Tdoc List

2017-05-22 10:30

TDoc Title Source Type For Agenda Avail Treated Decision Wdrn Replaced-by Replaces
S3‑171000 Agenda WG Chairman agenda  
2Approval of Agenda and Meeting Objectives
Yes
Yes
approved No    
S3‑171001 Report from SA3#86 MCC report  
4.1 Approval of the report from SA3#86 and SA3 ad-hoc
Yes
Yes
approved No    
S3‑171002 Report from SA3 Adhoc MCC report  
4.1 Approval of the report from SA3#86 and SA3 ad-hoc
Yes
Yes
approved No    
S3‑171003 SA3 Work Plan MCC Work Plan  
9Review and Update of Work Plan
Yes
Yes
noted No    
S3‑171004 Report from last SA meeting WG Chairman report  
4.2Report from SA #75
Yes
Yes
noted No    
S3‑171005 SA3 meeting calendar MCC other  
10Future Meeting Dates and Venues
Yes
Yes
noted No    
S3‑171006 Work Plan input from Rapporteurs MCC other  
9Review and Update of Work Plan
Yes
Yes
revised No S3‑171446  
S3‑171007 Middlebox security protocol ETSI TC CYBER LS in  
6.9TC-CYBER
Yes
Yes
replied to No    
S3‑171008 Reply LS on update to key management for application signalling C1-171654 LS in  
5Items for early consideration
Yes
Yes
replied to No    
S3‑171009 LS on MCData protocol and choice of media plane protocol C1-171820 LS in  
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
replied to No    
S3‑171010 Reply LS on security in E-UTRA-NR Dual Connectivity C1-171941 LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171011 Reply LS on LTE call redirection to GERAN C1-171945 LS in  
7.6.1SAE/LTE Security
Yes
Yes
noted No    
S3‑171012 Reply LS on security aspects of external xMB interface for TV services C3-171264 LS in  
5Items for early consideration
Yes
Yes
replied to No    
S3‑171013 LS on Support of Explicit Bootstrapping in ERP C4-172269 LS in  
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
Yes
replied to No S3‑171379  
S3‑171014 Reply LS on eDRX Configuration and IMSI-paging C4-172276 LS in  
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑171015 Liaison statement to ETSI 3GPP SA3 ETSI TC CYBER QSC LS in  
6.9TC-CYBER
Yes
Yes
noted No    
S3‑171016 LS to RIFS and SA3 on Diameter Security GSMA PACKET LS in  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesNokia was in favour of tackling on this work and answer to GSMA. Deutsche Telekom commented that there was no action needed. KPN: we did something in security 10, we can mention in a reply. It was agreed to reply to the LS in 540 about the same topic.
noted No    
S3‑171017 LS on LTE call redirection to GERAN R2-169124 LS in  
7.6.1SAE/LTE Security
Yes
Yes
noted No    
S3‑171018 LS on mobility enhancements for NB-IoT R2-1702290 LS in  
7.6.14Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑171019 LS on LTE call redirection to GERAN R2-1702388 LS in  
7.6.1SAE/LTE Security
Yes
YesDocomo: Mandating user interaction will not work for LTE devices that have no user. Nokia: Initial Attach: UE authenticated, the attack is possible, there is no solution now. This LS refer to Mobile terminated voice call: there are two solutions, in RAN2 and CT1. 360 was concerned about the initial attach scenario. The Chair clarified that this wasn’t addressed in the LS.
replied to No    
S3‑171020 LS on providing WT MAC address to the UE using eNB signalling R2-1702440 LS in  
7.6.1SAE/LTE Security
Yes
Yes
replied to No    
S3‑171021 LS to SA3 on actions for integrity check failure on SgNB R2-1703959 LS in  
8.3.18Other
Yes
Yes
replied to No    
S3‑171022 Reply LS on SA3 LS in S3-170944 “LS on security termination for the User Plane in 5G” R2-1703960 LS in  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDeutsche Telekom: what does "low" mean exactly? It's ambiguous and I'm not sure how this impacts our security design. Nokia: it refers to the timing part.DU and CU are almost co-located. KPN agreed with this being too ambiguous. Ericsson: it's saying that latency won’t be a problem. Docomo: it says that they asume that there is no latency.
noted No    
S3‑171023 Reply LS on security in E-UTRA-NR Dual Connectivity R2-1703961 LS in  
8.3.18Other
Yes
Yes
replied to No    
S3‑171024 LS on paging remote UEs over relays R2-1703967 LS in  
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
noted No    
S3‑171025 Reply LS on mobility enhancements for NB-IoT UEs R3-170896 LS in  
7.6.14Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑171026 LS on eDRX Configuration and IMSI-paging R3-170908 LS in  
6.13GPP Working Groups
Yes
YesNokia: no implication on us, but CT4 and RAN3 need to align. Docomo, DT: some info is being revealed, so this can have repecursions. It was agreed to follow these discussions closely for possible repercusions.
noted No    
S3‑171027 Response LS on Progress on Security for LWIP R3-171272 LS in  
7.6.1SAE/LTE Security
Yes
Yes
noted No    
S3‑171028 LS on Status of Higher-Layer Functional split between Central and Distributed unit R3-171306 LS in  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
noted No    
S3‑171029 Reply LS on N2 and N3 reference points for 5G system R3-171401 LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171030 LS on the support of Unicast and Groupcast transmission over PC5 for eV2X RP-170841 LS in  
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
noted No    
S3‑171031 Reply LS on applicability of WLAN emergency numbers on 3GPP access S1-171446 LS in  
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑171032 Reply LS on UE-to-NW relaying S2-170398 LS in  
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
postponed No    
S3‑171033 Reply LS on SeDoC related authentication procedure S2-171615 LS in  
6.13GPP Working Groups
Yes
YesNokia found the response satisfactory.
noted No    
S3‑171034 LS on PC5 Secure Communication S2-171621 LS in  
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
postponed No    
S3‑171035 Reply LS to LS on applicability of WLAN emergency numbers on 3GPP access (C1-170513/S2-171630) S2-172507 LS in  
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑171036 LS on Security Aspects Related to Non-3GPP authentication for (re)registration S2-172523 LS in  
8.3.18Other
Yes
Yestdoc 346 addresses this issue.
replied to No    
S3‑171037 LS on E-UTRA in NG-RAN (5G System) S2-172730 LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171038 Reply LS to SA3 on standardization of Northbound SCEF API S2-172738 LS in  
6.13GPP Working Groups
Yes
YesVodafone thought that the response included wrong statements. No architecture changes are required to enable EMDSDP. BT: do we need to change anything to expose capabilities to a higher layer? Vodafone: BEST is just user data, transparent at this point. You can see from the Attach that is a BEST service. This LS had to be taken offline for further consideration from Vodafone. Huawei commented that there was no concerns and no response was needed. Vodafone: we have covered everything and there is nothing else to do. This was agreed.
noted No    
S3‑171039 Reply LS to LS on state of SA3 discussions on NG security architecture S2-172861 LS in  
8.3.18Other
Yes
YesVodafone: Combining two different PLMNs, two different accesses, two different technologies? Having two different Home Networks? This is what the LS implies. Orange supported Vodafone. Qualcomm: it's not about having two HPLMNs.
noted No    
S3‑171040 LS on 5GS Security aspects seeking resolution S2-172862 LS in  
8.3.18Other
Yes
Yes
replied to No    
S3‑171041 LS on Use of the long-term identities for Charging in the VPLMN for 5G S5-171890 LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171042 Reply LS on addition of KMS URI to configuration parameters S6-170412 LS in  
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
noted No    
S3‑171043 LS on mission critical communication interworking security issues S6-170463 LS in  
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
replied to No    
S3‑171044 Reply LS to NGMN V2X Task-Force SP-170278 LS in  
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
noted No    
S3‑171045 Report from emeeting DoNAS MCC report Approval
4.1 Approval of the report from SA3#86 and SA3 ad-hoc
No
No
withdrawn Yes    
S3‑171046 Section 5.6.4.2.2 - Resolution of Editor’s Notes InterDigital, Inc. pCR Approval
8.3.6Authorization
Yes
Yes
left for email approval No    
S3‑171047 Section 5.6.4.3.2 - Resolution of Editor’s Notes. InterDigital, Inc. pCR Approval
8.3.6Authorization
Yes
Yes
left for email approval No    
S3‑171048 Section 5.6.3.3.1, Key Issue Details InterDigital, Inc. pCR Approval
8.3.6Authorization
Yes
Yes
left for email approval No    
S3‑171049 TCG progress report InterDigital, Inc. report Information
6.7TCG
Yes
Yes
noted No    
S3‑171050 Support of 256-bit Keys and Algorithms in 5G AT&T, InterDigital, MITRE discussion Decision
6.3ETSI SAGE
Yes
YesDocomo: it makes sense when we want to increase the security of the overall system. The kind of attacks with quantum computers require a large number of resources. This large number of resources could attack anything really. Does this justify the investment for the overall security of the system? AT&T found this justified. Gemalto supported the creation of a WID/SID to have longer keys for the algorithms. Docomo commented that there is more than extending the radio interface to 256 bits. All authentication solutions would need to be reevaluated. There's a lot of additional work. Vodafone: how does this interact with the SAGE work? Interdigital,, Gemalto supported AT&T's proposal for the work item. BT would support depending on the scope. The Chair commented that there are more questions to be answered before starting the work. Starting now would impact the work on the phae one of 5G. Qualcomm: we made a decision to use 128bits for the phase one. This can wait for phase 2. Gemalto: do we need to tell SAGE that we won’t include QSC in phase one? AT&T: I'm ok with not using 256bits in phase one, but SAGE should start the work soon so we have an answer when SA3 tackles this issue. Interdigital: we should tell SAGE when to start. Nokia: we are happy with 128 bits in phase one (specified by mid 2018).We don’t need longer keys algorithms by mid 2018. we might need them after that.
noted No    
S3‑171051 Quantum Safe Cryptography and Security Choices for 5G TCG, InterDigital, AT&T, MITRE discussion Presentation
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesNokia: specificying this would be fast but to have it in the UE may take long. Whatever we encrypt today, does it have to be like this in 20 years?Does it still matter? That's the question to answer.Qualcomm agreed; a threat analysis would be needed to know what we would gain with longer keys. NCSC: the current keys are considered until 2050. Nothing regarding 128 bits.
noted No    
S3‑171052 EPS Authentication with hiding keys assisted by UE - EPS AKA+ ZTE, China Unicom pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No   S3‑170608
S3‑171053 Update of solution 8.5 ZTE pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No   S3‑170609
S3‑171054 Key hierarchy when using UP security function ZTE, China Unicom pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No   S3‑170697
S3‑171055 Hiding keys exchanged between serving network nodes ZTE pCR Approval
8.3.3Security context and key management
Yes
Yes
left for email approval No   S3‑170611
S3‑171056 Remove EN of security requirements of user plane traffic differentiation ZTE, China Unicom pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
YesEricsson: if we intercept packets we have to describe the presence of a node being simulated, and that doesn't appear here. It was finally approved.
approved No    
S3‑171057 Miscellaneous changes to Chapter 6.6 of TS 33.185 CATR pCR  
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesNokia and Qualcomm considered that the privacy enhancements should be left open for discussion. Huawei clarified that the "randomize" statement was coming from SA2. Deutsche Telekom disagreed, they were not in favout of having this. Nokia: this is not related to security, let CT take charge of this. ORANGE: V2X application is not specified in 3GPP. Ericsson commented that the tracking issue needed to be considered at the application layer, this was discussed before. Everything was agreed except the statement on privacy enhancements that had to be taken offline. The privacy statement was covered by the note in tdoc 319
revised No S3‑171472  
S3‑171058 LS on Use of the long-term identities for Charging in the VPLMN for 5G S3i170148 LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171059 Reference to list of 3GPP vendor specific EAP methods Ericsson CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171526  
S3‑171060 Alignment of 3GPP-vendor specific EAP method names with TS 24.302 Ericsson CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171527  
S3‑171061 LS on LI requirements for CIOT services including BEST services S3i170163 LS in  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
YesORANGE: Why the HPLMN needs to have LI capabilities? Home Office: it doesn’t matter if you are roaming or not.
replied to No    
S3‑171062 Reply LS on Middlebox Security Protocol S3i170166 LS in  
6.9TC-CYBER
Yes
YesBT: keep the commercial network side and the LI side separate, they have different requirements.
noted No    
S3‑171063 LS on IMSI availability in the VPLMN S3i170167 LS in  
8.3.18Other
Yes
YesVodafone: Multiple subscriptions with different IMSIs has never been discussed in 5G. Deutsche Telekom: if this hasn't been addressed in SA1 or SA2, let's not worry about it. Nokia: we assume that the UE hasn't been tampered with and the mechanism is to stop the home network relying from the visited network in the three approaches. Home Office: in SA3-Li we are happy without multiple subscriptions if this is the assumption. T-Mobile: Solution one is preferred.
replied to No    
S3‑171064 TR 33.885 EN Cleanup Sec 3.1 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171065 TR 33.885 EN Cleanup Sec 4 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171066 TR 33.885 EN Cleanup Sec 5 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171067 TR 33.885 EN Cleanup Sec 5.3 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171068 TR 33.885 EN Cleanup Sec 5.5 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesNokia suggested a rewording of the note. Vodafone: it is strange that the TR has different solutions depending on the region. The text should say that some countries have strong requirements some have not.
revised No S3‑171476  
S3‑171069 TR 33.885 EN Cleanup Sec 5.7 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
merged No S3‑171476  
S3‑171070 TR 33.885 EN Cleanup Sec 5.8 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesChange from "requirements" to "potential requirements".
