Tdoc List

2017-12-05 01:21

Agenda Topic TDoc Title Source Type For Avail Treated Decision Wdrn Replaced-by Replaces
1 Opening of the Meeting                      
2 Approval of Agenda and Meeting Objectives S3‑173000 Agenda WG Chairman report   Yes
Yes
approved No    
3 IPR Reminder                      
4 Meeting Reports                      
4.1 Approval of the report from previous SA3 meeting(s) S3‑173001 Report from SA3#88 MCC report   Yes
Yes
approved No    
    S3‑173002 Report from SA3#88Bis Ad-Hoc MCC report   Yes
Yes
approved No    
    S3‑173467 Minutes of eMeeting on LTE re-direction SA3 vice-chairman (Qualcomm) report discussion Yes
Yes
noted No    
4.2 Report from SA Plenary S3‑173004 Report from last SA meeting WG Chairman report   Yes
Yes
noted No    
4.3 Report from SA3-LI                      
5 Items for early consideration S3‑173053 Draft LS on inclusion of the SEPP into the 5G architecture (to: SA2; cc: -; contact: Deutsche Telekom) Deutsche Telekom AG LS out Approval Yes
YesMCC: source is already SA3 Vodafone: mandatory for 5G? would be happy to remove "mandatory" Ericsson: operators cannot have any other connection except this proxy? if they have direct links the proxy would not be needed Nokia: concerned about "other 3rd parties" Deutsche Telekom: worried that other operator could send commands to the network; mandatory for "service based architecture" would be ok for us Orange: SA3 should define it is probably a better expression than mandatory conclusion: offline discussion, intention is to send it early this week to SA2 after offline discussion: Deutsche Telekom: we will drop the mandatory, Huawei wants to cc GSMA DES group Vodafone: what's the intention to cc GSMA? Deutsche Telekom: because they define the attributes Vodafone: suggests to not cc GSMA
revised No S3‑173413  
    S3‑173413 Draft LS on inclusion of the SEPP into the 5G architecture (to: SA2; cc: -; contact: Deutsche Telekom) Deutsche Telekom AG LS out Approval Yes
Yes
revised No S3‑173431 S3‑173053
    S3‑173431 Draft LS on inclusion of the SEPP into the 5G architecture (to: SA2; cc: -; contact: Deutsche Telekom) Deutsche Telekom AG LS out Approval Yes
YesOrange: no need to include the architecture figure, why can security function not be defined in SA3? Why do we need to ask SA2? NTT DOCOMO: to indicate that there is something that is breaking their bus; figure was there so that they understand where it should go; Orange: then better remove e.g. text and refer to figure Interdigital: we need bubbles for SEPP Ericsson: no bubbles needed, it is not a service based interface
revised No S3‑173437 S3‑173413
    S3‑173437 LS on inclusion of the Security Edge Protection Proxy into the 5G architecture (to: SA2; cc: -; contact: Deutsche Telekom) SA3 LS out Approval Yes
YesSA3 chair: to be sent out as soon as available LS was sent out on Tue noon of SA3 #89
approved No   S3‑173431
6 Reports and Liaisons from other Groups                      
6.1 3GPP Working Groups S3‑173012 Reply LS on LTE call redirection to GERAN C1-173752 LS in   Yes
YesNokia: no action for SA3 conclusion: no LS answer
not treated No    
    S3‑173497 Reply LS to C1-173752 = S3-173012 on LTE call redirection to GERAN (R2-1714121; to: CT1; cc: SA3, RAN3; contact: Ericsson) RAN2 LS in   Yes
YesEricsson: it seems RAN2 has misunderstood the mechanism; suggests to postpone an answer and come back at SA3 #90 on this conclusion: LS answer is postponed to next SA3 meeting
postponed No    
    S3‑173016 LS on Certification/License and Identification of Aerial Vehicles R2-1709973 LS in   Yes
YesNTT DOCOMO: no inputs on this, will discuss offline conclusion: no LS answer (so far)
noted No    
    S3‑173017 Reply LS on Certification/License and Identification of Aerial Vehicles S2-178175 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173451 Reply LS to S2-178175 = S3-173017 on Certification/License and Identification of Aerial Vehicles (to: SA2, RAN2; cc: RAN3, SA3, GSMA IoT Drone Interest Group; contact: Qualcomm) SA1 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173020 LS on provisioning of positioning assistance data via LPPa for broadcast R2-1712030 LS in   Yes
YesEricsson: no action for SA3 conclusion: no LS answer
noted No    
    S3‑173027 LS on the support of Unicast and Groupcast transmission over PC5 for eV2X S2-178181 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173518 LS on Extension of USAT Application Pairing mechanism (C6-170737; to: SA3; cc: -; contact: Gemalto) CT6 LS in   Yes
YesNote: Attachment was missing in LS C6-170737. Orange: let's postpone this discussion to the next meeting conclusion: LS answer is postponed
postponed No    
6.2 IETF                      
6.3 ETSI SAGE                      
6.4 GSMA                      
6.5 3GPP2                      
6.6 OMA                      
6.7 TCG S3‑173036 TCG progress report InterDigital, Inc. report Discussion Yes
Yes1. TCG – Highlights • New/modified work items o TCG Industrial SG of Embedded Systems WG – chartered February 2017 o Device ID Composition Engine Arch (DICE) – chartered October 2016 • Publication of new or revised deliverables o *** TCG Guidance for Securing Network Equipment – to publish December 2017 *** o *** TCG TNC Architecture 2.0 – published November 2017 *** o *** TCG TPM 2.0 Library v1.46 – public review November 2017 *** o TCG Algorithm Registry r1.27 – public review November 2017 o *** TCG Implicit ID Based Device Attestation – public review November 2017 *** o TCG Device Identifier Composition Engine – member review November 2017 o TCG Errata v1.3 for TPM 2.0 v1.38 – published September 2017 o TCG Mobile Implementation Guidance – published September 2017 2. Meetings TCG Members Meeting in Portland, OR – 26 February - 1 March 2018 TCG Members Meeting in San Diego, CA – 18-22 June 2018 MPWG meets every Thursday at 10-11 ET TMS WG meets every Monday and Friday at 12-13 ET
noted No    
6.8 oneM2M                      
6.9 TC-CYBER                      
6.10 ETSI NFV security                      
6.11 Other Groups                      
7 Work Areas                      
7.1 EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15) S3‑173028 Reply LS on algorithm selection in E-UTRA-NR Dual Connectivity S2-178182 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173469 Reply LS to S2-178182 = S3-173028 on algorithm selection in E-UTRA-NR Dual Connectivity (R2-1714124; to: SA2, CT1, SA3; cc: CT4, RAN3; contact: Intel) RAN2 LS in   Yes
YesQualcomm: we sort of responded also with our LS on Wed morning (3444) conclusion: no LS answer
noted No    
    S3‑173408 Reply LS on algorithm selection in E-UTRA-NR Dual Connectivity C4-175349 LS in   Yes
YesHuawei: if no transfer, then there is no impact Nokia: does not agree SA3 chair: it seems the LS can be interpreted in different ways Huawei: thinks LS is clear conclusion: no LS answer
noted No    
    S3‑173113 CR to resolve EDCE5 ENs (revision of S3-172575) Nokia CR Agreement Yes
YesOrange: is this option1 for the first question of the technical votings? SA3 chair: no
agreed No   S3‑172575
    S3‑173135 Solution for UP algorithm negotiation and activation for ENDC Huawei, Hisilicon, CR Agreement Yes
YesMCC: no CR number on CR cover; revision marks are not allowed on CR covers; curly quotes should not be used (use straight quotes instead) Huawei: would like to come back to this CR later
rejected No S3‑173414  
    S3‑173360 Corrections to deletion of SCG Keys Samsung CR Agreement Yes
YesEricsson: in conflict with Qualcomm Tdoc Qualcomm: put this one first to not lose changes in the controversial discussions coming later
revised No S3‑173480  
    S3‑173480 Corrections to deletion of SCG Keys Samsung CR Agreement Yes
Yes
agreed No   S3‑173360
    S3‑173394 Emergency call handling in EDCE5 QUALCOMM CDMA Technologies discussion   Yes
YesHuawei: SA2 should make a decision how to establish the bearer and then SA3 can decide what we do SA3 chair: we just checked whether we can be proactive Huawei: we could send LS to SA2 Ericsson: include RAN2 as well Qualcomm: we could include SA1 as well; SA3 chair: so we can prepare a draft LS to SA1, SA2, RAN2 and come back on it
noted No    
    S3‑173414 LS on Emergency call support for EDCE5 (to: SA1, SA2, RAN2; cc: -; contact: Qualcomm) SA3 LS out Approval Yes
Yes
approved No    
    S3‑173042 Completing the specification of the algorithms to use between UE and SgNB in EDCE5 Qualcomm Incorporated CR Agreement Yes
Yes
rejected No   S3‑172367
    S3‑173162 Align 5G algorithm Identifiers with 33.501 Huawei; Hisilicon CR Agreement Yes
YesVodafone: UE should never integrity protect RRC? This is confusing Nokia: why shall UE implement NIA0 for integrity protection of RRC signalling, unclear what the benefit is
rejected No    
    S3‑173288 Aligning the algorithm names between EDCE5 and 5G Qualcomm Incorporated CR Agreement Yes
YesQualcomm: will overlap with previous CRs Ericsson: there are some typos in E.3.10.1
revised No S3‑173481  
    S3‑173481 Aligning the algorithm names between EDCE5 and 5G Qualcomm Incorporated CR Agreement No
Yes
agreed No   S3‑173288
    S3‑173290 Aligning the specification of the key derivation function for key to use in security algorithms between UE and SgNB in EDCE5 with the 5G specification Qualcomm Incorporated CR Agreement Yes
YesMCC: wrong meeting number #88bis on CR cover SA3 chair: we will do a show of hands about the technical voting questions later on Monday SA3 chair: CR is an example for the removal Huawei: removing UP integrity will create 2 versions of 5G UE? Qualcomm: there is one that supports 5G core and one that does not SA3 chair: show of hands: one company, one hand, multiple NEC companies have just one hand/vote Questions: 1. removal of UP integrity algorithms as in 3042, 3290 supporting: Qualcomm, Ericsson, Nokia., Samsung, Intel => 5 companies 2. keeping UP integrity algorithms as in 3162 supporting: Huawei, Interdigital => 2 companies So majority for removal but we will leave time for further offline discussion Vodafone: we need to see whether MME needs changing SA3 chair: we will come to these questions afterwards
revised No S3‑173443 S3‑172576
    S3‑173443 Aligning the specification of the key derivation function for key to use in security algorithms between UE and SgNB in EDCE5 with the 5G specification Qualcomm Incorporated CR Agreement Yes
Yesas outcome of S3-173438: it is planned to add a note regarding UP integrity as requested by Huawei (details will be discussed offline)
agreed No   S3‑173290
    S3‑173043 Using AS layer signalling to negotiate the algorithm used between the UE and SgNB Qualcomm Incorporated CR Agreement Yes
YesSA3 chair: so they are the same as last meeting Vodafone: but we will remove emergency case text? Qualcomm: yes, we were just asked to submit the CR as it was
rejected No   S3‑172373
    S3‑173044 Using NAS layer signalling to negotiate the algorithm used between the UE and SgNB Qualcomm Incorporated CR Agreement No
Yes
withdrawn Yes   S3‑172374
    S3‑173045 Using NAS layer signalling to negotiate the algorithm used between the UE and SgNB Qualcomm Incorporated CR Agreement Yes
YesSA3 chair: so they are the same as last meeting Vodafone: but we will remove emergency case text? Qualcomm: yes, we were just asked to submit the CR as it was
rejected No   S3‑172374
    S3‑173103 UE NR capability negotiation for EDCE5 Discussion paper Nokia discussion Agreement Yes
YesProposal 1: For EDCE5 feature stay with LTE algorithm definitions this meets objectives of the WID, not necessary to introduce new algorithm definitions. Proposal 2: Adding octet9 and octet10 as NR algorithm in UE network capability will not impact a legacy MME, since it is supposed to treat the message in its entirety, but will not interpret the new octets. New added octets will not get dropped during a handover to another legacy MME. Huawei: prop. 2 will not impact legacy MME but we do not agree with proposal 1 and proposal 2 Ericsson: we have similar proposals as Nokia; current system does not work with protected with hash Vodafone: supports Nokia's discussion document Qualcomm: proposal 1 is ok but proposal 2 will need further clarification, as it is not enough as it is; in REL-15 we should specify a complete solution (so that we do not need add signalling later) Huawei: sees 3 solutions to address the bidding down mentioned by Qualcomm Nokia: do we want to change MME for EDCE5 or not is the question
noted No    
    S3‑173133 EDCE5: UE NR Security Capabilities Bidding-down Huawei, Hisilicon, discussion Discussion Yes
Yesproposal 1: As long as the UE is connected to LTE and all UE security capabilities including LTE security capabilities have been replayed correctly and successfully in the NAS SMC, the UE shall not consider the absence of the UE NR security capabilities in the NAS SMC as a security vulnerability. proposal 2: If the UE NR security capability is sent in a new IE over NAS, the legacy MME will drop the UE NR security capabilities. This will eliminate any potential bidding down attack. In addition, it eliminates changes to S10 interface which is required to inform target MME whether the UE NR security capabilities have been protected against bidding down or not. proposal 3: MeNB can support EDCE5 functionality while connected to a legacy MME. proposal 4: If during the Attach procedure, the MeNB receives the UE ENDC support capability in the UE LTE Radio capabilities, the UE ENDC authorization in the Restrictions list and does not receive the UE NR security capability from the MME, the MeNB shall set an indication “UE NR Capbilities mismatch” in the RRC Connection Reconfiguration message sent to the UE. Vodafone: will we need to change MME Huawei: no Nokia: how is bidding down prevented with the additional information element? Qualcomm: receiving MME will not be informed, with IE it will know whether bidding down happened NTT DOCOMO: are we trying to solve somethng that could be solved also by configuration? Qualcomm: you would have to analyze every case
noted No    
    S3‑173132 EDCE5 Support Legacy MME: UE NR Sec Cap delivery and MME Interworking Huawei, Hisilicon, discussion Discussion Yes
Yesproposal: UE NR security capabilities shall be added in a new IE over NAS. It is more advantageous and serves the security solution better. SA3 shall communicate the recommendation to CT1 & CT4.
noted No    
    S3‑173131 ENDC5 support legacy MME: Delivery UE NR sec. cap. to MeNB in X2 & S1 HO Huawei, Hisilicon, discussion Discussion Yes
YesProposed Solution: UE sends its NR security capabilities during X2 & S1 Handover
noted No    
    S3‑173134 Supporting EDCE5 with Legacy MME Huawei, Hisilicon, CR Agreement Yes
YesMCC: adding Editor's notes in a spec under CR control Huawei: S3-173134 is implementation of S3-173131 conclusion: covered already by S3-173445
rejected No    
    S3‑173265 Discussion document on Algorithm selection in EDCE5 VODAFONE Group Plc discussion Approval Yes
Yes
revised No S3‑173393  
    S3‑173393 Discussion document on Algorithm selection in EDCE5 (with attachments) VODAFONE Group Plc discussion Approval Yes
YesVodafone: is a copy of an email that was provided via the reflector
noted No   S3‑173265
    S3‑173268 CR to 33.401 - Using existing NAS, S1-AP and X2-AP signalling to negotiate the algorithm used by NR-PDCP for EPC controlled dual connectivity between E-UTRAN and NR VODAFONE Group Plc CR Agreement Yes
YesMCC: no CR number on CR cover; CR clashing with S3-173340; wrong reference [42] for TS 36.413; missing reference text for clause 2 for TS 37.340, TS 38.323, TS 29.274, TS 36.423 conclusion: covered already by S3-173445 Vodafone: is similar to Nokia Discussion paper and also overlapping with Ericsson views so with some merging activities we could progress on this
rejected No    
    S3‑173333 Discussion on the NR algorithm bidding-down attack with legacy MME Ericsson discussion   Yes
YesAttack: Observation 1: The bidding-down attack applies only to the NR algorithms that are used in the access stratum. Observation 2: The attack does not apply to NAS security. Observation 3: The attack is successful only with initial, unprotected Attach. Mobility: Observation 4: Even if the falsified NR algorithms were forwarded by the source legacy MME to the target Rel-15 MME, the UE will send the NR algorithms again in integrity protected TAU. Interworking: Observation 5: All earlier generations are forwarding UE network capabilities to the newer generation networks without bidding-down protection.
