafone and ORANGE supported this.
| revised | No | S3‑180390 | |||
S3‑180390 | Construction of serving network name with 5G AKA and EAP-AKA’ | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180295 | |||
S3‑180126 | Removal of the number of AVs requested in Authentication Information Request message | Huawei, Hisilicon | pCR | Approval | Yes |
YesKPN wasn't happy with the 5G HE AV being configured in the UDM.
BT supported this point, but there was no other support for this.
Only the first change was agreed.
| revised | No | S3‑180391 | |||
S3‑180391 | Removal of the number of AVs requested in Authentication Information Request message | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180126 | |||
S3‑180127 | Resolve Editor’s Note in clause 6.1.3.2 of TS 33.501 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180128 | Adding 5G Authentication Confirmation Answer for 5G-AKA | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180393 | |||
7.2.8.2 | EAP AKA’ over 3gpp/non3gpp access | S3‑180293 | New annex for 3GPP 5G profile on RFC 5448 EAP-AKA’ | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | ||
S3‑180344 | Clean up the EN in 6.1.3.1 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180137 | |||
S3‑180137 | Clean up the EN in 6.1.3.1 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180344 | |||
7.2.8.3 | Roaming/Multiple Authentication vectors |   | ||||||||||
7.2.8.4 | Authentication using EAP TLS | S3‑180173 | Security Procedures for EAP-TLS | Huawei, Hisilicon, Ericsson, Qualcomm Incorporated, China Mobile | pCR | Approval | Yes |
YesORANGE: Add an editor's note about the privacy of the private certificate.
Also on how the UDM is involved in this procedure.
BT: add that there is no support of roaming.
ORANGE: Key hierarchy is FFS.
| revised | No | S3‑180394 | |
S3‑180394 | Security Procedures for EAP-TLS | Huawei, Hisilicon, Ericsson, Qualcomm Incorporated, China Mobile | pCR | Approval | Yes |
Yes
| approved | No | S3‑180173 | |||
7.2.8.5 | Enhancements to authentication (Diffie-Hellman proposals etc) | S3‑180296 | Adding forward secrecy for AKA in phase 2 without bidding-down problems | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||
S3‑180336 | Comments on Adding forward secrecy for AKA in phase 2 without bidding-down problems | China Mobile; Huawei; Hisilicon | discussion | Discussion | Yes |
YesBT: Diffie-Hellman is not quantum-safe. Better bundled with the crypto upgrade to 256 bits.
Mark (National Technical Assistance), Qualcomm,ORANGE, and Nokia supported Ericsson in having it for phase 2.
Ericsson: if for phase two, we need to add something to the protocols now.
The Chair pointed out that this activity would go for phase two and no hooks would be worked on this phase.
| noted | No | ||||
7.2.8.6 | Authentication in Network sharing/limited deployment scenarios | S3‑180073 | Removing Editor's note on network sharing | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||
7.2.8.7 | Editorial corrections | S3‑180074 | Normative text for support of both authentication methods and text clarification to distinguish HN and SN | Nokia | pCR | Decision | Yes |
YesVodafone: note 0 is just describing what roaming is. This is not necessary.The phrase with "allows that" is not well written.
MCC commented that NOTE 3 was containing a requirement and that wasn't possible as described in the drafting rules.
It was decided to reword "mandatory to support" to "shall support" and remove "in the present release".
| revised | No | S3‑180395 | |
S3‑180395 | Normative text for support of both authentication methods and text clarification to distinguish HN and SN | Nokia,Huawei | pCR | Approval | Yes |
Yes
| approved | No | S3‑180074 | |||
S3‑180075 | Editorial clarification in clause on anchor key binding | Nokia | pCR | Decision | Yes |
Yes
| approved | No | ||||
S3‑180294 | Clarifications and clean-up of 5G AKA procedure | Ericsson | pCR | Approval | Yes |
YesNTT-Docomo: timer being optional and auth confirmation being optional is against what we had agreed in Singapore.
Everybody was agreeing on having the authentication confirmation.
Ericsson asked: For 5G AKA, do we need one authentication vector? BT preferred to have several auth vectors, but it was pointed out that long discussions before had led to having just one authentication per request for 5G.
| revised | No | S3‑180393 | |||
S3‑180393 | Clarifications and clean-up of 5G AKA procedure | Ericsson,Huawei,HiSilicon | pCR | Approval | Yes |
YesContent was approved and merged in 396.
| merged | No | S3‑180396 | S3‑180294 | ||
S3‑180071 | Adding numbers to the figure for 5G AKA | KPN | pCR | Approval | Yes |
Yes
| revised | No | S3‑180396 | |||
S3‑180396 | Adding numbers to the figure for 5G AKA | KPN | pCR | Approval | Yes |
Yes
| approved | No | S3‑180071 | |||
S3‑180070 | Adding numbers to the figure for EAP AKA prime | KPN | pCR | Approval | Yes |
Yes
| merged | No | S3‑180344 | |||
7.2.9 | Secondary authentication |   | ||||||||||
7.2.9.1 | MitM | S3‑180195 | Binding Primary and Secondary authentication | Intel | discussion | Endorsement | Yes |
Yes
| noted | No | ||
S3‑180186 | Solution to prevent unauthorized access to external Data Network | Intel | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180249 | Identifying problems with secondary authentication | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | S3‑173301 | |||
S3‑180291 | Proposal for way forward on the biding problem in the secondary | Ericsson | discussion | Endorsement | Yes |
YesIntel: this is man-in-the-middle attack.
Ericsson: It's not a man-in-the-middle but an authenticated UE that is misbehaving.
China Mobile: this is not related to secondary authentication.
ORANGE was supporting Ericsson here.
BT supported this paper, there is a threat in the secondary authentication.
ORANGE this is not a problem of 3GPP, we provide only the transport. KPN agreed.
Nokia pointed out that this was not part of phase one.
| noted | No | ||||
7.2.9.2 | Incomplete procedure | S3‑180196 | Secondary Re-Authentication | Intel | pCR | Approval | Yes |
Yes
| revised | No | S3‑180379 | |
S3‑180379 | Secondary Re-Authentication | Intel | pCR | Approval | Yes |
Yes
| approved | No | S3‑180196 | |||
S3‑180167 | DN authorization grant and revocation | Huawei & Hisilicon | pCR | Approval | Yes |
YesEricsson: SA2 makes these kind of decisions.What security issues or threats are we addressing here? We cannot redefine PDU procedures.
Qualcomm agreed with Ericsson.
There wasn't much support for this document, so it was noted.
Huawei commented that the procedure was missing and needed to be there.
| noted | No | ||||
S3‑180251 | pCR to update the secondary EAP authentication clause to take into account the roaming scenario | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑180380 | S3‑173303 | ||
S3‑180380 | pCR to update the secondary EAP authentication clause to take into account the roaming scenario | Qualcomm Incorporated,Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑180251 | |||
7.2.9.3 | Efficiency / security improvement | S3‑180166 | ID linkage verification in secondary authentication | Huawei & Hisilicon | pCR | Approval | Yes |
YesORANGE: sending the IMSI to a third party? This has privacy issues, it's internal to the network.
There wasn't any support for this change.