approved No    
S3‑171071 TR 33.885 EN Cleanup Sec 5.9 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesVodafone had issues with the sentence above the note. Huawei: we assume that the V2X service is the LTE service. Authentication of V2X enabled UE is ambiguous. Vodafone: there are many inaccurate issues here, we shouldn’t send the TR for approval. What’s the purpose if the TR is not accurate enough? The Chair commented that we can send the TR for approval and stop the work anyway. Alf (Docomo): are we going to use this TR for further work? We have the TS already. Marcus (Huawei): bad idea to withdraw the TR.
revised No S3‑171477  
S3‑171072 TR 33.885 EN Cleanup Sec 5.11 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171073 TR 33.885 EN Cleanup Sec 5.16 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
merged No S3‑171478  
S3‑171074 TR 33.885 EN Cleanup Sec 6 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171075 TR 33.885 EN Cleanup Sec 6.1.1 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171076 TR 33.885 EN Cleanup Sec 6.3 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171077 TR 33.885 EN Cleanup Sec 6.5 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171078 TR 33.885 EN Cleanup Sec 6.6 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
revised No S3‑171479  
S3‑171079 TR 33.885 EN Cleanup Sec 6.8 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171080 TR 33.885 EN Cleanup Sec 6.9 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171081 TR 33.885 EN Cleanup Sec 6.12.2 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171082 TR 33.885 EN Cleanup Sec 6.13 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171083 TR 33.885 EN Cleanup Sec 6.14.2 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171084 TR 33.885 EN Cleanup Sec 6.15 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171085 TR 33.885 EN Cleanup Sec Annex D Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesMCC commented that the link should be added to the references clause of the document.
revised No S3‑171481  
S3‑171086 TR 33.885 EN Cleanup Sec Sec Annex X Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171087 Misc Changes to TS 33.185 Sec 6.5 Huawei, HiSilicon pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
revised No S3‑171468  
S3‑171088 Abbreviations in TS 185 Huawei, HiSilicon pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171089 Liaison Statement on 5G Identity and Access Management GSMA LS in  
8.3.18Other
Yes
YesBT: their concern here is the identities in IoT.We would duplicate work that is being done. Vodafone: we will get requirements from SA1, not from here.
noted No    
S3‑171090 report from 3GPPSA3-Emeeting on DoNAS(NB-IOT) VODAFONE Group Plc report Information
7.6.14Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑171091 Report of 3GPPSA3-Emeeting on DoNAS(NB-IOT) VODAFONE Group Plc report Approval
4.1 Approval of the report from SA3#86 and SA3 ad-hoc
Yes
YesOfficial report of the emeeting on DoNAS, prepared by Vodafone.
revised No S3‑171447  
S3‑171092 draft TSxx.xxx BEST TS v0.0.1 (status following SA3#86bis) VODAFONE Group Plc other Information
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
noted No    
S3‑171093 pCR to BEST TS xx.xxx v 0.0.1 - changes agreed at BEST adhocs since Busan VODAFONE Group Plc other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171094 draft TSxx.xxx BEST v0.0.2 - BEST TS including S3-171093 as agreed in conf calls VODAFONE Group Plc other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
revised No S3‑171538  
S3‑171095 pCR to BEST TS xx.xxx v0.0.2 - Addition of error codes VODAFONE Group Plc other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
No
No
withdrawn Yes    
S3‑171096 New WID on Study on Long Term Key Update Procedures VODAFONE Group Plc WID new Agreement
8.6.5Other study items
Yes
YesBT: a lot of work will be done somewhere else.We will support the SID. TIM: the attacker will be able to find the new key after being compromised with the first one. What's the point? Vodafone: it's a way of better protecting yourself. Intel: remote SIM provisioning would be a solution for this? Vodafone: remote SIM provision is heavy and costly. It is not the only solution. Telia Sonera: it seems that you are ignoring the GSMA work. Vodafone: GSMA work may find different solutions that fit different use cases from us. Deutsche Telekom supported this SID. Vodafone commented that they have some potential solutions in mind and some examples can be found in TR 33.899. KPN supported this SID. Ericsson: is this related to 5G? Vodafone: it's applicable to 5G, but potentially to LTE, UMTS and so on. ORANGE: remove everything solution specific from the justification. We don’t need to say that we need something between the UE and the HSS, or that we will have a potential standard for that. This is coming from a solution in the TR 33.899 from 5G. China Mobile supported this SID. Gemalto: impacts of the algorithms.BT supported this. ORANGE: out of scope of 3GPP, it doesn't have to be part of the objectives. G&D: support of no algorithms in here. Other supporters were added (e.g. 360.) ORANGE: why changing the identifiers? We need a justification for this. Vodafone: it's part of the study.It's not a study about changing profiles between operators.ORANGE commented that they wanted this into the justification. G&D: identifiers can still be an output of the study, we can remove this statement to avoid confusion.
revised No S3‑171448  
S3‑171097 pCR to TR33.899 - corrections to solution 7.2 VODAFONE Group Plc pCR Agreement
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171098 pCR to align interim agreement on KI#1.3 and KI#1.4 KPN pCR Approval
8.3.1Security architecture
Yes
Yes
approved No    
S3‑171099 pCR to 33.899 to extend solution #7.7 on revealing long-term identity KPN pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171100 Updating solution #7.14 “Privacy protection of permanent or long-term subscription identifier using ABE” TELECOM ITALIA S.p.A. pCR Approval
8.3.7Subscription privacy
Yes
YesNokia: why deleting the first editor's note? It's still valid. Telecom Italia: One publick key is easier to trust than multiple keys. It is a question of simplicity. There are a lot of certification authorities, certificates and so on. This was agreed by Nokia. Vodafone: the issue is the management of the master key. What happens if it is compromised, how fast we can change it?That's our concern.
approved No    
S3‑171101 Evaluations and conclusions in clause 7 TELECOM ITALIA S.p.A. pCR Approval
8.3.7Subscription privacy
Yes
Yesmerged in 508 for evaluation and 509 for the conclusions.
merged No S3‑171508  
S3‑171102 Update of key issues of security area #11 Security visibility and configurability LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171103 Update of solution #11.2 Security visibility solution LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171104 Update of solution #11.3 Security configurability solution LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171105 Update of solution #11.4 UE trigger of key and ID refresh LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171106 Procedure for UE security indication and configuration LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171107 Conclusion for Security area #11: Security visibility and configurability LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171108 Questions and agreement for Security area #11: Security visibility and configurability LG Electronics pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
merged No S3‑171557  
S3‑171109 Clarification of ID change for V2X PC5 LG Electronics pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171110 Update of V2X UE privacy solution with LI support LG Electronics pCR Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171111 New SID on security aspects of 3GPP support of advanced V2X services LG Electronics SID new Approval
8.6.5Other study items
Yes
Yes
noted No    
S3‑171112 Updated SID on architecture enhancements for 3GPP support of advanced V2X services LG Electronics SID new Approval
8.6.5Other study items
Yes
YesThe Chair commented that SA3 should do their own SID document and not integrate it wit the SA2 WID. BT commented that the low latency issue hasn't been dealt with and it is not included in the objectives. Huawei: this is way too early for us. I don’t believe that there is anything to look for us at this early stage. Qualcomm supported but better to wait for a couple of meetings until SA3 gets more material from SA2. ORANGE agreed. The number of companies agreeing to delaying were the same as the number of companies who wanted to start. The Chair commented that LG could bring the SID with contributions to have the work started if the progress in SA2 allowed to do that. The SID was noted.
noted No    
S3‑171113 [FS_MC_SEC] MCData Payload security NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
YesAirbus: no mechanisms for OTA distribution? NCSC: not defined yet, this is done for alignment.
approved No    
S3‑171114 [FS_MC_SEC] MCData Key Management NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
revised No S3‑171454  
S3‑171115 [FS_MC_SEC] MCData Key Distribution NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
revised No S3‑171455  
S3‑171116 [MCSEC] Protection of full XML document NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171117 Reply LS on update to key management for application signalling NCSC LS out Approval
5Items for early consideration
Yes
YesEricsson: On point 3, rhere are backward compatibility issues with Rel-13 and we are not addressing CT1 concerns.
revised No S3‑171451  
S3‑171118 [MCSEC] Adding MSCCK functionality for back-compatibility NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
YesEricsson: how do you decide between the two procedures, MSCCK and MuSiK? NCSC: it's configured in the server.
revised No S3‑171457  
S3‑171119 [MCSEC] Discussion doc on update to MCPTT Multicast signalling NCSC discussion Discussion
5Items for early consideration
Yes
Yes
noted No    
S3‑171120 [FS_MC_SEC] Evaluation of Application Signalling Protection (Sol #1.4) NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171121 [FS_MC_SEC] Adding MSCCK functionality for back-compatibility into evaluation clause NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
revised No S3‑171452  
S3‑171122 [FS_MC_SEC] MCData Evaluation NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171123 [MCSEC] Update to MCData security NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
YesAirbus wanted to add a note on the open issues of authenticated payload.This wasn't agreed.
revised No S3‑171459  
S3‑171124 [MCSEC] Addition of descriptive clauses NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
No
No
withdrawn Yes    
S3‑171125 Interim Agreements: How to implement increased home control in EPS AKA* Ericsson pCR Approval
8.3.2Authentication
Yes
YesEricsson: This shows that the solution from Nokia in 373 is not valid. Nokia: in this case remove Note 1. Docomo:How does the UE know when to do what? Nokia: When it does the 5G authentication. NAS protocol between the UE and the 5G core must be different from the 4G core so the UE knows it's in the 5G network. It was suggested to add an editor's note on the need of deciding between the solution in 376 and 314.
revised No S3‑171500  
S3‑171126 Annex on the additional EAP methods Ericsson, Samsung, Qualcomm Incorporated, Nokia, Intel, Huawei pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesIt was argued the use of "can"; MCC commented that in this context it was better to use "can" instead of "may". Revised to address other comments.
revised No S3‑171506  
S3‑171127 Adding references to GIA4, GEA5/GIA5 and stage 3 GMM specifications, and removing corresponding editor's notes. Ericsson CR Approval
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
revised No S3‑171534  
S3‑171128 Adding references to GIA4, GEA5/GIA5 and stage 3 GMM specifications, and removing corresponding editor's notes. Ericsson CR Approval
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
revised No S3‑171535  
S3‑171129 reply LS on LTE call redirection to GERAN Ericsson LS out Approval
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171554  
S3‑171130 Update of Key issue #4.2 Security requirements on gNB Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171131 Questions and agreements on key issue #4.2 Security requirements on the gNB Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
noted No    
S3‑171132 pCR to 33.501: requirements on gNB Ericsson pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesInterdigital wondered why the interface is IP-based only in 5.2.5. Ericsson: this is in line with the split architecture that is being discussed in RAN.We agree with removing it if needed. Telia Sonera recommended to have a note on the general clause. Qualcomm: why remove 5.3.2? These requirements also apply to gNodeB. It was commented that SCAS requirements for eNodeB could also apply here. Deutsche Telekom: eNodeB SCAS is not ready yet,a bit premature to refer to it now.
revised No S3‑171493  
S3‑171133 Questions for Key issue #7.2: Storage and configuration of key related to encryption of permanent identifiers Ericsson pCR Approval
8.3.7Subscription privacy
Yes
YesORANGE: we are not trying to specify 3GPP specific methods for the question "By which methods shall it be allowed to configure the keys related to concealing the permanent subscription identifier?". This was asked to be in the minutes. Suggested a third question: If mulitple entities are allowed which is their priority?This was agreed.
revised No S3‑171549  
S3‑171134 Security aspects of xMB reference point Ericsson, Qualcomm CR Agreement
5Items for early consideration
Yes
YesNokia pointed out that the LS states that there is further cosnideration needed but that we are replying with an answer already.
agreed No    
S3‑171135 Alignment of LWIP to stage 3 Ericsson CR Approval
7.6.1SAE/LTE Security
Yes
YesBT: XW interface is missing from the figure H.1-1. Figure not changed in the CR, to be fixed.
revised No S3‑171555  
S3‑171136 KI#7.2_question_agreement_imsi_priv_privay_in_phase1 Ericsson, Nokia, Vodafone, Intel, KPN, LGE, China Mobile, CATT, NEC, Juniper Networks, T-Mobile, Telenor, Deutsche Telekom, Morpho, IPCom, Telecom Italia pCR Approval
8.3.7Subscription privacy
Yes
YesHuawei queried about the emergency calls. Vodafone: Protected identity will impact emergency calls? This is an open issue. BT: Non-3GPP accesses are in scope? E.g. using MAC addresses. Vodafone: it’s still the IMSI for these kind of accesses. BT: in WLAN there is a solution proposed by Apple, for example. Interdigital: what are we trying to protect here? The IMSI? Nokia: Subscription permanent identifier is what we try to protect here. Huawei: it's allowed without subscriptions. Vodafone: most countries forbid this, without subscription. ORANGE: format of the subscription identifier is not defined in SA3. Interdigital: in the TR we have a subscription identifier definition. It's not clear what we want to protect here. ORANGE: the definition is for us alone, not for the overall 3GPP. SA2 is working on the subsucription identifier. Ericsson: is the complete identifier protected? That's an issue as well. On the emergency call part, Vodafone preferred "long term" over "permanent subscription identifier".Nokia replied that that would be a different key issue. A note was added for this.