noted No    
    S3‑173336 Solution using stand-alone TAU Ericsson discussion Approval Yes
Yesproposal: SA3 chooses the TAU based solution to prevent the bidding-down attack, and to the use of legacy MME with EDCE5 Qualcomm: we have problems with the TAU proposal Nokia: TAU will affect legacy MME and legagcy UE? Ericsson: legacy UEs not impacted Huawei: legacy MME will not understand new information, passing it on to others without any security is not a good solution Qualcomm: stage 2 and stage 3 are not aligned from REL-8 onwards
noted No    
    S3‑173338 Solution using local mapping of NR algorithms at NR RRC layer Ericsson discussion Approval Yes
Yesproposal: - NR RRC layer in eNB/gNB is allowed to do local mapping of NR algorithms if the UE is known to support EDCE5 but if the NR algorithms are not available from S1/Xn/X2 interfaces. - There are two ways to do the mapping, and we propose that SA3 chooses option 1 below: 1. The mapping is based on the LTE algorithms that the UE supports. In this way, the support of ZUC could be assumed if the UE supports ZUC. 2. The mapping can be based on the standard (33.501) that mandates the UE to implement certain NR algorithms. In this case, ZUC could not be assumed.
noted No    
    S3‑173340 Using NAS layer signalling to negotiate the algorithm used between the UE and SgNB Ericsson CR Agreement Yes
YesMCC: revision marks and comments not allowed on CR covers; CR clashing with S3-173268; wrong rev - on CR cover instead of rev 3 conclusion: covered already by S3-173445
rejected No   S3‑172374
    S3‑173291 Handling security algorithms in LTE and NR Qualcomm Incorporated discussion Endorsement Yes
Yes
noted No    
    S3‑173292 Making the NAS layer bidding down in EPC automatically cover new security features Qualcomm Incorporated CR Agreement Yes
Yesconclusion: covered already by S3-173445
rejected No    
    S3‑173194 Allowing UE to accept replayed security capbilities on LTE without UE NR security capabilities Huawei; Hisilicon, China Mobile CR Agreement Yes
YesMCC: revision marks are not allowed on CR covers; 2 times Note 4; WI code EDCE5 does not fit to AI 5GS_Ph1-SEC Vodafone: some show of hands on remaining questions would be good to know who are the contacts Huawei: we could consider 3 questions: EDCE5 to work with legacy MME?, UE NR security in new IE?, mapping LTE algorithms to NR? Qualcomm: suggests instead of a show of hands we could have a discussion over Monday lunch time SA3 chair: seems the questions are: - solution would work with legacy MME? - solution should be future proof? - having a new IE? Orange: unclear what future proof means; suggests to check regarding legacy MME only and we can then see how to continue Vodafone: support for the existing 3 algorithms or future algorithms, legacy needs to support existing 3 and we should be able to extend in the future NTT DOCOMO: suggests to have lunch break discussion about the questions, there seem to be different views regarding potential upgrades in the future SA3 chair: see 4 discussion topics: legacy MME, future proof, now IE or not, having algorithm mapping or not Vodafone: it seems to be an implementation discussion that we need conclusion: covered already by S3-173445
rejected No    
    S3‑173419 Report of offline discussion EDCE5 security NTT DOCOMO report discussion Yes
Yesconclusion: further offline discussion will happen on Monday afternoon/evening to converge on one CR and to avoid technical votings on Tue; we will see the CR proposal on Tue morning and then decide on whether the technical voting on Tue 1pm is needed
noted No    
    S3‑173438 Report of Tue evening offline discussion EDCE5 security Qualcomm report discussion Yes
YesNTT DOCOMO: with this Tdoc no technical votes will be needed; still some open issues Vodafone: CT1 will need to be informed about the outcome Vodafone: CR takes care of all 3 questions Huawei: the UP integrity aspect was not yet covered SA3 chair: we had S3-173290 which was showing if we remove UP integrity Huawei: sees that as a UE issue so would like to hear views from other SA3 chair: we had a show of hands where we ended up with 5 to 2 for removing Orange: motivation for removing UP integrity algorithm? Qualcomm: why supporting a normative algorithm that is never used? NTT DOCOMO: we do not have to worry about HO scenarios where this could be relevant? show of hands: - removal of UP integrity algorithms: Qualcomm, Ericsson, Nokia, NEC, Samsung, Vodafone, Intel - keeping of UP integrity algorithms: Huawei SA3 chair: UP integrity debate will continue in Tue morning coffee break after offline discussion: Huawei: could accept to remove UP integrity but would like to add note in a revision of S3-173290 conclusions: - based on S3-173438 Qualcomm will work on a CR in S3-173445 - note will be added in next revision of S3-173290 in S3-173443, Huawei will make a proposal - Vodafone will draft an LSout in S3-173444 to inform other WGs (which will in the end attach CR S3-173445) - no technical votes will be needed
noted No    
    S3‑173444 LS on EDCE5 algorithm indication (to: CT1, CT4, RAN2, RAN3; cc: SA2; contact: Vodafone) SA3 LS out Approval Yes
Yeswill have S3-173445 attached LS was sent out on Wed morning of SA3 #89
approved No    
    S3‑173445 Handling the algorithms for use between a UE and SgNB for EN-DC Qualcomm, NEC, Vodafone CR Agreement Yes
Yes
agreed No    
7.2 Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) (Rel-15) S3‑173523 TS 33.501 v0.5.0 collecting agreements of SA3 #89 NTT DOCOMO draft TS Agreement No
Yessending out before Thu 7.12.17 eob CET comments before Mon 11.12.17 eob CET agreed version sent out before Wed 13.12.17 eob CET
for email discussion No S3‑173524  
    S3‑173524 TS 33.501 v0.6.0 doing a restructuring NTT DOCOMO draft TS Agreement No
Yessending out before Tue 19.12.17 eob CET comments before Thu 21.12.17 eob CET agreed version sent out before Fri 22.12.17 eob CET Ericsson: some sections will have to be merged NTT DOCOMO: put the text in the same sections and if the text needs to be modified this can be done in pCRs next time SA3 chair: all pCRs to next SA3 meeting have to be based on this new TS version v0.6.0
for email discussion No   S3‑173523
    S3‑173530 Draft agenda related to 5GS_Ph1-SEC for SA3 #90 NTT DOCOMO discussion discussion No
Yesinputs should be sent by Monday 4.12. rapporteur will provide draft version on Tue 5.12. via the SA3 reflector On Thu 7.12. rapporteur will send out the endorsed S3-173530 via the SA3 email reflector
for email discussion No    
7.2.1 Key hierarchy S3‑173144 Update key hierarchy by adding Kseaf and Kausf Huawei & Hisilicon pCR Approval Yes
Yesthere are related Tdocs: Huawei: 3145, 3146, 3147, 3149 Qualcomm: 3294 Ericsson: 3343 Nokia: has a similar proposal in 3129 but fine to go with Ericsson proposal in S3-173343 SA3 chair: so let's see 3149, 3294 and 3343 as well conclusion: S3-173144 is merged in S3-173514
merged No    
    S3‑173332 Security for multiple NAS connections NEC EUROPE LTD pCR Approval Yes
YesNEC: dependent on other topic SA3 chair: so we will not treat it now
not treated No    
7.2.2 Key derivation S3‑173127 Preventing bidding down between 5G releases - discussion - was 2401 Nokia, Qualcomm Incorporated discussion Decision Yes
YesMCC: Tdoc type corrected from pCR to discussion
noted No    
    S3‑173345 Using NAS SMC to protect the FeatureSet in phase 2 Ericsson discussion Approval Yes
Yesproposal: SA3 should conclude that the potential bidding down problem between 5G phases can be solved by NAS SMC. There is no need to solve the problem in phase 1. We would also like to remind that there is no agreement in 3GPP that there will be standalone SEAF in phase 2 Interdigital: has problems to understand the proposal, picture in S3-173345 is insecure Orange: supports Ericsson NTT DOCOMO: supports the Nokia proposal (S3-173127) as it is straightforward Ericsson: no need to negotiate releases over air interface NTT DOCOMO: limits operator deployment on AMF and will be complicated Huawei: when it comes in phase 2 we will address it SA3 chair: some people say "do it in phase 1" while others say "do it in phase 2" Qualcomm: you may get 2 sets of AMFs Orange: we are reopening agreements we had for phase 1 conclusion: no consensus
noted No    
    S3‑173128 Preventing bidding down between 5G releases - was 2403 Nokia, Qualcomm Incorporated pCR Approval Yes
Yes
postponed No    
    S3‑173327 Updates to clause 6.2.2 Key Derivation and distribution scheme and Annex A.7 NEC EUROPE LTD pCR Approval Yes
Yes
not treated No    
    S3‑173129 Computation of Key in AUSF for 5G AKA - was 2416 Nokia pCR Approval Yes
Yesconclusion: merged in S3-173514
merged No    
    S3‑173149 Discussion on Kausf in 5G AKA and EAP-AKA' Huawei & Hisilicon discussion   Yes
YesMCC: type corrected from pCR to discussion
noted No    
    S3‑173145 Kausf in EAP-AKA‘ Huawei & Hisilicon pCR Approval Yes
Yesconclusion: merged in S3-173514
merged No    
    S3‑173146 key derivation for Kseaf in Annex Huawei & Hisilicon pCR Approval Yes
Yesconclusion: merged in S3-173514
merged No    
    S3‑173147 key derivation for Kseaf for 5G AKA Huawei & Hisilicon pCR Approval Yes
Yesconclusion: merged in S3-173514
merged No    
    S3‑173148 key derivation (Kgnb, NH, Kn3iwf) Huawei & Hisilicon pCR Approval Yes
YesEricsson: error on 2nd change and can be merged with Ericsson document Interdigital: first and fourth change same? Qualcomm: editor's note to align KgNB and KN3IWF derivation conclusion: ... => Kamf, editor's note will be added
revised No S3‑173517  
    S3‑173517 key derivation (Kgnb, NH, Kn3iwf) Huawei & Hisilicon, Ericsson pCR Approval Yes
Yesincludes also aspects of S3-173082 and S3-173083
approved No   S3‑173148
    S3‑173082 Annex A.X (* derivation function) Ericsson pCR Approval Yes
Yesconclusion: merged into S3-173517
merged No    
    S3‑173083 Annex A.X (KgNB* derivation function) Ericsson pCR Approval Yes
Yesconclusion: merged into S3-173517
merged No    
    S3‑173289 Providing details of the key derivation for the security algorithm keys Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑172370
7.2.3 Mobility S3‑173143 Intra-gNB retaining AS keys exception Huawei, Hisilicon pCR Approval No
Yes
revised No S3‑173212  
    S3‑173212 Intra-gNB retaining AS keys exception Huawei, Hisilicon,China Mobile pCR Approval Yes
Yes
not treated No   S3‑173143
    S3‑173326 Reordering clause 6.5 NEC EUROPE LTD pCR Approval Yes
Yes
not treated No    
    S3‑173096 Clause 8.3.1.3.3 (horizontal key derivation of K_AMF at N2-Handover) Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173238 Kamf Derivation when AMF set changes Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173386 Idle mode mobility with horizontal key derivation Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173137 Flexible retaining AS keys solution Huawei, Hisilicon, China Mobile pCR Approval Yes
Yes
rejected No    
    S3‑173150 Modifications of Clause 8.3.1.1 Huawei & Hisilicon pCR Approval Yes
Yes
not treated No    
7.2.4 AS security S3‑173084 Clause 8 (open issues in AS security) Ericsson discussion Discussion Yes
Yes
noted No    
    S3‑173366 Discussion on user plane integrity protection for DRB Samsung pCR Approval Yes
YesProposal 1: AS SMC procedure is used to select the UP integrity algorithm. Proposal 2: 5QI value indicates whether to enable the UP integrity protection for a particular DRB or not. Using the 5QI value, the UE and gNB determines whether to apply UP integrity protection and establish the DRB accordingly. Ericsson: supports proposal 1, proposal 2 is up to RAN people Qualcomm: same view as Ericsson Huawei: does not support proposal 1 & 2 Nokia: supports proposal 2 Huawei: Let's keep this Tdoc open and see other Tdocs first conclusion: merged into S3-173516
merged No    
    S3‑173087 Clause 8 and Annex D.1 (user plane security – null-integrity and non-activation of integrity protection) Ericsson pCR Approval Yes
YesHuawei: does not agree with editor's note conclusion: further offline discussion about editor's note needed conclusion: merged into S3-173516
merged No    
    S3‑173088 Clause 8 (user plane security - integrity protection) Ericsson pCR Approval Yes
Yesconclusion: merged into S3-173516
merged No    
    S3‑173402 Nokia comments on S3-173088 Nokia discussion Endorsement Yes
Yes
noted No    
    S3‑173307 Use of integrity protection of user data in 5GS Qualcomm Incorporated pCR Approval Yes
YesEricsson: is reopening a discussion
rejected No    
    S3‑173201 Support No integrity for UP Huawei; Hisilicon pCR Approval Yes
YesEricsson: does not agree with last change Huawei: same view, change not needed NTT DOCOMO: we do not have NIA0 in LTE, they can easily compress it Ericsson: we have NIA0 SA3 chair: we could just have an editor's note and clarify this
revised No S3‑173493  
    S3‑173493 Support No integrity for UP Huawei; Hisilicon pCR Approval Yes
Yes
approved No   S3‑173201
    S3‑173494 Draft LS on over the air overhead of the use of integrity protection algorithm Huawei LS out Approval No
YesEricsson: we do not need to send this LS acc. to latest RAN news
withdrawn Yes    
    S3‑173089 Clause 8 (user plane security - confidentiality) Ericsson pCR Approval Yes
YesHuawei: would like to keep this open conclusion: merged into S3-173516
merged No    
    S3‑173111 Cluase 8.4 UP Security Nokia pCR Approval Yes
Yes
revised No S3‑173495  
    S3‑173495 Cluase 8.4 UP Security Nokia pCR Approval Yes
Yes
approved No   S3‑173111
    S3‑173197 UP security policy determination Huawei; Hisilicon pCR Approval Yes
YesNokia: too much signalling
postponed No    
    S3‑173198 Discussion on granularity of UP seucirty Huawei; Hisilicon,ZTE discussion Approval Yes
YesMCC: tyoe corrected from pCR to discussion Proposal 1: Option a) is endorsed by SA3. Proposal 2: Send a LS to SA2 and RAN2 to inform the AS security mechanism. Ericsson: requires more offline discussion Nokia: Tdoc is linked to granularity discussion
noted No    
    S3‑173199 pCR on UP protection granulairty Huawei; Hisilicon pCR Approval Yes
Yesconclusion: merged into S3-173516
merged No    
    S3‑173090 Clause 8 (relation between RRC and user plane security algorithms) Ericsson pCR Approval Yes
Yesconclusion: merged into S3-173516
merged No    
    S3‑173091 Clause 8 (conflict between RAN and CN) Ericsson pCR Approval Yes
YesHuawei: is an overload issue, does not agree to editor's note Qualcomm: if this is a problem, then we need to address it conclusion: merged into S3-173516
merged No    
    S3‑173112 Clause 5.2.9 Requirements for gNB DU-CU interface Nokia, Telecom Italia pCR Approval Yes
YesHuawei: wants to add a note Ericsson: supports to go with Nokia proposal
revised No S3‑173496  
    S3‑173496 Clause 5.2.9 Requirements for gNB DU-CU interface Nokia, Telecom Italia pCR Approval Yes
Yes
approved No   S3‑173112
    S3‑173395 pCR to 33.501 to 5.2.9 - Requirements for F1 interface revisited DOCOMO Communications Lab. pCR Approval Yes
Yessee S3-173496 instead
rejected No    
    S3‑173023 LS on security during Resume reject in INACTIVE state in NR R2-1712052 LS in   Yes
YesQuestions from the LS: Q.1: Does SA3 have any security concern with the above RAN2 agreement? For example, there can be DoS attack by a fake gNB sending one or more successive response messages with Wait timer. Further RAN2 would like to ask if SA3 has any comments regarding the Wait timer values. Q.2: Does SA3 sees any risk of replay attacks, from re-using the same I-RNTI and same key to derive the (short) MAC-I for the subsequent resume request message after a rejection? Nokia: we need to reply on this conclusion: LS answer postponed
postponed No    
    S3‑173072 Security aspects of RESUME REJECT in INACTIVE state in NR ZTE Corporation discussion Approval Yes
Yes
not treated No    
    S3‑173211 Discussion on Security Issues with RRC Reject for INACTIVE Mode Intel Corporation (UK) Ltd discussion Decision Yes
Yes
not treated No    
    S3‑173086 Clause 8.1.2.2 (AS security mode command procedure) for RRC Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173186 pCR to TS 33.501 Security handling in for RRC Connection Re-establishment Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173195 Security-algoritms-negotiation-for-Initial-AS-security-context Huawei, Hisilicon, China Mobile pCR Approval Yes
Yesconclusion: merged into S3-173516
merged No    
    S3‑173085 Clause 8.1.2.1.1 (AS algo. initial context) for RRC Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173196 AS Security Negotiation and Activation Huawei; Hisilicon pCR Approval Yes
Yesconclusion: merged into S3-173516
merged No    
    S3‑173187 pCR to TS 33.501 5G-RAN key identification Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173188 pCR to TS 33.501 5G-RAN key lifetimes Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173180 Adding context on Establishment of keys for cryptographically protected radio bearers (subclause 8.2.1.2.2) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173142 Security Procedures between 5G Network Functions Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173136 Address EN in requirements for gNB setup and configuration Huawei, Hisilicon, pCR Approval Yes
Yes
not treated No    
    S3‑173202 Requirements for UP and CP for the gNB Huawei, Hisilicon, China Mobile pCR Approval Yes
Yes
not treated No    
    S3‑173203 Replay protection Huawei; Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173204 Integrity clause Huawei; Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173205 Confidentiality clause Huawei; Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173141 Adding Forward & Backward Security definition to TS33.501 Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173190 Draft reply LS to R2-1712052 = S3-173023 on security during Resume reject in INACTIVE state in NR (to: RAN2; cc: -; contact: Huawei) Huawei, Hisilicon LS out Approval Yes
YesMCC: compare to S3-173213 and S3-173389
not treated No    
    S3‑173200 Draft LS on AS security (to: SA2, RAN2; cc: -; contact: Huawei) Huawei; Hisilicon LS out Approval Yes
Yesconclusion: LS will not be sent
rejected No    
    S3‑173389 Draft reply LS to R2-1712052 = S3-173023 on security during Resume reject in INACTIVE state in NR (to: RAN2; cc: -; contact: Ericsson) Ericsson LS out Approval Yes
YesMCC: Tdoc is not an LSout as it does not use the LSout template; compare S3-173213 and S3-173190
not treated No    
    S3‑173094 Clause 8.2.2.1 (key handling – RRC INACTIVE/CONNECTED state transition) Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173179 Adding context on Transition from CM-IDLE to CM-CONNECTED (subclause 8.2.1.2.1) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173181 Adding context on Transition from CM-CONNECTED to CM-IDLE (subclause 8.2.1.2.3) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173213 Draft reply LS to R2-1712052 = S3-173023 on security during Resume reject in INACTIVE state in NR (to: RAN2; cc: -; contact: Intel) Intel Corporation (UK) Ltd LS out Approval Yes
YesMCC: LS does not indicate draft in the title and has source: SA3; compare S3-173389 and S3-173190
not treated No    
    S3‑173189 Discussion on security during Resume reject in INACTIVE state in NR Huawei, Hisilicon discussion Discussion Yes
Yes
not treated No    
    S3‑173095 Clause 8.2.2.2 (key handling – RRC INACTIVE mobility) Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173092 UE-assisted network-based detection of false-cell-camping - disc Ericsson, AT&T, China Mobile, T-Mobile USA discussion Endorsement Yes
Yes
not treated No    
    S3‑173035 Support of PKI for NodeB Authentication AT&T, MITRE, Interdigital, TCG discussion Decision Yes