| noted | No | ||
S3‑180168 | Secondary Authentication for multiple PDU sessions | Huawei & Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180250 | pCR to update the secondary authentication procedure to include the authentication/authorization confirmation between UE and SMF when a key generating EAP method is used | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| noted | No | S3‑173302 | |||
7.2.9.4 | Miscellaneous | S3‑180237 | Secondary Authentication: Align with SA2 procedure and removal of EN on making the figure updatable | Nokia | pCR | Approval | Yes |
Yes
| merged | No | S3‑180380 | |
7.2.9.5 | Editorial and clarification | S3‑180201 | Clarification on network slice access authentication and authorization | LG Electronics | pCR | Approval | Yes |
Yes
| noted | No | ||
S3‑180236 | Secondary authentication: Clause 12.1.2: Resolve ENs | Nokia | pCR | Approval | Yes |
Yes
| approved | No | ||||
7.2.10 | Interworking |   | ||||||||||
7.2.10.1 | Idle mode 4G-5G | S3‑180281 | Idle mode mobility from EPS to 5GS | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180439 | |
S3‑180439 | Idle mode mobility from EPS to 5GS | Ericsson, Qualcomm,Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑180281 | |||
S3‑180233 | Interworking: Idle mode mobility from EPS to 5GS | Nokia | pCR | Approval | Yes |
Yes
| merged | No | S3‑180439 | |||
S3‑180255 | pCR to provide a text for idle mode mobility from EPC to 5GC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| merged | No | S3‑180439 | S3‑173305 | ||
7.2.10.2 | Idle mode 5G-4G | S3‑180280 | Idle mode mobility from 5GS to EPS | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180440 | |
S3‑180147 | Idle mode mobility from 5GS to EPS with N26 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180440 | |||
S3‑180234 | Interworking; Idle mode mobility from 5G to 4G | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180440 | |||
S3‑180440 | Interworking; Idle mode mobility from 5G to 4G | Nokia,Qualcomm, Huawei,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180234 | |||
S3‑180254 | pCR to provide a text for idle mode mobility from 5GC to EPC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| merged | No | S3‑180440 | S3‑173305 | ||
7.2.10.3 | Handover 5GC-EPS | S3‑180279 | Handover from 5GS to EPS | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180441 | |
S3‑180148 | Handover procedure from 5GS to EPS with N26 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180441 | |||
S3‑180216 | Handover from 5GS to EPS | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| merged | No | S3‑180441 | |||
S3‑180232 | Interworking: Handover from 5GC to EPS | Nokia | pCR | Approval | Yes |
Yes
| merged | No | S3‑180441 | |||
S3‑180252 | pCR to provide a normative text for handover from 5GC to EPC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑180441 | S3‑173305 | ||
S3‑180441 | pCR to provide a normative text for handover from 5GC to EPC | Qualcomm Incorporated,Nokia, NEC,Huawei,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180252 | |||
7.2.10.4 | Handover EPS-5GC | S3‑180282 | Handover from EPS to 5GS | Ericsson | pCR | Approval | Yes |
Yes
| merged | No | S3‑180442 | |
S3‑180218 | Handover from EPS to 5GS | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| merged | No | S3‑180442 | |||
S3‑180231 | Interworking: Handover from EPS to 5GS | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180442 | |||
S3‑180442 | Interworking: Handover from EPS to 5GS | Nokia, Qualcomm, NEC,Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180231 | |||
S3‑180253 | pCR to provide a normative text for handover from EPC to 5GC | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| merged | No | S3‑180442 | S3‑173305 | ||
7.2.10.5 | Security context mapping | S3‑180283 | Mapping of security contexts during interworking between EPS and 5GS | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180443 | |
S3‑180443 | Mapping of security contexts during interworking between EPS and 5GS | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180283 | |||
7.2.10.6 | Miscellaneous | S3‑180114 | Interworking with EPC without N26 interface in single-registration mode | Huawei, Hisilicon | pCR | Approval | Yes |
YesEricsson: too much text; security-wise we just refer to 33.401. Nokia agreed.
| revised | No | S3‑180444 | |
S3‑180444 | Interworking with EPC without N26 interface in single-registration mode | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180114 | |||
7.2.10.7 | Editorials |   | ||||||||||
7.2.11 | non-3GPP access |   | ||||||||||
7.2.11.1 | Miscellaneous | S3‑180012 | Authentication for Untrusted Non-3GPP Access using EAP | Motorola Mobility, Lenovo, LG Electronics, Nokia, KPN, Broadcom, Brocade | pCR | Approval | Yes |
Yes
| revised | No | S3‑180455 | S3‑173251 |
S3‑180455 | Authentication for Untrusted Non-3GPP Access using EAP | Motorola Mobility, Lenovo, LG Electronics, Nokia, KPN, Broadcom, Brocade | pCR | Approval | Yes |
Yes
| approved | No | S3‑180012 | |||
S3‑180013 | Addition of EAP-5G method ID | Lenovo, Motorola Mobility | CR | Approval | Yes |
Yes
| agreed | No | ||||
7.2.11.2 | Editorials |   | ||||||||||
7.2.12 | NDS |   | ||||||||||
7.2.12.1 | Miscellaneous | S3‑180108 | Security Procedures between 5G Network Functions | Huawei, Hisilicon | pCR | Approval | Yes |
YesReworded to "shall be supported".
| revised | No | S3‑180367 | |
S3‑180367 | Security Procedures between 5G Network Functions | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180108 | |||
7.2.12.2 | Editorials |   | ||||||||||
7.2.13 | Service based architecture |   | ||||||||||
7.2.13.1 | Interconnect (SEPP related) | S3‑180072 | Conclusions from IPX Security Conference calls | KPN | report | Information | Yes |
YesVodafone commented that this misrepresented what was agreed in the meeting in the first line.
| noted | No | ||
S3‑180238 | SBA: Prioritization for Phase 1 | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180353 | |||
S3‑180353 | SBA: Prioritization for Phase 1 | Nokia | other | Approval | Yes |
Yes
| approved | No | S3‑180238 | |||
S3‑180028 | Analysis of different approaches for implementing SBA security over N32 reference point | TIM (Telecom Italia) s.p.a. | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑180210 | Inter Operator Signalling Security in 5G Proposal | Deutsche Telekom AG | discussion | Decision | Yes |
Yes
| noted | No | ||||
S3‑180299 | LS on protection of HTTP messages between SEPPs | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑180352 | Living document on SBA | China Mobile | other | discussion | Yes |
Yes
| noted | No | ||||
7.2.13.2 | Protection of Attributes | S3‑180261 | Reply LS on Use of Subscriber Identity in HTTP URI | Nokia | LS out | Approval | Yes |
Yes
| noted | No | ||
S3‑180298 | LS (S3-180034/CT4-176395) on the Use of Subscriber Identity in HTTP URI | Ericsson | LS out | Approval | Yes |
Yes
| noted | No | ||||
S3‑180239 | SBA: Resolve EN on Information Elements that require protection | Nokia | other | Approval | Yes |
Yes
| revised | No | S3‑180354 | |||
S3‑180354 | SBA: Resolve EN on Information Elements that require protection | Nokia | other | Approval | Yes |
Yes
| approved | No | S3‑180239 | |||
S3‑180329 | Attributes requiring confidentiality protection on the N32 interface | Deutsche Telekom AG, KPN | pCR | Approval | Yes |
YesChina Mobile commented that the confidentiality protection for location data should be optional (not a "shall").
ORANGE commented that this was only for roaming. What's the reason for not having location data confidentiality protected?
It was commented that some countries would not allow to have this as a requirement.
Vodafone: put it as "shall" unless local regulators don’t allow it.
| revised | No | S3‑180355 | |||
S3‑180355 | Attributes requiring confidentiality protection on the N32 interface | Deutsche Telekom AG, KPN | pCR | Approval | Yes |
Yes
| approved | No | S3‑180329 | |||
S3‑180260 | SBA: Considerations on applying security on HTTP message payload | Nokia | discussion | Decision | Yes |
Yes
| noted | No | ||||
S3‑180263 | SBA: Resolve EN on use of JOSE with multiple HTTP Sessions between two NFs. | Nokia | other | Approval | Yes |
YesNTT-Docomo: This implies a binding between request and response that needs to be captured in an editor's note.
| revised | No | S3‑180356 | |||
S3‑180356 | SBA: Resolve EN on use of JOSE with multiple HTTP Sessions between two NFs. | Nokia | other | Approval | Yes |
Yes
| approved | No | S3‑180263 | |||
7.2.13.3 | Transport security (intra and inter-PLMN) | S3‑180301 | TLS mandatory to implement for SBA security | Ericsson | pCR | Approval | Yes |
YesBT commented that the meaning of "use" in this case was ambiguous. The first phrase was reworded to clarify this.
| revised | No | S3‑180357 | |
S3‑180357 | TLS mandatory to implement for SBA security | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180301 | |||
7.2.13.4 | NF-NRF Authentication & Authorization | S3‑180300 | Including authentication into authorization aspects | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180368 | |
S3‑180368 | Including authentication into authorization aspects | Ericsson | pCR | Approval | Yes |
Yes
| approved | No | S3‑180300 | |||
S3‑180152 | Authentication in the service registration procedure | Huawei, Hisilicon | pCR | Approval | Yes |
YesNokia preffered to have the authentication to be done in the transport layer (e.g. using certificates) instead of the application layer.
Vodafone asked: If using transport level, can we have different levels of service? Huawei replied that this was the case.
Ericsson: if there is a proxy in between this might not work. This is not the way to go.
