Tdoc List

2018-05-25 14:56

TDoc Title Source Type For Agenda Avail Treated Decision Wdrn Replaced-by Replaces
S3‑181600 Agenda WG Chairman report  
2Approval of Agenda and Meeting Objectives
Yes
Yes
The Chair commented that finishing 5G items was a priority for the meeting and anything else would be secondary.
Qualcomm commented that LS should be considered early since RAN groups and others were having their meetings during the same week.
approved No    
S3‑181601 Report from last SA3 meeting MCC report  
4.1Approval of the report from previous SA3 meeting(s)
Yes
Yes
approved No    
S3‑181602 SA3 Work Plan MCC Work Plan  
9.1Review of work plan
Yes
Yes
Vodafone: LTKUP is not complete, it should continue in Rel-16. ORANGE replied that a conclusion had been approved already.This discussion was taken to the LTKUP agenda item.
 
noted No    
S3‑181603 SA3 meeting calendar MCC other  
10Future Meeting Dates and Venues
Yes
Yes
revised No S3‑182081  
S3‑181604 Work Plan input from Rapporteurs MCC other  
9.2Rapporteur input on status of WID or SID
Yes
Yes
V2X work item is 100% completed (the Work Plan shows 90%).
 
 
revised No S3‑181965  
S3‑181605 [MCSec] 33180 R14 technical clarification for a proxy usage Airbus DS SLC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
Yes
Yes
revised No S3‑181939  
S3‑181606 [eMCSec] 33180 R15 technical clarification for a proxy usage Airbus DS SLC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
revised No S3‑181940  
S3‑181607 33.501 after implementation of approved CRs of SA3#91 NTT DOCOMO INC. other Information
7.2.16Others
Yes
Yes
noted No    
S3‑181608 Reply LS on protected payload message types C1-182577 LS in  
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
noted No    
S3‑181609 LS on LMR Interworking Terminology C1-182644 LS in  
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑181610 LS on modification of solution for PLMN and RAT selection policies for roaming based on SA2 comments C1-182779 LS in  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
noted No    
S3‑181611 Reply LS on SoR mechanism C1-182829 LS in  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
noted No    
S3‑181612 Reply LS on SoR mechanism C1-182830 LS in  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
replied to No    
S3‑181613 LS on Security for NEF Northbound APIs C3-182459 LS in  
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
replied to No    
S3‑181614 Reply LS on the documentation of security requirements for API design C4-183467 LS in  
7.2.13.1Interconnect (SEPP related)
Yes
Yes
replied to No    
S3‑181615 LS on security keys for generation of shortResumeMAC-I for UP EDT R2-1806285 LS in  
7.10.19Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
replied to No    
S3‑181616 Response to LS on encrypting broadcasted positioning data and LS on provisioning of positioning assistance data via LPPa for broadcast R2-1806307 LS in  
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑181617 Reply LS to SA3 on encryption of broadcast positioning information R2-1806308 LS in  
6.13GPP Working Groups
Yes
Yes
786 has a reply LS proposal. Commented in 920.
 
replied to No    
S3‑181618 LS on UE capability related to integrity protection of DRBs S2-184513 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
Qualcomm: The security parameter should be integrity protected and preferably confidentiality protected. If the signalling is in the NAS is not clear that the first is achieved.
Nokia: The limitation is at AS level, not at NAS level. Qualcomm replied that the parameters should be sent to the RAN in an integrity protected way.
Vodafone: this is the best way for a good bidding down protection.
 
 
replied to No    
S3‑181619 LS on reporting Integrity check failure for DRB to network R2-1806490 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
Related to tdoc 861.
 
replied to No    
S3‑181620 Reply LS on User Plane Security Policy R3-182437 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181621 LS response on LS on Support User Plane Encryption in UP security policy S2-184225 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181622 LS response on LS on UP Security Policy S2-184226 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181623 LS on UE differentiation in NB-IoT R3-182509 LS in  
7.10.19Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
noted No    
S3‑181624 Response LS on authentication related services provided by AUSF and UDM S2-184229 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181625 Reply LS one step MO SMS procedure S2-184442 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181626 Reply LS on secured Signalling-only connection S2-184507 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181627 LS response on Initial NAS message protection S2-184510 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
690, 767,769,727,691 and 768 are related to this LS.
 
replied to No    
S3‑181628 Reply LS on paging with IMSI/SUCI in 5GS S2-184512 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181629 Reply LS to SA3 on Security Gateway notification to group members S6-180726 LS in  
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
noted No    
S3‑181630 Reply LS on CAPIF4xMB S6-180727 LS in  
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
Postponed since this affected Rel-16.
 
postponed No    
S3‑181631 5G for Industrial Communication 5G-ACIA LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181632 Considerations for CIoT Security work in 5G Phase 2 InterDigital, Inc. discussion Endorsement
7.11New Work Item proposals
Yes
Yes
Ericsson: we have work based on GBA and we have also piggibacked some other work in SA2 work.
ORANGE: we don’t need to copy their requirements in our documents, just refer them.
Interdigital's concerns had already been taken into account.
 
noted No    
S3‑181633 Correction for TS 33.501 subclause 5.11.2 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
withdrawn Yes    
S3‑181634 Correction for TS 33.501 subclause 6.9.2.3.4 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
withdrawn Yes    
S3‑181635 Draft Reply LS to LS on Security for NEF Northbound APIs Huawei, Hisilicon LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182013  
S3‑181636 Study on security aspects of encrypted traffic detection and verification China Unicom, China Telecom, China Mobile, OPPO, ZTE, Huawei, HiSilicon, Intel, CATR, CATT, Alibaba Inc., Motorola Mobility, Lenovo SID new Agreement
8.8New study item proposals
Yes
Yes
Interdigital: solutions limited to the SA2 study? Or we can bring more?
OPPO: we depend on the architecture design of SA2.
Ericsson: SA2 may bring other solutions, but we will work on the final agreed solution in SA2. Qualcomm supported this. The objectives should be updated with this.
Sandvine supported this work item and pointed out that it would be very useful for operators.
IDEMIA: we don’t know if there's impact on the UICC.
Qualcomm: in SA2 the UICC is not impacted and we will follow their work.
Docomo objected to implying that SA3 would study any deep packet inspection, breaking encryption procedures.
T-Mobile supported this study.
The Chair commented that it could be an issue in the SA plenary to introduce supporting companies that don't come to SA3 and advised the Rapporteur to take this into account.
 