Yestreated in connection with S3-173064; BT: how do we get emergency calls to work? is unncessary for commercial networks at the moment, you could do this proprietary if you really need it Ericsson: we see a value of a SI but not now; Orange: SI about the support of a solution is not appropriate, it should be about requirements; BT: limited system for special customers; SA3 chair: due to current time pressure bringing the WI/SI proposal at a later stage (after completion of phase 1) would be better; Qualcomm: also suggests to look at the TR in which we collected the threats Orange: sees that the proposed WI/SI has also RAN and SA2 impact Ericsson: suggests to look also at S3-173093
noted No    
    S3‑173093 UE-assisted network-based detection of false-cell-camping - pCR Ericsson, AT&T, China Mobile, T-Mobile USA pCR Approval Yes
YesEricsson: also Telecom Italia is supporting this Nokia: supports the Tdoc but suggests to add something to 8.2.3 SA3 chair: someone against the proposal? KPN: some worries Qualcomm: no changes needed ? Ericsson: not in phase 1 Qualcomm: why not putting it in the informative annex? there is no change of the normative part Huawei: same view as Qualcomm and KPN Orange: agrees with Huawei, this may also have impact on RAN
revised No S3‑173499  
    S3‑173499 UE-assisted network-based detection of false-cell-camping - pCR Ericsson, AT&T, China Mobile, T-Mobile USA pCR Approval Yes
YesEricsson: only Annex remained
approved No   S3‑173093
    S3‑173365 pCR on signalling procedure for periodic local authentication Samsung pCR Approval Yes
Yes
not treated No    
    S3‑173510 Draft LS on UP security policy (to: SA2, RAN3; cc:-; contact: Huawei) Huawei LS out Approval No
YesEricsson: not sure about algorithms in bullet list Huawei: would be fine for phase 1 Nokia: why is RAN2 in the to: list? Ericsson: which group defines policy control function? Huawei: then we include also CT3 on cc:
withdrawn Yes S3‑173520  
    S3‑173520 LS on User Plane Security Policy (to: SA2, RAN3; cc: CT3; contact: Huawei) SA3 LS out Approval Yes
Yes
approved No   S3‑173510
    S3‑173511 Report from offline session about UP security granularity NTT DOCOMO report discussion Yes
Yesoffline discussion was held during Thu lunch break SA3 chair: so points 7 and 10 are still under discussion NTT DOCOMO: 1. was the basis
noted No    
    S3‑173516 Agreements on UP security Ericsson, Huawei, Samsung, Qualcomm, Nokia, HiSilicon pCR Approval Yes
Yesthis pCR is merging aspects of the following pCRs: Ericsson: 3087, 3088, 3089, 3090, 3091 Huawei: 3195, 3196, 3199 after the results of the offline discussion in S3-173511
approved No    
7.2.5 NAS security S3‑173108 Clause 6.6.2.2 Multiple active NAS connections Nokia pCR Approval Yes
YesSA3 chair: we will discuss S3-173108, S3-173371, S3-173300, S3-173331, S3-173234, S3-173193 together
not treated No    
    S3‑173371 Multiple active NAS connections in the same PLMN’s serving network Ericsson pCR Approval Yes
YesEricsson: similar to Nokia's proposal, Nokia assumes dynamic handling
not treated No    
    S3‑173300 Discussion on the NAS security contexts when registered on both 3GPP and non-3GPP access in the same PLMN Qualcomm Incorporated discussion Endorsement Yes
Yes
noted No    
    S3‑173331 Threat model without multiple NAS keys NEC EUROPE LTD pCR Approval Yes
Yes
rejected No    
    S3‑173234 Adding content to NAS security Huawei, Hisilicon pCR Approval Yes
Yes
rejected No    
    S3‑173193 Add new requirements for multiple registrations in the same PLMN Huawei, Hisilicon, China Unicom pCR Approval Yes
YesSA3 chair: we will discuss S3-173108, S3-173371, S3-173300, S3-173331, S3-173234, S3-173193 together Ericsson: all proposals are rather close together apart from NEC proposal Intel: does it work for reauthentication? Nokia: reauthentication is simple (only when 2 it's complex), dispute is within one PLMN Intel: fine if same for all access technologies conclusion: further offline discussion needed
rejected No    
    S3‑173107 Clause 6.6.5 Handling of NAS counts -multiple NAS links Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173109 Clause 6.3.4.2 Multiple registrations in same PLMN Nokia pCR Approval Yes
Yesnot treated after S3-173330
not treated No    
    S3‑173106 Changes for Multiple NAS links Annex D Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173359 Multiple registrations in different PLMNs serving networks Ericsson pCR Approval Yes
Yes
postponed No    
    S3‑173177 Adding context on Transition from RM-REGISTERED to RM-DEREGISTERED (subclause 8.2.1.1.1) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173178 Adding context on Transition from RM-DEREGISTERED to RM-REGISTERED (subclause 8.2.1.1.2) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173383 Connection state transitions in TS 33.501 Ericsson, Huawei, Hisilicon pCR Approval Yes
Yes
revised No S3‑173489  
    S3‑173489 Connection state transitions in TS 33.501 Ericsson, Huawei, Hisilicon pCR Approval No
Nomerges also S3-173179, S3-173180, S3-173181
withdrawn Yes   S3‑173383
    S3‑173382 Registration state transitions in TS 33.501 Ericsson, Huawei, Hisilicon pCR Approval Yes
Yes
revised No S3‑173488  
    S3‑173488 Registration state transitions in TS 33.501 Ericsson pCR Approval No
Nomerges also S3-173177, S3-173178
withdrawn Yes   S3‑173382
    S3‑173184 pCR to TS 33.501 KDF negotiation Huawei, Hisilicon pCR Approval Yes
Yestreated in connection with S3-173328/3329
rejected No    
    S3‑173403 Nokia comments on KDF negotiation contributions 3184,3328,3329 Nokia discussion Endorsement Yes
Yestreated in connection with S3-173328/3329
noted No    
    S3‑173362 New requirements for algorithm selection in TS 33.501 Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173097 Clause 6.6.6 (rectifying partial protection aspects) Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173293 Aligning the protection of initial NAS messages and the NAS Security Mode procedure subclauses Qualcomm Incorporated pCR Approval Yes
Yes
not treated No   S3‑172383
    S3‑173404 Commenting contribution on S3-173293 for protection of initial NAS message Huawei Tech.(UK) Co., Ltd discussion Discussion Yes
Yes
not treated No    
    S3‑173405 Companion pCR to S3-173304 Huawei Tech.(UK) Co., Ltd pCR Approval Yes
Yes
not treated No    
    S3‑173110 Clause 6.7.2 NAS SMC procedure (over any NAS connection) Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173176 Corrections on NAS security mode command procedure (subclause 6.7.2) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173185 Delete allowed NSSAI in NAS SMC Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173361 Exception lists of NAS and RRC message to be integrity protected and encrypted Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173156 Enforcement of Session Key with DH Procedure in Serving Networks Huawei & Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173262 pCR to 33.501 - DH procedure with AMF for protection against passive eavesdropping VODAFONE Group Plc pCR Approval Yes
Yes
not treated No    
    S3‑173275 pCR- Updating NAS security mode command procedure China Mobile pCR Approval Yes
Yes
withdrawn Yes    
    S3‑173276 pCR- Updating NAS security mode command procedure China Mobile pCR Approval Yes
Yes
not treated No    
    S3‑173277 Adding Security Mode of the Session key to the SMC procedure China Mobile discussion   Yes
Yes
not treated No    
7.2.6 Security context management S3‑173175 Adding the requirement of NEA0 and NIA0 Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑173173 Fixing the definition of NEA and NIA Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑173308 Multiple Registrations in different PLMNs using K_AUSF Qualcomm Incorporated pCR Approval Yes
YesDeutsche Telekom: is this optimisation really needed Qualcomm: is optional feature for UE and network Ericsson: not really needed in phase 1 Orange: key derivation should be discussed first Nokia: we have a number of comments and this proposal cannot work Ericsson: has a different solution in S3-173359
postponed No    
    S3‑173330 Multiple registrations in the same PLMN NEC EUROPE LTD pCR Approval Yes
YesEricsson: belongs to same set of documents that were postponed Nokia: S3-173109 clashes with this pCR Huawei: S3-173192 also clashes with this pCR
postponed No    
    S3‑173364 New UE requirement to store two 5G security contexts in TS 33.501 Ericsson pCR Approval Yes
YesQualcomm: is in wrong place Ericsson: would like to postpone this
postponed No    
    S3‑173328 Discussion on UE 5G Security Capability with KDF identifiers NEC EUROPE LTD discussion Discussion Yes
YesMCC: Tdoc type corrected from pCR to discussion
noted No    
    S3‑173329 KDF ID to be included as a part of UE Security capabilities NEC EUROPE LTD pCR Approval Yes
YesHuawei: has a related Tdoc in S3-173184 (AI 7.2.5) Nokia: has S3-173403 (AI 7.2.5)
rejected No    
    S3‑173105 Handling security contexts within the serving network Nokia, Huawei, HiSilicon pCR Approval Yes
YesNokia: also Ericsson is supporting this Tdoc Qualcomm: why should subscriber identity in the clear Orange: should be replaced by SUPI Ericsson: under 6.3.3.4 in 2nd paragraph: wondering about "upgraded"
revised No S3‑173519  
    S3‑173519 Handling security contexts within the serving network Nokia, Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑173105
7.2.7 Visibility & configurability S3‑173218 Security visibility China Unicom pCR Approval Yes
Yes
not treated No    
    S3‑173396 pCR to 33.501 5.4.1 - Clarification of security indication NTT DOCOMO, Department of Commerce, KPN pCR Approval Yes
Yes
not treated No    
    S3‑173227 Clarification of security indication for UE (subclause 5.4.1) LG Electronics pCR Approval Yes
Yes
not treated No    
    S3‑173126 Visibility and configurability supporting serving network authorization Nokia, LG pCR Approval Yes
Yes
not treated No    
    S3‑173219 Security configurability China Unicom pCR Approval Yes
Yes
not treated No    
7.2.8 Primary authentication S3‑173104 Clause 6 5G AKA over non-3gpp access Nokia, Lenovo, Motorola Mobility pCR Approval Yes
Yes
not treated No    
    S3‑173294 Specifying the key derivation when using 5G AKA Qualcomm Incorporated pCR Approval Yes
Yestreated in connection with S3-173144 (AI 7.2.1) conclusion: merged in S3-173514
merged No   S3‑172382
    S3‑173343 Unified handling of Kausf with 5G AKA and EAP-AKA’ Ericsson pCR Approval Yes
Yestreated in connection with S3-173144 (AI 7.2.1)
revised No S3‑173514  
    S3‑173514 Unified handling of Kausf with 5G AKA and EAP-AKA’ Ericsson, Qualcomm, Nokia, Huawei, Hisilicon pCR Approval Yes
Yesis a revision of S3-173343 and will include also changes from merged Tdocs 3144, 3145, 3146, 3147, 3294, 3129
approved No   S3‑173343
    S3‑173312 Adding numbered figure for EAP-AKA' KPN pCR Approval Yes
Yes
not treated No    
    S3‑173313 Adding numbered figure for 5G AKA. KPN pCR Approval Yes
Yes
not treated No    
    S3‑173270 Resolve Editor’s Note in clause 6.1.3.2 of TS 33.501 Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173273 Adding 5G Authentication Confirmation Answer for 5G-AKA Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173269 Removal of the number of AVs requested in Authentication Information Request message Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173397 pCR to 33.501 6.1.2, 6.1.3.2 – only one authentication vector at a time DOCOMO Communications Lab. pCR Approval Yes
Yes
not treated No    
    S3‑173400 Discussion on multiple authentication vectors in response to S3-173397and other docs VODAFONE Group Plc discussion Information Yes
Yes
not treated No    
    S3‑173344 Construction of serving network name with 5G AKA and EAP-AKA’ Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173125 Authorization of SN by UE Nokia, LG pCR Approval Yes
Yes
not treated No    
    S3‑173391 Information about new I-D related to EAP-AKA Ericsson discussion Information Yes
YesMCC: type corrected from pCR to discussion
not treated No    
    S3‑173263 pCR to 33.501 - DH procedure with SEAF for protection against passive eavesdropping VODAFONE Group Plc pCR Approval Yes
Yes
not treated No    
    S3‑173155 Security Procedures for EAP-TLS Huawei, Hisilicon, Ericsson, Qualcomm Incorporated, China Mobile pCR Approval Yes
Yes
not treated No    
7.2.9 Secondary authentication S3‑173342 Alignment with SA2 procedure and general cleanup Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173341 Resolve ENs on use of Normative language Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173228 Clarification on network slice access authentication and authorization LG Electronics pCR Approval Yes
Yes
not treated No    
    S3‑173163 Binding Primary and Secondary authentication Intel Corporation (UK) Ltd discussion Discussion Yes
Yes
not treated No    
    S3‑173401 Comments to S3-173163 China Mobile discussion   Yes
Yes
not treated No    
    S3‑173301 Identifying a problem with secondary authentication Qualcomm Incorporated pCR Approval Yes
Yes
not treated No   S3‑172380
    S3‑173164 Secure binding of primary and secondary authentication Intel Corporation (UK) Ltd pCR Approval Yes
Yes
not treated No    
    S3‑173165 Secure Data Port for Secondary Authentication Intel Corporation (UK) Ltd pCR Approval Yes
Yes
not treated No    
    S3‑173302 pCR to update the secondary authentication procedure to include the authentication/authorization confirmation between UE and SMF when a key generating EAP method is used Qualcomm Incorporated pCR Approval Yes
Yes
not treated No    
    S3‑173157 ID linkage verification in secondary authentication Huawei & Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173303 pCR to update the secondary EAP authentication clause to take into account the roaming scenario Qualcomm Incorporated pCR Approval Yes
Yes
not treated No    
    S3‑173152 Secondary authentication via NEF Huawei & Hisilicon discussion   Yes
YesMCC: type corrected from pCR to discussion Proposal1: The SMF may use the NEF for DN authentication/authorization according to DN policy, local configuration, and/or the application identifier provided by the UE considering the impact to the AF. Proposal2: The DN authentication/authorization function may authenticate/authorize the PDU session establishment and return the authentication/authorization result to the SMF via the NEF. Nokia: is an architecture change, not in line with SA2 Orange: too late to modify SA3 chair: there is no support for the proposals, also related pCR 3151 is not agreed
noted No    
    S3‑173151 Discussion on secondary authentication Huawei & Hisilicon pCR Approval Yes
Yes
rejected No    
    S3‑173158 DN authorization grant and revocation Huawei & Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173166 Secondary Re-Authentication Intel Corporation (UK) Ltd pCR Approval Yes
Yes
not treated No    
    S3‑173159 Secondary Authentication for multiple PDU sessions Huawei & Hisilicon pCR Approval Yes
Yes
not treated No    
7.2.10 Interworking S3‑173170 Discussion on security of interworking with N26 Huawei, Hisilicon discussion Discussion Yes
Yes
revised No S3‑173232  
    S3‑173232 Discussion on security of interworking with N26 Huawei, Hisilicon discussion Discussion Yes
YesProposal 1: MMEs are mandatory to upgrade for interworking if the above observations are taken into consideration. Proposal 2: Native security context takes precedence over mapped security context in the target system, but the source system is always required to verify the UE with its native security context when it receives the context request message. Proposal 3: The anchor key shall never be sent to the other system during the interworking procedure. Nokia: does not agree to proposal 1 Qualcomm: disagrees with proposal 1 Ericsson: should we say "no MME impact"? Qualcomm: it shall be possible to have interworking with legacy MMEs, so no upgrading should be needed for 4G-5G interworking Huawei: if no change how would MME find out that coming in UE is 5G capable? Ericsson: we do not yet need to agree to proposal 3 Orange: if SA2 is deciding to modify MME, then there is no problem for us to change but if they do not change, then we should follow SA3 chair: so you want to check with SA2? Orange: yes conclusion: proposal 1 and 3 not agreed; instead of proposal 1 the following was agreed: support for legacy MME is mandatory; instead of proposal 2 the following is agreed: "Native security context takes precedence over mapped security context in the UE"
noted No   S3‑173170
    S3‑173346 Discussion on the security for interworking between EPC and 5GC Ericsson discussion Approval Yes
YesProposal 1: The security mechanisms for interworking shall minimize, if not possible to avoid, impact on 4G. Proposal 2: The security mechanisms for interworking shall maintain at least the same level of security compared to 4G. This does not overrule the introduction of improvements. Proposal 3: The security mechanisms for interworking shall not prevent the independent evolution of 5G security. Proposal 4: The system shall provide mechanisms to protect the confidentiality and the integrity protection of the transferred UE context data for interworking. Proposal 5: The system shall provide a mechanism to authenticate the trigger message before transfer of the UE context for interworking. Proposal 6: The system shall provide backward security from 5G to 4G. Proposal 7: The system shall provide integrity protection of the initial NAS message for idle mode mobility both from 5G to 4G and from 4G to 5G. Huawei: as we said MME shall not be changed, proposal 1 is not ok Nokia: proposal 2 is unclear Ericsson: it means: we have 4G security in 5G we may want more Vodafone: should proposal 4 not say "5G system"? Qualcomm: proposal 4 should clarify: transfer between core network nodes Qualcomm: is proposal 5 just for idle mode mobility (it makes no sense in other cases)? Ericsson: yes, most interesting in idle mode Nokia: not really sure what proposal 5 wants to say Qualcomm: proposal 7 is not related to interworking, we will do it anyway conclusions: proposal 1 not agreed; instead of proposal 2 only first part is agreed: "The security mechanisms for interworking shall maintain at least the same level of security compared to 4G."; proposal 3 is agreed; instead of proposal 4 it is agreed: The system shall provide mechanisms to protect the confidentiality and integrity of the UE context data when transferred between network nodes for interworking; proposal 5 needs further offline discussion; proposal 6 is agreed; proposal 7 is not agreed
revised No S3‑173457  
    S3‑173457 Discussion on the security for interworking between EPC and 5GC Ericsson discussion Approval No
Yes
withdrawn Yes   S3‑173346
    S3‑173304 Security handling for interworking between NextGen Core and EPC Qualcomm Incorporated discussion Endorsement Yes
YesProposal #1: To support 5GC to EPC mobility, AMF shall be able to derive a key from KAMF that would be used by the MME to create a security context. Proposal #2: AMF shall be able to derive a native EPS security context. Proposal #3: To support EPC to 5GC mobility, MME shall be able to derive a key from KAMSE which would be used create a security context at SEAF. Proposal #4: To support interworking with a legacy MME, AMF shall be able to create a 5G security context using the EPS security context received from MME. Furthermore, AMF shall be able to set a key usage information (e.g., native or mapped) to the 5G security context. Proposal #5: AMF shall be able to retrieve a native 5G security context if available. Nokia: proposals 1, 2 and 5 are ok for us conclusion: proposal 1 is agreed instead of proposal 2 it is agreed: AMF shall be able to retrieve a native 5G security context if available. proposal 3 is not agreed proposal 4 is agreed instead of proposal 5 it is agreed: AMF shall be use the native 5G security context if available.