revised No S3‑171511  
S3‑171137 KI#7.2_quesions_imsi_priv_solution_types Ericsson, Nokia, Vodafone, Intel, KPN, LGE, China Mobile, CATT, NEC, Juniper Networks, TeliaSonera, Deutsche Telekom, T-Mobile, Morpho, IPCom, Telecom Italia pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No    
S3‑171138 KI#7.2_agreements_imsi_priv_solution_types Ericsson, Nokia, Vodafone, Intel, LGE, China Mobile, CATT, NEC, Juniper Networks, Deutsche Telekom, T-Mobile, Morpho, IPCom pCR Approval
8.3.7Subscription privacy
Yes
YesVodafone: wording is not correct ("significant hassles, last resort"). Second and third bullets were decided to be removed. AT&T: according to SA plenary, there is a phase going to an existing EPC core whereas a "1.5" phase it goes to the 5G core. The Chair confirmed that the understanding of "phase one" for SA3 is the one with 5G core. Interidigital: hard to answer the question when we don’t know what to protect. ORANGE: there are no contributions that address this issue. Qualcomm wanted to have HN pseudonym as possible solution in E72A2. ORANGE agreed with the answer no for that question. This was conceded by Qualcomm. Huawei disagreed with E72C2, but as it was the same discussion as the show of hands, the group procceeded with the "no". For E72D2, Huawei also disagreed. They proposed to have options for the privacy solution but ORANGE rejected this categorically. It was decided to agree with this one as well. AT&T: PKI management; there automated procedures for millions of them. There's no such complexity of PKIs.
revised No S3‑171513  
S3‑171139 KI#7.1_KI#7.4_questions_agreements_GUTI Ericsson, Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
merged No S3‑171550  
S3‑171140 KI#7.3_KI#7.5_KI#7.7_KI#7.8_KI#7.9_questions_agreements Ericsson, Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171141 Conclusion_bidding_down_aspects_privacy_(was_S3-170879) Ericsson, Nokia, Vodafone pCR Approval
8.3.7Subscription privacy
Yes
Yes
merged No S3‑171509  
S3‑171142 Evaluations_two_pseudonym_solutions_(was_S3-170746) Ericsson pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171143 Update_solution_#7.15_addressing_LI_aspects_(was_S3-170896) Ericsson pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171144 Update_KI_#7.9_privacy_aspects_of_MCC_MNC_(was_S3-170748) Ericsson pCR Approval
8.3.7Subscription privacy
Yes
YesVodafone: it doesn't addess the case of miultiple subscriptions for the same user.
noted No    
S3‑171145 Key issue update, questions and agreements for key handling in state transition from RRC_INACTIVE state to RRC_CONNECTED state Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
revised No S3‑171573  
S3‑171146 Update of KI #4.4 and questions and agreements on KI #4.4 Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
revised No S3‑171571  
S3‑171147 EN-DC in option 3a/3x Ericsson pCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesQualcomm disagreed. Ericsson pointed out that solution one was what was given to SA3 and that needed to be the working assumption. Qualcomm: the solution is not being imposed according to the LS from RAN. It's a preference. Huawei supported the Ericsson proposal. Nokia commented that both CT1 and RAN2 feedbacks were slightly different from each other and from there SA3 should study which one to use. Qualcomm: ask CT1 in a LS if they have any issues with SA3 using variant one and wait for the next meeting.
revised No S3‑171486  
S3‑171148 Some comments on proposed text for supporting Option 3 Ericsson pCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesSome of its content will go into 487
merged No S3‑171487  
S3‑171149 Security solution for key handling in state transition from RRC inactive state to RRC connected state Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171150 Security solution on mobility in RRC_INACTIVE state Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171151 Clarifications on solution #4.10 (detection type solution) Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171152 Minor clarification on KI #4.14 regarding constant RAN level identifiers Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171153 Questions and interim agreements for KI #4.5, KI #4.6, KI #4.9, KI #4.12, KI #4.15, KI #4.16, KI #4.17 Ericsson pCR Approval
8.3.4RAN security
Yes
YesQualcomm: E4.17, do we need this level of detail in the questions? Huawei liked the questions as they were.It was agreed to leave it as it was.
revised No S3‑171569  
S3‑171154 Questions and interim agreements for KI #8.3 CATT pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171155 Evaluation for Network Slicing Security Solution #8.7 CATT pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171156 Network Slicing Security Architecture and General Procedure CATT pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171157 Question for NG2 handover China Mobile, Huawei pCR Approval
8.3.4RAN security
Yes
YesOverlaps with 1153. It was agreed to merge the question with E.4.9 in 1153.
merged No S3‑171569  
S3‑171158 Questions for security of Xn handover China Mobile pCR Approval
8.3.4RAN security
Yes
Yes
merged No S3‑171569  
S3‑171159 Questions for Security algorithm negotiation between UE and RAN China Mobile pCR Approval
8.3.4RAN security
Yes
YesOverlaps with 1153. Ericsson: it’s the same as our document so we can merge. Huawei didn’t agree that they were the same. Qualcomm: how to define the negotiation? Leave the Interim agreement TBD. It was decided to merge with 1153.
merged No S3‑171569  
S3‑171160 Conclusion and interim agreements for KI# 4.4 and KI #4.7 China Mobile pCR Approval
8.3.4RAN security
Yes
YesThe first part overlaps with 1146. Huawei supported the Interim agreement in E.4.7..Both were agreed.
revised No S3‑171572  
S3‑171161 Update of Key Issue #4.7 China Mobile pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171162 pCR to adding new key issue: User location confidentiality China Mobile pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171163 pCR remove the editor’s note in solution #7.10 China Mobile pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171164 pCR update the solution #7.10 China Mobile pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171165 Questions related to concealing permanent subscription identifier in key issue #7.1 China Mobile pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171166 Questions related to Termination of EAP method in key issue #2.1 China Mobile pCR Approval
8.3.2Authentication
Yes
YesQualcomm: we have this already in the TS.
noted No    
S3‑171167 Questions related to the Usability of legacy USIM in key issue #2.1 China Mobile pCR Approval
8.3.2Authentication
No
Yes
revised No S3‑171351  
S3‑171168 Questions and agreement for KI #8.2 China Mobile pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171169 Questions and agreement for KI #8.3 China Mobile pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171170 Discussion and pCR for V2X privacy China Mobile pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesORANGE: the first requirement looks like a legal requirement on the network. We don’t use the term pseudonomity in 33.401. Vodafone: we have agreed on confidentiality being the same as in LTE. I don’t see why we need this clause at all.It's saying "for the Uu interface we need to use the LTE specs". LG: this is a different case. This document overlapped with tdoc 319 and was merged with it.
merged No S3‑171473  
S3‑171171 Resolving non-technical editor’s notes China Mobile pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No    
S3‑171172 Resolving technical editor’s notes and adding sections to align with TS33.117 China Mobile pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No    
S3‑171173 Discussion for User-to-User DDoS Attack Prevention China Mobile discussion Endorsement
8.6.5Other study items
Yes
YesDocomo: have you seen this happening to the network? Do you think that standards can define interfaces to fix this? China Mobile confirmed that they have seen this happening. They don’t propose any solutions but they would like to address this. ORANGE: are you proposing a DoS from the user to the network? China Mobile: the attack comes from software, not the UE. ORANGE: do you foresee something that needs to be done in 3GPP? Does GSMA know this problem?It's more appropiate to raise this issue in there.
noted No    
S3‑171174 Questions and Interim Agreements on Security for Handover within 5GS NEC EUROPE LTD pCR Approval
8.3.1Security architecture
Yes
YesNokia: we don’t need a question for this. Ericsson doubted whether the first question was needed. Handover will be studied but this contribution depends on other contributions that need to be agreed as well. They depend on the strcuture of the TR. Qualcomm: why do we need this question for the study?Of course we need to study it in phase one,it's obvious.
noted No    
S3‑171175 Key Issue on Handover within 5G Systems NEC EUROPE LTD pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171176 Update of Solution #1.31 NEC EUROPE LTD pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171177 Update of Solution #1.32 NEC EUROPE LTD pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171178 Inter NG RAN Handover with Xn interface NEC EUROPE LTD pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171179 Intra AMF, Intra SMF, Inter NG RAN handover without Xn interface NEC EUROPE LTD pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171180 Intra AMF, Inter SMF, Inter NG RAN handover without Xn interface NEC EUROPE LTD pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171181 Inter AMF, Intra SMF, Inter NG RAN handover without Xn interface NEC EUROPE LTD pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171182 Inter AMF, Inter SMF, Inter NG RAN handover without Xn interface NEC EUROPE LTD pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171183 Intra NG RAN Handover NEC EUROPE LTD pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesEricsson: it's too early to include this content. We would have to include all the details: names, keys, etc.. We propose to postpone for next meeting. Nokia agreed with Ericsson. Alignment with RAN2 and RAN3 is needed as well. Docomo agreed with this. Ericsson: I'm not sure we have an agreed solution. NEC: no key issue with the handover. This was agreed in the TR. We can add this and update it later. Ericsson: the question is update it to what. It was agreed to work with this offline and come back for the next meeting.
noted No    
S3‑171184 Update of solution #4.6 on security mechanism for deployment scenario of option 3 NEC EUROPE LTD pCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesNEC wanted to send this info in the LS, but it was finally agreed not to do it.
approved No    
S3‑171185 EN-DC (E-UTRAN – New Radio) Dual Connectivity NEC EUROPE LTD CR  
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesDiscussed with the related document 324. Parts of this CR were merged with the Qualcomm proposal in 324.
not pursued No    
S3‑171186 Solution for forward and backward security of Xn handover Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171187 Solution2.12 handling Privacy and Meeting LI Requirements in all Scenarios Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171188 Conclusion and interim agreements for KI # 4.11 & 4.15 Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
YesIt overlaps with 1153. Ericsson: too early for E4.15.
revised No S3‑171570  
S3‑171189 MASA Response to Evaluation# 2. Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171190 Solution for IMSI Privacy while meeting LI Requirements Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
YesNokia: evaluation for 2.12 should be taken into account. A note was added to address this. Nokia: as a general statement, we are not in favour of this kind of solution.
revised No S3‑171510  
S3‑171191 MASA handling OUT of Sequence Scenario Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171192 MASA Modular Approach Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171193 MASA Update Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171194 MASA crypto analysis conclusion Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171195 Interim Agreement Analysis and Impact of Primary Authentication Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171196 Interim Agreement Proposal for IMSI privacy Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
revised No S3‑171544  
S3‑171197 Interim Agreement for 5G NR Primary Authentication Alternative Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171198 EPS-AKAi: A primary authentication solution for 5G NR access Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171199 Resolving Editors Notes in Security requirements on gNB Potential security requirements V3 Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171200 backward security for RRC inactive state to RRC active state Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171201 Anti-DDOS for RRC inactive state to RRC active state Huawei, Hisilicon, China Mobile pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171202 Generate Temporary or short-term subscription identifiers by Random Number Generator Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171203 Interim Agreement for Using effective temporary or short-term subscription identifiers Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
postponed No    
S3‑171204 MASA support 4G USIM and clarification. Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171205 Questions and interim agreement for NG2 handover procedure Huawei, Hisilicon, China Mobile pCR Approval
8.3.4RAN security
Yes
No
withdrawn Yes    
S3‑171206 Update solution 2.11 for KI 1.21 interim agreement Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171207 Interim Agreement for KI#1.21 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
YesORANGE: Anti-DoS atack? Huawei: solutions in phase one for DoS attack to the core network. ORANGE proposed some rewording: should antiDoS attack protection be addressed? Huawei agreed. Qualcomm: UP or CP attacks? KPN: we have a key issue referring to the signalling. Ericsson: already discussed but not agreed. Not appropiate to have a mechanism to detect bad behaving User Equipments. Juniper Networks: DoS attacks is a huge topic. We need to narrow it down. KPN: we have tdoc 386 with a more detailed approach on DoS attacks.
merged No S3‑171564  
S3‑171208 IMSI privacy solutions evaluation & Discussion Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
YesDeutsche Telekom:LI requirements need to be Yes, as we have seen in their LS during this meeting. Huawei agreed, as an outcome of this meeting it will be updated. Nokia: "it increases the number of times" we don’t know how many times MCC+MNC is sent. Vodafone: it isn't clear how to integrate this document into the TR. Huawei: evaluation parts can be merged into the evaluation. The Chair replied that the best option give the lack of time would be to add an additional section for this document. Ericsson wasn't happy with the table and with the overall document. They commented that in some parts it seems that they are promoting their own solutions. Due to these and other concerns the document was noted.
noted No    
S3‑171209 Security threats of key issue #3.3 “Principles of security negotiation” Huawei, Hisilicon pCR Approval
8.3.3Security context and key management
Yes
Yes
left for email approval No    
S3‑171210 solution for UP security negotiationV3 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171211 Interim agreement for UP integrity Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
YesVodafone: it's not clear where the application resides. TIM commented that the group should try to make fundamental questions instead of making 1000 questions. Vodafone: I said that before, we should go and put content in the TS instead. Nokia: we don’t need in phase one, it should be left to the operator. Ericsson pointed out that it overlapped with 279.
noted No    
S3‑171212 update interim agreement on reducing the impact of secert key lekage Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171213 agreement on support ERP Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
YesNokia: we don’t need this in 5G. Qualcomm and Ericsson commented that the answer should be "no in phase one". This was agreed.
revised No S3‑171567  
S3‑171214 Update the skeleton to support security on service based architecture Huawei, Hisilicon pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
noted No    
S3‑171215 Interim agreement for support security on service based architecture in 5G phase 1 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
YesORANGE: what is a service based architecture? Huawei: covered in SA2, it should be studied. ORANGE: I prefer to have a contribution where it is explained how the security is impacted. Vodafone: which requirements and key issues is this question related to? Huawei: we will update with the key issue associated. Ericsson: we need to address it if it is in the SA2 TS. Vodafone: this refers to something that doesn’t belong to phase one,as we defined in a table in December. Huawei replied that this is not in that table. China Mobile: we need to answer whether we need security for the service architecture.