ORANGE found the objective very solution specific and didn’t understand the use cases.
Deutsche Telekom preferred to bring this back into the next meeting and wait for SA2's progress the following week and being aligned with them.
The Chair suggested the authors to refine this for the next meeting and have offline discussions with the companies who preferred to align with SA2 activity. For this reason the study was noted.
revised No S3‑182059  
S3‑181637 Correction for TS 33.501 subclause 6.6.1 InterDigital, Inc. CR Approval
7.2.4AS security
Yes
Yes
Ericsson: the first change is confusing.Whatever applies to a PDU session applies to all DRBs serving that PDU session.
merged No S3‑181987  
S3‑181638 Correction for TS 33.501 Section 3.1 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
withdrawn Yes    
S3‑181639 Correction for TS 33.501 subclause 4.1 InterDigital, Inc. CR Approval
7.2.13.2Other
Yes
Yes
revised No S3‑181961  
S3‑181640 Correction for TS 33.501 subclause 5.3.10 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
withdrawn Yes    
S3‑181641 Correction for TS 33.501 subclause 5.11.2 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
revised No S3‑182051  
S3‑181642 Clause 13.3 - Remove of transport layer protection procedure ZTE Corporation, China Mobile CR Approval
7.2.13.2Other
Yes
Yes
merged No S3‑181960  
S3‑181643 Clause 13.5 - Authentication for SEPP capability negotiation ZTE Corporation, China Mobile CR Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Ericsson: this will be there in all SEPPs, it won't be optional.
Deutsche Telekom: SEPP to SEPP is always in a TLS tunnel.
There was a misunderstanding in what was existing, so the CR was finally not pursued.
 
not pursued No    
S3‑181644 Clause 13.5 - Failure on SEPP capability negotiation ZTE Corporation, China Mobile CR Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Huawei: no need for additional messages to express the failure, the original response message can be used for that.
not pursued No    
S3‑181645 new KI for security algorithm handling ZTE Corporation, China Unicom pCR Approval
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
ORANGE didn't find the requirement clear.
Given that there was no understanding of this requirement it was noted.
 
noted No    
S3‑181646 Clause 13.4.1 - No registration for NF service consumer ZTE Corporation, China Mobile other Approval
7.2.13.2Other
Yes
Yes
merged No S3‑181962  
S3‑181647 TCG progress report InterDigital, Inc. report Information
6.6TCG
Yes
Yes
1. TCG – Highlights
        • New/modified work items
            • none
        • Publication of new or revised deliverables (incremental changes from the status reported at SA3#91)
o TCG TMS Use Cases v2 – to be published May 2018
o TCG SNMP MIB for TPM-based Attestation – public review May 2018
2. Meetings
TCG Members Meeting in San Diego, CA – 18-22 June 2018
TCG Members Meeting in Lisbon, PT – 15-18 October 2018
MPWG meets every Thursday at 10-11 ET
TMS WG meets every Monday and Friday at 12-13 ET
noted No    
S3‑181648 Discussion on the Impact of enabling user plane integrity protection Vodafone España SA discussion Information
7.10.1SAE/LTE Security
Yes
Yes
DT, Docomo supported this document. China Mobile commented that they had done a similar exercise and agreed with the proposal. They commented that VoLTE traffic will grow more and more and it should be considered.
Ericsson commented that the scope could be enlarged: privacy enhancement for example.
Vodafone proposed to have a SID brought directly in to the plenary to speed up the work.They didn't think that such a study would not be agreable at this meeting.
Qualcomm, TIM, ORANGE: let's discuss the scope of this Work Item in SA3. They had concerns of having this SID being sent directly to SA Plenary.
The Chair commented that sending the SID directly to the plenary would bring the wrong message.
TIM wasn't in favour of sending the SID to SA directly either.
Vodafone commented that they would push for an LS to SA3 in SA plenary instead but they thought that no progress in two meetings was showing a bad image.
 
 
noted No    
S3‑181649 Statement on urgency of alignment of ETSI SSP with 3GPP release 15 GSMA LS in  
7.2.8Primary authentication
Yes
Yes
noted No    
S3‑181650 UE capability related to integrity protection of DRBs R2-1804056 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
noted No    
S3‑181651 [CAPIF_SEC] 33.122 Restructure of clause 5 Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
noted No    
S3‑181652 [CAPIF_SEC] 33.122 Onboarding flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181942  
S3‑181653 [CAPIF_SEC] 33.122 Authentication and Authorization flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181943  
S3‑181654 [CAPIF_SEC] 33.122 EN in clause 6.3.1 Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
withdrawn Yes    
S3‑181655 [CAPIF_SEC] 33.122 Remove ENs Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
withdrawn Yes    
S3‑181656 [CAPIF_SEC] 33.122 Update to API onboarding Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181911  
S3‑181657 [CAPIF_SEC] 33.122 Update to Method 3 Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181912  
S3‑181658 [eMCSec] 33180 R15 Migration KMS clarification Motorola Solutions Germany CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
revised No S3‑182030  
S3‑181659 [MCPTT] 33.179 R13 Add GMK management Motorola Solutions Germany CR Agreement
7.10.11Security of MCPTT (MCPTT)
Yes
Yes
revised No S3‑181938  
S3‑181660 [MCPTT] 33.179 R13 Fix annex E.6.3 reference Motorola Solutions Germany CR Agreement
7.10.11Security of MCPTT (MCPTT)
Yes
Yes
agreed No    
S3‑181661 Discussion on WID on Network Slicing Security Huawei, HiSilicon, CMCC, China Unicom, CATR, CATT discussion Endorsement
7.11New Work Item proposals
Yes
Yes
noted No    
S3‑181662 New WID on Network Slicing Management Security Huawei, HiSilicon, CMCC, China Unicom, CATR, CATT WID new Agreement
7.11New Work Item proposals
Yes
Yes
ORANGE: our SA5 delegate believes it's a bit premature to go for this security work. Wait for SA5 to finish their architecture before starting the work in SA3.
Huawei commented that was not the input they got from their delegates in SA5.
ORANGE: SA5 has no architecture for the management. We have no architecture to work on. I suggest to have this WID presented in August.
Huawei: what they have in their TS is sufficient.
Vodafone: does this include the ME and the UE? Huawei replied that they were not included and that they would clarify this in the WID description.
ORANGE: it's about OAM interfaces, not so much about the core network.
Ericsson: the info we get from our delegates is that the part that we need to secure, will be done in Rel-16.
Vodafone believed that this was obvious and it wasn't needed, as this could be considered as a VPN or TLS for securing it. Huawei agreed and commented that this could be written in the specification. Vodafone suggested to have a better argument in the justification.
ORANGE: let's wait for results from their meeting in June since TS 28.533 has hardly any content.They also commented that there was some risk that their work would be pushed to Rel-16.
BT: support of slices need support in the visited network as well. ORANGE didn't think this was part of SA5's work.
Vodafone: make it generic for external party and the operator.
The Chair suggested to follow closely what SA5 was doing and bring the WID together with the solutions in the SA3 August meeting for one step approval provided that their progress could allow it.
 