noted No   S3‑172385
    S3‑173073 Discussion paper on retaining security context in Interworking Nokia discussion Approval Yes
YesProposal 1: To support integrity protection of the idle mode moblity management (MM) message to the target network, the UE shall store the current security context (mapped or native) for the previously visited network for a limited period. Proposal 2: To support integrity check of the idle mode MM message, the source network shall store the security context for the UE for a limited period. Proposal 3: The target network shall verify the integrity of the idle mode MM message if it has the current security context for the UE. Proposal 4: If the target network successfully verified the integrity of the idle mode MM message, it shall not consider the mapped security context from the source network. In this case, the target network shall continue to use the stored current security context for the UE. Proposal 5: The target network shall use the existing parameter “MS validated” to indicate to the source network in the Context Request message that it has successfully validated the UE. The source network shall skip integrity check if “MS validated” is TRUE. Proposal 6: Send an LS to SA2, inform them of the above proposals – if agreed by SA3 – and ask them to add corresponding functionality to their specs, in particular for proposal 2. Ericsson, Huawei: we do not need proposals 1/2/3 Ericsson: for proposal 6 we have already an LS for this conclusion: proposals 1, 2, 3 are not agreed proposals 4, 5, 6 are agreed
noted No    
    S3‑173334 Skeleton proposal for clause 9 - Security of interworking NEC EUROPE LTD pCR Approval Yes
YesEricsson: should we not do Ericsson's restructuring first? conclusion: NEC's input can be addressed under Ericsson's restructuring in S3-173392
merged No    
    S3‑173233 Interworking with EPC without N26 interface Huawei, Hisilicon pCR Approval Yes
YesEricsson: has a lot of text from SA2 text, so not supporting to include this part in the SA3 spec SA3 chair:yes, we need avoid duplication
postponed No    
    S3‑173347 Proposal for a new subclause 9.X on the registration mode and the applicability of the security mechanisms for interworking between 4G and 5G Ericsson pCR Approval Yes
YesNokia: prefers S3-173347 over S3-173233
revised No S3‑173466  
    S3‑173466 Proposal for a new subclause 9.X on the registration mode and the applicability of the security mechanisms for interworking between 4G and 5G Ericsson pCR Approval Yes
Yes
approved No   S3‑173347
    S3‑173305 pCR to provide a general text for interworking between 5GC and EPC Qualcomm Incorporated pCR Approval Yes
Yesconclusion: section 9.1 will be merged into S3-173466
merged No   S3‑172386
    S3‑173075 Integrity protection of idle mobility message during Interworking Nokia discussion Approval Yes
Yes
not treated No    
    S3‑173074 Discussion paper on Interworking with a legacy MME Nokia discussion Approval Yes
Yes
not treated No    
    S3‑173172 handover procedures between 5GC and EPC with N26 Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173078 Handover from 4G to 5G Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173079 Handover from 5G to 4G Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173337 Handover procedure from EPS to 5GS NEC EUROPE LTD pCR Approval Yes
Yes
not treated No    
    S3‑173335 Handover procedure from 5GS to EPS NEC EUROPE LTD pCR Approval Yes
Yes
not treated No    
    S3‑173379 Proposal for a new subclause 9.Z.X on interworking security in handover from 4G to 5G Ericsson LM pCR Approval Yes
Yes
not treated No    
    S3‑173380 Proposal for a new subclause 9.Z.X on interworking security in handover from 5G to 4G Ericsson LM pCR Approval Yes
Yes
not treated No    
    S3‑173171 Idle mode mobility between EPC and 5GC with N26 Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173076 Idle mode mobility from 4G to 5G Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173077 Idle mode mobility from 5G to 4G Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173350 Proposal for a new subclause 9.Y.X on interworking security in idle mode from 4G to 5G Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173351 Proposal for a new subclause 9.Y.X on interworking security in idle mode from 5G to 4G Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173348 Proposal for a new subclause 9.X on mapping of security contexts during interworking between 4G and 5G Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173349 Draft reply LS to S2-178210 = S3-173030 on security handling for EPC-5GC interworking (to: SA2; cc: -; contact: Ericsson) Ericsson LS out Approval Yes
YesMCC: source is already SA3
revised No S3‑173508  
    S3‑173508 Reply LS to S2-178210 = S3-173030 on security handling for EPC-5GC interworking (to: SA2; cc: -; contact: Nokia) SA3 LS out Approval Yes
YesEricsson: worried about overhead where you have trust in 4G system LS was sent out on Thu evening of SA3 #89
approved No   S3‑173349
    S3‑173048 Security for idle mobility between 4G and 5G ZTE Corporation discussion Approval Yes
Yes
not treated No    
    S3‑173521 Agreements on interworking Nokia discussion discussion Yes
Yes
endorsed No    
7.2.11 Non-3gpp access S3‑173182 multiple NAS keys at AMF when UE connectes to the AMF belonging to different Operators Huawei, Hisilicon pCR Approval No
Yes
withdrawn Yes    
    S3‑173183 signal NAS keys at AMF when UE connects to the AMF belonging to the same Operaotr Huawei, Hisilicon pCR Approval No
Yes
withdrawn Yes    
    S3‑173192 Add a new requirement in scenario when UE has multiple registration in different PLMNs Huawei, Hisilicon, China Unicom pCR Approval Yes
Yesnot treated after S3-173330
not treated No    
    S3‑173251 Authentication for Untrusted Non-3GPP Access using EAP Motorola Mobility, Lenovo, LG Electronics, Nokia, KPN, Broadcom, Brocade pCR Approval Yes
Yes
not treated No    
7.2.12 NDS S3‑173046 Protecting sensitive information transmitted between operators - reference point presentation ZTE Corporation, China Unicom pCR Approval Yes
Yes
not treated No   S3‑172203
    S3‑173206 Add Management Plane Protection Huawei; Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173207 Add management reference to gNB setup and configuration Huawei; Hisilicon pCR Approval Yes
Yes
not treated No    
7.2.13 Service based architecture S3‑173246 Security requirements for service based architecture Neul Limited pCR Approval No
Yes
revised No S3‑173255  
    S3‑173250 Authentication in the service registration procedure Neul Limited pCR Approval No
Yes
revised No S3‑173256  
    S3‑173253 Authorization of NF service discovery Neul Limited pCR Approval No
Yes
revised No S3‑173258  
    S3‑173258 Authorization of NF service discovery Huawei, Hisilicon pCR Approval Yes
Yes
not treated No   S3‑173253
    S3‑173255 Security requirements for service based architecture Huawei, Hisilicon pCR Approval Yes
YesDeutsche Telekom: has a problem with the language used here, "should" means no guarantee, we need "shall" Intel: has related Tdocs in S3-173209 and S3-173210 conclusion: authorization aspect will be merged into S3-173483
merged No   S3‑173246
    S3‑173209 Security requirements for Service Based Architecture Discovery Intel Corporation (UK) Ltd pCR Approval Yes
Yesconclusion: title will be changed, shall support, authorization will be added (merged with Huawei text)
merged No    
    S3‑173210 Security requirements for Service Based Architectur Registration Intel Corporation (UK) Ltd pCR Approval Yes
YesDeutsche Telekom: authorization request should be added conclusion: title will be changed, shall support, authorization will be added (merged with Huawei text)
revised No S3‑173483  
    S3‑173483 Security requirements for Service Based Architectur Registration Intel Corporation (UK) Ltd pCR Approval Yes
Yeswill include aspects of S3-173255 and S3-173209
approved No   S3‑173210
    S3‑173153 Adding KI of Service authorization to living doc Huawei & Hisilicon pCR Approval Yes
Yesconclusion: will be added into living Tdoc S3-173484
endorsed No    
    S3‑173484 Living document for service based architecture Nokia discussion discussion Yes
Yesincludes also aspects of S3-173486, S3-173490
endorsed No    
    S3‑173208 NRF Requirements Huawei; Hisilicon pCR Approval Yes
YesEricsson: first requirement is unclear NTT DOCOMO: not shared conclusion: req. 1 will be split into 2 (rest of req. 1 will be removed), req. 2 and editor's notes at the end will be removed; "NRF shall" will be integrated in requirements; req.3 will be removed
revised No S3‑173485  
    S3‑173485 NRF Requirements Huawei; Hisilicon pCR Approval Yes
YesDeutsche Telekom raised concerns about the word „may“ in the second NRF requirement, citing the agreed SBA security goal goal #4.