Deutsche Telekom: preconfiguring RAND is odd.
| noted | No | ||||
S3‑180184 | NF Service Register Request Procedure | Intel | pCR | Approval | Yes |
YesEricsson didn’t support this method.
NTT-Docomo and DT: use certificates. Ericsson agreed to use them for authorization, they preferred to use standardised solutions in any case.
Intel: registration request and response is coming from SA2, this is not a new method. We are adding protection for that.
Intel clarified that this is for authentication.
| revised | No | S3‑180358 | |||
S3‑180358 | NF Service Register Request Procedure | Intel | other | Approval | Yes |
YesAgreed to use the public key for this purpose and remove everything else.
It was agreed to add this to the living document.
| approved | No | S3‑180184 | |||
S3‑180154 | Authorization of NF service discovery | Huawei, Hisilicon | pCR | Approval | Yes |
YesChina Mobile: add an editor's note about NF instance to be releaved to the NRF in HPLMN.
Ericsson: this can be summarised in a couple of sentences, it's overly complicated.
| revised | No | S3‑180360 | |||
S3‑180360 | Authorization of NF service discovery | Huawei, Hisilicon | pCR | Approval | Yes |
YesIt was agreed to summarize this contribution into a single sentence.
| approved | No | S3‑180154 | |||
S3‑180164 | NF Service Discovery Request Procedure | Intel | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180155 | Authorization of NF service access | Huawei, Hisilicon | other | Approval | Yes |
YesContribution to the living document.
| approved | No | ||||
S3‑180185 | Security requirements for Service Request | Intel | pCR | Approval | Yes |
YesChina Mobile argued that there was no need to have the sessions.The communication can be secured by the signalling, no need to have a secure session.Whether it is session based or not, that's another discussion.
Ericsson: pre-configured discovery between the two NFs, how is the second requirement fulfilled?
Intel: it is assuming that there is no pre-configuration.
| revised | No | S3‑180361 | |||
S3‑180361 | Security requirements for Service Request | Intel | pCR | Approval | Yes |
YesAgreed to remove the second and third requirements.
| approved | No | S3‑180185 | |||
S3‑180177 | Merge two procedures of SBA authorization | Huawei, Hisilicon, | other | Approval | Yes |
Yes
| approved | No | ||||
S3‑180359 | Adding an editor's note on NF Service Register Request Procedure | Intel | pCR | Approval | Yes |
YesAdding an editor's note based on the tdoc 358.
| approved | No | ||||
7.2.13.5 | NF-NF Authentication & Authorization | S3‑180225 | Discussion and pCR about NF authentication for SBA | China Mobile | other | Approval | Yes |
YesContribution to the living document.
NTT-Docomo commented that this will be a problem in the evaluation.
BT was concerned that this suggests that whatever the vendors build is depending on the deployment of the operator.
Vodafone commented that it was difficult to track what this contribution was affecting and how. The use of living documents was confusing.
NTT-Docomo: this document is too vague, not clear what needs to be done.
264 displays Nokia's opinion on this issue.
| noted | No | ||
S3‑180327 | Considerations on Network Function Authorization in 5G SBA | Deutsche Telekom AG | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑180264 | SBA: Service access authorization | Nokia | pCR | Approval | Yes |
YesNTT-Docomo: this implies a change of all software of all NFs at the same time when it is easier to change the hardware.BT agreed.
Huawei agreed with NTT-Docomo.
Ericsson preffered a token-based proposal and not this one.
| noted | No | ||||
S3‑180165 | NF Service Request Procedure | Intel | other | Approval | Yes |
YesDecided to include it in the living document.
| revised | No | S3‑180363 | |||
S3‑180363 | NF Service Request Procedure | Intel | other | Approval | Yes |
Yes
| approved | No | S3‑180165 | |||
7.2.13.6 | Miscellaneous |   | ||||||||||
7.2.13.7 | Editorials | S3‑180054 | Adding the abbreviations of NF and NFR | CATT | pCR | Approval | Yes |
YesDT: NRF is not agreed in SA2 in yet.
Agreed to add only NF and wait for SA2 for the other acronym.
| revised | No | S3‑180364 | |
S3‑180364 | Adding the abbreviations of NF and NFR | CATT | pCR | Approval | Yes |
Yes
| approved | No | S3‑180054 | |||
7.2.14 | Privacy |   | ||||||||||
7.2.14.1 | SUPI and LI | S3‑180240 | Protecting the IMSI and IMEI in NAS Security Mode Command | Qualcomm Incorporated | discussion | Endorsement | Yes |
YesBT: if we are forced to turn NAS encryption off, it's doubtful we can encrypt partially in all scenarios.
Verizon: we can protect privacy without having to encrypt the IMSI. IMEI is a device parameter, not an user parameter.
Docomo: much cheaper to change the IMSI than the IMEI.
Docomo: the question is: are we allowed to protect IMSI even if the encryption is not there?
Nokia: ask SA3-LI with an LS if we are allowed to send the IMSI at all in this situation.
BT: UE needs to send IMSI in some form. The restriction would be you can’t send it when NAS encryption is off. I wouldn’t like that option as BT.
Alex commented that a possible LS would not be answered until after the SA3#90Bis meeting.
| noted | No | ||
S3‑180331 | Discussion on SUPI privacy proposals | NTT DOCOMO INC. | discussion | Decision | Yes |
YesNTT Docomo: Proposal one not needed to be known in the access network.
China Mobile: we would like to have the SUPI accessible in the clear, known in the VPLMN including the base station.
It was pointed out that there was a requirement on this. BT commented that SA3 would be changing the requirement that's being worked in SA3-LI and that a contribution should be sent to SA3-LI for discussion. BT wanted to have minuted the documentation of this requirement.
Vodafone: CMCC wants the requirement on the VPLMN irrespectible of the HPLMN wanting to prevent the encryption of the SUPI.
Huawei: HPLMN can decide on the privacy of the SUPI.
Qualcomm: on "the SUPI shall be able to be sent clear over the air", What happens with the privacy of the SUPI in this case? We can disregard everything.
BT: 3GPP works on requirements that are written down somewhere.If we are coming up with new requirements we need to communicate this with LS.
The Chair asked if there was any requirement on "the SUPI should not be in the clear".
Qualcomm: this is not a requirement from the LI perspective.
ORANGE: is there any TS describing LI activities over the air? There is nothing on lawful interception over the air.
This issue had to be taken offline.
The Chair commented that if there was no agreement on this issue he would need to know if there was an official regulator requirement or a company requirement.
| noted | No | ||||
S3‑180083 | LI conformity when privacy is used - was S3-173124 | Nokia, Orange, T-Mobile USA | pCR | Approval | Yes |
Yes
| noted | No | S3‑173124 | |||
S3‑180051 | Solution for meeting LI and privacy requirements | CATT | pCR | Approval | Yes |
YesBT: this is far more reliable for LI.
| noted | No | ||||
S3‑180206 | Meeting SUPI privacy and LI Requirements | Huawei, Hisilicon, Intel, China Mobile, CATT | pCR | Approval | Yes |
Yes
| noted | No | S3‑180101 | |||
S3‑180265 | Clause 6.7.2 (NAS SMC, SUPI from UE for LI) | Ericsson | pCR | Approval | Yes |
YesVodafone: it was generally agreed that the visited network should not tamper with the information that is passing.
NTT-Docomo: requirement of sending the SUPI over the air and protecting it.
BT: if SA3 accepts that authentication fails when messing with the SUPI/IMSI, that would work well with the LI group and BT would support this contribution. The Nokia solution is more difficult to live with for LI.
Docomo: nobody seems to be objecting to using a hash. In this case the Ericsson proposal would be straightforward. I like the partial protection of the IMEI from the Qualcomm proposal. Combining both would be a good privacy solution.
BT: hash based solution is fine if authentication fails. If any possiblity allows the UE to connect, LI will not agree.KPN agreed with this. If the SUPI is not the same in both sides, the connection shall fail.
Huawei: LI should just accept the SUPI from the home network and make things easier. ORANGE replied that these are regulatory requirements that operators need to comply with.
It looked like the hash-based Ericsson solution seemed to be the most accepted.
BT commented that there was no chance to bring back this discussion to the next SA3 meeting.
| noted | No | ||||
S3‑180082 | Requirement on AMF related to LI | Nokia | pCR | Approval | Yes |
Yes
| revised | No | S3‑180458 | |||
S3‑180458 | Requirement on AMF related to LI | Nokia | pCR | Approval | Yes |
Yes
| approved | No | S3‑180082 | |||
S3‑180326 | pCR to 33.501 - SUPI Encryption Protocol: issues identified by ETSI SAGE | VODAFONE Group Plc | pCR | Approval | Yes |
YesBT supported this contribution.