 
noted No    
S3‑181663 Security options for 33.501 Huawei, HiSilicon CR Agreement
7.2.16Others
Yes
Yes
ORANGE commented that this didn’t add anything to the specification. No one seemed to see the use for this.
 
not pursued No    
S3‑181664 Improvements for key derivation an distribution scheme Huawei, HiSilicon CR Agreement
7.2.1Key hierarchy
No
Yes
withdrawn Yes    
S3‑181665 Clarifications on service authorization Huawei, HiSilicon CR Agreement
7.2.13.2Other
No
Yes
withdrawn Yes    
S3‑181666 SBA_NF service access authorization discussion Huawei, HiSilicon discussion Endorsement
7.2.13.2Other
Yes
Yes
Ericsson pointed out that CT4 was working with this issue and that a reponse to the LS would be needed.
 
noted No    
S3‑181667 Adding further details for EPS to 5G interworking Huawei, HiSilicon CR Agreement
7.2.10Interworking
No
Yes
withdrawn Yes    
S3‑181668 Clarifications to Definitions and Abbreviations Huawei, HiSilicon CR Agreement
7.2.16Others
No
Yes
withdrawn Yes    
S3‑181669 ID binding for 2nd Authentication Huawei, HiSilicon, China Southern Power Grid, China Unicom CR Agreement
7.2.9Secondary authentication
No
Yes
withdrawn Yes    
S3‑181670 Discussion on ID binding for 2nd Authentication Huawei, HiSilicon, China Southern Power Grid, China Unicom discussion Endorsement
7.2.9Secondary authentication
Yes
Yes
ORANGE: the secondary authentication credentials will stop the second UE from accessing the network with the USIM. SIM lock would also solve the issue.
Qualcomm: no requirements for the DN-AAA should be made here.
The Chair commented that IoT was not to be treated in Rel-15 as agreed for phase one.
Qualcomm: we have studied this use case for MTC and implemented it.
Interdigital: this logging is illegal in some countries.
 
 
noted No    
S3‑181671 Evaluation of NSST integrity protection solution Huawei, HiSilicon pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
merged No S3‑182029  
S3‑181672 Evaluation of NSST confidentiality protection solution Huawei, HiSilicon pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑182067  
S3‑181673 Evaluation of Authentication for slice management interface solution Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑181931  
S3‑181674 Evaluation of OAuth based authorization for access to management functions solution Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑182066  
S3‑181675 Security options Huawei, HiSilicon pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE objected to this document.
BT supported this as long as the indications had a more proper security language.
ORANGE: the table is not correct and goes beyond the scope of slicing.
TIM didn’t support this contribution either.
This was finally noted since there was not much support for it.
 
noted No    
S3‑181676 Conclusions Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE didn’t support having in the specification that the normative work should be done in the same release as the normative work in SA5.The last sentence should be removed.
They didn't support the second bullet either. It should state that the preferred solution is 1.1 for future normative work.
Ericsson supported not restricting the options for the normative work.
Both bullets were reworded in the revision.
 
 
revised No S3‑182068  
S3‑181677 Overview Huawei, HiSilicon pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE didn’t see the benefit of having an overview at all.
Ericsson: network slice as a service is an optional feature in the SA5 work, which is not implied here. The overview of key issues should be in the end of the document, not here.
ORANGE proposed to remove the entire clause 4 instead.
There was no support for this document, so it was noted.
 
noted No    
S3‑181678 Introduction Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE: TR 33.899 was never approved.
MCC: better refer to documents rather than working groups.
 
revised No S3‑182070  
S3‑181679 Editorial and removing ENs Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑181680 CR on Cluase 6.6 UP security mechanism with security policy Nokia other Approval
7.2.3Mobility
Yes
Yes
Huawei: This is limiting the available resources as decided by RAN.
revised No S3‑181999  
S3‑181681 Discussion paper Clause 6.9.5.2 clarification on completion of NAS SMC Nokia discussion Endorsement
7.2.5NAS security
Yes
Yes
noted No    
S3‑181682 CR Clause 6.9.5.2 clarification on completion of NAS SMC Nokia other Approval
7.2.5NAS security
Yes
Yes
merged No S3‑181979  
S3‑181683 Discussion EN on Simultaneous NAS connections context. Nokia discussion Endorsement
7.2.5NAS security
Yes
Yes
noted No    
S3‑181684 CR to delete EN on Simultaneous NAS connections context Nokia other Approval
7.2.5NAS security
Yes
Yes
withdrawn Yes    
S3‑181685 CR Clause 6.3.1.2 Unused AVs from legacy MME Nokia other Approval
7.2.10Interworking
Yes
Yes
merged No S3‑182040  
S3‑181686 CR clarifications to Clause 7.2 on UE Id in EAP-5G. Nokia other Approval
7.2.11non-3GPP access
Yes
Yes
revised No S3‑182044  
S3‑181687 Discussion paper on Network Slice enhancements SID Nokia discussion Endorsement
8.8New study item proposals
Yes
Yes
ORANGE: not slice specific authentication but studying it feasibility of having it. Make it clear that this is not replacing primary authentication.
TIM: requirements from NGMN or we wait for requirements coming from SA1?
ORANGE: we need to see the use cases and requirements from SA1, study whether this is really needed. What are the service requirements leading us to do this study? See first what's being done in SA1.
Ericsson pointed out that there is work being done in SA2 and that could be the base for SA3's work.
 