approved No   S3‑173208
    S3‑173220 Security for Service Based Interconnect interfaces Nokia, Deutsche Telecom discussion Approval Yes
YesProposal 1: Add in the 5G architecture a network element at the edge of the service provder network that allows for interconnect security to be implemented, in addition to other security policies such topology hiding etc. Proposal 2: Implement e2e application layer security in the network element at the edge of the network. Proposal 3: Add in the 5G architecture the possibility for active intermediate security end-nodes that may manipulate application layer information as it traverses through it. Proposal 4: Delegation of e2e application layer security to another service provider must be allowed in 5G Proposal 5: Delegation of e2e application layer security to roaming hubs must be allowed in 5G. Proposal 6: Take FS.19 – Diameter Interconnect Security, as the basis to identify Information elements (IEs) that need e2e protection in 5G SBA Proposal 7: Map identified IEs into one of the protection categories identified in clause 4.1.5 above. NTT DOCOMO: Ericsson is against security at edge proxy? Ericsson: no, but not all Ericsson: for proposals 4 & 5 we need an extra discussion document conclusion: proposal 1 is agreed, instead of proposal 2 it is agreed: Consider implementation of application layer security in SEPP proposal 3 is agreed (end has to be removed), proposals 4 and 5 not agreed proposals 6 and 7 agreed
revised No S3‑173486  
    S3‑173486 Security for Service Based Interconnect interfaces Nokia, Deutsche Telecom discussion Approval Yes
Yesconclusion: will be included into living Tdoc S3-173484
endorsed No   S3‑173220
    S3‑173221 Security architecture for Service Based Interconnect Interfaces Nokia, Deutsche Telecom discussion Approval Yes
YesEricsson: we have LS we sent to SA2 on Wed
noted No    
    S3‑173222 pCR on Requirement for e2e core network interconnection security Nokia, Deutsche Telecom pCR Approval Yes
YesDeutsche Telekom: it's not a proxy function but just a proxy conclusion: "function" in "proxy function" will be removed
revised No S3‑173487  
    S3‑173487 pCR on Requirement for e2e core network interconnection security Nokia, Deutsche Telecom pCR Approval Yes
Yes
approved No   S3‑173222
    S3‑173261 Protection of the communication between NFs Huawei, Hisilicon pCR Approval Yes
YesDeutsche Telekom, Orange: do not accept this proposal
rejected No    
    S3‑173047 Protecting sensitive information transmitted between operators - SBA ZTE Corporation, China Unicom pCR Approval Yes
YesEricsson: visited network is never authenticated Deutsche Telekom: per user basis is not acceptable to us
rejected No    
    S3‑173314 Discussion on adopting GSMA recommendations for IPX Security. KPN discussion Endorsement Yes
Yesproposals: • SA3 agrees to adopt the integrity protection mechanism proposed by GSMA; • SA3 agrees to adopt the confidentiality protection mechanism proposed by the GSMA; • SA3 agrees to the overall structure of the messages with a message-content part and a signature part as proposed in the GSMA document; • SA3 agrees to use the mechanisms in either [2] or [3] for the encrypted containers and the signature-part of the messages. KPN: proposals are for email discussion
noted No    
    S3‑173223 Application layer security based on JOSE framework Nokia, Deutsche Telecom discussion Approval Yes
Yes
noted No    
    S3‑173224 pCR on Application layer security Nokia, Deutsche Telecom pCR Approval Yes
YesNTT DOCOMO: you must explain what is the basis of the pCR; suggests and editor's note (regarding CT4 and 2 parallel https)
revised No S3‑173490  
    S3‑173490 pCR on Application layer security Nokia, Deutsche Telecom pCR Approval Yes
Yesconclusion: merged into S3-173484
merged No   S3‑173224
    S3‑173154 Merge two procedures of SBA authorization Huawei, Hisilicon, InterDigital pCR Approval Yes
Yes
not treated No    
    S3‑173259 Authorization of NF service access Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173225 OAuth 2.0 based service authorization for SBA Nokia discussion Decision Yes
Yes
not treated No    
    S3‑173226 pCR on OAuth based service authorization for SBA Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173257 Discussion and pCR about NF authentication for SBA China Mobile other   Yes
Yes
not treated No    
    S3‑173376 Including authentication into authorization aspects Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173377 Add section for authentication between network functions Ericsson pCR Approval Yes
Yes
not treated No    
    S3‑173256 Authentication in the service registration procedure Huawei, Hisilicon pCR Approval Yes
Yes
not treated No   S3‑173250
    S3‑173526 [Draft] LS on security across inter-operator interconnect (to: CT4; cc: -; contact: Deutsche Telekom) Deutsche Telekom, NTT DOCOMO LS out Approval Yes
Yes
revised No S3‑173527  
    S3‑173527 LS on security across inter-operator interconnect (to: CT4; cc: -; contact: Deutsche Telekom) SA3 LS out Approval Yes
Yes
approved No   S3‑173526
7.2.14 Privacy (not covered by other headings) S3‑173070 Solution for meeting LI and privacy requirements CATT pCR Approval Yes
YesOrange: can we treat all proposals together SA3 chair: ok, so after S3-173070 also S3-173098, S3-173124, S3-173138, S3-173398 will be presented
postponed No    
    S3‑173098 Clauses 6.1.3 and 6.7.2 (auth procedures and NAS SMC, SUPI from UE for LI) Ericsson pCR Approval Yes
Yes
postponed No    
    S3‑173124 LI conformity when privacy is used - was 2506 Nokia, Orange pCR Approval Yes
YesOrange if mismatch between what UE and core network is sending, then our proposal is handling this at an early stage NTT DOCOMO: not clear how random R is passed around
postponed No    
    S3‑173138 Meeting SUPI privacy and LI Requirements Huawei, Hisilicon, Intel pCR Approval Yes
Yes
postponed No    
    S3‑173398 pCR to 33.501 6.1.3.1, 6.1.3.2, Annex A – SUPI assurance in SEAF DOCOMO Communications Lab. pCR Approval Yes
YesT-Mobile: supports Nokia proposal, NTT DOCOMO proposal can be attacked KPN: after discussion with regulators: IMSI needs to be got first Vodafone: LI can be done after authentication without problems SA3 LI chair: we discussed in LI group: do we trust anything before authentication is completed? the answer is no; timing: only relevant for first authentication so not a big issue; if encryption is off there is no need to transfer IMSI (no need to support the extras in this) NTT DOCOMO: SUPI will be public and could be misused Qualcomm: agrees with NTT to send NAS security mode complete; has preference to binding to some key; privacy is maintained and controled by home operator Ericsson: what happens if SUPI is send wrongly? Huawei: we heard from SA3 LI that all operator have NAS security enabled Nokia: we are worried how NAS is handled and so in our proposal we avoid sending the SUPI SA3 LI chair: no requirement for sending SUPI over unencrypted that why we assume encryption; proving that a SUPI was received (for court cases) would make a difference in the proposals; Vodafone: our S3-173272 belongs to this set as well SA3 chair: so please present S3-173272
postponed No    
    S3‑173272 Discussion on provision of SUPI from home to visited network VODAFONE Group Plc discussion Discussion Yes
YesOrange: worries that we mix now 2 topics KPN: would support variant 1 Orange: it seems we have 3 proposals supi in NAS SMC (Ericsson/Huawei ...) , hash function (Nokia ...) and binding keys (NTT DOCOMO), can we have a show of hands NTT DOCOMO: still unclear how Nokia proposal works SA3 LI: operator cannot select their own hash algorithm? show of hands: NAS/IMSI complete: ZTE, home office, NCSC, MTECH, BT, Ericsson, Intel, CMCC, CATT, KPN, Samsung, Huawei => 12 hash based: Minsiter eco, Oberthur, Nokia, T-Mobile, Orange, Gemalto => 6 binding: DOCOMO, LG, Qualcomm =>3 NTT DOCOMO: first proposal must make sure that SUPI is never sent unencrypted SA3 LI chair: IMEI more imprtant than IMSI Orange: heard the opposite SA3 LI chair: both are needed but IMEI allows to do things you cannot do with IMSI Huawei: if NAS encryption could be turned off, we need to find a solution T-Mobile: NAS encryption can be turned off Orange: yes, this is part of our spec that optionally NAS encryption can be switched off; so we cannot make at another part of the spec the assumption that it is encrypted Orange: we could think about a vote and/or check the SA3 LI view NTT DOCOMO: a way where we do not send SUPI in the clear would be acceptable for us (then we would drop our binding proposal) SA3 LI chair: response from SA3 LI could only be accepted by March 18
noted No   S3‑172225
    S3‑173099 Clause 6.8.3 (5G-GUTI refresh at periodic registration update) Ericsson, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑173100 Clause 6.8.3 (5G-GUTI refresh at network triggered service request) Ericsson, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑173114 Privacy requirements on the UE - was 2509 Nokia pCR Approval Yes
YesVodafone: does not support the proposal, proposal would need to standardize algorithms Orange: should say "The UE" not "A UE"
revised No S3‑173435  
    S3‑173435 Privacy requirements on the UE - was 2509 Nokia pCR Approval Yes
Yes
approved No   S3‑173114
    S3‑173278 pCR- Updating 5.1.5 Subscriber privacy China Mobile pCR Approval Yes
YesOrange: compromise: The calculation of SUCI shall be done in ME and USIM (and USIM takes precedence). BT: precedence may not be good if this is the weaker implementation Nokia: what about precedence by operator policy? Orange: mandatory in ME, possible in USIM and if in USIM we need to define a precedence Oberthur: wrong and unfair analysis provided in rational by China Mobile: - the ECDH computation delay on M0 was assumed without any optimization enabled however when optimization is enabled performance gain is significant as shown in the referenced paper on performance investigations. - not true that the network will reject the UE after 6s but instead after 30s as the timer of 6s is repeated 5 times before the procedure is aborted.
revised No S3‑173436  
    S3‑173436 pCR- Updating 5.1.5 Subscriber privacy Orange, Gemalto, Oberthur Technologies, Morpho, CATT, KPN, Vodafone, Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑173278
    S3‑173306 pCR: Calculation of SUCI Qualcomm Incorporated pCR Approval Yes
Yes
withdrawn Yes   S3‑172503
    S3‑173384 5G privacy: SUCI calculation Gemalto, G&D, Morpho, Oberthur, Vodafone pCR Approval Yes
Yesconclusion: merged into S3-173436
merged No    
    S3‑173230 Discussion on the use of home network public key LG Electronics discussion Endorsement Yes
Yes
noted No    
    S3‑173231 Inputs of SUCI construction in annex C LG Electronics pCR Approval Yes
YesGemalto: overlap with Ericsson contribution? Ericsson: extra separator on input here in this proposal NT DOCOMO: fixed string not useful
rejected No    
    S3‑173069 Remove editor note related to SIDF location CATT pCR Approval Yes
Yesconclusion: will be merged into S3-173446
merged No    
    S3‑173229 SIDF location clarification in subclause 6.1.2 LG Electronics pCR Approval Yes
Yesconclusion: will be merged into S3-173446
merged No    
    S3‑173117 SIDF purpose in initiation of authentication - 2355 Nokia pCR Approval Yes
YesHuawei: do we need to indicate which protection scheme was used?
revised No S3‑173446  
    S3‑173446 SIDF purpose in initiation of authentication - 2355 Nokia, LG, CATT pCR Approval Yes
Yes
approved No   S3‑173117
    S3‑173118 SIDF functionality - was 2356 Nokia pCR Approval Yes
YesInterdigital: unclear why to standardize because it is a deployment issue whether co-location KPN: authentication center is normally the place, you would not like to put it anywhere in the cloud Ericsson: we do not need editor's note Interdigital, Ericsson: we are fine with UDM SA3 chair: what about the proposed changes? Ericsson: "Functionality" would be a new term, normally we talk about function Nokia: SA2 is using "function" in a different way than SA3 Huawei: editor's note should not be in definitions Orange: has problem with note 2 unde 6.8.x SA3 chair: we had several comments to 6.8x and even the question whether this clause is needed at all conclusion: - first definition: use "Function" instead of Functionality, use "This service" instead of "This functionality" - 2nd definition: first part kept until e.g., MSIN), rest will be removed - editors' note under definitions will be removed - change in abbreviations will be cancelled
revised No S3‑173447  
    S3‑173447 SIDF functionality - was 2356 Nokia pCR Approval Yes
Yes
approved No   S3‑173118
    S3‑173102 Annex C.3 (SUCI, ECIES scheme normative Annex) Ericsson pCR Approval Yes
YesBT: do we have these profile names like top secret ?
revised No S3‑173450  
    S3‑173450 Annex C.3 (SUCI, ECIES scheme normative Annex) Ericsson pCR Approval Yes
YesVodafone: editor's notes should not be used as blocking technique
approved No   S3‑173102
    S3‑173260 pCR to 33.501 - SUPI Encryption Protocol: issues identified by ETSI SAGE VODAFONE Group Plc pCR Approval Yes
YesVodafone: we defined 6 curves while Ericsson defined 2, this is the main difference; advantage: people can at least find 2 curves that they are happy with; suggests to merge part with the curves in the Ericsson Tdoc? Qualcomm: we could not have so many curves Orange: would not agree to only NIST curves, so supporting Vodafone conclusion: curve list will be taken over into S3-173450, other parts can be discussed until next SA3 meeting
merged No    
    S3‑173065 Privacy requirement about who define SUPI protection schemes CATT pCR Approval Yes
YesVodafone: we do not support, it's up to the home operator to design so we want the opposite (MME and user are different); also wondering whether you can restrict SA3 chair: anyone supporting this Tdoc? seems there is no support
rejected No    
    S3‑173066 Remove editor note about choosing null-scheme CATT pCR Approval Yes
YesEricsson: fine with the Tdoc except first change Vodafone: it's assuming a solution of public key, you might not have public key because you do SUPI calculation in USIM BT: any validity for public key? SA3 chair: seems this can not be agreed
rejected No    
    S3‑173068 Remove editor note about visited network require null-scheme CATT pCR Approval Yes
YesEricsson: there are more Tdocs on the scheme (S3-173101, S3-173139, S3-173119)
rejected No    
    S3‑173101 Clauses 5.1.5/6.8.1 and Annex C.2 (SUCI - selection of null-scheme) Ericsson pCR Approval Yes
YesSA3 chair: discuss this further offline and see whether some editor's notes can be removed conclusion: merged into S3-173453
merged No    
    S3‑173139 Subscriber Privacy under Home network control Huawei, Hisilicon pCR Approval Yes
YesNTT DOCOMO: first 2 requirements of 6.8.2 could be kept BT: 2nd one could be changed SA3 chair: can discuss further offline
revised No S3‑173453  
    S3‑173453 Subscriber Privacy under Home network control Huawei, Hisilicon, Ericsson, CATT pCR Approval Yes
Yes
approved No   S3‑173139
    S3‑173119 Discussion paper on null-scheme SUCI request by VN Nokia pCR Approval Yes
YesNTT DOCOMO: before we implement the feature we need to figure out which countries would really have a problem BT: is it about countries or is there a finer granularity NCSC: we will not be able to ask all countries' regulators Ericsson: if a country does not allow it, they can handover to 4G NTT DOCOMO: home control on visited network could be retrofit in newer UEs later SA3 chair: we have higher priority topics and this topic seems to need more discussion
rejected No    
    S3‑173115 Requirement on AMF - was 2354 Nokia pCR Approval Yes
Yes
rejected No    
    S3‑173311 Procedure for mandating null-scheme SUCI KPN, Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173310 Adding Null scheme mandatory messages KPN, Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173174 Adding the content on Subscription identification procedure(6.8.4) Huawei, Hisilicon pCR Approval Yes
Yes
not treated No    
    S3‑173123 Resolving editors note on null-SUCI or SUPI for emergency call handling -v1.doc Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173140 Moving UE handling SUCI to SUCI clause Huawei, Hisilicon, China Mobile pCR Approval Yes
Yes
not treated No    
    S3‑173116 SUCI introductionary text merging 6.8.1 and 6.8.2 - merge 2362 and 2354 Nokia, KPN pCR Approval Yes
Yes
not treated No    
    S3‑173121 UDM requirements - key management and privacy - was 2358 Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173120 Privacy related functions in UDM Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173122 Privacy data UDR - split from 2356 Nokia pCR Approval Yes
Yes
not treated No    
    S3‑173067 Remove editor note about how to connect to 5G network CATT pCR Approval Yes
Yes
not treated No    
    S3‑173071 Solution for raw public key provisioning CATT pCR Approval Yes
Yes
not treated No    
7.2.15 Others S3‑173029 Reply LS on applicability of service based interface for legacy core network elements S2-178205 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173007 LS on secure storage and processing of subscription credentials S1-173475 LS in   Yes
YesLS was seen in the previous ad hoc, we will come back to it later this week conclusion: LS answer iss postponed
postponed No    
    S3‑173008 Update on the status of the work on SSP (Smart Secure Platform) ETSI TC SCP LS in   Yes
YesVodafone: LS is out-of-date, we need the latest status conclusion: no LS answer
noted No    
    S3‑173009 NGMN Paper on 5G End-to-end Architecture Framework NGMN LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173013 Reply LS on PLMN and RAT selection policies for roaming C1-174589 LS in   Yes
YesVodafone: they ignored a part of our LS; is creating a secure channel to MME which is not secure BT: also undear which system is considered Deutsche Telekom: supports Vodafone SA3 chair: so we need to send them an answer that we do not want this as this is wrong; do we have a related discussion Tdoc or LS reply? Orange: we clarified that their previous LS was not clear and as answer they just send us references to these Tdocs Samsung: if they come with the solution then we need to secure it Ericsson: suggests to wait a bit with our LS answer Orange: first question was not answered, so we need to send a reply LS to ask for clarification on 2 points Huawei: we could wait a bit with the answer KPN: we have not yet seen requirements from SA1 (answer to S2-175286) Orange: we need to avoid that CT1 starts to work with wrong assumptions Qualcomm: acc. to the WI code, CT1 is working here on 5G phase 1 conclusion: SA3 chair: we will come back later this week on this after offline discussion: Orange: will write an LS answer (termination in the UE, why OTS does not work, no SA3 agreement to agree this for REL-15), create a living document
replied to No    
    S3‑173426 Reply LS to C1-174589 = S3-173013 on PLMN and RAT selection policies for roaming (to: CT1; cc: CT6, SA3-LI, SA2, CT3; contact: Orange) SA3 LS out Approval Yes
YesLS was sent out on Thu afternoon of SA3 #89
approved No    
    S3‑173509 Reply LS to C1-174589 = S3-173013 on PLMN and RAT selection policies for roaming (C4-176362; to: CT1, SA3; cc: CT3, SA2; contact: Huawei) CT4 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173515 Reply LS to C1-174589 = S3-173013 on PLMN and RAT selection policies for roaming (C3-176332; to: CT1; cc: SA2, SA3, CT4; contact: Huawei) CT3 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173235 Discussion paper for steering of roaming Huawei, Hisilicon discussion Discussion Yes
Yesproposal: to choose one of the two solutions as baseline to provide end to end security for the delivery of the list of PLMN/access technology combinations, and approve the corresponding companion pCR (S3-173236/S3-173237) Vodafone: this is the 3rd meeting where we see that they based the document on the same mistake Orange: does not agree on observation 2 and 3 Qualcomm: we had papers in the past supporting go in the direction of solution 2 (using K_AUSF) Vodafone: we should have a study on this Gemalto: does not support solution 2, MME or UICC needs to be discussed first
noted No    
    S3‑173427 PLMN and RAT selection policies for roaming Orange discussion discussion Yes
Yesendorsed skeleton for the living document Vodafone: concerned about having too many living documents (difficult to trace) MCC: you could have a TR under the 5G WI (revised WI) and use this to store topics of related living documents SA3 chair: let's keep living document for the moment and think about the possibility to create a TR
revised No S3‑173482  
    S3‑173482 Living document on PLMN and RAT selection policies for roaming Orange discussion Endorsement Yes
Yeswill include agreements of SA3 #89 in a lving document
endorsed No   S3‑173427
    S3‑173309 Security for Network Steering of UE in 5GS Qualcomm Incorporated pCR Approval Yes
Yesproposals: 1) Agree to the following proposals 1 to 3 as the SA3 working assumption for securing the network steering information. Proposal #1: Key(s) derived from KAUSF shall be used to protect the network steering information. Proposal #2: Security procedures required at the AUSF to support steering of the UE using the control plane solution after the UE has registered shall be optional for implementation. Proposal #3: The NAS message that carries the steering information shall always include the integrity protected steering information. 2) Approve the below pCR to draft TS 33.501. Vodafone: pCR does not say that this is an addition to what exists already Qualcomm: we could a sentence about this BT: proposal seems to assume 5G as basis so this will not work on 2G/3G etc. Qualcomm: yes, the proposal is just for 5G Vodafone: we can do all this already Qualcomm: using NAS message is new Orange: Vodafone means you need to replace UE by MME; but we do not agree to such a change Qualcomm: we tried to keep it generic Orange: 2nd paragraph of pCR should be removed ("The Ntwork ...") Vodafone: last sentence is not future proof Nokia: has a proposal to rephrase last sentence and proposal 2 is not reflected in pCR Qualcomm: CT1 is looking at solution where update can happen at any time NTT DOCOMO: section 5 is requirement section and not section 6 SA3 chair: we got the information that other groups have not yet developed specs on this Orange: happy to add text in requirements section Ericsson: CT1 has only TR Qualcomm: all agreements that we go in TS are currently in a TR Oberthur: CT is still working on a SI, WI will come in Dec.17 SA3 chair: further offline discussion needed (should we work on this at all?, CT1 work going to spec?, how to document SA3 work?)