noted No    
S3‑171216 Security capability handling for EN-DC Huawei, Hisilicon discussion Discussion
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesEricsson didn’t understand how to handle proposal 3 according to Qualcomm's proposal in 338. It was agreed to send an LS to both RAN2 and CT1 to state that no decision has been made on the three options and that will be done in the next meeting. Huawei reminded that the majority of companies in CT1 didn’t like option one.
noted No    
S3‑171217 AS algorithms selection Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
YesEricsson: there is no format of evidence. Huawei suggested to remove the term "simulated eNodeB". This was agreed.
revised No S3‑171519  
S3‑171218 Verify RRC integrity protection Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
revised No S3‑171520  
S3‑171219 Verify the feature of EIA0 Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
revised No S3‑171521  
S3‑171220 Verify key refresh at eNB Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
revised No S3‑171522  
S3‑171221 The skeleton of TR 33843 Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
YesMCC pointed out that the template was wrong. ORANGE asked what this had to do with REAR, but it was pointed out that it was in the approved study.
revised No S3‑171575  
S3‑171222 The reference of TR 33843 Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑171223 The scope of TR 33843 Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
revised No S3‑171577  
S3‑171224 key issue authentication and authorization Huawei, Hisilicon, China Mobile pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
revised No S3‑171578  
S3‑171225 key issue security on service continuity Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
noted No    
S3‑171226 key issue security on discovery Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
YesORANGE: alignment with 33.303 in an editor's note. MCC: avoid mentioning Releases, reference other specifications.
revised No S3‑171581  
S3‑171227 key issue security of UP between eRemote UE and network Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
revised No S3‑171582  
S3‑171228 key issue security of CP between eRemote UE and network Huawei, Hisilicon, China Mobile pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑171229 discussion-authentication and authorization of eRemote UE Huawei, Hisilicon discussion Discussion
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
No
No
withdrawn Yes    
S3‑171230 a solution of key isolation in inter-AMF mobility Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171231 add evaluation of solution #2.29 Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171232 interim agreement for KI#1.7 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
merged No S3‑171556  
S3‑171233 interim agreement for KI#2.4 Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171234 interim agreement for KI#2.8 Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171235 interim agreement for KI#7.1 Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
YesORANGE didn’t agree with the UE being able to trigger a temp id refresh procedure.
merged No S3‑171550  
S3‑171236 interim agreement for KI#7.4 Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
postponed No    
S3‑171237 interim agreement for KI#11.1 and #11.2 Huawei, Hisilicon pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171238 interim agreement for KI#11.3 Huawei, Hisilicon pCR Approval
8.3.11Security visibility and configurability
Yes
Yes
left for email approval No    
S3‑171239 Clarification for KDF negotiation Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171240 Clarification for solution #1.13 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171241 A security solution for SMS over NAS Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171242 Interim Agreement for KI1.18 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171563  
S3‑171243 Interim Agreement for KI1.5 on integrity for uplink NAS signalling Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171244 Interim Agreement for KI1.5 and KI1 6 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171245 Enhanced NAS token solution for LTE redirection attack Huawei, Hisilicon CR Agreement
7.6.1SAE/LTE Security
Yes
YesNokia: Enhancement of the proposal of including a NAS token.I see some problems in the communication between MME and UE. MCC note: this document was reserved as CR but it contains a discussion paper. It was decided to note it since conference calls will deal with this issue before the next meeting.
not pursued No    
S3‑171246 Solution for key Handling in RRC Inactive state to RRC active state transition Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No    
S3‑171247 5G security architecture discussion Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171248 Annex for 5G security architecture Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171249 Interim agreement for the key hierarchy Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
noted No    
S3‑171250 Interim agreement for the anchor key Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171251 Solution for key hierarchy in 5G phase1 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171252 Example Procedure for non-AKA EAP-based Authentication Method in 5G Huawei, Hisilicon pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesSome language should be corrected (e.g. use of "we"). Vodafone: this is not an interim agreement so we should not procceed with it. The Chair asked the authors to work on this document and bring an updated version for the next meeting.
noted No    
S3‑171253 Editor’s Note for Key Issue #4.4 Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
YesOverlaps with 146. China Mobile supported this.
left for email approval No    
S3‑171254 Questions and agreement for KI8.2 Huawei, Hisilicon pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171255 Questions and agreement for KI8.3 Huawei, Hisilicon pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171256 Interim Agreement for KI8.4 Huawei, Hisilicon pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171257 Interim Agreement for KI8.5 Huawei, Hisilicon pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171258 Interim Agreement for KI8.7 Huawei, Hisilicon pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171259 Use of legacy USIM and NextGen ME in solution #7.12 Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171260 Network slice life-cycle security update Huawei, Hisilicon pCR Approval
8.3.16 Management Security
Yes
Yes
left for email approval No    
S3‑171261 Soltuion for service based architecture Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171262 Question and interim agreement for co-location of the SCMF and the SEAF Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171415  
S3‑171263 Question and interim agreement for AUSF in visited network Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
No
withdrawn Yes    
S3‑171264 Deleting the EN in the section 4.2.6 of TS33.250 Huawei, Hisilicon pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
YesEricsson: why removing the configuration? They didn't agree with the changes. Deutsche Telekom only agreed with removing the editor's note.
revised No S3‑171516  
S3‑171265 pCR to 33.899: Updates to Solution #7.2 Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171266 pCR to 33.899: Updates to Key agreements to key issue #4.14 Intel pCR Approval
8.3.4RAN security
Yes
Yes
approved No    
S3‑171267 pCR to 33.899: Updates to Key Issue #7.1 Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
revised No S3‑171546  
S3‑171268 pCR to TR 33.899: Securing and refreshing the temporary subscriber identifiers. Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171269 Discussion for Securing and refreshing the temporary subscriber identifiers. Intel discussion Discussion
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171270 pCR to TR 33.899: Securing the permanent device identifiers. Intel pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171271 Changes to Security Key Update Intel, Qualcomm, Nokia CR Approval
7.6.1SAE/LTE Security
Yes
YesEricsson didn’t agree with the change from shall to may. Intel: discussed and agreed in the Sophia meeting. This is done to avoid additional overhead in the handshake. Samsung: agreed only in certain scenarios, not all of them.
revised No S3‑171547  
S3‑171272 Discussion for RAN2 LS regarding WT MAC address for uplink traffic Intel, Qualcomm, Nokia discussion Discussion
7.6.1SAE/LTE Security
Yes
Yes
noted No    
S3‑171273 Reply LS on on providing WT MAC address to the UE using eNB signalling Intel LS out Approval
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171528  
S3‑171274 Discussion on security for multiple NAS connections (KI #1.7) Ericsson discussion Discussion
8.3.1Security architecture
Yes
Yes
noted No    
S3‑171275 New solution for the protection of multiple NAS connections (KI #1.7) Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171276 Trust model and key hierarchy discussion for Next Generation systems (KI #1.7) Ericsson pCR Discussion
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171277 New key hierarchy proposal for Next Generation systems (KI #1.7) Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171278 Discussion on the feasibility of the support and negotiation of a PDU Session specific-security features (KI #1.16) Ericsson pCR Discussion
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171279 Questions and interim agreements on the granularity of the UP protection (KI #1.16) Ericsson pCR Approval
8.3.1Security architecture
Yes
YesORANGE didn’t agree with having E1X22 in phase one. Ericsson agreed with delaying this in phase one but pointed out it was coming from the TR.
revised No S3‑171562  
S3‑171280 Solution for a PDU session-specific security negotiation (KI #1.16) Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171281 Discussion on network slice isolation (KI #8.1) Ericsson, Nokia pCR Discussion
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171282 Questions and interim agreements on Network Slice-sepcific keys (KI #8.1) Ericsson, Nokia pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171283 Update of solution #1.36 for SEAF realization via AMF (KI #1.2) Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171284 Resolution of the editor’s notes in solution #6.4 Ericsson pCR Approval
8.3.6Authorization
Yes
Yes
left for email approval No    
S3‑171285 Content for clause 7 on security procedures between 5G Network Functions Ericsson pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesNokia: wrongly deleted editor's note in 7.2 due to a misunderstanding. Ericsson understood and agreed. Deutsche Telekom: Note 1 in 7.1.1 should go away. Also, are we changing the SA acronym of AMF to avoid misunerstanding with our AMF? Nokia: we add a note everytime that this can be confusing. As per comments from BT the note was agreed to be reworded. ORANGE: in TS 33.210 implementation of IPSEC was optional. Is it the same case in 5G core network?Ericsson preferred to keep it optional to implement. Telia Sonera, China Mobile and Deutsche Telekom had the same thought. BT: we have a different concept of implementation. It's about turning it on or off. It was agreed in 7.1.1 to add an editor's note on the management plane as suggested by Deutsche Telekom. ORANGE: mandatory use of IPSEC is FFS. An editor's note was added to that effect. MCC reminded that a better standardization term for "mandatory to implement and optional to use" was "shall be supported".
revised No S3‑171502  
S3‑171286 Questions and agreements for key issue #1.7 on key hierarchy related to NAS security Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171558  
S3‑171287 Questions and interim agreement for key issue #1.7 on key hierarchy related to core network keys Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171556  
S3‑171288 Discussion on RAN deployment and interface protection Ericsson pCR Discussion
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDiscussed together with 285.
noted No    
S3‑171289 Questions and agreements for key issue #1.7 on key hierarchy related to the access network and air interface protection keys Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171559  
S3‑171290 Overall presentation of contributions proposing questions and interim agreements for key issue #1.7 on key hierarchy Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
approved No    
S3‑171291 Security aspects of xMB reference point Ericsson, Qualcomm CR  
5Items for early consideration
No
No
withdrawn Yes    
S3‑171292 Alignment of LWIP to stage 3 Ericsson CR  
7.6.1SAE/LTE Security
No
No
withdrawn Yes    
S3‑171293 Discussion on resubmission of S3-170758-759-760-763-765-766-767 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171294 Key issues on identity probing - was 758-458 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171295 Solution - Research Paper - Using pools of IMSIs and indicate in RAND - was 759-452 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171296 Solution - Research Paper - Encrypted pseudonym transported in RAND - was 760-453 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171297 Question to concealment of identifiers OTA - was 763-455 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171298 Question to concealment of temporary identifiers - was 765-456 Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesVodafone: define the frequencies at which the refresh occur. This should be included in the questions (standardise triggers for refresh). No agreement has been made for that.
revised No S3‑171550  
S3‑171299 Question to full protection of permanent identifier - was 766-203 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
revised No S3‑171512  
S3‑171300 Agreement to full protection of permanent identifier Nokia, Ericsson, Intel, Qualcomm, Morpho, KPN, TNO pCR Decision
8.3.7Subscription privacy
Yes
YesQualcomm: there may be other subscription identifiers rather than the IMSI, according to SA2. The Chair asked: shall the routing information be hidden at the air interface (question in 299)? Interidigital: preserving network policy should be optional (yes/maybe for the above question). The Chair proposed a show of hands: Show of hands per company for question in 299; who supports the response "no" (privacy protected)? Vodafone,KPN,ORANGE,Oberthur,Juniper,Intel,Ericsson,Nokia,LG,Deutsche Telekom, Docomo,IPCom,NEC,Qualcomm,UK government, US department of commerce, China Mobile. Same question, yes privacy protection: AT&T, TIM, Interdigital, BT,360,Huawei, Neul Limited Motorola Solutions abstained. The Chair commented that this could go to a technical vote for the next meeting if there was no agreement. AT&T proposed to go on with the "no" response so as not to waste time, Interdigital agreed. The Chair asked the group if it was OK to procceed with "no" as the response to 299. There was no opposition and the document was approved.
approved No    
S3‑171301 Question to slice identifier protection - was 767-204 Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesORANGE: the key issue is not about correlation of the slice id and the subscription id. Qualcomm agreed. Nokia: the question is here because there was a discussion in the Busan adhoc and this is still an open issue. Vodafone: No difference with the situation of having two base statiion with two network ids. Vodafone: Why the extra protection of the NSSAI if we have privacy protection for the subscriber already? Interidigital: we don’t need it. It all was reduced to the question of the need of the extra protection for NSSAI. It was commented that the issue was more about confidentiality protection. Vodafone: It's purely about slicing, not the privacy. BT: you can identify the customer by the slice he's using, so Vodafone is wrong.
revised No S3‑171551  
S3‑171302 Agreement to slice identifier protection Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesQualcomm: it shall be supported (optional to use). Vodafone: we need for phase one a clear statement of what needs to be protected. T-Mobile: this means no confidentiality protection in phase one. ORANGE: not crutial for phase one. Vodafone: capability yes. Ericsson: not in phase one. BT: not on phase one. NEC: wait for SA2 procedures to finish this discussion. Nokia: they are waiting for us. Huawei: not for phase one. Docomo: not for the initial registration but for the subsequent use of the slice. ORANGE and NEC were fine with this. ORANGE: we need an answer for this meeting. ORANGE: we say no and we work more on this when discuss the solution. Ericsson agreed, but some companies disagreed. The Chair proposed as suggested by ORANGE: NSSAI shall be confidentiality protected whenever NAS confidentiality protection is enabled. This was agreed. Vodafone objected to the answer of this question being agreed in this meeting as many issues have been identified that need further thought before concluding on this interim agreement
revised No S3‑171552  
S3‑171303 Question on synchronization and recovery - was 764 Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesDocomo: questions are too specific. Deutsche Telekom proposed to have a question on real identity, can an attacket force the UE to reveal the real identity? ORANGE supported it with some rewording (is it acceptable..?) KPN: the response would be NO. The rest of the questions were not generally supported so they were removed.