noted No    
S3‑181688 Correction and Clarification for EDCE5 Huawei, Hisilicon CR Approval
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
agreed No    
S3‑181689 a proposal for the emergency session in SRVCC of TR33.856 Huawei, Hisilicon pCR Approval
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
BT: the last sentence in the solution details doesn' make much sense.
revised No S3‑182076  
S3‑181690 Discussion on Protection of initial NAS message Huawei, Hisilicon discussion Approval
7.2.5NAS security
Yes
Yes
noted No    
S3‑181691 Draft Reply LS to SA2 on initial NAS message protection Huawei, Hisilicon LS out Approval
7.2.5NAS security
Yes
Yes
merged No S3‑181933  
S3‑181692 Remove initial NAS message protection solution from clause 6.4.6 Huawei, Hisilicon CR Approval
7.2.5NAS security
No
Yes
withdrawn Yes    
S3‑181693 Security Negotiation for RRC INACTIVE Huawei, Hisilicon CR Approval
7.2.4AS security
Yes
Yes
revised No S3‑182061  
S3‑181694 Key Handling at RRC state transitions Huawei, Hisilicon CR Approval
7.2.4AS security
Yes
Yes
revised No S3‑182060  
S3‑181695 Security Mechanisms for Dual Connectivity Architecture for MR-DC with 5GC Huawei, Hisilicon CR Approval
7.2.4AS security
Yes
Yes
revised No S3‑181985  
S3‑181696 Security requirements for API invoker onboarding Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182001  
S3‑181697 Authorization aspects for discovering Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑181698 Relocation of topology hiding Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182002  
S3‑181699 Editorial corrections and deleting Editor's Note to TS 33.122 v0.2.0 Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182025  
S3‑181700 Security procedures for updating security method Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182003  
S3‑181701 Delete the EN in section 6.4.2 Huawei, Hisilicon CR Approval
7.2.5NAS security
No
Yes
withdrawn Yes    
S3‑181702 Discussion on SoR using ETSI Secure Packet Intel Deutschland GmbH discussion  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
Vodafone: this is not new, it's what we can do now.
T-Mobile: CT1 has developed a solution for SoR and we need to develop the security for that sollution. This is part of that solution.
ORANGE: CT1 has proposals to change the solution during their current meeting. SA3-LI still has to reply to their LS so it's still an open solution.
ORANGE: we can work on the solution in the living document, but nothing for the TS until they have somethinf stable. Intel agreed to go for the living document.
Qualcomm: this is an existing solution, but CT1 is doing a control plane procedure that is missing from here.
 
noted No    
S3‑181703 SoR Living Doc: Secure Packet Solution for Steering of Roaming Intel Deutschland GmbH other  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
ORANGE: remove the conclusion. Intel agreed to do this.
ORANGE: you propose another secure channel between UICC and UDM, so you need to maintain two secure channels.
Vodafone: this causes huge amounts of loading in UDM.
Qualcomm had multiple issues with the document. The solution was not complete for them.
Gemalto: it's a candidate solution that should be part of the document.
Vodafone: we agreed with CT1 not to use the auth mechanism and not to interact with the authenticate commands.
noted No    
S3‑181704 IV generation for ECIES Apple Inc, Ericsson CR Agreement
7.2.14Privacy
No
Yes
withdrawn Yes   S3‑181495
S3‑181705 Unauthenticated Emergency Calls can use NEA0 Huawei, Hisilicon CR Approval
7.2.4AS security
Yes
Yes
ORANGE: no need for a new requirement.
Huawei: we can make it a note.
Ericsson didn't agree with the addition in the requirement clause.
not pursued No    
S3‑181706 Reply SA3 LS on security for inactive state Huawei, Hisilicon LS out Approval
7.2.4AS security
Yes
Yes
revised No S3‑181997  
S3‑181707 Discussion Paper of CIoT Early Data Transmission (EDT) Huawei, Hisilicon discussion Endorsement
6.13GPP Working Groups
Yes
Yes
Ericsson: we see no security issues with the new key. No threat.
Qualcomm: no point with keeping the old keys.Samsung agreed.
Ericsson:The source generates a new key and gives it to the target. We are not breaking any security requirement.
This had to be taken offline.
 
Tdocs related: 860, 708,778,615.
 
noted No    
S3‑181708 Draft Reply LS to SA2 regarding EDT Huawei, Hisilicon LS out Approval
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑181709 IV generation for ECIES Apple,Ericsson other Agreement
7.2.14Privacy
Yes
Yes
NCSC: the rational doesn’t give a reason for this change.
merged No S3‑181968  
S3‑181710 Security procedures for dual connectivity Huawei,Ericsson, Qualcomm draftCR Approval
7.2.16Others
Yes
Yes
revised No S3‑181984 S3‑181517
S3‑181711 ME-USIM negotiation for SUCI calculation in ME Apple, Deutsche Telekom, Sony, KPN, China Mobile, Qualcomm Incorporated, BT Group,Intel CR Agreement
7.2.14Privacy
Yes
Yes
IDEMIA didn’t agree with the reason for the change. It could be done with an applet.
Vodafone: CT6 created a new PDU function over the top incorrectly, by misunderstanding SA3 text in this spec. We need a file where we can use existing SIMs.
 