revised No S3‑173428  
    S3‑173428 Security for Network Steering of UE in 5GS Qualcomm Incorporated pCR Approval Yes
Yesconclusion: merged into living Tdoc S3-173482
merged No   S3‑173309
    S3‑173236 Protecting network selection list by UDM&ARPF Huawei, Hisilicon pCR Approval Yes
YesOrange: USIM does not keep IK CK KPN: does not want to see a solution that influences authentication SA3 chair: so this is related to solution1 of S3-173235
rejected No    
    S3‑173237 Protecting network selection list by AUSF Huawei, Hisilicon pCR Approval Yes
YesSA3 chair: so this is related to solution2 of S3-173235 Vodafone: up to VPLMN when to do the authentication
rejected No    
    S3‑173022 LS on usage of user plane integrity protection for DRB R2-1712051 LS in   Yes
YesDeutsche Telekom: why would integrity protection be a big problem? Qualcomm: due to the way their interface is working Huawei: was a performance issue (not limited to IOT) Nokia: we need to send an LS answer NTT DOCOMO: we must indicate that we need integrity protection, at what level can be discussed further SA3 chair: so we need to indicate that we need integrity protection and the solution has to be found Qualcomm: we have a reply proposal in SA2 Nokia: SA3 has an action here, and we should not limit it to low rate NTT: for all use cases we need to support integrity protection
replied to No    
    S3‑173420 Reply LS to R2-1712051 = S3-173022 and R2-1714125 = S3-173470 on maximum data rate of user plane integrity protected data (to: RAN2; cc: SA2, RAN3; contact: Qualcomm) SA3 LS out Approval Yes
YesDeutsche Telekom: we will need IPSec on CU-DU anyway Ericsson: UP integrity is currently optional, the core network can decide whether to use it LS was sent out on Thu afternoon of SA3 #89 (note: wrong Tdoc number on the Tdoc)
approved No    
    S3‑173470 LS on maximum data rate of user plane integrity protected data (R2-1714125; to: SA3; cc: SA2; contact: Qualcomm) RAN2 LS in   Yes
YesQualcomm: could reply to this also in S3-173420 (which is a reply to LSin S3-173022) NTT DOCOMO: also use case need to be taken into account Nokia: first agreement: interprets it as minimum 64kbps are offered Ericsson: this is UE side Qualcomm: UE will make an indication and network will make decision on UP integrity SA3 chair: it seems the LS is not clear KPN: seems it is the lowest maximum data rate up to which UP integrity is supported Qualcomm (RAN2): RAN2 will introduce a maximum value, once a new use case is coming up we can bring CRs to RAN2 to allow UP integrity up to a higher data rate NTT DOCOMO: why is this not aligned with QCI values? Qualcomm (RAN2): is a hardware related requirement and granularity is not enough Nokia: we should ask whether/how is the mechanism to increase the data rate that limits UP integrity protection conclusion:: further offline discussion needed
replied to No    
    S3‑173024 LS reply on Support for fake gNB detection mechanisms R4-1711318 LS in   Yes
YesNokia: LS says this is not for REL-15 but there is a pCR related to REL-15? conclusion: no LS answer
noted No    
    S3‑173030 LS on security handling for EPC-5GC interworking S2-178210 LS in   Yes
Yesthere is a draft reply LS to S3-173030 in S3-173349
replied to No    
    S3‑173040 Reply LS from 802.11 to NGMN LS on E2E Architectural Framework IEEE 802.11 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173406 128-EIA3 for jumbo frames ETSI SAGE LS in   Yes
YesVodafone: originally RAN2 asked about usage of jumbo frames and it seems we could reply now that everything is fine Ericsson: we indicated already that this is ok SA3 chair: so then we do not need to send another one to RAN2 conclusion: no LS answer to ETSI SAGE
noted No    
    S3‑173041 Liaison Statement on 5G Identity and Access Management Requirements NGMN LS in   Yes
YesKPN: was discussed in SA1 NTT DOCOMO: Why is NGMN sending us GSMA LSs? SA3 chair: is the same S3-173409, we will come to this one later conclusion: see S3-173430 instead
withdrawn Yes    
    S3‑173409 Liaison Statement on 5G Identity and Access Management Requirements GSMA LS in   Yes
Yessee S3-173430 instead
withdrawn Yes    
    S3‑173430 Liaison Statement on 5G Identity and Access Management Requirements GSMA LS in   Yes
YesOrange: is this for phase 2? GSMA: SA1 SI will finish by end of REL-16 Orange: is it linked to IMSI? GSMA: has to be linked with subscription Orange: moving of credentials between devices? GSMA: we will leave this to the experts to see what is achievable NTT DOCOMO: is a nice wish list but not realistic to have it by the end of next year BT: would have impact on privacy work conclusion: no LS answer to GSMA
noted No    
    S3‑173407 Liaison Statement reply to 3GPP S3-172175: DESS Update and Requirements for Securing Inter-PLMN Signalling Interfaces in 5G GSMA LS in   Yes
YesEricsson: it seems GSMA wants to have everything they have in 4G without checking impacts KPN: there should be a mechanism to protect fields SA3 chair: do we need to reply to it? KPN: we can also respond when we have done it; there are related papers from Nokia and Deutsche Telekom NTT DOCOMO: we should not break existing business models
replied to No    
    S3‑173433 Reply LS to DESS 11_02 = S3-173407 on DESS Update and Requirements for Securing Inter-PLMN Signalling Interfaces in 5G (to: GSMA FASG DESS; cc: -; contact: KPN) SA3 LS out Approval Yes
Yes
approved No    
    S3‑173050 LS on LI relation to TS 33.501 S3i170462 LS in   Yes
Yesproposal: To be included in TS 33.501 section 5.8: "The security and privacy features specified in the present document shall not preclude or inhibit the operation of LI as specified in TS 33.126." KPN: has a problem with this as it is not possible to see whether requirement is met Vodafone: should be written in positive way SA3 LI chair: formulating it in a positive way would mean to check the 33.501 features KPN: "subject to national regulations" would be acceptable for us SA3 LI chair: not all LI and all privacy requirements can be met at the same time NTT DOCOMO: "up to national regulations" could be added in a similar way as for encryption BT: LI specs were one REL behind, do we get a problem with this? SA3 LI chair: 33.126 is written in a service agnostic way so does not see a problem conclusion: BT will draft a pCR to TS 33.501 in S3-173429, BT will draft an LS reply in S3-173512
replied to No    
    S3‑173512 Reply to: LI relation to TS 33.501 (to: SA3 LI; cc: -; contact: BT) SA3 LS out Approval Yes
Yesconclusion: source field still shows company name, therefore revised
revised No S3‑173531  
    S3‑173531 Reply to S3i170462 = S3-173050 on LI relation to TS 33.501 (to: SA3 LI; cc: -; contact: BT) SA3 LS out Approval Yes
Yes
approved No   S3‑173512
    S3‑173429 LI requirement BT pCR Approval No
Yes
withdrawn Yes    
    S3‑173392 Proposals to restructure TS 33.501 Ericsson discussion   Yes
YesNokia: there is some overlap in clause 6 and 8 NEC: would not like to have the changes NTT DOCOMO: we should get rid of the overlap, but some reasons why the overall structure was done as it is SA3 chair: would like to take a restructuring discussion offline to see how this can be done
revised No S3‑173528  
    S3‑173528 Proposals to restructure TS 33.501 Ericsson discussion - Yes
Yesconclusion: endorsed unseen
endorsed No   S3‑173392
7.3 Mission Critical Security Enhancements (eMCSec) (Rel-15) S3‑173032 LS on signalling plane security for MC system interconnection S6-171458 LS in   Yes
Yes
replied to No    
    S3‑173432 Reply LS to S6-171458 = S3-173032 on signalling plane security for MC system interconnection (to: SA6; cc: -; contact: Motorola Solutions) SA3 LS out Approval Yes
YesNCSC: some filtering may be needed
approved No    
    S3‑173033 LS on providing SIP identities to access a partner MC system S6-171490 LS in   Yes
Yes
replied to No    
    S3‑173411 Reply LS to S6-171490 = S3-173033 on LS on providing SIP identities to access a partner MC system (SCP(17)000190; to: SA6; cc: SA3, CT6, SA1; contact: Orange) ETSI TC SCP LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173452 Reply LS to S6-171490 = S3-173033 on providing SIP identities to access a partner MC system (to: SA6; cc: SA3, ETSI SCP, CT6; contact: Blackberry) SA1 LS in   Yes
Yesconclusion: no LS answer to SA1
noted No    
    S3‑173468 Reply LS to S6-171490 = S3-173033 on providing SIP identities to access a partner MC system (C6-170676; to: SA6; cc: SA3, ETSI SCP, SA1; contact: Blackberry) CT6 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173434 Reply to S6-171490 = S3-173033 on providing SIP identities to access a partner MC system (to: SA6; cc: SA1; contact: NCSC) SA3 LS out Approval Yes
YesOrange: having multiple ISIMs may be problematic and 5. will need some rewording; SA3 chair: it may be good to discuss this draft LS first offline Motorola Solutions: some numbering needs to fixed Oberthur: SA1 and CT4 action needed Orange: no they replied already
approved No    
    S3‑173282 [eMCSEC] Addition of Element for Authenticating Requests (EAR) to TS 33.180. NCSC CR Agreement Yes
Yes
revised No S3‑173448  
    S3‑173448 [eMCSEC] Addition of Element for Authenticating Requests (EAR) to TS 33.180. NCSC CR Agreement Yes
YesNCSC: 4 group messages: some correction was needed compared previous revision NCSC: since S3-173287 is not yet accepted we still need to have some offline discussion on this Huawei: no boxes ticked? NCSC: it is just affecting application
agreed No   S3‑173282
    S3‑173283 [eMCSEC] Addition of KMS Requests to TS 33.180 to support KMS Discovery NCSC CR Agreement Yes
Yes
agreed No    
    S3‑173390 [eMCSEC] Addition of Security Gateway to TS 33.180 NCSC CR Agreement Yes
YesMCC: CR includes no change (all changes must be visible with rev marks!)
revised No S3‑173449  
    S3‑173449 [eMCSEC] Addition of Security Gateway to TS 33.180 NCSC CR Agreement Yes
YesNCSC: there are still some comments from Motorola Solutions to be solved
agreed No   S3‑173390
    S3‑173456 Exception request sheet for REL-15 WI eMCSec stage 2 NCSC, Motorola Solutions WI exception request Agreement Yes
Yesextension of 1 quarter needed as there are still SA6 parts open NCSC: intention is to report 80% to SA #78
agreed No    
    S3‑173352 Update of clause 6.6 on key hierarchy Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173353 Update of clause 6.7 on security contexts Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173354 Update of clause 6.3 skeleton on Security negotiation Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173355 Update for skeleton of clause 8 on Security Procedures between UE and 5G Access Network Functions Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173356 Update of clause 5 skeleton on Security Requirements and Features Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173357 Update of clause 8.1.1.2 ‘5G-RAN key identification‘ in TS 33.501 Ericsson pCR Approval No
Yes
withdrawn Yes    
    S3‑173358 Update of clause 8.1.1.3 ‘5G-RAN key lifetimes‘ in TS 33.501 Ericsson pCR Approval No
Yes
withdrawn Yes    
7.4 Battery Efficient Security for very low Throughput Machine Type Communication Devices (BEST_MTC_Sec) (Rel-15) S3‑173031 Reply LS on LI Requirements for CIoT services including BEST services S3i170239 LS in   Yes
YesVodafone: there are mutually exclusive requirements; we are turning off ciphering and integrity protection is not a problem KPN: we do not switch off encryption over the air conclusion: no LS answer and no action planned
noted No    
    S3‑173051 Collection of editorial changes to BEST TS 33.163 Juniper Networks CR Agreement Yes
YesMCC: no CR number on CR cover Vodafone: NULL is missing an L Juniper: also a reference needs correction/addition
revised No S3‑173459  
    S3‑173459 Collection of editorial changes to BEST TS 33.163 Juniper Networks CR Agreement Yes
YesVodafone: we are still waiting for some CT4 work (confirmation on S6 interface needed), should we have an exception sheet and an LS? We need subset of S6a commands, with separate interface we would not have interaction
agreed No   S3‑173051
    S3‑173460 Exception request sheet for WI BEST_MTC_Sec Vodafone WI exception request Agreement Yes
Yesprovided as target has to be extended Vodafone: CT4 will probably reply "S6a interface is fine" and so we will not need the exception sheet SA3 chair: will you do a CR for SA3 #89 then? Vodafone: editor's note could be removed but Annex will need until next meeting SA3 chair: ok, we can do both next time conclusion: Tdoc was agreed first and then after S3-173522 it was withdrawn
withdrawn Yes    
    S3‑173461 LS on extension of S6x interface for BEST (to: CT4; cc: -; contact: Vodafone) SA3 LS out Approval Yes
YesLS was sent out on Thu afternoon of SA3 #89
approved No    
    S3‑173522 Reply LS to S3-173461 on extension of S6x interface for BEST (C4-176388; to: SA3; cc: -; contact: Vodafone) CT4 LS in   Yes
YesVodafone: so exception request sheet in S3-173460 can be withdrawn and we will bring final SA3 CR next time conclusion: no LS answer
noted No    
7.5 Northbound APIs Security for SCEF - SCS/AS Interworking (NAPS_Sec) (Rel-15) S3‑173264 Security requirements of T8 interface Huawei, Hisilicon CR Agreement Yes
YesMCC: "TS" should not be in spec number field; Tdoc number and CR number missing on CR cover; wrong WI code or agenda item NEC: we have a related Tdoc in S3-173325 conclusion: will be merged into S3-173463
merged No    
    S3‑173325 Security requirement for T8 reference point NEC EUROPE LTD CR Agreement Yes
YesMCC: adding empty sections is not ideal; file name inside zip file does not show Tdoc number Nokia: what is the privacy part? Orange: 2 different requirements; example should be another bullet point/requirement SA3 chair: NEC document is covering Huawei requirements? NEC: yes conclusion: S3-173325 will be revised in S3-173463 (merging into this one also the S3-173264 aspects)
revised No S3‑173463  
    S3‑173463 Security requirement for T8 reference point NEC EUROPE LTD CR Endorsement Yes
Yesconclusion: endorsed and CR will not be sent to SA #78 but will be included in draft CR for next SA3 meeting
endorsed No   S3‑173325
    S3‑173266 Authentication and transmission protection for T8 interface Huawei, Hisilicon CR Agreement Yes
YesMCC: "TS" should not be in spec number field; Tdoc number and CR number missing on CR cover; wrong WI code or agenda item Samsung: we have a related Tdoc in S3-173363 conclusion: discuss offline what can be merged from S3-173266 into S3-173464
merged No    
    S3‑173363 Security Mechanism for T8 interface Samsung CR Agreement Yes
YesHuawei: we could also merge S3-173266 and S3-173363 SA3 chair: as the Tdocs are different a merging will not be easy Samsung: one big difference is that credentials are very much open which we do not want Nokia: supports Samsung proposal Ericsson: an agreed CR from NEC added an empty section, it would be better that the former CR is not adding the empty section BT: reference need to be checked
revised No S3‑173464  
    S3‑173464 Security Mechanism for T8 interface Samsung CR Endorsement Yes
Yesconclusion: CR is just endorsed and will not be provided to SA #78 but it will be included in the draft CR S3-173465
endorsed No   S3‑173363
    S3‑173267 Authorization of SCS/AS to send requests for the 3GPP Network Entity Huawei, Hisilicon CR Agreement Yes
YesMCC: "TS" should not be in spec number field; Tdoc number and CR number missing on CR cover; wrong WI code or agenda item Ercisson: adding title twice Nokia: cridentials to be corrected Samsung: "preconfigured" unclear conclusion: 5.5.2 headline and "After the authentication, SCEF determines whether the SCS / AS is authorized to send requests for the 3GPP Network Entity." will be merged into S3-173464
merged No    
    S3‑173465 Northbound APIs Security for SCEF - SCS/AS Interworking Huiawei, Hisilicon, NEC, Samsung draftCR Agreement Yes
YesThis will be a working draft CR
endorsed No    
7.6 Other work areas                      
7.6.1 SAE/LTE Security S3‑173021 LS on encrypting broadcasted positioning data R2-1712031 LS in   Yes
YesSA3 VC: we plan to reply to this? seems we have 2 LSout on this (S3-173297 and S3-173374)
replied to No    
    S3‑173439 Reply to R2-1712031 = S3-173021 on encrypting broadcasted positioning data (to: RAN2; cc: RAN3, SA2; contact: Ericsson) SA3 LS out Approval Yes
Yesboth proposals (from Ericsson & Qualcomm) will be attached to this LS
approved No    
    S3‑173296 Ciphering of Broadcast Assistance Data Qualcomm Incorporated discussion Endorsement Yes
YesEricsson: shouldn't we use different keys? Qualcomm: is it worth the extra complexity Ericsson: worried about limiting IV SA3 VC: let's see the alternative in S3-173373 and then discuss them together
noted No    
    S3‑173373 Discussion on details for encryption of LTE Positioning broadcast Ericsson discussion Discussion Yes
YesEricsson: suggests to send the Qualcomm and Ericsson proposals to RAN2 and let RAN2 decide as this is not really an SA3 issue SA3 VC: is this acceptable to send an LS to RAN2? Qualcomm: we should explain the MAC issue Nokia: why should RAN2 chose and not SA3? Ericsson: no security considerations anymore, RAN2 could decide (e.g. looking at aspects on quick calculation, large data) Nokia: we should do an evaluation in SA3 SA3 VC: so from SA3 point of view both proposals are acceptable; what is the RAN2 timeline for this? Ericsson: not much work ongoing at the moment Qualcomm: would be good to get feedback whether counter-mode is acceptable for RAN2
noted No    
    S3‑173297 Draft reply LS to R2-1712031 = S3-173021 on encrypting broadcasted positioning data (to: RAN2; cc: SA2; contact: Qualcomm) Qualcomm Incorporated LS out Approval Yes
YesMCC: source is already indicated as SA3; compare S3-173374 See instead S3-173439
withdrawn Yes    
    S3‑173374 Draft reply LS to R2-1712031 = S3-173021 on encrypting broadcasted positioning data (to: RAN2, SA2; cc: RAN3; contact: Ericsson) Ericsson LS out Approval Yes
YesMCC: source says already SA3; compare S3-173297 See instead S3-173439
withdrawn Yes    
    S3‑173375 Living document for ciphering of LTE positioning broadcast Ericsson discussion Approval Yes
Yes
noted No    
    S3‑173080 Clause 7.2.4.4 (rectifying use of HASH_MME at NAS_SMC in Rel-14) Ericsson CR Agreement Yes
Yes
agreed No    
    S3‑173081 Clause 7.2.4.4 (Rectifying use of HASH_MME at NAS_SMC in Rel-15) Ericsson CR Agreement Yes
Yes
agreed No    
    S3‑173191 Address EN for the RLFs for UEs doing user plane over control plane using NAS level security Huawei, Hisilicon CR Agreement Yes
YesSA3 VC: ME and Core Network boxes need to be ticked
revised No S3‑173440  
    S3‑173440 Address EN for the RLFs for UEs doing user plane over control plane using NAS level security Huawei, Hisilicon CR Agreement Yes
YesQualcomm: we had the same CR S3-173298 under different AI SA3 VC: S3-173298 can be withdrawn then and S3-173440 is agreed unseen
agreed No   S3‑173191
    S3‑173321 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-14) NEC EUROPE LTD CR Agreement Yes
YesMCC: WI code missing on CR cover
revised No S3‑173415  
    S3‑173415 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-14) NEC EUROPE LTD CR Agreement Yes
YesQualcomm: Note 1 text needs correction (*the Attach Request and the TAU Request" needs to be replaced in first sentence) SA3 VC: change "may" into "could" in Note 2 two times; in Note 1: remove rest "menaing that the .."