Vodafone was happy with merging this paper with any solution as long as the fraud part was covered.
Change one was not agreed.
Ericsson wanted to discuss more deeply the editor's notes on the fraud cases in change two, so it was suggested to have a dedicated conference call to discuss them.
| noted | No | S3‑173260 | |||
S3‑180018 | Solution for meeting LI and privacy requirements | CATT | pCR | Agreement | No |
Yes
| withdrawn | Yes | ||||
S3‑180101 | Meeting SUPI privacy and LI Requirements | Huawei, Hisilicon, Intel | pCR | Approval | No |
Yes
| revised | No | S3‑180206 | |||
S3‑180457 | SUPI and LI | WG Chair | other | Endorsement | Yes |
YesIt was decided that partial IMEI encryption wasn't an issue here.
"SMC must fail cryptographically if the UE and HPLMN responses don’t matcht (leading to no service provisioning to UE)"-> BT favoured this statement to fulfil the LI requirement no matter the solution found.
Nokia and Huawei disagreed with the last point ("6") since it was restricting too much the solution.
The Chair requested a show of hands:
Support of point two ("NAS SMC will include a hash of SUPI + something") --> Docomo, Sony, KPN,BT,ORANGE,Intel,NEC,Samsung,Huawei, Ericson,Ipcom,CATT,Home Office, NIST,Airbus,ZTE, DT,AT&T,ZTE, Vodafone,OTD,French Ministry, NTECH.
Support for "Hash of SUPI + something":
ORANGE, Nokia, SDT, T-mobile, ORANGE, Interdigital, Gemalto, IDEMIA, Motorola, NIST, AT&T.
Objections to sentence in point two: Tmobile, Nokia, Gemalto IDEMIA.
NAS SMC was removed from "NAS SMC will include a hash of SUPI + something".
Once the basics were agreed, the presentation was endorsed.
| endorsed | No | ||||
7.2.14.2 | SUCI and Schemes | S3‑180079 | HN authorization of serving network actions directed to the UE | Nokia, KPN | discussion | Discussion | Yes |
YesDocomo: we agreed to have no mechanisms to send the SUPI in the clear.
Nokia: this is in 4G.
Vodafone: you shouldn’t send the SUPI in 4G.
| noted | No | ||
S3‑180080 | Privacy related function in UDM - Authorization proof | Nokia, KPN | pCR | Decision | Yes |
Yes
| noted | No | ||||
S3‑180081 | Requirement on AMF related to HN authorization | Nokia, KPN | pCR | Decision | Yes |
Yes
| noted | No | ||||
S3‑180266 | Clause 5.1.5 (SUCI – on-the-fly indication to use null-scheme) | Ericsson | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180049 | Privacy requirement improvement related to using non null-scheme | CATT | pCR | Approval | Yes |
YesVodafone disagreed. It’s the ME, not the UE.
This was agreed.
| revised | No | S3‑180460 | |||
S3‑180460 | Privacy requirement improvement related to using non null-scheme | CATT | pCR | Approval | Yes |
Yes
| approved | No | S3‑180049 | |||
S3‑180258 | Support of privacy schemes and profiles by the UE | Qualcomm Incorporated | pCR | Approval | Yes |
YesVodafone: cool wit this as long as it is not just a single scheme.
| noted | No | ||||
S3‑180306 | Annex C (SUCI – ECIES profiles) | Ericsson | pCR | Approval | Yes |
Yes
| revised | No | S3‑180451 | |||
S3‑180451 | Annex C (SUCI – ECIES profiles) | Ericsson,Vodafone | pCR | Approval | No |
YesQualcomm commented that these are too many profiles: We haven’t heard any argument why one profile is not sufficient.
Vodafone: SAGE has trust issues with having a single profile. ORANGE supported Vodafone.
Intel supported Qualcomm.
KPN preferred multiple curves, but better to have a single decent curve than multiple curves that don’t work as Ericsson.
Qualcomm: No reason to mandate multiple curves in the ME. Samsung and NEC supported this at least for phase one.The scheme can be selected by negotiation.
Docomo: we cannot retrofit more curves (update all USIMS in the field), we need to have more curves in the beginning if that's the plan for phase two.
It was noted that this topic had to be agreed in the next meeting.
NCSC: If we can clarify whether more curves can be added in the future, then we can reach an agreement.
Ericsson: we will need more curves.
| noted | No | S3‑180306 | |||
S3‑180337 | Comments on S3-180306 - Annex C (SUCI – ECIES profiles) | Vodafone | pCR | Agreement | Yes |
Yes
| merged | No | S3‑180451 | |||
S3‑180214 | Updates to Clause 6.12.2 regarding protection scheme identification | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180303 | Clause 6.12.2 (SUCI – behaviours when USIM calculates SUCI) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180324 | SUCI calculation | Gemalto N.V. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180302 | Annex C (SUCI – scheme properties) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180048 | How AMF and SEAF deal with null-scheme SUCI | CATT | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180050 | Privacy requirement of using SUCI in initial registration procedure | CATT | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180213 | Discussion and pCR for privacy calculation in UE side | China Mobile, ZTE | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180197 | Discussion on the enhancement of SUCI construction scheme | LG Electronics | discussion | Discussion | Yes |
Yes
| not treated | No | ||||
S3‑180198 | Additional input for SUCI construction - Annex C. | LG Electronics | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180199 | Draft LS on the security of a known part of plaintext for subscription identifier | LG Electronics | LS out | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180010 | Discussion Paper on the need and ways to make SUPI protection opaque to IMSI sniffers | InterDigital, Inc. | discussion | Decision | Yes |
Yes
| not treated | No | ||||
S3‑180011 | PCR to Annex C for making SUPI protection opaque to IMSI sniffers | InterDigital, Inc. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180069 | PCR to Section 6.12.2 | InterDigital, Inc. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180052 | Solution for raw public key provisioning | CATT | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180015 | How AMF and SEAF deal with null-scheme SUCI | CATT | pCR | Agreement | No |
Yes
| withdrawn | Yes | ||||
S3‑180016 | Privacy requirement improvement related to using non null-scheme | CATT | pCR | Agreement | No |
Yes
| withdrawn | Yes | ||||
S3‑180017 | Privacy requirement of using SUCI in initial registration procedure | CATT | pCR | Agreement | No |
Yes
| withdrawn | Yes | ||||
S3‑180019 | Solution for raw public key provisioning | CATT | pCR | Agreement | No |
Yes
| withdrawn | Yes | ||||
7.2.14.3 | SIDF | S3‑180211 | Discussion and pCR for SUCI home routing | China Mobile | pCR | Approval | Yes |
YesVodafone: keys stored in something else that the AUSF?
Ericsson: SIDF colocated in the UDM was the agreement and this is against that.
Vodafone: Add extra bits for routing, no need for SIDF.ORANGE supported this.
Nokia: postpone the discussion since this is changing an agreement. Huawei supported this.
Nokia, Ericsson didn’t support this change in 5.5.1.Huawei commented that this is a problem that needs to be addressed.
| noted | No | ||
S3‑180267 | NF discovery with SUCI | Ericsson | pCR | Approval | Yes |
YesKPN supported this way ahead as opposed to the China Mobile solution in 211.
Nokia preferred to further study the new Annex.