 
revised No S3‑181967 S3‑181496
S3‑181712 ID linkage verification in secondary authentication Huawei, HiSilicon, China Southern Power Grid, China Unicom other Agreement
7.2.9Secondary authentication
Yes
Yes
revised No S3‑182032  
S3‑181713 New Study on Security Aspects of the 5G Service Based Architecture Deutsche Telekom AG SID new Approval
8.8New study item proposals
Yes
Yes
It was clarified that SBA security work for Rel-15 would finish by the end of the current meeting.
Ericsson queried on the timescales of this SID. Deutsche Telekom commented that work could continue in the next meetings given that this was a study item.
KPN was worried that the content of the living document wasn't proper for a TR. Clarification would require quite some time. The Chair commented that it could be decided later to drop the TR or refine it properly.
It was asked to be minuted that the TR wouldn't become a mere container for diverse solutions.
It was agreed to send it for information for SA#80.
 
 
revised No S3‑181963  
S3‑181714 TR Skeleton for FS_SBA-Sec Deutsche Telekom AG other Approval
7.2.13.2Other
Yes
Yes
revised No S3‑181964  
S3‑181715 Incorporating Living Doc Contents into FS_SBA-Sec TR Deutsche Telekom AG other Approval
7.2.13.2Other
Yes
Yes
noted No    
S3‑181716 Discussion on Malicious Messages on N32 Deutsche Telekom AG discussion Endorsement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
On proposal 4,Vodafone: it would be useful to log and detect these received messages in order to find out who the sender was. After that the message is discarded.
DT wanted to have proposal 4 as a requirement in TS 33.501. Ericsson commented that SA3 needed to be more precise with the anti-spoofing mechanisms. ORANGE supported to have anti-spoofing protection mentioned in the specification.
Juniper: why not having it for a future SCAS for SEPP?
 
 
revised No S3‑181950  
S3‑181717 LS on Security Requirements for API Design Deutsche Telekom AG LS out Agreement
7.2.13.2Other
Yes
Yes
revised No S3‑181936  
S3‑181718 Annex B-Wording correction -based on Living CR S3-181470 CATT CR Agreement
7.2.8Primary authentication
Yes
Yes
revised No S3‑181993 S3‑181470
S3‑181719 Clause 6.1.2-Clarification to authentication method selection-based on Living CR S3-181465 CATT, China Mobile CR Agreement
7.2.8Primary authentication
Yes
Yes
not pursued No   S3‑181465
S3‑181720 Improvements for key derivation an distribution scheme Huawei, HiSilicon other Agreement
7.2.1Key hierarchy
Yes
Yes
Overlapping with 752.
 
merged No S3‑181996  
S3‑181721 Clarifications on service authorization Huawei, HiSilicon other Agreement
7.2.13.2Other
Yes
Yes
revised No S3‑182034  
S3‑181722 Adding further details for EPS to 5G interworking Huawei, HiSilicon other Agreement
7.2.10Interworking
Yes
Yes
revised No S3‑182089  
S3‑181723 Clarifications to Definitions and Abbreviations Huawei, HiSilicon other Agreement
7.2.16Others
Yes
Yes
merged No S3‑182049  
S3‑181724 Mac key length in Annex C Huawei, HiSilicon other Agreement
7.2.14Privacy
Yes
Yes
noted No    
S3‑181725 Delete Editor’s Note of Multiple NAS connections Huawei, Hisilicon other Agreement
7.2.5NAS security
Yes
Yes
Qualcomm didn't agree with deleting the editor's note. It would affect the deregistration of UEs when there is a multiple connection.
Ericsson also had an issue with deleting the editor's note, but didn’t agree with Qualcomm's proposal. Qualcomm proposed to reword the editor's note to describe better the problem.
It was agreed to minute the description of the problem rather than adding another editor's note.
 
merged No S3‑181980  
S3‑181726 Clause 6.1.3- Editorial_reference_wording_error correction -based on Living CR S3-181453 CATT CR Agreement
7.2.8Primary authentication
Yes
Yes
merged No S3‑181990 S3‑181453
S3‑181727 Remove Initial NAS Message Protection Solution from clause 6.4.6 Huawei, Hisilicon other  
7.2.5NAS security
Yes
Yes
noted No    
S3‑181728 Clause 6.2.2-Editorial_reference_wording_error correction -based on Living CR S3-181578 CATT CR Agreement
7.2.1Key hierarchy
Yes
Yes
merged No S3‑181996 S3‑181578
S3‑181729 Clause 6.2.3-Editorial_reference_wording_error correction -based on Living CR S3-181434 CATT CR Approval
7.2.1Key hierarchy
Yes
Yes
revised No S3‑181995 S3‑181434
S3‑181730 Clause 6.3.1.4-Reference_wording_error correction -based on Living CR S3-181455 CATT CR Agreement
7.2.8Primary authentication
Yes
Yes
revised No S3‑181992 S3‑181455
S3‑181731 Clause 6.12.2-Routing registration request using SUCI-based on Living CR S3-181496 CATT CR Agreement
7.2.14Privacy
Yes
Yes
revised No S3‑182053 S3‑181496
S3‑181732 pCR to Living doc: Protection Policies KPN N.V. other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Juniper: policy per NF in 4.3.6.4? That would be complex. KPN agreed: One policy per NF service would be better.
Huawei didn’t agree with 4.3.6.6.  
revised No S3‑181941  
S3‑181733 Clause 11.1.2 Add EAP failure processing-based on Living CR S3-181569 CATT, China Mobile CR Approval
7.2.9Secondary authentication
Yes
Yes
Ericsson: we usually don’t specify failure cases or if we do, we need to specify what happens afterwards.
ORANGE: why does the UPF need to be notified?
Ericsson: to release resources, but this is not in our scope.
The last change was kept in 2038 which was merged in the CR in 2037.
 
not pursued No   S3‑181569
S3‑181734 Protection policies SEPP and NF KPN N.V. CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181735 Discussion on use of TLS 1.3 in 3GPP NCSC discussion Endorsement
7.10.20Other work items
Yes
Yes
Docomo: TLS 1.3 we cannot influence. We are not doing any traffic engineering for OAM interfaces (traffic prioritzation, for example).
The suggestions were endorsed, but it was decided not to send an LS to SA2.
 