revised No S3‑173441 S3‑173321
    S3‑173441 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-14) NEC EUROPE LTD CR Agreement Yes
Yesconclusion: agreed unseen
agreed No   S3‑173415
    S3‑173322 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-15) NEC EUROPE LTD CR Agreement Yes
YesMCC: WI code missing on CR cover
revised No S3‑173416  
    S3‑173416 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-15) NEC EUROPE LTD CR Agreement Yes
Yessame changes needed as for S3-173415
revised No S3‑173442 S3‑173322
    S3‑173442 Improve and clarify texts under NOTE1 under clause 7.2.4.4 (Rel-15) NEC EUROPE LTD CR Agreement Yes
Yesconclusion: agreed unseen
agreed No   S3‑173416
7.6.2 IP Multimedia Subsystem (IMS) Security                      
7.6.3 Network Domain Security (NDS)                      
7.6.4 UTRAN Network Access Security                      
7.6.5 GERAN Network Access Security                      
7.6.6 Generic Authentication Architecture (GAA)                      
7.6.7 Multimedia Broadcast/Multicast Service (MBMS)                      
7.6.8 Security Aspects of Home(e)NodeB (H(e)NB)                      
7.6.9 Security Aspects related to Machine-Type Communication ((e)MTC)                      
7.6.10 Security Aspects of Isolated E-UTRAN Operation for Public Safety (IOPS)                      
7.6.11 Security of MCPTT (MCPTT) S3‑173458 Correction to MIKEY Key parameters NCSC, Motorola, Airwave CR Agreement Yes
Yes
agreed No    
7.6.12 Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3)                      
7.6.13 Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM)                      
7.6.14 Security Aspects of Narrowband IOT (CIoT) S3‑173010 LS/o on Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of Things ITU-T LS in   Yes
YesVodafone: SA1 should have this LS also in copy conclusion: no LS answer
noted No    
    S3‑173011 LS on “Security Requirements and Framework for Narrow Band Internet of Things” ITU-T LS in   Yes
YesSA3 chair: so we could send them a reply informing them about what we have done
replied to No    
    S3‑173471 Reply to ITU-T SG17-LS66 = S3-173011 on Security Requirements and Framework for Narrow Band Internet of Things (to: ITU-T SG17; cc: SA; contact: China Unicom) SA3 LS out Approval Yes
Yes
approved No    
    S3‑173019 LS on Early Data Transmission R2-1711978 LS in   Yes
Yes
replied to No    
    S3‑173014 Reply LS on Early Data Transmission C1-174595 LS in   Yes
Yesconclsuion: no LS answer
noted No    
    S3‑173015 Reply LS on Early Data Transmission S2-178180 LS in   Yes
Yesconclsuion: no LS answer
noted No    
    S3‑173169 Discussion on Security Issues with Early Data Transmission Intel Corporation (UK) Ltd discussion Discussion Yes
YesIntel: there are Qualcomm (3295) and Ericsson (3387)
noted No    
    S3‑173168 Draft reply LS to R2-1711978 = S3-173019 on Early Data Transmission (to: RAN2; cc: SA2, CT1; contact: Intel) Intel Corporation (UK) Ltd LS out Approval Yes
YesMCC: source is already SA3; compare S3-173387 conclusion: will be covered in S3-173472
merged No    
    S3‑173295 Discussion on a response to S3-173019/R2-1711978 on Early data transmission Qualcomm Incorporated discussion Endorsement Yes
Yes
noted No    
    S3‑173387 Draft reply LS to R2-1711978 = S3-173019 on Early Data Transmission (to: RAN2; cc: -; contact: Ericsson) Ericsson LM LS out Approval Yes
YesMCC: Tdoc is not an LSout as it does not use the LSout template; compare S3-173168 Ericsson: Q1 and Q2 are resolved (no security issue), for Q3 Intel does not agree Intel: we are in line from security perspective but we ask why Ericsson: for Q5 we of course prefer Ericsson solution but would like to hear others Qualcomm: on Q5 we would like to see some authorization to the UE Ericsson: does not agree with this Huawei: does not support to send NCC, is not necessary Ericsson: RAN2 is asking whether there is a security issue
revised No S3‑173472  
    S3‑173472 Reply LS to R2-1711978 = S3-173019 on Early Data Transmission (to: RAN2; cc: RAN3, SA2, CT1; contact: Ericsson) SA3 LS out Approval Yes
Yes
approved No   S3‑173387
    S3‑173298 Removing editor’s note on calculation of UL_NAS_MAC and DL_NAS_MAC Qualcomm Incorporated CR Agreement Yes
Yes
withdrawn Yes    
    S3‑173299 Security for the RLFs for UEs doing user plane over control plane using NAS level security for Rel-15 specification Qualcomm Incorporated CR Agreement Yes
YesMCC: wrong rev 2 on CR cover (which should be rev -) Qualcomm: this is actually a mirror CR that was forgotten in a previous meeting (Dali)
revised No S3‑173473  
    S3‑173473 Security for the RLFs for UEs doing user plane over control plane using NAS level security for Rel-15 specification Qualcomm Incorporated CR Agreement No
Yes
agreed No   S3‑173299
    S3‑173410 Reply LS on Early Data Transmission S2-178180 LS in   Yes
Yes
withdrawn Yes    
7.6.15 New GPRS algorithms for EASE (EASE_ALGOs_SA3) (Rel-13)                      
7.6.16 Support of EAP Re-Authentication Protocol for WLAN Interworking (ERP) (Rel-14)                      
7.6.17 Security Assurance Specifications (SCAS-SA3, SCAS_PGW, SCAS_eNB) S3‑173049 Summary for WI SCAS NTT DOCOMO WI summary Endorsement Yes
YesSA3 delegates are requested to review and to provide comments to the Tdoc author
noted No    
    S3‑173399 WI Summary of SCAS DOCOMO Communications Lab. WI summary Endorsement No
Yes
withdrawn Yes    
7.6.18 Security aspect of architecture enhancements for LTE support of V2X services (V2XLTE-Sec)                      
7.6.19 Security of the Mission Critical Service (MCSec) S3‑173054 Fix inter-domain IdM token exchange procedure Motorola Solutions Germany CR Agreement Yes
Yes
revised No S3‑173417  
    S3‑173417 Fix inter-domain IdM token exchange procedure Motorola Solutions Germany CR Agreement Yes
Yes
agreed No   S3‑173054
    S3‑173059 Fix client check during GMK provisioning Motorola Solutions Germany CR Agreement Yes
Yes
revised No S3‑173421  
    S3‑173421 Fix client check during GMK provisioning Motorola Solutions Germany CR Agreement Yes
Yes
agreed No   S3‑173059
    S3‑173284 [MCSEC] Clarification on validating GMS URI on receipt of GMK NCSC CR Agreement Yes
Yesconclusion: merged into S3-173421
merged No    
    S3‑173060 Alignment with MuSiK Stage 3 in CT1 specs 24.379 and 24.481 Motorola Solutions Germany CR Agreement Yes
Yes
revised No S3‑173424  
    S3‑173424 Alignment with MuSiK Stage 3 in CT1 specs 24.379 and 24.481 Motorola Solutions Germany CR Agreement Yes
Yes
agreed No   S3‑173060
    S3‑173055 Group config I_MESSAGE clarification Motorola Solutions Germany CR Agreement Yes
Yes
withdrawn Yes    
    S3‑173056 GMK over SIP and HTTP Motorola Solutions Germany CR Agreement Yes
Yes
withdrawn Yes    
    S3‑173058 Fix media security for private call Motorola Solutions Germany CR Agreement Yes
Yes
agreed No    
    S3‑173057 Fix reference to 33.179 Motorola Solutions Germany CR Agreement Yes
YesMotorola: 33.179 ended in REL-13, in REL-14 we have 33.180
agreed No    
    S3‑173130 Group key distribution enhancement Motorola Solutions Germany CR Agreement Yes
Yes
revised No S3‑173422  
    S3‑173422 Group key distribution enhancement Motorola Solutions Germany CR Agreement Yes
YesNCSC: this is a correction in REL-14 (to allow the REL-15 feature, see S3-173130 under AI 7.3), we also have this error in REL-13 and will need to do a REL-13 33.179 CR (see S3-173458 under AI 7.6.11)
agreed No   S3‑173130
7.6.20 Other work items S3‑173034 LS on CAPIF security aspects S6a170383 LS in   Yes
YesSA3 chair: there is a corresponding WID proposal in S3-173367 conclusion: no LS answer
noted No    
    S3‑173367 New WID on Security Aspects of Common API Framework Samsung WID new Agreement Yes
YesMotorola Solutions and Interdigital support the WI Huawei: fears that we may duplicate and not end up with a TS Nokia: harmonization should be understood as an attempt Huawei: we should not end up with 2 different mechanisms for the same SA3 chair: yes, 2 WGs working on this requires that we take this into account CMCC: wants to cosign Intel, LG: also support the WI conclusion: revised to add more supporters
revised No S3‑173498  
    S3‑173498 New WID on Security Aspects of Common API Framework Samsung WID new Agreement Yes
Yes
agreed No   S3‑173367
    S3‑173064 Proof of Concept PKI Implementation for NodeB Authentication AT&T, MITRE, Interdigital discussion Decision Yes
Yesproposal: A Study Item Description (SID) or Work Item Description (WID) should be created for the addition of functionality to support the use of PKI in special use cases to protect certain AS/NAS messages in 5G. Interdigital: this is for an isolated system, this is to lock out rogue systems completely Ericsson: thought that we were mitigating this issue already NTT DOCOMO: this is for LTE? At the moment we are very busy and so coming with this at a different time would be better; not sure that there is a business case Vodafone: same view on timing and a SI would be more appropriate than a WI MITRE: has related Tdoc in S3-173035 conclusion: can bring a proposal in the future again
noted No    
    S3‑173271 IoT botnet detection and dismantling China Mobile discussion   Yes
Yesproposal: to discuss and study the IoT botnets, and provide efficient solutions to stop IoT devices services when large scale devices are compromised. KPN: supports a later SI Vodafone: agrees with KPN but not before mid 2018 BT: worried about (1) Ericsson: not clear what SA3 could standardize for this SA3 chair: people are positive to study this in the future but not now
noted No    
    S3‑173274 Malicious Internet Voice Systems detection China Mobile discussion   Yes
YesNokia: we had a couple of SIs and WIs on this so suggests to look into the corresponding documentation BT: suggests to be a bit more careful with the language
noted No    
    S3‑173324 Editorial in TS 33.187 NEC EUROPE LTD CR Agreement Yes
YesMCC: Tdoc number missing in file name inside zip file
revised No S3‑173474  
    S3‑173474 Editorial in TS 33.187 NEC EUROPE LTD CR Agreement Yes
Yes
agreed No   S3‑173324
    S3‑173368 Security Aspects of Common API Framework for 3GPP Northbound APIs Samsung other   Yes
Yesis actually a draft TS skeleton related to new WI S3-173498
endorsed No    
    S3‑173369 pCR on CAPIF Security requirements Samsung other   Yes
Yes
postponed No    
    S3‑173370 pCR on CAPIF security within PLMN Trust Domain Samsung other   Yes
Yes
postponed No    
    S3‑173372 pCR on CAPIF Security mechanism for CAPIF-1e Samsung other   Yes
Yes
postponed No    
    S3‑173532 WI summary ERP Orange WI summary Endorsement Yes
YesSA3 delegates are requested to review and to provide comments to the Tdoc author
noted No    
8 Studies                      
8.1 Study on Mission Critical Security Enhancements (FS_MC_Sec) (Rel-14) S3‑173285 [FS_MC_SEC] Update to EAR (Solution #1.6) in TS 33.880 NCSC pCR Approval Yes
Yes
approved No    
    S3‑173286 [FS_MC_SEC] TR 33.880 EAR Authorisation solution NCSC pCR Approval Yes
Yes
approved No    
    S3‑173287 [FS_MC_SEC] Evaluation of EAR solution in TS 33.880 NCSC pCR Approval Yes
YesMotorola Solutions: there is a related CR as well and we have not yet achieved agreement on this NCSC: suggests to leave some more time for offline discussion conclusion: further offline discussion and we will come back to it later this week
approved No    
    S3‑173061 Interworking key management KI Motorola Solutions Germany pCR Approval Yes
Yes
revised No S3‑173418  
    S3‑173418 Interworking security data transfer Motorola Solutions Germany pCR Approval Yes
Yestitle was corrected
approved No   S3‑173061
    S3‑173062 Interworking key management SIP MESSAGE solution Motorola Solutions Germany pCR Approval Yes
Yes
revised No S3‑173425  
    S3‑173425 Interworking security data MESSAGE solution Motorola Solutions Germany pCR Approval Yes
Yestitle was corrected NCSC: still some KMM to be corrected (to be replaced)
approved No   S3‑173062
    S3‑173063 Interworking key management MCData solution Motorola Solutions Germany pCR Approval Yes
Yes
revised No S3‑173423  
    S3‑173423 Interworking security data MCData solution Motorola Solutions Germany pCR Approval Yes
Yestitle was corrected Motorola Solutions: still some KMM to be replaced
approved No   S3‑173063
    S3‑173388 [eMCSEC] Evaluation of Security Gateways (SeGy) NCSC pCR Approval Yes
Yes
approved No    
    S3‑173454 TR 33.880 v1.6.0 including agreements from SA3 #89 NCSC draft TR Agreement Yes
YesNCSC: TR should go to SA #78 for approval
agreed No    
    S3‑173455 Cover for TR 33.880 NCSC TS or TR cover Agreement Yes
YesNCSC: FS_MC_Sec is 90% complete (as SA6 is still working on it) Note: Presentation to SA #78 will have to be done with v2.0.0 so change of version on S3-173455 is needed before submission to SA #78.