Noted to give it more time for further study.
| noted | No | ||||
S3‑180304 | Clause 6.12.5 (SIDF – size of SUCI) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180305 | Clause 6.12.5 (SIDF – validating calculation of the SUCI) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180212 | Requirements on SIDF | NEC Telecom MODUS Ltd. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180077 | UDM requirements - key management and privacy - S3-173121 | Nokia | pCR | Decision | Yes |
Yes
| not treated | No | S3‑173121 | |||
7.2.14.4 | Miscellaneous | S3‑180057 | Discussion on Identity Request and Registration Procedures in 5G | KPN | discussion | Approval | Yes |
Yes
| not treated | No | ||
S3‑180058 | LS to SA2 on Registration Request and Identity Request with clear text SUPI | KPN | other | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180059 | Adding the subscription identification procedure to TS 33.501 | KPN, Nokia | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180140 | Subscription identification procedure | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180268 | Clause 6.12.4 (subscription identification procedure) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180235 | Adding Emergency Services paragraph for Subscription Identification procedure | KPN N.V. | pCR | Approval | Yes |
Yes
| not treated | No | ||||
7.2.14.5 | Editorials | S3‑180084 | Resolving editors note on emergency call handling | Nokia | pCR | Decision | Yes |
Yes
| not treated | No | ||
S3‑180078 | SUCI intro and handling - was S3-173316 | Nokia, KPN | pCR | Decision | Yes |
Yes
| not treated | No | S3‑173316 | |||
S3‑180102 | Moving UE handling SUCI to SUCI clause | Huawei, Hisilicon, CMCC | pCR | Approval | Yes |
Yes
| not treated | No | ||||
S3‑180269 | Clauses 6.12.1 and 6.12.2 (Moving SUCI related text from 6.12.1 to 6.12.2) | Ericsson | pCR | Approval | Yes |
Yes
| not treated | No | ||||
7.2.15 | Incoming and outgoing LSes | S3‑180033 | Reply LS on PLMN and RAT selection policies for roaming | C3-176332 | LS in | Yes |
Yes
| noted | No | |||
S3‑180036 | LS on maximum data rate of user plane integrity protected data | R2-1714125 | LS in | Yes |
YesThis was replied in SA3#89.
| noted | No | |||||
S3‑180037 | LS on Security aspects of supporting LTE connected to 5GC | R2-1714244 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑180348 | Reply to: LS on Security aspects of supporting LTE connected to 5GC | Ericsson | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑180039 | Reply LS on 5G Identity and Access Management Requirements | S1-174557 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180040 | Reply LS on selectively disabling legacy radio access | S1-174601 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180044 | Response LS on voice service continuity from 5G to 2/3G | SP-171078 | LS in | Yes |
YesBT commented that this wasn't a priority as discussed in SA plenary since the work item was going to Rel-16.
| noted | No | |||||
S3‑180045 | LS on secure storage and processing of subscription credentials | S1-173475 | LS in | Yes |
Yes
| postponed | No | |||||
S3‑180046 | LS on security during Resume reject in INACTIVE state in NR | R2-1712052 | LS in | Yes |
Yes
| replied to | No | |||||
S3‑180349 | Reply to: LS on security during Resume reject in INACTIVE state in NR | Intel | LS out | approval | Yes |
Yes
| approved | No | ||||
S3‑180034 | LS on Use of Subscriber Identity in HTTP URI | C4-176395 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180350 | Reply to: LS on Use of Subscriber Identity in HTTP URI | Deutsche Telekom | LS out | approval | No |
Yes
| withdrawn | Yes | ||||
S3‑180338 | Business rationale for requirements in “S3-172175: DESS Update and Requirements for Securing Inter-PLMN Signalling Interfaces in 5G” | GSMA FASG DESS | LS in | Yes |
Yes
| noted | No | |||||
S3‑180351 | NGMN White Paper on Service-based Architecture in 5G | NGMN | LS in | discussion | Yes |
YesThe Chair encouraged the delegates to have a look at the white paper.
| noted | No | ||||
7.2.16 | PLMN RAT selection | S3‑180035 | LS on a potential USIM solution for PLMN and RAT selection policies for roaming | C6-170696 | LS in | Yes |
Yes
| postponed | No | |||
S3‑180378 | Reply to: LS on a potential USIM solution for PLMN and RAT selection policies for roaming | Vodafone | LS out | approval | No |
Yes
| withdrawn | Yes | ||||
S3‑180112 | Adding key issue to Living Document S3-173482 | Huawei, Hisilicon; Samsung | other | Approval | Yes |
Yes"..during the registration process" is solution-specific. This was agreed to be removed.
Vodafone: 3.1 is a new clause and we don’t think that the title is an issue. Altering and blocking have different solutions; they should not be combined.The requirements need to be reworded.
The clause title and requirements were changed as proposed by Vodafone.
| revised | No | S3‑180369 | |||
S3‑180369 | Adding key issue to Living Document S3-173482 | Huawei, Hisilicon; Samsung | other | Approval | Yes |
Yes
| approved | No | S3‑180112 | |||
S3‑180316 | New key issue on UE behaviour on failing integrity check | Ericsson | other | Approval | Yes |
YesVodafone: The wording for the key issue looks like a requirement.It's missing here to describe some means of receiving the message correctly (e.g. a request to be resent).
Huawei commented that they didn’t agree with the requirements.
This had to be taken offline.
| revised | No | S3‑180370 | |||
S3‑180370 | New key issue on UE behaviour on failing integrity check | Ericsson | other | Approval | Yes |
Yes
| approved | No | S3‑180316 | |||
S3‑180113 | Adding potential solution for living document S3-173482 | Huawei, Hisilicon; Samsung | other | Approval | Yes |
YesVodafone disagreed: This is a strong financial incentive for the networks to do as little authentication as they can. NTT-Docomo agreed and added that it should be written into the evaluation clause.
Huawei: this is a CT1 decision.
It was agreed to let CT1 know with an LS (contained in 373) that they should not to continue work on this solution.
Samsung didn't find any technical reasons to reject this.
| revised | No | S3‑180372 | |||
S3‑180372 | Adding potential solution for living document S3-173482 | Huawei, Hisilicon; Samsung | other | Approval | Yes |
Yes
| approved | No | S3‑180113 | |||
S3‑180317 | New solution: Protected UE configuration update commands | Ericsson | other | Approval | Yes |
Yes
| revised | No | S3‑180374 | |||
S3‑180374 | New solution: Protected UE configuration update commands | Ericsson | other | Approval | Yes |
YesAdding editor's notes addressing the received comments.
| approved | No | S3‑180317 | |||
S3‑180318 | New solution: key management via AUSF | Ericsson | pCR | Approval | Yes |
YesVodafone: UDM knows everytime that the auth process is being done.Narrow it down to authentication for network access. Sending keys out every time we need an authentication might be a problem.
| revised | No | S3‑180375 | |||
S3‑180375 | New solution: key management via AUSF | Ericsson | other | Approval | Yes |
Yes
| approved | No | S3‑180318 | |||
S3‑180319 | Addition of soltion to living document (Steering of roaming) | Vodafone GmbH | other | Approval | Yes |
YesDT: Take out the DH example. This was agreed.
ORANGE: if you are proposing a new secure channel here you should consider the LI aspects with an editor's note.
| revised | No | S3‑180377 | |||
S3‑180377 | Addition of solution to living document (Steering of roaming) | Vodafone GmbH | other | Approval | Yes |
Yes
| approved | No | S3‑180319 | |||
S3‑180371 | Living document on PLMN RAT selection | ORANGE | other | Approval | Yes |
Yes
| noted | No | ||||
S3‑180373 | Concerns of the use of authentication for steering of roaming | Vodafone | LS out | Approval | Yes |
YesThis was sent during the meeting.
| approved | No | ||||
7.2.17 | Others | S3‑180247 | Adding references to the algorithm test data | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| revised | No | S3‑180416 | |
S3‑180416 | Adding references to the algorithm test data | Qualcomm Incorporated | pCR | Approval | Yes |
Yes
| approved | No | S3‑180247 | |||
S3‑180362 | Draft TS 33.501 | NTT-Docomo | draft TS | Approval | No |
YesReady on Wednesday 31st January
Comments Thursday 1st February
Final version Friday 2nd February
KPN: too many editor's notes in this spec, shouldn't we remove some?
Vodafone agreed with this.