revised No S3‑171548  
S3‑171304 Solution on synchronisation and recovery Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171305 Solution variant to 7.3 based on encrypted IMSI only - was 757 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
revised No S3‑171553  
S3‑171306 Proposed answers to questions on synchronization and recovery Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesORANGE: no solutions for Over The Top for the 3GPP network.
noted No    
S3‑171307 Additional privacy related questions for security visibility and configurability - related to S3-170852 Nokia pCR Decision
8.3.11Security visibility and configurability
Yes
Yes
revised No S3‑171557  
S3‑171308 Solution on efficient handling of privacy protected AV requests by HSS-AUSF or SLF Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171309 V2X MB2 interface requirements Nokia pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171310 V2X privacy requirements Nokia pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesORANGE: what is the UE identity? Nokia: it's the IMSI. ORANGE: this is not defined anywhere. Is the IMSI distributed over the PC5 interface? Ericsson: this is LTE, we don’t try to change the legacy system, it's conflicting with what we already have. This had to be taken offline.
revised No S3‑171470  
S3‑171311 V2X privacy solution Nokia pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesEricsson: transmission of broadcast messages over PC5 is confusing. Nokia: we can enhance MBMS to be used here. Ericsson: you cannot use MBMS on PC5. Nokia clarified that the "LTE identity" is the IMSI. BT: have a general section on privacy issues only. Ericsson: we don’t have a privacy solution and we need to make it clear in the TS. Nokia: Resource allocation and how it is dynamically done is not SA3's business and does not need to be here. Vodafone: there is no user interface specified for V2X in 3GPP. We need to make it clear. This had to be taken offline. A sentence on user consent was added to tdoc 319 to address this document.
merged No S3‑171473  
S3‑171312 V2X key issue enhanced Nokia pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesVodafone: to have the means for trust/confidence would be a better rewording.
revised No S3‑171478  
S3‑171313 Resolution of ENs in solutions 1.23 and 1.24 Nokia pCR  
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171314 pCR to TS35.501 - Authentication procedure for EPS AKA* - possible variant VODAFONE Group Plc pCR Agreement
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDiscussed together with Nokia's solution in tdoc 373. Main difference is the Resp. No big difference between this and Nokia's solution, Vodafone opted to follow Nokia's option.
noted No    
S3‑171315 Interim Agreements on Key Issue # 4.1: AS security during RRC idle mode Samsung pCR Approval
8.3.4RAN security
Yes
Yes
noted No    
S3‑171316 Question and Interim Agreements on Key Issue # 1.3: User plane integrity between UE and network Samsung pCR  
8.3.1Security architecture
Yes
Yes
revised No S3‑171561  
S3‑171317 Background to proposed SA3 handling of LS from TC CYBER Home Office, BT, Telefonica discussion Discussion
6.9TC-CYBER
Yes
Yes
noted No    
S3‑171318 New Key Issue in response to in ETSI TC CYBER on middlebox security Home Office, BT, Telefonica pCR Approval
8.3.1Security architecture
Yes
YesVodafone supported this contribution. BT suggested the change of some requirements to adjust to this. Qualcomm: it’s more appropiate to look at this from the access and core network point of view, a separate study item would be required. Nokia: is this relevant to the other 5G work we are doing? I think it isn't. Nokia: it's about inter operator links. Sprint disagreed. Docomo: Who authorizes the middleboxes to be there? It's premature before seeing protocols that can support this. NCSC: hop by hop doesn’t have an issue. Security across domains is the key issue here and needs to be recorded. Vodafone: at application level, is the middle box for them as well? Home Office: the intention is that it is transparent for them.
noted No    
S3‑171319 Adding information on lack of Uu privacy to the V2X CR Qualcomm Incorporated, Ericsson, LG pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesORANGE: we have LTE privacy at least. Telia Sonera supported this document. Ericsson: we are not addressing that the operator cannot track users in V2X, as required by SA1. ORANGE: just reference to 33.401. BT,Nokia: not only 33.401. Qualcomm: it's important to note the requirements that we are not addressing. ORANGE: they don't have any requirements for the IMSI privacy. Vodafone suggested to move the text on the technical solution to a note. This was accepted.
revised No S3‑171473  
S3‑171320 Clarifying some text on the procedures for the security of V2X data Qualcomm Incorporated pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesVodafone: it seems that we are enforcing the policy to be the same.
revised No S3‑171469  
S3‑171321 Correcting the XML for the UE to PKMF interface Qualcomm Incorporated CR Agreement
7.6.12Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3)
Yes
Yes
agreed No    
S3‑171322 Correcting the XML for the UE to PKMF interface Qualcomm Incorporated CR Agreement
7.6.12Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3)
Yes
Yes
revised No S3‑171533  
S3‑171323 Tidying up the eNB to eNB dual connectivity Qualcomm Incorporated CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171529  
S3‑171324 Solution for Dual Connectivity between MeNB and SgNB Qualcomm Incorporated CR Agreement
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesEricsson preferred to have the content in an annex as Qualcomm proposed.This was agreed. Vodafone pointed out that both Annex A and E needed to be normative. Ericsson commented that the NR capability should be left out when merging with 185, as it is still an open issue. Qualcomm agreed. It was agreed to create a DraftCR (living document) to include agreed content until the next meeting.
not pursued No    
S3‑171325 Security for the RLFs for UEs doing user plane over control plane using NAS level security Qualcomm Incorporated CR Agreement
7.6.1SAE/LTE Security
Yes
YesIt will come back for the next meeting.
postponed No    
S3‑171326 Proposed questions and agreements on the derivation of the anchor key Qualcomm Incorporated pCR Approval
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171327 Simplified symmetric key privacy solution that enable routing to multiple AUSFs Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No    
S3‑171328 Generic introductory text for the Authentication clause of TS 33.501 Qualcomm Incorporated pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDocomo warned about the ambiguous use of mays and shoulds that may or may not be normative language. Ericsson commented that the second paragraph in 6.1.1.1 hasn’t been defined yet and that it should be removed.
revised No S3‑171496  
S3‑171329 EAP based secondary authentication with PDU session authorization information Qualcomm Incorporated pCR Approval
8.3.2Authentication
Yes
YesDiscussed with 1331, and 1431.
noted No    
S3‑171330 Security procedures between UE and external data networks via the 5G network Qualcomm Incorporated pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
noted No    
S3‑171331 pCR to provide an update to the Key Issue #1.5 to add a PDU session authorization token in the NAS SM signalling Qualcomm Incorporated pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171332 PMSI usage in EAP-AKA' Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No   S3‑170833
S3‑171333 pCR to update solution #7.4: Privacy enhanced Mobile Subscriber Identifier (PMSI) to clarify the PMSI synchronization Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No   S3‑170836
S3‑171334 pCR to provide an evaluation on the solution #7.4 Privacy enhanced Mobile Subscription Identifier (PMSI) Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No   S3‑170837
S3‑171335 pCR to provide an evaluation on the solutions for identity privacy Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
YesEricsson didn’t agree with a big part of this document,es pecially the second section. Vodafone proposed to add computation at the UE China Mobile: the conclusion is not complete because other solutions are not considered. It's not valid either cause it uses different situations for the comparisons. Ericsson: there are some agreements in this conclusion. China Mobile: why there are no issues with the UE having incorrect symmetric key? Ericsson agreed that this wasn’t mentioned. Revised to address comments from Ericsson, Nokia and Interdigital.
merged No S3‑171509 S3‑170838
S3‑171336 pCR to provide an evaluation on the solutions for identity privacy Qualcomm Incorporated pCR Approval
8.3.7Subscription privacy
Yes
Yes
noted No   S3‑170832
S3‑171337 Agreements related to UE (re)registration and NAS security procedures in 5GS Qualcomm Incorporated discussion Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
noted No    
S3‑171338 NR algorithm selection in EN-DC Qualcomm Incorporated pCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
noted No    
S3‑171339 Details of the calculation of HASH_MME and HASH_UE Qualcomm Incorporated CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
revised No S3‑171530  
S3‑171340 New Solution response to work in ETSI TC CYBER on middlebox security Home Office, BT, Telefonica pCR Approval
8.3.1Security architecture
Yes
Yes
noted No    
S3‑171341 N3gpp access merged Call flow Nokia, Qualcomm, Intel, Huawei, Broadcom pCR Approval
8.3.1Security architecture
Yes
YesT-Mobile: Update the call flow to address the privacy of the user identity (reflect what is encrypted and so on).
revised No S3‑171565  
S3‑171342 Draft reply to LS from TC CYBER on middlebox security Home Office, BT, Telefonica LS out Approval
6.9TC-CYBER
Yes
YesDocomo: not sure that TC CYBER is the place to define such protocol but IETF.
revised No S3‑171449  
S3‑171343 BEST TS33.xyz Section 6.2.1 - IP EMSDP PDU Juniper Networks other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171344 N3GPP access key issue and agreement Nokia, Qualcomm, Intel, Huawei, Broadcom pCR Approval
8.3.1Security architecture
Yes
YesDependant of tdoc 341.
revised No S3‑171566  
S3‑171345 BEST TS33.xyz Section 6.2.2 - EMSDP Payload Format Juniper Networks other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171346 draft_reply to SA2 on S2-172523 n3gpp authentication for re-registration Nokia LS out Approval
8.3.1Security architecture
Yes
YesQualcomm commented that option 2 is better, in order to minimise the impact on the UE. The NAS message should be kept the same. Vodafone: option 2 protects the identities more than option 1.This should be added in the response to the LS. Ericsson: the privacy solution is handled separately and it will be similar for both options. We support option one, achieving an architecture that is agnostic to the access. Nokia: privacy concerns are the same for both options, the parameters are the same. We agree with Ericsson. BT preferred option one because it was simpler for them. Huawei and Intel went for option one.Intel commented that the first option was simpler to implement for CT1. Huawei: if we have a privacy solution for option one equal to what we have in LTE, it's fine. 3GPP and non-3GPP accesses should have the same privacy protection.
revised No S3‑171488  
S3‑171347 Detailing of ToC for TS 33.501 wrt authentication Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesORANGE didn’t agree with the wording in 6.1.1.1. Why referencing to an informative Annex? Discussed with tdoc 285 and 378.
revised No S3‑171495  
S3‑171348 Key Managemat Procedure between the HSE and EAS China Mobile Com. Corporation other  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
YesVodafone asked for more time to work with China Mobile for the next meeting. There was agreement on the work needing to be done.
noted No    
S3‑171349 UP Integrity KI and requirements Nokia pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171350 Alignment according to withdrawal of I-WLAN - Rel-13 Gemalto N.V. CR Agreement
7.6.18Other work items
Yes
YesQualcomm: this feature is not in 402, so it would be considered as a new feature. Is there a use case to have such scenario in 402? I don’t think we need to move this to 402. Gemalto: for EAP AKA in 4G we think it should be available in the 33.402 document. Qualcomm: I-WLAN features will be discontinued from Rel-13. This is a I-WLAN specific feature and we have no requirements for this in 402. BT: this scenario has no use cases. Deutsche Telekom and ORANGE agreed.
not pursued No    
S3‑171351 Questions related to the Usability of legacy USIM in key issue #2.1 China Mobile, KPN pCR Approval
8.3.2Authentication
Yes
YesQualcomm: why not Rel-99 USIM? Nokia: Rel-99 USIMs can be used for LTE access. This is not correct. Docomo: From Rel-99 to Rel-8, there is a new separation bit, so the USIMs are different. Oberthur: there are other non security features that differ Rel-99 and Rel-8 SIMs. The first question doesn't work, you need to update the card.It will never attach to 5G. Deutsche Telekom: then ,the answer is no. Oberthur: 5G authentication will never happen. KPN: so we all get rid of all SIM cards in the World? What happens to my customers? Oberthur: you can send new SIMs or update them. TIM: operators will not throw milllions of SIMs away because of 5G. This wasn't defined in SA1. Vodafone agreed with the question one. ORANGE: this is valid for legacy SIMs. TIM: this is a generic issue, not privacy. TIM: if we have any doubt these requirements, we need to ask SA1. ORANGE: we need to study technically this, not for business reasons. SA1 cannot decide that. Gemalto supported ORANGE. This is a security group, we need to study if there is a security issue and we don’t know the conclusions yet. G&D supported ORANGE's position. We need to consider the USIM evolution. Deutsche Telekom and Telia Sonera supported ORANGE's proposal as well. Gemalto: if we answer no to the questions, it doesn’t mean that we have to replace all USIMs. Qualcomm supported ORANGE. TIM objected to this contribution. The Chair asked if this question blocked the work. It didn’t seem to be the case. He also pointed out that the question needed some clarification. Nokia suggested to discuss this in a conference call. BT commented that the impact on the UICC appears on the CR cover, so this can be discussed further depending on the technical issue. The Chair commented that there is no restric rule for that and that it was better to reach an agreement beforehand in a conference call. It was decided to have a conference call to clarify this contribution: questions on the use of legacy USIMs.
noted No   S3‑171167
S3‑171352 UP Integrity solution Nokia pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171353 Requirements for secure storage and processing of subscription credentials ORANGE pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesGemalto: subscription credentials stored and processed in the UICC, was a solution in the TR.We disagree with this. Sony agreed with Gemalto. ORANGE: is the UICC one of the solutions? Also, we are not excluding other options as the following editor's note is stating. Intel supported Gemalto and preferred to have the UICC solution removed. It was agreed to remove the last sentence and editor's note.