approved No    
8.2 Study on security aspects of enhancements to ProSe UE-to-Network Relay (FS_REAR_Sec) (Rel-15) S3‑173025 LS on FS_REAR study outcome S2-176446 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173018 Reply LS on FS_REAR study outcome R2-1711861 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173026 LS on FS_REAR SI conclusion S2-177943 LS in   Yes
Yesconclusion: no LS answer
noted No    
    S3‑173240 Clarification of key issue #7 Huawei, Hisilicon pCR Approval Yes
YesSA3 VC: more authorization than authentication Ericsson: unclear what the key issue is
revised No S3‑173475  
    S3‑173475 Clarification of key issue #7 Huawei, Hisilicon pCR Approval Yes
Yes
approved No   S3‑173240
    S3‑173241 Authentication of eRemote UE during one-to-one communication setup Huawei, Hisilicon pCR Approval Yes
YesKPN: proposal does more than expected, e.g. also sets up secure connection LG: agrees with KPN that topic was authorization by network Ericsson: would be happy to put it in as it is, there is already an editor's note so no need to add another one conclusion: key isssue 7 will be added in introductory text
revised No S3‑173476  
    S3‑173476 Authentication of eRemote UE during one-to-one communication setup Huawei, Hisilicon pCR Approval Yes
Yes
approved No   S3‑173241
    S3‑173242 Remove Editor's Note in subclause 5.4.3 Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑173243 Remove Editor's Note in subclause 6.7.2 of Solution #7 Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑173244 Remove Editor‘s Note in Solution of Discovery Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑173245 Solution of discovery parameters configuration for eRemote UE when dynamic trust relationship establishment is supported Huawei, Hisilicon pCR Approval Yes
YesKPN: structure of the pCR needs a cleanup, also key issue has to be listed; we should solve it in line with SA2 Huawei: will do the cleanup and agrees on the last point
revised No S3‑173478  
    S3‑173478 Solution of discovery parameters configuration for eRemote UE when dynamic trust relationship establishment is supported Huawei, Hisilicon pCR Approval Yes
Yes
approved No   S3‑173245
    S3‑173315 Structure of Conclusions Clause KPN pCR Approval Yes
Yes
approved No    
    S3‑173316 Conclusions for KI #2 KPN pCR Approval Yes
Yes
approved No    
    S3‑173317 Resolving editor's Notes for KI #3 KPN pCR Approval Yes
YesHuawei: suggest to keep first editor's note in 5.3.4 KPN: ok, if Huawei intends to remove it next time conclusion: first editor's note under 5.3.4 will not be deleted and 5.x will not be added
revised No S3‑173479  
    S3‑173479 Resolving editor's Notes for KI #3 KPN pCR Approval Yes
Yes
approved No   S3‑173317
    S3‑173318 Conclusions for KI #3 KPN pCR Approval Yes
YesHuawei: does not agree to the change KPN: we can work on this until next meeting
postponed No    
    S3‑173319 Conclusions for KI #8 KPN pCR Approval Yes
Yes
approved No    
    S3‑173320 Conclusions for KI #9 KPN pCR Approval Yes
Yes
approved No    
    S3‑173339 Conclusions for KI 6 KPN N.V. pCR Approval Yes
Yes
approved No    
    S3‑173477 TR 33.843 v0.3.0 on Study on security aspect of architecture enhancements to Proximity Services (ProSe) User Equipment (UE)-to-network relay Huawei draft TR Agreement Yes
Yescapturing all agreements of SA #89 Nokia: SI has been concluded in other WGs but not in SA3? Huawei: correct, intention is to complete the SI in March 18; 79% complete will be reported to SA #78; intention is to bring the TR for 1-step approval to SA #79
agreed No    
8.3 Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15) S3‑173037 Threats against LTK and limitations of existing approaches InterDigital, Inc. discussion Decision Yes
YesVodafone: last bullet of Recommendations: only if we select GSMA based solutions Interdigital: related pCR in S3-173039
noted No    
    S3‑173038 Threats against LTK and limitations of existing approaches InterDigital, Inc. discussion Decision No
Yes
withdrawn Yes    
    S3‑173039 LTK Derivation – Key Issue 7.x InterDigital, Inc. pCR Approval Yes
YesOrange: so main threat: key transported between SIM maker and operator; requirement is suggesting a specific solution BT: there should be just one communication link; longterm key should be generated in the system that minimized the number of links Vodafone: we intend to not tie this TR to 5G, it should be applicable to other technologies as well BT: not happy about "while being stored" under 1. in 7.X.1 esp. the (e)UICC should not be there so better remove the text in ( ) Orange: wants an editor's note under requirement: which longterm keys is ffs Vodafone: we could do this next time Gemalto: maybe we can remove the e.g. MCC: general request to respect drafting rules (e.g. no automatic numbering is allowed) otherwise the rapporteur will have to do a lot of reformatting conclusion: first e.g. and ( ) at the end of 1. in 7.x.1 will be removed; 5G will be avoided, editor's note will be added
revised No S3‑173500  
    S3‑173500 LTK Derivation – Key Issue 7.x InterDigital, Inc. pCR Approval Yes
Yes
approved No   S3‑173039
    S3‑173239 pCR to TR33.834 Update long term keys based on PKI Huawei, Hisilicon pCR Approval Yes
YesOrange: is not addressing key issue we have; you are introducing a new long term key SA3 VC: it seems there is a proposal to remove evaluation or to add an editor's note BT: does not agree that it will become a new longterm key Gemalto: would like to add text under evaluation Vodafone: evaluations needs to be extended conclusion: remove 1st sentence of evaluation and discuss other parts of evaluation offline (if no consensus then evaluation will be removed)
revised No S3‑173501  
    S3‑173501 pCR to TR33.834 Update long term keys based on PKI Huawei, Hisilicon pCR Approval Yes
Yes
approved No   S3‑173239
    S3‑173249 pCR to TR33.834 - Updates as agreed at LTKUP conf call VODAFONE Group Plc pCR Approval Yes
YesVodafone: was output of conference call BT: may be in conflict with previously agreed pCR Vodafone: it is not ruling out Gemalto: editor's note for AMF based solution under 9.x.3.1 preferred Orange: 7.1.3: protect instead of change (change is already the solution) and make requirement conditional Vodafone: does not agree to "protect" SA3 VC: discuss this further offline Orange: 8.5: add "(if any)" conclusion: editor's note in 9.x.3.1, (if any) in 8.5, further discussion about 7.1.3 text
revised No S3‑173502  
    S3‑173502 pCR to TR33.834 - Updates as agreed at LTKUP conf call VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑173249
    S3‑173252 pCR to TR 33.834 - addition of DH trnsport options VODAFONE Group Plc pCR Approval Yes
Yes
approved No    
    S3‑173254 pCR to TR33.834 - addition of Public Key, Extended USIM OTA and inline with authentication solutions VODAFONE Group Plc pCR Approval No
Yes
withdrawn Yes    
    S3‑173323 LTKUP: solution proposal Gemalto N.V. pCR Approval Yes
YesOberthur:several keys for one IMSI? Gemalto: only one is active, same as Vodafone Vodafone: conclusions should only be put in when all solutions are in Oberthur: if card is broken all sets will be compromised so we should add "assessment if card is broken" under 9.x.3.6 Oberthur: 2nd bullet under 1. in 9.x.2 is complex and unclear how it is secured Vodafone: can add editor's note under 9.x.3.6 Vodafone: would be happy to provide SI TR for information to SA Orange: we can wait one more cycle Gemalto: agrees that it is too early to bring TR for information BT: would be ok to send the TR to SA Vodafone: anyone planning to bring more solutions? conclusion: 3 editor's notes under 9.x.3.6 about additional risks, removal of conclusion; further offline discussion whether to send TR for information to SA #78
revised No S3‑173503  
    S3‑173503 LTKUP: solution proposal Gemalto N.V. pCR Approval Yes
Yes
approved No   S3‑173323
    S3‑173504 TR 33.834 v0.3.0 collecting agreements of SA3 #89 Vodafone draft TR Agreement No
Yessending out before Thu 7.12.17 eob CET comments before Mon 11.12.17 eob CET agreed version sent out before Wed 13.12.17 eob CET
for email discussion No    
8.4 Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15) S3‑173161 Threats and requirement to KI#1 Huawei & Hisilicon pCR Approval Yes
Yes
revised No S3‑173492  
    S3‑173492 Threats and requirement to KI#1 Huawei & Hisilicon pCR Approval Yes
Yes
revised No S3‑173505 S3‑173161
    S3‑173505 Threats and requirement to KI#1 Huawei & Hisilicon, CATR, China Unicom pCR Approval Yes
Yes
approved No   S3‑173492
    S3‑173167 Adding security threat and requirement for TR 33.811 clause 5.1 CATR pCR Approval Yes
YesTdoc is already included in S3-173492
merged No    
    S3‑173214 Security requirements for Key issue #1: Unauthorized access to Management Exposure Interface China Unicom pCR Approval Yes
YesTdoc is already included in S3-173492
merged No    
    S3‑173160 A key issue proposal on security capability for TR33.811 Huawei & Hisilicon pCR Approval Yes
Yes
revised No S3‑173491  
    S3‑173491 A key issue proposal on security capability for TR33.811 Huawei & Hisilicon pCR Approval Yes
YesHuawei: changes compared to S3-173160: 5.x.1 was rephrased, 5.x.2 if statements, 5.x.3 requirements rewritten Orange: not related to roaming, change HPLMN to MNO Orange: bullets 2-6 under 5.X.3 should be removed and security in first bullet should be removed, is this then in the scope of SA3? BT: "customer" in bullet 4 needs clarification Interdigital: is supporting the Tdoc SA3 VC: it seems at the moment there is no consensus conclusion: talk further offline
revised No S3‑173513 S3‑173160
    S3‑173513 A key issue proposal on security capability for TR33.811 Huawei & Hisilicon pCR Approval No
YesOrange: talked with SA5 delegate that this is beyond SA3 SI
rejected No   S3‑173491
    S3‑173215 Key issue on network slice instance commissioning China Unicom pCR Approval Yes
Yes
not treated No    
    S3‑173216 Key issue on network slice instance creation conflict detection China Unicom pCR Approval Yes
Yes
not treated No    
    S3‑173217 Key issue on network slice instance decommissioning China Unicom pCR Approval Yes
Yes
not treated No    
    S3‑173279 Key issue on protecting the integrity of results of NSI supervision/reporting China Mobile pCR Approval Yes
YesBT: 5.x.3 needs rewording and remove "in transmitting" conclusion: improve 5.x.3 wording
revised No S3‑173506  
    S3‑173506 Key issue on protecting the integrity of results of NSI supervision/reporting China Mobile pCR Approval Yes
Yes
approved No   S3‑173279
    S3‑173280 Key issue on protecting Network Slice Subnet Template China Mobile Group pCR Approval Yes
YesBT: network slice subnet reference to be added SA3 VC: language can be improved; if definition/reference is not available, then we cannot agree the pCR
revised No S3‑173507  
    S3‑173507 Key issue on protecting Network Slice Subnet Template China Mobile Group pCR - Yes
Yes
approved No   S3‑173280
    S3‑173525 TR 33.811 v0.3.0 collecting agreements of SA3 #89 Huawei draft TR Agreement No
Yessending out before Thu 7.12.17 eob CET comments before Mon 11.12.17 eob CET agreed version sent out before Wed 13.12.17 eob CET
for email discussion No    
8.5 Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16) S3‑173247 initial TR33.xxx - Study on the support of 256-bit Algorithms for 5G VODAFONE Group Plc other   Yes
YesNCSC: threats for quantum cryptography? Home Office: is not about cryptography but about quantum computing Ericsson: why are points of SID used as headings but last parts are missing? Should we have editor's notes for this Vodafone: we can have it in the scope SA3 chair: you may want to have editor's notes under the section headings Qualcomm: Proposed requirements should be changed to Potential requirements Vodafone: ok Orange: we should also have a conclusion section Vodafone: this is a study of the threats but will add it
revised No S3‑173462  
    S3‑173462 initial TR33.xxx - Study on the support of 256-bit Algorithms for 5G VODAFONE Group Plc other Endorsement No
Yesnote: The SID for this SI was agreed in the last SA3 meeting in S3-172556 but it is not yet approved by SA and therefore the SID will be submitted to SA #78 for approval. Once the SID is approved a corresponding TR number can be allocated. sending out before Thu 7.12.17 eob CET comments before Mon 11.12.17 eob CET agreed version sent out before Wed 13.12.17 eob CET
for email discussion No   S3‑173247
    S3‑173248 pCR to TR33.xxx - 256 bit keys: Co-existence of different size keys and number and types of algorithms VODAFONE Group Plc other   Yes
YesVodafone: in the phone call different companies offered to fill different sections, this is our input Ericsson: suggests to remove 10.1 Ericsson: type is rather symmetric/asymmetric and not algorithms BT: we seem to fill out the back of the TR without doing the first part (the threats) so section 4 should be filled out first or at least have editor's notes in the later sections that they will checked against the earlier sections Vodafone: we can add editor's note "will be reviewed" conclusion: 10.1 and 10.2 will be removed; add editor's notes and capture all in S3-173462
noted No    
    S3‑173281 pCR to TR 33.xxx - Addition of Quantum threats and countermeasures VODAFONE Group Plc, NIST other   Yes
YesEricsson: some instead of many scientists Vodafone: ok Orange: change "security community" NCSC: add "theoretical" for speedup conclusions: changes will be captured in S3-173462
noted No    
    S3‑173378 Overview of existing GSMA/3GPP symmetric algorithms Ericsson discussion Approval Yes
YesEricsson: text could be added to living document Vodafone: in section 10? BT: correct table colours BT: maybe we should add that not all algorithms are covered Vodafone: not needed conclusion: text will be merged into section 10 of S3-173462
noted No    
    S3‑173381 Overview of NIST Post-Quantum Standardization Ericsson discussion Approval Yes
YesNCSC: do we need all this information? Orange: wonders why we need all this text NIST: we support to include the text conclusion: no consensus to include this in the living document
noted No    
    S3‑173385 Additional Benefit of 256 bit keys U.S. Department of Commerce other   Yes
Yesconclusion: will be included in S3-173462
noted No    
    S3‑173052 Draft LS on the Impacts of increasing the MAC-I (to: RAN2, RAN3; cc: ETSI SAGE; contact: AT&T) InterDigital, AT&T LS out Approval Yes
YesMCC: LS has already source: SA3 Vodafone: as the SI is not yet officially approved, we should better wait with it Qualcomm: answering RAN2/RAN3 to analyze before we did our work is strange so we would be even worried to send the LS next time
postponed No    
8.6 Other study areas                      
9 Review and Update of Work Plan S3‑173003 SA3 Work Plan MCC Work Plan   Yes
Yes
noted No    
    S3‑173006 Work Plan input from Rapporteurs MCC discussion   Yes
Yes
revised No S3‑173412  
    S3‑173412 Work Plan input from Rapporteurs MCC discussion - Yes
Yes
not treated No   S3‑173006
10 Future Meeting Dates and Venues S3‑173005 SA3 meeting calendar MCC discussion   Yes
YesQualcomm: may be we do not need the March 19 ad hoc SA3 chair: fine, then we remove the ad hoc in week 8 2019 NTT DOCOMO: so SA3 #94 can be moved 1 week later SA3 chair: ok, SA3 #94 will then be in week 4 conclusion: weeks 4, 18, 25, 34, 41, 46
revised No S3‑173529  
    S3‑173529 SA3 meeting calendar SA3 chairman (NEC) discussion - Yes
YesOrange: suggest to cancel the July 2018 ad hoc NTT DOCOMO: would be happy to remove it but we may need to have an ad hoc to complete our work Vodafone: removal may have impact on the travel budget from companies SA3 chair: also the Sep. 18 is optional conclusion: July 18 and Sep.18 meetings are currently kept in the meeting calendar, SA3 will discuss in the future whether these 2 meetings will be really take place or not (hosts will be warned that these 2 meetings are not yet confirmed)
agreed No   S3‑173005
11 Any Other Business                      
12 Closing of the meeting