BT volunteered to help KPN with the removal of some editor's notes
33.501 will be sent for approval in the March plenary.
| left for email approval | No | ||||
7.3 | Mission Critical Security Enhancements (eMCSec) (Rel-15) | S3‑180038 | LS on Removal of 'over LTE' limitation from Mission Critical Specifications | S1- 174542 | LS in | Yes |
Yes
| noted | No | |||
S3‑180043 | LS on end-to-end encryption for mission critical communications between LMR users and 3GPP MC users | S6-171838 | LS in | Yes |
Yes
| noted | No | |||||
S3‑180332 | [eMCSEC] Adding Integrity Key for KMS communications | NCSC | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑180160 | [eMCSec] 33180 R15 Interworking SeGy clarification | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑180386 | |||
S3‑180386 | [eMCSec] 33180 R15 Interworking SeGy clarification | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180160 | |||
S3‑180153 | [eMCSec] 33180 R15 IWF security | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| merged | No | S3‑180386 | |||
S3‑180229 | Document showing the changes to SeGy functionality | NCSC | discussion | Discussion | Yes |
Yes
| noted | No | ||||
S3‑180228 | [eMCSEC] Security Gateway clause update and move to annex | NCSC | CR | Agreement | Yes |
Yes
| merged | No | S3‑180386 | |||
S3‑180226 | [eMCSEC] Notifying the use of Security Gateways | NCSC | CR | Agreement | Yes |
Yes
| agreed | No | ||||
S3‑180227 | [eMCSEC] LS to SA6 on Security Gateway notification | NCSC | LS out | Approval | Yes |
Yes
| revised | No | S3‑180387 | |||
S3‑180387 | [eMCSEC] LS to SA6 on Security Gateway notification | NCSC | LS out | Approval | Yes |
Yes
| approved | No | S3‑180227 | |||
S3‑180156 | [eMCSec] 33.180 R15 Interworking media and signaling | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑180376 | |||
S3‑180376 | [eMCSec] 33.180 R15 Interworking media and signaling | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180156 | |||
S3‑180158 | [eMCSec] 33180 R15 Interworking key mgmt (InterSD) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑180413 | |||
S3‑180413 | [eMCSec] 33180 R15 Interworking key mgmt (InterSD) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180158 | |||
S3‑180159 | [eMCSec] 33180 R15 Interworking key mgmt (MCData) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| withdrawn | Yes | ||||
S3‑180163 | New WID for MONASTERY security | Motorola Solutions UK Ltd. | WID new | Agreement | Yes |
YesIt was commented whether it was possible to add a new objective in the existing WID instead of a new WID.
MCC commented that for tracking-in-3GPP purposes and given that it was a new topic, it was better to have a separate WID.
It was pointed out that this was a Rel-15 WID, so the work would be brought for the next Bis meeting as well.
| revised | No | S3‑180385 | |||
S3‑180385 | New WID for MONASTERY security | Motorola Solutions UK Ltd. | WID new | Agreement | Yes |
Yes
| agreed | No | S3‑180163 | |||
S3‑180427 | Changes to TS 33.180 from SA3#90 | NCSC | other | Information | Yes |
Yes
| noted | No | ||||
7.4 | Northbound APIs Security for SCEF - SCS/AS Interworking (NAPS_Sec) (Rel-15) | S3‑180157 | Authorization of SCS/AS to send requests for the 3GPP Network Entity | Huawei, Hisilicon | CR | Approval | Yes |
YesORANGE: we cannot adapt to all types of third party networks. You are proposing an authorization mechanism here, not a security procedure.
ORANGE wasn't convinced why it is for multiple authorization mechanisms.Keep only the first sentence. We need an authorization mechanism, but which one is not clear.
It was clarified that this was a contribution to the draft CR from the previous meeting, so the type had to be changed to "other".
It was asked to be minuted that OATH is a good candidate for this.
There was no consensus on this so Huawei decided not to pursue this.
| not pursued | No | ||
S3‑180459 | Exception Sheet NAPS-Sec | Huawei | WI exception request | Agreement | Yes |
Yes
| withdrawn | Yes | ||||
7.5 | Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15) | S3‑180207 | Scope of CAPIF security | Huawei, Hisilicon, China Mobile | pCR | Approval | Yes |
YesNEC commented that the scope here was too short and needed more wording.
The Vice Chair proposed to accept this and bring more proposals for the next meeting.
| approved | No | S3‑180142 | |
S3‑180307 | CAPIF Security requirements | Samsung, Motorola Solutions | pCR | Approval | Yes |
Yes
| revised | No | S3‑180392 | |||
S3‑180392 | CAPIF Security requirements | Samsung, Motorola Solutions,China Unico,Huawei,China Mobile, HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180307 | |||
S3‑180224 | Security requirements on the CAPIF-4 reference point | China Mobile, Huawei | pCR | Approval | Yes |
Yes
| merged | No | S3‑180392 | |||
S3‑180191 | Key issue on topology hiding of the service | China Unicom, China Mobile | pCR | Yes |
Yes
| merged | No | S3‑180392 | ||||
S3‑180192 | ey issue on secure communication between functions in CAPIF | China Unicom, China Mobile | pCR | Yes |
Yes
| merged | No | S3‑180392 | ||||
S3‑180144 | Additional security requirements for 3rd party API provider | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180392 | |||
S3‑180208 | Security requirements on CAPIF entities | Huawei, Hisilicon, China Mobile | pCR | Approval | Yes |
Yes
| merged | No | S3‑180392 | S3‑180143 | ||
S3‑180309 | Security procedure for CAPIF-1e reference point | Samsung | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180312 | Security Procedure for CAPIF-2e reference point | Samsung | pCR | Agreement | Yes |
YesNEC: it is strange that there are three methods here, which seems like three options.
It was clarified that method one and two are authentication and method three is authorization/authentication.
BT: how is the method chosen/ negotiated in the fly?
Samsung: this is determined in 392.
Nokia: method three is fine but the others need some more refinement.
Huawei wasn't convinced with the authorization mechanisms for method one and two, so an editor's note was added to address this.
| revised | No | S3‑180403 | |||
S3‑180403 | Security Procedure for CAPIF-2e reference point | Samsung | pCR | Agreement | Yes |
Yes
| approved | No | S3‑180312 | |||
S3‑180314 | CAPIF security within PLMN Trust Domain | Samsung | pCR | Approval | Yes |
YesNEC: this is in a solution section and we have two requirements.
Huawei: the second line is too broad, you cannot mention that the whole TS 33.310 applies; refer to the right clause.
China commented that the first sentence wasn't clear enough and needed to be more specific about what exactly is being taken from TS 33.310. MCC agreed with this.
| revised | No | S3‑180404 | |||
S3‑180404 | CAPIF security within PLMN Trust Domain | Samsung | pCR | Approval | Yes |
Yes
| approved | No | S3‑180314 | |||
S3‑180142 | Scope of CAPIF security | Huawei, Hisilicon | pCR | Approval | No |
Yes
| revised | No | S3‑180207 | |||
S3‑180143 | Security requirements on CAPIF entities | Huawei, Hisilicon | pCR | Approval | No |
Yes
| revised | No | S3‑180208 | |||
S3‑180401 | Draft TS 33.122 | Samsung | draft TS | Approval | Yes |
Yes
| approved | No | ||||
7.6 | Other work areas |   | ||||||||||
7.6.1 | SAE/LTE Security | S3‑180245 | Discussion on completing the LTE bidding down procedures | Qualcomm Incorporated | discussion | Discussion | Yes |
Yes
| noted | No | ||
7.6.2 | IP Multimedia Subsystem (IMS) Security | S3‑180325 | Clarification for TCP connection reuse | Ericsson Limited | CR | Agreement | Yes |
Yes
| revised | No | S3‑180417 | |
S3‑180417 | Clarification for TCP connection reuse | Ericsson Limited | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180325 | |||
7.6.3 | Network Domain Security (NDS) | S3‑180262 | Clarification need of CMPv2 in TS 33.310 | Ericsson | discussion | Endorsement | Yes |
YesIt was agreed to treat this in the Bis meeting in San Diego.
It was commented that it was needed to go back up to Rel-10.
| noted | No | ||
7.6.4 | UTRAN Network Access Security |   | ||||||||||
7.6.5 | GERAN Network Access Security |   | ||||||||||
7.6.6 | Generic Authentication Architecture (GAA) |   | ||||||||||
7.6.7 | Multimedia Broadcast/Multicast Service (MBMS) |   | ||||||||||
7.6.8 | Security Aspects of Home(e)NodeB (H(e)NB) |   | ||||||||||
7.6.9 | Security Aspects related to Machine-Type Communication ((e)MTC) | S3‑180029 | Collection of clarifications and editorial changes to BEST TS 33.163 | Deutsche Telekom AG | CR | Approval | Yes |
YesBEST is not part of the agenda of this meeting.
| postponed | No | ||
7.6.10 | Security Aspects of Isolated E-UTRAN Operation for Public Safety (IOPS) |   | ||||||||||
7.6.11 | Security of MCPTT (MCPTT) |   | ||||||||||
7.6.12 | Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3) |   | ||||||||||
7.6.13 | Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM) |   | ||||||||||
7.6.14 | New GPRS algorithms for EASE (EASE_ALGOs_SA3) |   | ||||||||||
7.6.15 | Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) |   | ||||||||||
7.6.16 | Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB) | S3‑180088 | Collection of changes based on feedback from GSMA SECAG - CR to 33.117v1 Rel.14 | Nokia | CR | Agreement | Yes |
YesMCC commented that normative language cannot be used in Notes ("shall", "should"), which are just informative in nature and cannot be used for requirements and recommendations.