 
endorsed No    
S3‑181736 Requirement for and impact of a longer MAC NCSC pCR Approval
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
revised No S3‑182073  
S3‑181737 pCR on Onboarding procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181972  
S3‑181738 pCR on introducing offboarding procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181973  
S3‑181739 Options for integrity protection of the N32 interface NCSC discussion Endorsement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Ericsson: it seems cumbersome. Better to use authenticated encryption all the time.
 
noted No    
S3‑181740 pCR on integrating subclause 6.1 into 6.3 NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
withdrawn Yes    
S3‑181741 pCR on CAPIF-1e security procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181974  
S3‑181742 pCR on clarification of authroization information in CAPIF-2, 2e procedures NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181975  
S3‑181743 pCR on clarifcation of access token generation in CAPIF-2e method 3 NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
merged No S3‑181978  
S3‑181744 Alignment of CAPIF specs NEC Corporation discussion Endorsement
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
endorsed No    
S3‑181745 [DRAFT] LS on CAPIF specification work in SA3 NEC Corporation LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182019  
S3‑181746 pCR on introduction clause NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑181747 pCR on editorial correction NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑181748 Clarifications to definitions and abbreviations NEC Corporation CR Approval
7.2.16Others
Yes
Yes
revised No S3‑182049 S3‑181475
S3‑181749 Updates to clause 6.1.1.1 NEC Corporation CR Agreement
7.2.8Primary authentication
Yes
Yes
Ericsson,Nokia: it's not clarifying anything here.
not pursued No   S3‑181460
S3‑181750 Editorial correction to clause 6.12.5 on SIDF NEC Corporation CR Agreement
7.2.14Privacy
Yes
Yes
Vodafone objected to having "shall" in here. This is a box that deconceals the SUPI. If using mobile encryption, the rest of the sentence is correct.
This was finally reworded in the revision.
 
revised No S3‑181932  
S3‑181751 Clarification on UE ID in clause 11.1.2 NEC Corporation CR Approval
7.2.9Secondary authentication
Yes
Yes
not pursued No   S3‑181569
S3‑181752 Resolving an EN on event(s) that triggers the storage of Keys in clause 6.2.2.2 NEC Corporation CR Agreement
7.2.2Key derivation
Yes
Yes
Qualcomm didn’t agree with this CR.Authentication shouldn’t trigger the storage.
 
merged No S3‑181996  
S3‑181753 Calculation of NAS MAC included in NAS Container at N2 HO Ericsson CR Agreement
7.2.3Mobility
Yes
Yes
Two options to choose from in 753 and 783.
This was taken offline (although it seemed that most companies wanted 783).
revised No S3‑182062  
S3‑181754 UE handover handling - corrections and clarifications Ericsson other Agreement
7.2.3Mobility
Yes
Yes
merged No S3‑182062 S3‑181511
S3‑181755 Network N2-handover handling - corrections and clarifications Ericsson other Agreement
7.2.3Mobility
Yes
Yes
merged No S3‑182062 S3‑181511
S3‑181756 Network Xn-handover handling – correction of indicator name Ericsson other Agreement
7.2.3Mobility
Yes
Yes
noted No   S3‑181511
S3‑181757 Update to clause 6.1.3: clarification on EAP notifications Ericsson other Agreement
7.2.8Primary authentication
Yes
Yes
merged No S3‑181990 S3‑181453
S3‑181758 Correction to: 3GPP 5G profile for EAP-AKA' Ericsson CR Agreement
7.2.8Primary authentication
Yes
Yes
revised No S3‑181991  
S3‑181759 Sending ABBA to the UE with ngKSI Ericsson discussion Endorsement
7.2.6Security context
Yes
Yes
endorsed No    
S3‑181760 Update to clause 6.7.2: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
revised No S3‑182006 S3‑181518
S3‑181761 Update to clause 6.1.3: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
Nokia and Huawei didn’t agree with step 12 of the figure. This was removed.
 
revised No S3‑182007 S3‑181453
S3‑181762 Update to Annex B: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
revised No S3‑182008 S3‑181470
S3‑181763 CR to include MAC in SUCI NEC Corporation other Approval
7.2.14Privacy
Yes
Yes
Huawei: MAC verified only by the HPLMN. If the routing info is changed this will be erroneous.
Qualcomm: this doesn’t bring any benefit.
 
 
noted No    
S3‑181764 Updates to Key distribution and derivation scheme (keys in network entities) NEC Corporation CR Agreement
7.2.2Key derivation
Yes
Yes
Qualcomm: the figure displays too much and it's hard to read.
The content will be added to 996.
not pursued No   S3‑181354
S3‑181765 Updates to Key distribution and derivation scheme (keys in UE) NEC Corporation CR Agreement
7.2.2Key derivation
Yes
Yes
merged No S3‑181996  
S3‑181766 Updates on key handling for registration via 5G-RAN NEC Corporation other Approval
7.2.5NAS security
Yes
Yes
Ericsson agreed with the changes but suggested to make it more generic instead of adding the values here.
Some part willl go to 981 and some part will go to 982.
approved No S3‑181981  
S3‑181767 Discussion on the incoming LS from SA2 on initial NAS protection Qualcomm Incorporated other Discussion
7.2.5NAS security
Yes
Yes
Ericsson: Partial cyphering mechanism. How important is this for Rel-15? Better to postpone it for Rel-16. In CT1 the partial cyphering mechanism will be treated in Rel-16.
Qualcomm: initial registration, I cannot use the upper parameters.
Nokia: better to introduce it earlier, Rel-15, and use it.
KPN and Deutsche Telekom supported Qualcomm.
This was finally noted.
 