revised No S3‑171492  
S3‑171354 New Key issue avoiding IMSI paging Nokia pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171355 HASH Derivation for NAS security mode command procedure Huawei, Hisilicon CR  
7.6.1SAE/LTE Security
Yes
Yes
merged No S3‑171530  
S3‑171356 pCR to S3-170916 - Change to Key Hierarchy KPN, Nokia other Approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
revised No S3‑171539  
S3‑171357 Initiation of authentication Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171358 BEST TS 33.xyz Section 4.4.2 - EAS Registration Nokia other  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171359 BEST TS 33.xyz Section 4.4.4 - Key Refresh Nokia other  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
revised No S3‑171442  
S3‑171360 BEST TS33.xyz Section 3-4 - Editorial and interface Corrections Juniper Networks other Approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
YesAll these type of documents will be implemented in the draft spec in tdoc 538.
approved No    
S3‑171361 Dynamic pseudonyms as short-term subscription identifiers TELECOM ITALIA S.p.A. pCR Approval
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171362 Initiation of authentication Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesSome concerns on the editor's note and its links with the privacy work. Nokia: The Home network determines what authentication method to use. Qualcomm: better rename EPS AKA* since we are creating a new protocol and may not have to be related to the one that is in the TR. Ericsson: we discourage MME to handle more than one authentication vector, which is not here. Nokia: it's a recommendation. Some operators would like to have batches of authentication vectors to be used in case of outage of the HPLMN. Docomo: roaming in a malicious network then coming back to the trusted network is a confusing use case. Deutsche Telekom: if we allow this, we have to deal with the consequences. This can lead to greater complexity. Vodafone confirmed that the batches of authentication vectors are a useful tool for operators. An editor's note and some text revisions were done in order to address all comments.
revised No S3‑171497  
S3‑171363 Authentication procedure for EAP-AKA’ Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171364 New key issue avoiding IMSI paging Nokia pCR Approval
8.3.7Subscription privacy
No
No
withdrawn Yes    
S3‑171365 BEST TS 33.xyz Section 4.4.3 - Key Request Nokia other  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171366 Adding a requirement within 3GPP TS 33.250 on “Unpredictable GTP TEID” TELECOM ITALIA S.p.A., KPN pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
YesEricsson doubted whether this was necessary, as there were other issues. Deutsche Telekom: GTP spoof has been treated since a long time ago and we shouldn’t discuss whether this is a real threat or not. It is correct that there are other solutions but this one is the simplest so far. Docomo: this is a valid threat and we should try to protect agains it.
approved No    
S3‑171367 Comments on S3-171144, Privacy aspects of MCC/MNC in IMSI InterDigital, Inc., AT&T discussion Decision
8.3.7Subscription privacy
Yes
YesVodafone: even if I give you a random number I can guess your identity by identifying other factos like the time you turn on, or the places you appear, etc.. There's no such thing as real privacy. Ericsson: Encrypting MSIDN it will be more complex to track someone. T-Mobile: IMSI catcher needs close proximity and knowledge of the user. Interdigital: hability to know the information by catching ovber the air is the real issue. Deutsche Telekom: don’t forget that these are options for the operators and that in some countries they will not be allowed to use it. If we raise the bar too high and design an overly complex solution, we take the risk that it will not be used at all. Docomo supported this; it needs to be taken into consideration. No apparent agreement between companies since their positions were quite fixed.
noted No    
S3‑171368 Question and interim agreement on support for secondary authentication by an authenticator in the Data network Nokia pCR  
8.3.2Authentication
No
No
withdrawn Yes    
S3‑171369 Adding test case for the requirement on unpredictable TEID generated by the PGW. TELECOM ITALIA S.p.A., KPN pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
revised No S3‑171515  
S3‑171370 Authentication procedure for EAP-AKA’ Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesQualcomm and Ericsson: same key derivation for all EAP methods would be more desireable. Which key to be used should be left for further study: MSK or derived from MSK.
revised No S3‑171499  
S3‑171371 Authentication procedure for EPS AKA* Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171372 Question and interim agreement on support for secondary authentication by an authenticator in the Data network Nokia pCR Approval
8.3.2Authentication
Yes
Yes
noted No    
S3‑171373 Authentication procedure for EPS AKA* Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesSolution from the TR.
noted No    
S3‑171374 Protecting EAP messages between 3GPP Network and external DN-AAA server Nokia pCR Approval
8.3.1Security architecture
No
No
withdrawn Yes    
S3‑171375 Protecting EAP messages between 3GPP Network and external DN-AAA server Nokia pCR Approval
8.3.1Security architecture
Yes
Yes
left for email approval No    
S3‑171376 Authentication procedure for EPS AKA* - possible variant Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesThe solutions over the table were in tdocs 314 and 376. This tdoc presents a modified authentication response. Variation of 376. Vodafone didn’t favour the original . Ericsson was in favour of this solution. Gemalto commented that there is no requirement for support of legacy USIM. Nokia: It shall be possible to compute this in the ME. Oberthur: SA1 defines new requirements, if there are not new requirements the old ones are applicable. Keep it as it is. Docomo: we need to make sure that the serving network name is something that we can use. KPN had a slight preference for Vodafone's solution, as Huawei. Vodafone went for this solution eventually. Huawei disagreed with this solution.
revised No S3‑171545  
S3‑171377 Linking increased home control to subsequent procedures Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDeutsche Telekom: maybe to make 6.1.4.2 normative? Ericsson: There may be other ways to do this. It's not clear for us whether this could become normative so we suggest to postpone for the next meeting. Docomo preferred to have this normative, Vodafone as well. BT was concerned to have this in the normative part of the TS.
revised No S3‑171501  
S3‑171378 Question and Interim Agreement on linking increased home control to subsequent procedures Nokia pCR  
8.3.2Authentication
Yes
YesHuawei: is this going to an informative annex? Ericsson: what do we have to decide now that this is going to be informative? Docomo: it can only be informative. Remove the "informative". Ericsson: we don’t need to agree now that this is going to be a guidance.
revised No S3‑171494  
S3‑171379 Reply LS on Support of Explicit Bootstrapping in ERP ORANGE LS out Approval
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
Yes
revised No S3‑171532  
S3‑171380 Remove support of ERP Explicit Boostrapping ORANGE other Approval
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
No
withdrawn Yes    
S3‑171381 Secondary authentication by an external DN-AAA server Nokia pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesAlf (Docomo): restrict the shalls to the requirements clauses. Ericsson: make the figure editable. Qualcomm didn’t agree with the editor's note (EAP auth role) being in the TS. Ericsson agreed with removing the editor's note.
revised No S3‑171505  
S3‑171382 Security procedures on N12 Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesQualcomm: reword EAP-AKA' success according to what's being discussed in this meeting. MCC suggested to remove the note in EAP-AKA' Success so as not to name stages or releases in the content of the TS.This was agreed.
revised No S3‑171503  
S3‑171383 Security procedures on N12 Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171384 Security procedures on N12 Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171385 Security procedures on N12 Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171386 Interim agreement on DoS KPN pCR Approval
8.3.1Security architecture
Yes
YesEricsson: it is not realistic to have mechanisms like this at the core network. T-Mobile commented that it is not sufficient to solve such problems from the UE side. ORANGE supported this question. Nokia disagreed with the question, Qualcomm needed some rewording.
revised No S3‑171564  
S3‑171387 EAP based Secondary authentication with an external Authenticator Nokia pCR Approval
8.3.2Authentication
Yes
YesQualcomm: the justification is very weak for the EAP authentication by an external authenticator. Ericsson didn’t suppor this either. Deutsche Telekom: it looks similar to 329. where we didn’t want to overload the authentication with additional features.
noted No   S3‑170749
S3‑171388 Resolution of editor's notes in 33.116 NTT DOCOMO other Agreement
7.1.1Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3)
Yes
No
withdrawn Yes    
S3‑171389 Resolution of editor's notes in 33.117 NTT DOCOMO, KPN other Agreement
7.1.2Security Assurance Specification for 3GPP network product classes (MME, TS 33.116) (SCAS-SA3)
Yes
No
withdrawn Yes    
S3‑171390 Resolution of editor's notes in 33.916 NTT DOCOMO other Agreement
8.6.4TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
Yes
No
withdrawn Yes    
S3‑171391 pCR to S3-170916 - Editorial changes to align terminology on key names KPN, Nokia other  
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
No
No
withdrawn Yes    
S3‑171392 [FS_MC_Sec] 33880 pCR editorial updates Motorola Solutions Danmark A/S pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
revised No S3‑171456  
S3‑171393 [MCSec] 33.180 pCR Inter-domain IdM profile corrections Motorola Solutions Danmark A/S pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
YesAirbus found confusing the addition of "primary or partner" in B.9. It was agreed to remove it. Some rewording in B.6.4 was also suggested by Airbus and agreed.
revised No S3‑171458  
S3‑171394 [MCSec] 33180 pCR editorial updates Motorola Solutions Danmark A/S pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171395 [MCSec] 33180 pCR requirement updates Motorola Solutions Danmark A/S pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
revised No S3‑171460  
S3‑171396 WID MSec continuation work Motorola Solutions Danmark A/S WID new Agreement
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
YesNCSC commented that there is a strong dependence on SA6, so any delay in their work would delay SA's work as well. They have to finish their work the meeting before december 18.
revised No S3‑171465  
S3‑171397 Security procedures on N13 Nokia pCR  
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesDocomo: we didn't try to secure Diameter in security area 10. Nokia:we do some solutions; public keys techniques, or protecting the internal AVP. Docomo: a lot of diameter things happening are not visible in the standards. We would like them to find a security solution. Nokia: CT4 defines AVPs, so we can do it in 3GPP. IETF has draft for the solutions in security. We should come back to them with some joint input with GSMA. We don’t define security end-to-end but we can provide with requirements.
revised No S3‑171504  
S3‑171398 Question and agreement on granularity of anchor key binding to serving network Nokia pCR  
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171399 Network Slice Corrections to clause 5.8.3.1 Nokia,Ericsson pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171400 pCR to TR 33.899 on granularity of anchor key binding to serving network Nokia pCR  
8.3.2Authentication
Yes
Yes
left for email approval No    
S3‑171401 Key issue details for clause 5.10.3.2.1 Nokia pCR  
8.3.10Network domain security
Yes
Yes
left for email approval No    
S3‑171402 Network Slice Corrections to clause 5.8.3.2 Nokia,Ericsson pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171403 Network Slice Correction to clause 5.8.3.4 Nokia,Ericsson pCR Approval
8.3.8Network slicing security
Yes
Yes
left for email approval No    
S3‑171404 Threats alignment between 5.10.3.2.2 and 5.3.3.1.2 Nokia pCR  
8.3.10Network domain security
Yes
Yes
left for email approval No    
S3‑171405 Addition of requirements for 5.10.3.2.3 Nokia pCR  
8.3.10Network domain security
Yes
Yes
left for email approval No    
S3‑171406 Enhancing solution 10.1 Nokia pCR  
8.3.10Network domain security
Yes
Yes
left for email approval No    
S3‑171407 drfat_LS On Clarifications on false eNB detection to RAN groups Nokia LS out Approval
8.3.4RAN security
Yes
YesDeutsche Telekom: is this for the eNodeB or for the gNodeB? Nokia: will change for gNodeB.
revised No S3‑171568  
S3‑171408 Discussion paper on RAN2 LS on LTE call redirection ( R2-1702388) to GERAN Nokia discussion Endorsement
7.6.1SAE/LTE Security
Yes
Yes
noted No    
S3‑171409 draft_LS reply to LTE call redirection to GERAN Nokia LS out Approval
7.6.1SAE/LTE Security
Yes
YesDocomo commented that the CS fallback/redirection to 2G wasn't the way. 360 and Huawei supported this. Your first reject it and then redirect it to 2G and registers into the CS fallback. Better to fix the problem of having a call being sent over 3G even if we don’t want it in 2G.CS fallback call that we don’t want to have in 2G. It doesn’t matter if we want the authentication call before or not. Nokia: distinguish between idle mode and terminating call. This attack doesn’t have to be with the CSFB, it's a more general attack. It's not about voice calls but forcing the UE not to go to an available 4G network. Docomo: why is it an issue if we go to 2G? 2G is not so well protected. If there is an incoming call, yoCSFB and any type attack that will force the UE to be in 2G to receive this call will be bad. Ericsson and BT agreed with Docomo. BT commented that a long term solution was needed. Ericsson: why is RAN2 working on this if this a SA3 issue? Nokia: this problem has been lingering since quite a long time. They copied us a few meetings back in a LS asking for feedback that we didn’t provide. It's not a 2G issue. Docomo: the UE needs to be aware that this is something that happens in a 2G network.it should reject unprotected redirections. The Chair commented that there is a bigger problem that we already knew. Can we solve such problem? With offline discussions, are companies aware of a bigger problem or not? Is there hope for a solution for this problem?
noted No    
S3‑171410 Editorial changes to align key names KPN, Nokia other Approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171411 New Key Issue on AKA via eRelay KPN pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
revised No S3‑171579  
S3‑171412 New Key Issue on attach via eRelay KPN pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
revised No S3‑171580  
S3‑171413 New Key issue on Managing handovers of eRemote UE KPN pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
noted No    
S3‑171414 UP confidentiality and integrity protection in 5G KPN pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
YesNokia had an issue with the PDCP layer. This wasn't needed according to them. BT: we need to look closely at what support means. Nokia: support means implemented or not. They proposed to follow 401. The meaning of support wasn't clear in the room.