The content was fine but the distinction of normative/recommendation and informative text had to be worked offline.
The editor's note was removed and added to the report as action item:
"It is FFS on how details should be added to the SCAS to indicate whether requirements and associated test cases are applicable to all units or boards within a Network Product."
| revised | No | S3‑180419 | |
S3‑180419 | Collection of changes based on feedback from GSMA SECAG - CR to 33.117v1 Rel.14 | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180088 | |||
S3‑180089 | Collection of changes based on feedback from GSMA SECAG - CR to 33.117v1 Rel.15 | Nokia | CR | Agreement | Yes |
YesMCC pointed out that this CR wasn't necessary since the latest version of the spec is in Rel-14.
| not pursued | No | ||||
S3‑180090 | Collection of changes based on feedback from GSMA SECAG - CR to 33.916v1 Rel.14 | Nokia | CR | Agreement | Yes |
Yes
| revised | No | S3‑180420 | |||
S3‑180420 | Collection of changes based on feedback from GSMA SECAG - CR to 33.916v1 Rel.14 | Nokia | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180090 | |||
S3‑180091 | Collection of changes based on feedback from GSMA SECAG - CR to 33.916v1 Rel.15 | Nokia | CR | Agreement | Yes |
Yes
| not pursued | No | ||||
S3‑180345 | NESAS Pilot Findings and Recommendations to SA3 | GSMA SECAG | LS in | Information | Yes |
Yes
| replied to | No | ||||
S3‑180418 | Reply to: NESAS Pilot Findings and Recommendations to SA3 | Nokia | LS out | approval | Yes |
Yes
| approved | No | ||||
7.6.17 | Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) |   | ||||||||||
7.6.18 | Security of the Mission Critical Service (MCSec) | S3‑180315 | LS to CT1 on Protected Payload message type | NCSC | LS out | Approval | Yes |
Yes
| revised | No | S3‑180388 | |
S3‑180388 | LS to CT1 on Protected Payload message type | NCSC | LS out | Approval | Yes |
Yes
| approved | No | S3‑180315 | |||
7.6.19 | Other work items |   | ||||||||||
7.7 | New Work Item proposals | S3‑180222 | New WID on GBA enhancements for Internet of Things | China Mobile, CATR, China Unicom | WID new | Agreement | Yes |
YesEricsson: it should be a study first and wider in scope, considering discussions in IETF.
Qualcomm: in the objectives, which protocols other than HTTP?
The Chair commented that the overal opinion seemed that the work should start with a study item first.
ORANGE: include 5G in the scope, e.g. SSO in 5G.
Nokia: there is no time to have a new study item given the workload with 5G.
Vodafone expressed their concerns on study items taking out time for 5G items.
BT suggested to handle every normative item in 5G as a priority before heading for study item work.
The Chair pointed out that prioritization will serve that purpose and that contributions can be always accepted as a 3GPP working procedure.
Gemalto: some study items are essential for future normative work,
ORANGE: this should be decided each meeting, not as a general rule.
The Chair decided to use prioritization in the next meetings. Vodafone wanted their objection recorded if this issue was commented in SA plenary; they preferred to have study items delayed until August.
Ericsson asked to delay this study item for the next meeting in order to have internal discussions about it.There may be several studies in here.
There was no agreement and the document was noted and expected to come back for the meeting SA3#91.
| noted | No | ||
S3‑180381 | New SID on GBA enhancements | China Mobile, CATR, China Unicom | SID new | Agreement | No |
Yes
| withdrawn | Yes | ||||
S3‑180335 | New WID for 5G SCAS | Huawei, Hisilicon,Ericsson | WID new | Agreement | Yes |
YesBT: HSS/UDM is a critical element and it should be considered as well.
DT:Consider SBA as well?
China Mobile: we have concerns about the network functions, they could be virtualised. Study the virtualisation of network functions first.
Huawei commented that the work item should focus on the physical elements and focus on the virtualised aspects in a study item.
NTT-Docomo supported the first two objectives.
Alex (BT): assume that the network will be partly virtualised at least even in early stages.
Nokia preferred a study item, but the consensus was to make it as a work item.
| revised | No | S3‑180383 | S3‑180334 | ||
S3‑180383 | New WID for 5G SCAS | Huawei, Hisilicon,Ericsson | WID new | Agreement | Yes |
YesVodafone commented that there isn’t much time to deal with this and that 5G should have preference.
| agreed | No | S3‑180335 | |||
7.8 | Documents on joint meeting with SA6 regarding eMCSec | S3‑180382 | Presentation for Joint SA3/SA6 meeting | NCSC | other | Presentation | Yes |
YesSlide 4: SA6 agreed to the assumptions.
InterSD vs SDS: who makes the decision? SA3 or SA6?
Motorola solutions: InterSD would seem easier for SA6 according to some informal discussions we've had.
Motorola Solutions (SA3): we are OK with this in SA3.
It was noted that the InterSD message must be identifiable. SA6 will take care of the documentation and flows of these messages.
IWF to the client security would be work for SA3. There are no new reference points so we would use existing ones.
It was agreed that service independence aspects should be added.
Slide 8: Discreet listening/viewing
One SA6 opinion was that this should be considered inRel-16. This was agreed.
Police of Netherlands: collection and storage? this is real time.
Peter (NCSC): it's SA6 who decides how and when this data is stored.
Slide 9: Temporary group call/user regroup
SA6 recognises the problem and it needs to be discussed further.Downstream groups face the same issue.
T-Dek (SA6): There are two models: Group ID pre-alocated before the group is formed. SA3 mechanisms are based on this model. Temporary group call is based on the case when the Group ID is not pre-alocated, that is part of the SA1 requirements. It's not appropriate to discard this for the security. We need to enhance the procedure, it's not complete. This is SA6 perspective.
The SA6 Chair commented that it will be decided whether this will go to Rel-15 or Rel-16.
Alan (SA6): it's a deployment decision whether they want to use an unsecure call.
Adrian (SA6) supported that. It's an operational deployment choice.
Peter (NCSC): the media security is mandatory in 3GPP. It's a requirement that wouldn't be applied in this case.
The Chair (SA3) commented that this could be enhanced in Rel-16 but SA6.
Motorola (SA6): It was also commented from an SA6 delegate that cat-F CRs could be brought to enhance this.
Firstnet (SA6): we are ok with having it in Rel-16.
| noted | No | ||
S3‑180402 | LMR interworking key management summary | Harris Corporation | other | Presentation | Yes |
Yes
| noted | No | ||||
8 | Studies |   | ||||||||||
8.1 | Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-15) | S3‑180161 | [FS_MC_Sec] 33880 Interworking eval (InterSD) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| revised | No | S3‑180414 | |
S3‑180414 | [FS_MC_Sec] 33880 Interworking eval (InterSD) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| agreed | No | S3‑180161 | |||
S3‑180162 | [FS_MC_Sec] 33880 Interworking eval (MCData) | Motorola Solutions UK Ltd. | CR | Agreement | Yes |
Yes
| withdrawn | Yes | ||||
8.2 | Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15) | S3‑180060 | Discussion on PC-5 security | KPN | discussion | Endorsement | Yes |
YesHuawei: PC-5 needs to be security protected. This is specified in the solution 8 of the TR. SA2 has concluded their work on this, so no reason to send an LS.
| noted | No | ||
S3‑180115 | Clarification of Introduction of REAR | Huawei, Hisilicon | pCR | Approval | Yes |
YesVodafone: the introduction is too obscure. The whole clause needs rewriting.ORANGE agreed.