 
 
noted No    
S3‑181768 LS response on Initial NAS message protection Qualcomm Incorporated LS out Approval
7.2.5NAS security
Yes
Yes
revised No S3‑181933  
S3‑181769 Proposed updates to the CR on initial NAS protection (S3-181544) Qualcomm Incorporated other Approval
7.2.5NAS security
Yes
Yes
Ericsson: we need to wait for CT1's reply to the LS before removing this Editor's note.
 
revised No S3‑181934  
S3‑181770 Referencing algorithm and key derivation description for EN-DC that exist in TS 33.501 Qualcomm Incorporated CR Agreement
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
agreed No    
S3‑181771 Assigning FC values to TS 33.501 Qualcomm Incorporated CR Agreement
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
Related to tdoc 883.
 
revised No S3‑181928  
S3‑181772 Adding FC values to TS 33.501 Qualcomm Incorporated other Approval
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
noted No    
S3‑181773 Clarify that both split bearers and SCG bearer may need security resources at the SgNB Qualcomm Incorporated CR Agreement
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
Huawei: we need corrections in other places.
Where these needed to be corrected in other places was taken offline.
 
revised No S3‑181927  
S3‑181774 Filling is some of the details on dual connectivity for TS 33.501 Qualcomm Incorporated other Approval
7.2.4AS security
Yes
Yes
merged No S3‑181984  
S3‑181775 Generalising key issue #1 in the TR 33.856 Qualcomm Incorporated pCR Approval
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No    
S3‑181776 Resolving the editor’s note on the ABBA parameter Qualcomm Incorporated other Approval
7.2.6Security context
Yes
Yes
MCC commented that the note had normative language. The "needs to be" was reworded and the second sentence removed.
Ericsson: How does the UE know about the length?
Qualcomm: it's in the IE, as defined by CT1.
 
 
 
merged No S3‑181929  
S3‑181777 Resolving action item on collision between S3-181512 and S3-181547 from SA3 #91 Qualcomm Incorporated other Discussion
7.2.5NAS security
Yes
Yes
noted No    
S3‑181778 Reply LS on security keys for generation of shortResumeMAC-I for UP EDT Qualcomm Incorporated LS out Approval
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑181779 Using Registration Accept to change the security context on the other access Qualcomm Incorporated other Approval
7.2.5NAS security
Yes
Yes
noted No    
S3‑181780 Kamf' derivation in EPS to 5GS HO Qualcomm Incorporated other Agreement
7.2.10Interworking
Yes
Yes
First change merged in 2042, Second change merged into tdoc 929.
 
merged No S3‑182042  
S3‑181781 missing implementation of merging S3-181566 to S3-181511 Qualcomm Incorporated other Agreement
7.2.5NAS security
Yes
Yes
merged No S3‑181979  
S3‑181782 clairifications and updates on EPS to 5GS HO in clause 8.4 Qualcomm Incorporated other Agreement
7.2.10Interworking
Yes
Yes
revised No S3‑182041  
S3‑181783 NAS MAC calculation for NASC and text clarifications on Cluase 6.9.2.3.3 and 6.9.2.3.4 (changes to S3-181511) Qualcomm Incorporated other Agreement
7.2.3Mobility
Yes
Yes
merged No S3‑182062  
S3‑181784 Security handling at RRC state transitions (changes to S3-181456) Qualcomm Incorporated other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑182060  
S3‑181785 Security solution for encryption of broadcast positioning information Qualcomm Incorporated LS out Approval
6.13GPP Working Groups
Yes
Yes
revised No S3‑181926  
S3‑181786 On the ciphering of broadcasted positioning data Qualcomm Incorporated other Endorsement
6.13GPP Working Groups
Yes
Yes
noted No    
S3‑181787 Updates to clause 6.9.3 NEC Corporation CR Agreement
7.2.3Mobility
Yes
Yes
Revised content is in S3-182004.
 
not pursued No   S3‑181511
S3‑181788 Correcting Figure 6.13-1 on gNB periodic local authentication procedure NEC Corporation CR Approval
7.2.4AS security
Yes
Yes
revised No S3‑181988 S3‑181340
S3‑181789 Corrections to section 4.1 Security domains China Mobile Com. Corporation CR Approval
7.2.16Others
Yes
Yes
agreed No    
S3‑181790 Corrections to section 5.1.2 Authentication and Authorization China Mobile Com. Corporation CR Approval
7.2.8Primary authentication
Yes
Yes
not pursued No    
S3‑181791 Discussion on security policy provisioning for SEPP Huawei, Hisilicon discussion Endorsement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Ericsson: you may configure directly in the SEPP, not in another node.
Nokia, Docomo agreed with Ericsson.
 
noted No    
S3‑181792 Corrections to section 13.4.1.1 China Mobile Com. Corporation CR Approval
7.2.13.2Other
Yes
Yes
There were several issues with the CR cover page that needed to be taken care of. The CR didn’t display the whole clause where the change was happening either.
revised No S3‑181959  
S3‑181793 Security policy provisioning for SEPP to SBA Living Document Huawei, Hisilicon other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
approved No    
S3‑181794 New solution for Security of Service Based Architecture TIM, InterDigital other Approval
7.2.13.2Other
Yes
Yes
withdrawn Yes    
S3‑181795 Remove the editors note in section 6.12.1 China Mobile Com. Corporation CR Approval
7.2.14Privacy
Yes
Yes
merged No S3‑181970  
S3‑181796 Security policy provisioning for SEPP Huawei, Hisilicon CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181797 Eidtorials Corrections to 33.501 China Mobile Com. Corporation CR Approval
7.2.16Others
Yes
Yes
not pursued No    
S3‑181798 Discussion on protection against fraudulent PLMN ID attack between different PLMNs Huawei, Hisilicon discussion Endorsement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
DT: Validating the message itself and doing a cross check is different from what Huawei proposes.
 
noted No    
S3‑181799 Definition and abbreviation China Mobile Com. Corporation pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑181862  
S3‑181800 Addition of authorization for slice management interface solution China Mobile Com. Corporation pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑181863  
S3‑181801 Evaluation of integrity protection of NSST China Mobile Com. Corporation pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑182029  
S3‑181802 Resolving Editor’s Note on USIM Orange Romania CR Agreement
7.2.8Primary authentication
Yes
Yes
ORANGE clarified that there is no reference to the ETSI SSP work, only this Editor's note.
Qualcomm wanted to be minuted that SSP should be added as a solution when it's ready from ETSI SCP and complies with the 33.501 security requirements.
ORANGE commented that this would come later in a proper CR that had to be discussed. They wanted to mention the release in the minutes.
Ericsson: SA plenary said that SSP is release independent.
ORANGE: it cannot be included in Rel-15 since it will be over in June.
Vodafone: it will be a new feature, it will require updates in CT6 specs and it will have to go to the next release for this reason.
There was disagreement whether to mention the Release in the minutes when deleting the editor's note, so the CR had to be taken offline.
Eventually the decision was to remove the editor's note and have minuted:
 
ETSI SCP is working on a new secure element called SSP. The SSP can be included as another solution where the USIM can reside on, if the SSP is defined in the Release 16 timeframe and if it complies with the security requirements defined in TS 33.501.
 