revised No S3‑171491  
S3‑171415 Question and interim agreement for co-location of the SCMF and the SEAF Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
revised No S3‑171560 S3‑171262
S3‑171416 Key issue on location information protection China Unicom, CATR pCR  
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171417 Key issue on subscribed service information protection China Unicom, CATR pCR  
8.3.7Subscription privacy
Yes
Yes
left for email approval No    
S3‑171418 CR to TR33.926 on Adding a generic threat on “User Session Tampering” TELECOM ITALIA S.p.A., KPN other Approval
8.6.1Security Assurance Specification for 3GPP network product classes (33.926) (SCAS)
Yes
No
withdrawn Yes    
S3‑171419 TS 33.402 - Align with CT1 TS 24.302 for obtaining IMEI using Mobile Equipment Identity signalling Nokia other Agreement
7.6.18Other work items
Yes
No
withdrawn Yes    
S3‑171420 Update of references to GSMA NESAS documents in TR 33.916 Deutsche Telekom AG CR Agreement
8.6.4TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
Yes
Yes
agreed No    
S3‑171421 TR 33.885: conclusion on V2X Entities Secure Environment Gemalto N.V. pCR Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
revised No S3‑171480  
S3‑171422 TS 33.185: V2X Entities Secure Environment Gemalto N.V. pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
YesVodafone: is this spec applicable to LTE only or 5G as well? The answer was LTE only. Vodafone: then we don’t need it. This has been specified already. Gemalto: this was in the TR. Why is it different now in the TS? KPN supported Vodafone. If this is agreed here, we have to add it to all LTE specs. BT supporting having this. Vodafone:it should be USIM and not UICC. This was agreed.. Telia Sonera supported BT: this is a new use case.
revised No S3‑171467  
S3‑171423 Alignment according to withdrawal of I-WLAN feature - Rel-14 Gemalto N.V. CR Agreement
7.6.18Other work items
Yes
Yes
not pursued No    
S3‑171424 Comments on S3-171271: Changes to Security Key Update Samsung discussion Discussion
7.6.1SAE/LTE Security
Yes
Yes
endorsed No    
S3‑171425 256-bit algorithms for 5G ETSI SAGE LS in  
6.3ETSI SAGE
Yes
YesBT doubted whether anything else besides radio should have 256bits.
noted No    
S3‑171426 Setting the salt value in UE and P-CSCF when using AES-GCM/AES-GMAC in IPSec ESP in IMS access security Nokia CR  
7.6.2IP Multimedia Subsystem (IMS) Security
Yes
Yes
agreed No    
S3‑171427 Setting the salt value in UE and P-CSCF when using AES-GCM/AES-GMAC in IPSec ESP in IMS access security Nokia CR  
7.6.2IP Multimedia Subsystem (IMS) Security
Yes
Yes
agreed No    
S3‑171428 Introduction of a new value range for the input value FC for the key derivation function (KDF) for use in TS 33.203 Nokia CR  
7.6.2IP Multimedia Subsystem (IMS) Security
Yes
Yes
agreed No    
S3‑171429 Introduction of a new value range for the input value FC for the key derivation function (KDF) for use in TS 33.203 Nokia CR  
7.6.2IP Multimedia Subsystem (IMS) Security
Yes
Yes
agreed No    
S3‑171430 Correction of reference Nokia, Vodafone CR  
7.6.1SAE/LTE Security
Yes
Yes
agreed No    
S3‑171431 Comments on S3-171331 as well as 1329, 1330 pCR to provide an update to the Key Issue #1.5 to add a PDU session authorization token in the NAS SM signalling Nokia response Agreement
8.3.1Security architecture
Yes
YesQualcomm disagreed with the paragraph where the Nokia states that the UE is happy with the 3GPP network is talking to an ext DN the UE is associated with. Orange supported Nokia. ORANGE: Relationship between external DN and operator. The same as EAPS AKA*. Qualcomm: only some of the allowed roaming networks have a relation with the DN AAA.
left for email approval No    
S3‑171432 Allocation of FC values for BEST KPN, Vodafone CR Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
revised No S3‑171542 S3‑170670
S3‑171433 [MCSEC] Addition of descriptive clauses NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171434 Remove support of ERP Explicit Boostrapping ORANGE CR Agreement
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
Yes
revised No S3‑171531  
S3‑171435 Resolution of editor's notes in 33.116 NTT DOCOMO CR Agreement
7.1.1Security Assurance Specification for 3GPP network product classes (General, TS 33.117) (SCAS-SA3)
Yes
Yes
agreed No    
S3‑171436 Resolution of editor's notes in 33.117 NTT DOCOMO, KPN CR Agreement
7.1.2Security Assurance Specification for 3GPP network product classes (MME, TS 33.116) (SCAS-SA3)
Yes
Yes
agreed No    
S3‑171437 Resolution of editor's notes in 33.916 NTT DOCOMO CR Agreement
8.6.4TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR)
Yes
Yes
agreed No    
S3‑171438 CR to TR33.926 on Adding a generic threat on “User Session Tampering” TELECOM ITALIA S.p.A., KPN CR Agreement
8.6.1Security Assurance Specification for 3GPP network product classes (33.926) (SCAS)
Yes
YesEricsson doubted whether this was required at all.
revised No S3‑171514  
S3‑171439 TS 33.402 - Align with CT1 TS 24.302 for obtaining IMEI using Mobile Equipment Identity signalling Nokia CR Agreement
7.6.18Other work items
Yes
Yes
agreed No    
S3‑171440 Draft reply LS to CT3 and SA4 on xMB security Ericsson LS out  
5Items for early consideration
Yes
Yes
revised No S3‑171450  
S3‑171441 Reply LS on secure storage and processing of subscription credentials within the NG UE ETSI TC SCP LS in  
8.3.18Other
Yes
Yes
noted No    
S3‑171442 BEST TS 33.xyz Section 4.4.4 - Key Refresh Nokia other -
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
revised No S3‑171541 S3‑171359
S3‑171443 Reply LS on NAS SM integrity protection S1-172226 LS in discussion
8.3.18Other
Yes
Yes
noted No    
S3‑171444 LS on Closed Subscriber Group in 5GS S1-172425 LS in discussion
8.3.18Other
Yes
YesQualcomm: wait for SA2 and RAN to see if the CSGs are the same as in LTE. Oberthur: there are no specific requirements from SA1 for this. Vodafone: they want to use this in phase one, although there is no use case. It was decided to postpone since the next SA3 meeting would before SA1's.
postponed No    
S3‑171445 Reply LS on addition of KMS URI to configuration parameters S6-170795 LS in discussion
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
noted No    
S3‑171446 Work Plan input from Rapporteurs MCC other -
9Review and Update of Work Plan
No
No
reserved No   S3‑171006
S3‑171447 Report of 3GPPSA3-Emeeting on DoNAS(NB-IOT) VODAFONE Group Plc report Approval
4.1 Approval of the report from SA3#86 and SA3 ad-hoc
Yes
YesRevised to correct the table of attendees.
approved No   S3‑171091
S3‑171448 New WID on Study on Long Term Key Update Procedures VODAFONE Group Plc WID new Agreement
8.6.5Other study items
Yes
Yes
agreed No   S3‑171096
S3‑171449 Reply to LS from TC CYBER on middlebox security Home Office LS out Approval
6.9TC-CYBER
Yes
Yes
approved No   S3‑171342
S3‑171450 Reply LS to CT3 and SA4 on xMB security Ericsson LS out -
5Items for early consideration
Yes
Yes
approved No   S3‑171440
S3‑171451 Reply LS on update to key management for application signalling NCSC LS out Approval
5Items for early consideration
Yes
Yes
approved No   S3‑171117
S3‑171452 [FS_MC_SEC] Adding MSCCK functionality for back-compatibility into evaluation clause NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No   S3‑171121
S3‑171453 Reply to: LS on MCData protocol and choice of media plane protocol NCSC LS out approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171454 [FS_MC_SEC] MCData Key Management NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No   S3‑171114
S3‑171455 [FS_MC_SEC] MCData Key Distribution NCSC pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No   S3‑171115
S3‑171456 [FS_MC_Sec] 33880 pCR editorial updates Motorola Solutions Danmark A/S pCR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No   S3‑171392
S3‑171457 [MCSEC] Adding MSCCK functionality for back-compatibility NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No   S3‑171118
S3‑171458 [MCSec] 33.180 pCR Inter-domain IdM profile corrections Motorola Solutions Danmark A/S pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No   S3‑171393
S3‑171459 [MCSEC] Update to MCData security NCSC pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No   S3‑171123
S3‑171460 [MCSec] 33180 pCR requirement updates Motorola Solutions Danmark A/S pCR Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No   S3‑171395
S3‑171461 Draft TR 33.880 NCSC draft TR Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171462 Cover sheet TR 33.880 NCSC TS or TR cover Approval
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
No
No
withdrawn Yes    
S3‑171463 Draft TS 33.180 NCSC draft TS Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171464 Cover sheet TS 33.180 NCSC TS or TR cover Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171465 WID MSec enhancements Motorola Solutions Danmark A/S WID new Agreement
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
YesAdding new supporters, correcting some issues on name and acronym and impacted existing specs table. Motorola commented that they wished to continue using TR 33.880 and extend the study. MCC commented that the Study item may have to be revised since the justification and objectives may have changed. The original study was intended for Release 14. The Study item had to be checked offline, but in any case this WID was correct and agreed.
agreed No   S3‑171396
S3‑171466 Reply LS to SA6 on mission critical communication interworking security issues NCSC LS out Approval
7.2Security of the Mission Critical Service (MCSec) (Rel-14)
Yes
Yes
approved No    
S3‑171467 TS 33.185: V2X Entities Secure Environment Gemalto N.V. pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171422
S3‑171468 Misc Changes to TS 33.185 Sec 6.5 Huawei, HiSilicon pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171087
S3‑171469 Clarifying some text on the procedures for the security of V2X data Qualcomm Incorporated pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171320
S3‑171470 V2X privacy requirements Nokia pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171310
S3‑171471 V2X privacy solution Nokia pCR Decision
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
No
No
withdrawn Yes    
S3‑171472 Miscellaneous changes to Chapter 6.6 of TS 33.185 CATR pCR -
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171057
S3‑171473 Adding information on lack of Uu privacy to the V2X CR Qualcomm Incorporated, Ericsson, LG pCR Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No   S3‑171319
S3‑171474 Draft TS 33.185 Huawei draft TS Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171475 Cover sheet TS 33.185 Huawei TS or TR cover Approval
7.3Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec) (Rel-14)
Yes
Yes
approved No    
S3‑171476 TR 33.885 EN Cleanup Sec 5.5 Huawei, HiSilicon pCR Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No   S3‑171068
S3‑171477 TR 33.885 EN Cleanup Sec 5.9 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No   S3‑171071
S3‑171478 V2X key issue enhanced Nokia pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No   S3‑171312
S3‑171479 TR 33.885 EN Cleanup Sec 6.6 Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No   S3‑171078
S3‑171480 TR 33.885: conclusion on V2X Entities Secure Environment Gemalto N.V. pCR Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
No
YesORANGE: subscription credentials resides in the USIM in the 3GPP, but for non 3GPP where do they reside? UICC is a better term than USIM. Gemalto agreed. This would be consistent with TS 33.402. ORANGE agreed as well. Vodafone: What entity in the UICC has these credentials? This was taken offline and finally approved.
approved No   S3‑171421
S3‑171481 TR 33.885 EN Cleanup Sec Annex D Huawei, HiSilicon pCR Decision
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No   S3‑171085
S3‑171482 Draft TR 33.885 Huawei draft TR Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
YesVodafone commented that they preferred to have this specification withdrawn and not to be sent for approval.
approved No    
S3‑171483 Cover sheet TR 33.885 Huawei TS or TR cover Approval
8.2Study on security aspects for LTE support of V2X services (FS_V2XLTE) (Rel-14)
Yes
Yes
approved No    
S3‑171484 Reply to: LS to SA3 on actions for integrity check failure on SgNB Huawei LS out approval
8.3.18Other
Yes
Yes
approved No    
S3‑171485 Reply to: Reply LS on security in E-UTRA-NR Dual Connectivity Qualcomm LS out approval
8.3.18Other
Yes
YesSA3 is still analyzing the three options, so no final decision has been made in SA3 during this meeting.
approved No    
S3‑171486 EN-DC in option 3a/3x Ericsson pCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesKeeps the interim agreements part and states only "yes".
approved No   S3‑171147
S3‑171487 Solution for Dual Connectivity between MeNB and SgNB Qualcomm Incorporated draftCR Approval
7.5EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
YesContains the merge of 324,487 and 148. This will be a living document that eventually will become a CR when the content is agreed.
approved No    
S3‑171488 Reply to SA2 on S2-172523 n3gpp authentication for re-registration Nokia LS out Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171346
S3‑171489 Reply to: LS on 5GS Security aspects seeking resolution Nokia LS out approval
8.3.18Other
Yes
YesVodafone strongly disagreed with "the NSSAI shall be confidentiality protected whenever a NAS security context is available (as far as regulation allows)". They also suggested to remove explanation on the rule about interim agrements going to the TS. Nokia commented that this was coming from interim agreements already approved. This is a SA3 working procedure. ORANGE also expressed their concerns on questioning such working procedures.
approved No    
S3‑171490 Reply to: LS on IMSI availability in the VPLMN T-Mobile LS out approval
8.3.18Other
Yes
Yes
approved No    
S3‑171491 UP confidentiality and integrity protection in 5G KPN pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171414
S3‑171492 Requirements for secure storage and processing of subscription credentials ORANGE pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171353
S3‑171493 pCR to 33.501: requirements on gNB Ericsson pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171132
S3‑171494 Question and Interim Agreement on linking increased home control to subsequent procedures Nokia pCR -
8.3.2Authentication
Yes
Yes
approved No   S3‑171378
S3‑171495 Detailing of ToC for TS 33.501 wrt authentication Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171347
S3‑171496 Generic introductory text for the Authentication clause of TS 33.501 Qualcomm Incorporated pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171328
S3‑171497 Initiation of authentication Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171362
S3‑171498 Evaluations and conclusions in clause 7 updated as a result of FS_NSA conference calls Vodafone pCR Approval
8.3.7Subscription privacy
Yes
YesIssues in 5.7.4.4.4 for Qualcomm. Telecom Italia commented that they had comments since the Tenerife meeting for the evaluation of 7.14. Nokia commented that there were some other conclusions for 5.7.5 from other companies that could be added here. It was seen that a better solution would be to have a separate document for this. AT&T: What part of the IMSI needs to be protected must be very clear.