Vodafone: it needs to properly introduce the service and be increased in size.
| revised | No | S3‑180405 | |||
S3‑180405 | Clarification of Introduction of REAR | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180115 | |||
S3‑180116 | Delete Editor’s notes in clause 5 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180062 | Resolving Editor's Note in clause 5.3 | KPN | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180067 | Miscellaneous editorials to TR 33.843 | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180063 | Resolving Editor's Note in clause 6.2 | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180117 | Clarification of solution #4 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| merged | No | S3‑180407 | |||
S3‑180064 | Resolving Editor's Note and adding evaluation in clause 6.4.3 | KPN | pCR | Approval | Yes |
Yes
| revised | No | S3‑180407 | |||
S3‑180407 | Resolving Editor's Note and adding evaluation in clause 6.4.3 | KPN,Huawei,HiSilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180064 | |||
S3‑180122 | Add Evaluation for Solution #6 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180065 | Evaluation of solution #6 | KPN | pCR | Approval | Yes |
Yes
| noted | No | ||||
S3‑180120 | Clarification of solution #7 | Huawei, Hisilicon | pCR | Approval | Yes |
YesORANGE: remove "minor" from the impact.
| revised | No | S3‑180408 | |||
S3‑180408 | Clarification of solution #7 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180120 | |||
S3‑180118 | Clarification of solution #8 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180119 | Add Evaluation for Solution #12 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180409 | |||
S3‑180409 | Add Evaluation for Solution #12 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180119 | |||
S3‑180123 | Add Evaluation for Solution #13 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180410 | |||
S3‑180410 | Add Evaluation for Solution #13 | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| approved | No | S3‑180123 | |||
S3‑180066 | Evaluation of solution #13 | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180121 | Conclusion for the Key Issues | Huawei, Hisilicon | pCR | Approval | Yes |
Yes
| revised | No | S3‑180411 | |||
S3‑180411 | Conclusion for the Key Issues | Huawei, Hisilicon,KPN | pCR | Approval | Yes |
Yes
| approved | No | S3‑180121 | |||
S3‑180068 | Adding conclusions for key issues 1,4, and 5 and adding an overal conclusions clause | KPN | pCR | Approval | Yes |
Yes
| merged | No | S3‑180411 | |||
S3‑180061 | Discussion and pCR on authorization | KPN | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180406 | Draft TR 33.843 | Huawei | draft TR | Approval | Yes |
YesIt was argued whether this was going for information or approval.
KPN commented that definitions and abbreviations clauses are empty in the TR and needed to be filled in.
The TR will be sent to the plenary for approval.
| approved | No | ||||
S3‑180412 | Cover sheet TR 33.843 | Huawei | TS or TR cover | Approval | Yes |
Yes
| approved | No | ||||
8.3 | Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15) | S3‑180172 | draft LS on the status of work on interfaces | Huawei & Hisilicon | LS out | Approval | Yes |
Yes
| revised | No | S3‑180436 | |
S3‑180436 | draft LS on the status of work on interfaces | Huawei & Hisilicon | LS out | Approval | Yes |
YesDoing some rewording with the help of Vodafone.
ORANGE found strange that SA3 was asking for information that could be found in SA5 specifications.
| approved | No | S3‑180172 | |||
S3‑180169 | A key issue proposal on security capability for TR33.811 | Huawei, Hisilicon, China Moible, China Unicom, CATR, CATT | pCR | Approval | Yes |
YesVodafone had issues with the term "network operator", there are better terms in SA3 terminology.
ORANGE: the threats don’t seem to be threats, only the last one.
ORANGE: We don’t need to define all security options that are available for a network slice because they are in TS 33.401 already.
NCSC: catalog the options that are available instead of relying on 33.401.
| revised | No | S3‑180437 | |||
S3‑180437 | A key issue proposal on security capability for TR33.811 | Huawei, Hisilicon, China Moible, China Unicom, CATR, CATT | pCR | Approval | Yes |
YesKey issue will verse on the negotiation.
| approved | No | S3‑180169 | |||
S3‑180170 | A key issue proposal on security level | Huawei, Hisilicon, China Moible, China Unicom, CATR, CATT | pCR | Approval | Yes |
YesBT: "level" implies some kind of judgment. Better use "security profile".
NCSC: these are the same key issues as the last one.
Vodafone didn’t like the idea of standardising different security profiles; it would restrict the market. Better to define the parameters that describe the profile instead of defining the profile.
KPN didn’t support this contribution.
NCSC: these requirements are not requirements, they need some work.
It was decided to note this contribution and work on 169.
| noted | No | ||||
S3‑180171 | A key issue proposal on isolation degree | Huawei, Hisilicon, China Moible, China Unicom, CATR, CATT | pCR | Approval | Yes |
YesVodafone: isolation changes second by second in a SBA. It cannot be a criteria. ORANGE supported Vodafone.
Huawei commented that the term "isolation" was used by SA5.
BT commented that SA5 has a catalog of features; when they are not available this doesn’t mean that there is isolation.
Vodafone commented that regardless of what SA5 has worked on, isolation cannot be guaranteed.
The Vice Chair (Alf) encouraged Huawei to work on this offline and come back in the next meeting if they had any agreements.
| noted | No | ||||
S3‑180179 | Confidentiality protection of NSST | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180180 | Confidentiality protection of NSI monitoring data | Huawei, Hisilicon, | pCR | Approval | Yes |
Yes
| approved | No | ||||
S3‑180438 | Draft TR 33.811 | Huawei | draft TR | Approval | No |
Yes
| approved | No | ||||
8.4 | Other study areas | S3‑180109 | The impaction of 256 bit keys for NG areas | CATT | other | Yes |
Yes
| withdrawn | Yes | |||
S3‑180110 | The clarification of the entropy CK and IK | CATT | other | Yes |
Yes
| withdrawn | Yes | |||||
8.5 | New study item proposals | S3‑180187 | Discussion paper on voice service continuity between 5G and 3G | China Unicom, Huawei, HiSilicon, ZTE, CATR, OPPO | discussion | Yes |
Yes
| noted | No | |||
S3‑180188 | New study item on Security aspects of single radio voice continuity from 5G to 3G | China Unicom, Huawei, HiSilicon, ZTE, CATR, OPPO | SID new | Yes |
YesAlex (BT): 2G needs to be removed from here. The SA plenary position was to agree to do this for 3G. This could be a WID for Rel-16 instead, and wait for the work done in SA1.
KPN:opening a WID, how do we capture our thoughts? Keep it as SID.
NTT-Docomo: Remark that this is 5G to UTRAN CS.
| revised | No | S3‑180384 | ||||
S3‑180384 | New study item on Security aspects of single radio voice continuity from 5G to 3G | China Unicom, Huawei, HiSilicon, ZTE, CATR, OPPO | SID new | - | Yes |
Yes
| agreed | No | S3‑180188 | |||
S3‑180189 | Discussion paper on encrypted traffic detection and verification | China Unicom, Huawei, HiSilicon, ZTE, CATR, OPPO | discussion | Yes |
Yes
| noted | No | |||||
S3‑180190 | Study on security aspects of encrypted traffic detection and verification | China Unicom, ZTE, Huawei, HiSilicon, CATR, OPPO | SID new | Yes |
YesEricsson: wait for SA2 to work further.Nokia agreed.
There wasn't much support for this Study item.
| noted | No | |||||
S3‑180205 | new SID on security of 5WWC | Huawei, Hisilicon | SID new | Agreement | Yes |
YesORANGE: fourth bullet point, replace equipment with UE. The only equipment that can access the public network are the UE.
Broadcom: consider the solution/s that SA2 will find.
DT: subscription privacy of wired network entity? What's that?
Qualcomm: time scales are too tight, the workload is high and this is not realistic.
Vodafone: we object to this, we don’t have the time to work on this study item in SA3 given the workload.
NTT-Docomo: tell SA that security work in this time scale is not realistic.
BT: this work needs to be done, and the interest is evident from the list of supporting companies.
The Chair suggested to work on this offline and bring it back for the next meeting.
Vodafone commented that the list of supporting companies are coming from the SA2 work, not for this work item.
| noted | No | ||||
9 | Review and Update of Work Plan | S3‑180002 | SA3 Work Plan | MCC | Work Plan | Yes |
Yes
| noted | No | |||
S3‑180005 | Work Plan input from Rapporteurs | MCC | other | Yes |
Yes
| revised | No | S3‑180346 | ||||
S3‑180346 | Work Plan input from Rapporteurs | MCC | other | - | No |
Yes
| noted | No | S3‑180005 | |||
10 | Future Meeting Dates and Venues | S3‑180004 | SA3 meeting calendar | MCC | other | Yes |
Yes
| revised | No | S3‑180366 | ||
S3‑180366 | SA3 meeting calendar | MCC | other | - | No |
YesAd-hoc in July 2018 was removed.
| noted | No | S3‑180004 | |||
11 | Any Other Business |   | ||||||||||
12 | Close |   |