revised No S3‑171508  
S3‑171499 Authentication procedure for EAP-AKA’ Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171370
S3‑171500 Interim Agreements: How to implement increased home control in EPS AKA* Ericsson pCR Approval
8.3.2Authentication
Yes
Yes
approved No   S3‑171125
S3‑171501 Linking increased home control to subsequent procedures Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171377
S3‑171502 Content for clause 7 on security procedures between 5G Network Functions Ericsson pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171285
S3‑171503 Security procedures on N12 Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171382
S3‑171504 Security procedures on N13 Nokia pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171397
S3‑171505 Secondary authentication by an external DN-AAA server Nokia pCR Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171381
S3‑171506 Annex on the additional EAP methods Ericsson, Samsung, Qualcomm Incorporated, Nokia, Intel, Huawei pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171126
S3‑171507 Reply to: Reply LS on SA3 LS in S3-170944 “LS on security termination for the User Plane in 5G” Deutsche Telekom LS out approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
No
withdrawn Yes    
S3‑171508 Evaluations and conclusions in clause 7 updated as a result of FS_NSA conference calls Vodafone pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171498
S3‑171509 Conclusions in clause 7 Vodafone pCR Approval
8.3.7Subscription privacy
Yes
YesContains the conclusions of S3-171101 as well.
approved No    
S3‑171510 Solution for IMSI Privacy while meeting LI Requirements Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171190
S3‑171511 KI#7.2_question_agreement_imsi_priv_privay_in_phase1 Ericsson, Nokia, Vodafone, Intel, KPN, LGE, China Mobile, CATT, NEC, Juniper Networks, T-Mobile, Telenor, Deutsche Telekom, Morpho, IPCom, Telecom Italia pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171136
S3‑171512 Question to full protection of permanent identifier - was 766-203 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171299
S3‑171513 KI#7.2_agreements_imsi_priv_solution_types Ericsson, Nokia, Vodafone, Intel, LGE, China Mobile, CATT, NEC, Juniper Networks, Deutsche Telekom, T-Mobile, Morpho, IPCom,ORANGE pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171138
S3‑171514 CR to TR33.926 on Adding a generic threat on “User Session Tampering” TELECOM ITALIA S.p.A., KPN CR Agreement
8.6.1Security Assurance Specification for 3GPP network product classes (33.926) (SCAS)
Yes
Yes
agreed No   S3‑171438
S3‑171515 Adding test case for the requirement on unpredictable TEID generated by the PGW. TELECOM ITALIA S.p.A., KPN pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No   S3‑171369
S3‑171516 Deleting the EN in the section 4.2.6 of TS33.250 Huawei, Hisilicon pCR Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No   S3‑171264
S3‑171517 Draft TS 33.250 China Mobile draft TS Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No    
S3‑171518 Cover sheet TS 33.250 China Mobile TS or TR cover Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No    
S3‑171519 AS algorithms selection Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
approved No   S3‑171217
S3‑171520 Verify RRC integrity protection Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
YesRemoving the term "simulated eNodeB"
approved No   S3‑171218
S3‑171521 Verify the feature of EIA0 Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
approved No   S3‑171219
S3‑171522 Verify key refresh at eNB Huawei, Hisilicon pCR Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
YesEricsson suggested to add the screeshot of relevant changes. Also removing the simulated eNodeB term.
approved No   S3‑171220
S3‑171523 Draft TS 33.216 Huawei draft TS Approval
7.1.4Security Assurance Specification for eNB network product class (eNB, TS 33.216) (SCAS_eNB)
Yes
Yes
approved No    
S3‑171524 Draft TS 33.501 NTT-Docomo draft TS Approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
No
Yes
left for email approval No    
S3‑171525 Revised SID MCPTT NCSC SID revised Agreement
8.4Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14)
Yes
YesThe SID was revised to keep working in TR 33.880 introducing the new activity in Rel-15.
agreed No    
S3‑171526 Reference to list of 3GPP vendor specific EAP methods Ericsson CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
agreed No   S3‑171059
S3‑171527 Alignment of 3GPP-vendor specific EAP method names with TS 24.302 Ericsson CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
agreed No   S3‑171060
S3‑171528 Reply LS on on providing WT MAC address to the UE using eNB signalling Intel LS out Approval
7.6.1SAE/LTE Security
Yes
Yes
approved No   S3‑171273
S3‑171529 Tidying up the eNB to eNB dual connectivity Qualcomm Incorporated CR Agreement
7.6.1SAE/LTE Security
Yes
YesChanged the Release since not possible to have Cat-D for Rel-14 (frozen).
agreed No   S3‑171323
S3‑171530 Details of the calculation of HASH_MME and HASH_UE Qualcomm Incorporated CR Agreement
7.6.1SAE/LTE Security
Yes
Yes
agreed No   S3‑171339
S3‑171531 Remove support of ERP Explicit Boostrapping ORANGE CR Agreement
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
YesAdding the reference to the RFC in clause 2. Removing "in this release" in the NOTE, as commented by MCC.
agreed No   S3‑171434
S3‑171532 Reply LS on Support of Explicit Bootstrapping in ERP ORANGE LS out Approval
7.6.17Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)
Yes
Yes
approved No   S3‑171379
S3‑171533 Correcting the XML for the UE to PKMF interface Qualcomm Incorporated CR Agreement
7.6.12Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3)
Yes
Yes
agreed No   S3‑171322
S3‑171534 Adding references to GIA4, GEA5/GIA5 and stage 3 GMM specifications, and removing corresponding editor's notes. Ericsson CR Approval
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
agreed No   S3‑171127
S3‑171535 Adding references to GIA4, GEA5/GIA5 and stage 3 GMM specifications, and removing corresponding editor's notes. Ericsson CR Approval
7.6.13Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)
Yes
Yes
agreed No   S3‑171128
S3‑171536 LS on a new requirement on “Unpredictable GTP TEID” Telecom Italia LS out Approval
7.1.3Security Assurance Specification for PGW network product class (PGW, TS 33.250) (SCAS_PGW)
Yes
Yes
approved No    
S3‑171537 Reply to: LS on LI requirements for CIOT services including BEST services Vodafone LS out approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No    
S3‑171538 draft TSxx.xxx BEST v0.0.2 - BEST TS including S3-171093 as agreed in conf calls VODAFONE Group Plc other Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No   S3‑171094
S3‑171539 pCR to S3-170916 - Change to Key Hierarchy KPN, Nokia other Approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No   S3‑171356
S3‑171540 Liaison Statement to 3GPP SA3: GSMA Activity on Securing Diameter Interfaces GSMA FASG LS in discussion
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
replied to No    
S3‑171541 BEST TS 33.xyz Section 4.4.4 - Key Refresh Nokia,China Mobile other -
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
Yes
approved No   S3‑171442
S3‑171542 Allocation of FC values for BEST KPN, Vodafone CR Agreement
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
YesThe CR will be revised during the SA plenary to introduce the TS number once the BEST WID is approved.
agreed No   S3‑171432
S3‑171543 Cover sheet TS BEST specification Vodafone TS or TR cover Approval
7.6.15Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec)
Yes
YesIt will be revised during the SA plenary to introduce the TS number once the BEST WID is approved.
approved No    
S3‑171544 Interim Agreement Proposal for IMSI privacy Huawei, Hisilicon pCR Approval
8.3.7Subscription privacy
No
Yes
left for email approval No   S3‑171196
S3‑171545 Authentication procedure for EPS AKA* - possible variant Nokia,Ericsson pCR -
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No   S3‑171376
S3‑171546 pCR to 33.899: Updates to Key Issue #7.1 Intel pCR Approval
8.3.7Subscription privacy
No
Yes
left for email approval No   S3‑171267
S3‑171547 Changes to Security Key Update Intel, Qualcomm Incorporated, Nokia, Samsung CR Approval
7.6.1SAE/LTE Security
Yes
Yes
agreed No   S3‑171271
S3‑171548 Question on synchronization and recovery - was 764 Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesContaining the agreed question
approved No   S3‑171303
S3‑171549 Questions for Key issue #7.2: Storage and configuration of key related to encryption of permanent identifiers Ericsson pCR Approval
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171133
S3‑171550 Question to concealment of temporary identifiers - was 765-456 Nokia pCR Decision
8.3.7Subscription privacy
Yes
YesEricsson disagreed with the way that their question from 7.4 was integrated here. Ericsson will bring a contribution for the next meeting to address their concerns for question (1).
approved No   S3‑171298
S3‑171551 Question to slice identifier protection - was 767-204 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171301
S3‑171552 Agreement to slice identifier protection Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171302
S3‑171553 Solution variant to 7.3 based on encrypted IMSI only - was 757 Nokia pCR Decision
8.3.7Subscription privacy
Yes
Yes
approved No   S3‑171305
S3‑171554 reply LS on LTE call redirection to GERAN Ericsson LS out Approval
7.6.1SAE/LTE Security
Yes
Yes
approved No   S3‑171129
S3‑171555 Alignment of LWIP to stage 3 Ericsson CR Approval
7.6.1SAE/LTE Security
Yes
Yes
agreed No   S3‑171135
S3‑171556 Questions and interim agreement for key issue #1.7 on key hierarchy related to core network keys Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171287
S3‑171557 Additional privacy related questions for security visibility and configurability - related to S3-170852 Nokia pCR Decision
8.3.11Security visibility and configurability
No
Yes
left for email approval No   S3‑171307
S3‑171558 Questions and agreements for key issue #1.7 on key hierarchy related to NAS security Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171286
S3‑171559 Questions and agreements for key issue #1.7 on key hierarchy related to the access network and air interface protection keys Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171289
S3‑171560 Question and interim agreement for co-location of the SCMF and the SEAF Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171415
S3‑171561 Question and Interim Agreements on Key Issue # 1.3: User plane integrity between UE and network Samsung pCR -
8.3.1Security architecture
Yes
Yes
approved No   S3‑171316
S3‑171562 Questions and interim agreements on the granularity of the UP protection (KI #1.16) Ericsson pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171279
S3‑171563 Interim Agreement for KI1.18 Huawei, Hisilicon pCR Approval
8.3.1Security architecture
Yes
YesRemoving any reference of the solution for KDF negotiation as proposed by ORANGE. Agreement is TBD.
approved No   S3‑171242
S3‑171564 Interim agreement on DoS KPN pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171386
S3‑171565 N3gpp access merged Call flow Nokia, Qualcomm, Intel, Huawei, Broadcom pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171341
S3‑171566 N3GPP access key issue and agreement Nokia, Qualcomm, Intel, Huawei, Broadcom pCR Approval
8.3.1Security architecture
Yes
Yes
approved No   S3‑171344
S3‑171567 agreement on support ERP Huawei, Hisilicon pCR Approval
8.3.2Authentication
Yes
Yes
approved No   S3‑171213
S3‑171568 LS On Clarifications on false eNB detection to RAN groups Nokia LS out Approval
8.3.4RAN security
Yes
Yes
approved No   S3‑171407
S3‑171569 Questions and interim agreements for KI #4.5, KI #4.6, KI #4.9, KI #4.12, KI #4.15, KI #4.16, KI #4.17 Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
left for email approval No   S3‑171153
S3‑171570 Conclusion and interim agreements for KI # 4.11 & 4.15 Huawei, Hisilicon pCR Approval
8.3.4RAN security
Yes
Yes
approved No   S3‑171188
S3‑171571 Update of KI #4.4 and questions and agreements on KI #4.4 Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
approved No   S3‑171146
S3‑171572 Conclusion and interim agreements for KI# 4.4 and KI #4.7 China Mobile pCR Approval
8.3.4RAN security
Yes
Yes
approved No   S3‑171160
S3‑171573 Key issue update, questions and agreements for key handling in state transition from RRC_INACTIVE state to RRC_CONNECTED state Ericsson pCR Approval
8.3.4RAN security
Yes
Yes
approved No   S3‑171145
S3‑171574 Reply to: Liaison Statement to 3GPP SA3: GSMA Activity on Securing Diameter Interfaces KPN LS out approval
7.4Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15)
Yes
Yes
approved No    
S3‑171575 The skeleton of TR 33843 Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No   S3‑171221
S3‑171576 Draft TR 33.843 Huawei draft TR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
No
Yes
left for email approval No    
S3‑171577 The scope of TR 33843 Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
No
Yes
left for email approval No   S3‑171223
S3‑171578 key issue authentication and authorization Huawei, Hisilicon, China Mobile pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
YesMCC pointed out that better than mentioning SA1,SA2 and Rel-13 Prose, Rel-15 Prose and so on, there should be references to the referred documents and avoid mentioning working groups or Releases. Added an editor's note for alignment with TS 33.303.
approved No   S3‑171224
S3‑171579 New Key Issue on AKA via eRelay KPN pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No   S3‑171411
S3‑171580 New Key Issue on attach via eRelay KPN pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No   S3‑171412
S3‑171581 key issue security on discovery Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No   S3‑171226
S3‑171582 key issue security of UP between eRemote UE and network Huawei, Hisilicon pCR Approval
8.5Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15)
Yes
Yes
approved No   S3‑171227
S3‑171583 draft TR 33.899 Ericsson draft TR Approval
8.3.18Other
No
Yes
left for email approval No