 
 
 
 
 
agreed No    
S3‑181803 Protection against fraudulent PLMN ID attack between different PLMNs Huawei, Hisilicon CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
DT: it needs more details.
Ericsson: in the app layer solution we are introducing what Huawei wants.Nokia agreed.
Companies were fine with the requirement introduced in this CR.
 
revised No S3‑181955  
S3‑181804 Addition of security procedures between network slicing management functions China Mobile Com. Corporation pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑181864  
S3‑181805 Discussion on inconsistent AKA algorithms between UE and UDM Huawei, Hisilicon discussion Endorsement
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
noted No    
S3‑181806 Analysis and pCR for malicious message over N32 China Mobile Com. Corporation other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
KPN: the solution needs more work, it's a bit thin.
Juniper commented that the document needed some language check.
KPN: this is describing authenticated and integrity messages that need a standard to describe how they are dropped. I don’t agree with this.
Nokia didn’t support this either.
 
 
 
noted No    
S3‑181807 Discussion of error handling in service layer procedures China Mobile Com. Corporation discussion Discussion
7.2.13.2Other
Yes
Yes
Juniper and ORANGE didn’t agree with the second issue:it would bring DoS attacks.
Docomo: an authorization failure wouldn't be a bad thing.
Nokia: if there's an error during service discovery, then it is out of our scope but in CT4's scope.
This was eventually noted.
 
noted No    
S3‑181808 Requirement for AKA algorithm negotiation between UE and UDM Huawei, Hisilicon pCR Approval
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
NCSC: this is very normative and it is bringing assumptions we haven’t agreed on.
Qualcomm didn't find this needed at all. ORANGE supported Qualcomm.
Vodafone: not written in the same style as the other items in the same clause. It's all normative when the other clauses deal with coexistence.
The Chair commented that Huawei would need some offline explanations to the companies who didn’t support this contributed, hence this was noted.
 
 
noted No    
S3‑181809 AKA algorithm negotiation between UE and UDM Huawei, Hisilicon pCR Approval
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
No
Yes
withdrawn Yes    
S3‑181810 pCR for error handling in service layer procedures China Mobile Com. Corporation other Approval
7.2.13.2Other
Yes
Yes
noted No    
S3‑181811 Annex: Rationale for integrity protection of the N32 interface NCSC CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181812 Living Document-Security of Service Based Architecture of 5G phase 1 China Mobile Com. Corporation other Approval
7.2.13.2Other
Yes
Yes
noted No    
S3‑181813 Skeleton of authentication and key management for applications and 3GPP services based on 3GPP credential in 5G China Mobile Com. Corporation other Approval
8.7Other study areas
Yes
Yes
approved No    
S3‑181814 Scope of authentication and key management for applications and 3GPP services based on 3GPP credential in 5G China Mobile Com. Corporation other Approval
8.7Other study areas
Yes
Yes
revised No S3‑182054  
S3‑181815 TLS 1.3 Ericsson CR Agreement
7.10.20Other work items
Yes
Yes
China Mobile didn’t agree with having draft versions of RFCs being mandated here. The Chair clarified that SA3 usually works with draft RFCs and this is watched over as a normal 3GPP process.
ORANGE: this draft is pretty stable in IETF.
revised No S3‑182056 S3‑181401
S3‑181816 TLS 1.3 Ericsson CR Agreement
7.10.20Other work items
Yes
Yes
revised No S3‑182057  
S3‑181817 Clause structure proposal for the application layer solution Ericsson CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
It was commented that this CR should not be implemented if the exception sheet for 33.501 was approved in the plenary. In case that the exception wasn't approved the CR could be brought later as cat-F.
817 was converted into a draftCR in 937. Its contents were agreed and moved there.
 
 
not pursued No    
S3‑181818 Format of message protection policies Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑181819 Protection policies for N32 interface Ericsson CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181820 Issuing of protection policies Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑181821 Requirements for the format of message protection policies Ericsson CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181822 Applying JWE and JWS for N32 application layer solution Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑181823 Using JWE and JWS for protecting JSON objects Ericsson CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
merged No S3‑181948  
S3‑181824 JWE and JWS profiles Ericsson CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181825 Authentication and authorization clarifications Ericsson other Agreement
7.2.13.2Other
Yes
Yes
merged No S3‑181960 S3‑181486
S3‑181826 TLS and routing: solution selection and LS discussion Ericsson other Approval
7.2.13.2Other
Yes
Yes
approved No    
S3‑181827 draft LS on TLS and inter-PLMN routing Ericsson LS out Approval
7.2.13.2Other
Yes
Yes
ORANGE: do we need a reply from CT4 only or also from SA2? Ericsson clarifed that CT4's response was enough.
revised No S3‑181956  
S3‑181828 discussion paper: Protection scheme selection using legacy USIM Ericsson discussion Discussion
7.2.14Privacy
Yes
Yes
noted No    
S3‑181829 CR to 5.2.5: Protection scheme selection using legacy USIM Ericsson other Agreement
7.2.14Privacy
Yes
Yes
Second requirement and Note stay.
 
noted No   S3‑181462
S3‑181830 CR to 6.12.2: Protection scheme selection using legacy USIM Ericsson other Agreement
7.2.14Privacy
Yes
Yes
noted No   S3‑181496
S3‑181831 Clarification on counter for ECIES Ericsson other Agreement
7.2.14Privacy
Yes
Yes
revised No S3‑181969 S3‑181495
S3‑181832 SUCI – length corrections to Profile and Ericsson other Agreement
7.2.14Privacy
Yes
Yes
merged No S3‑181968 S3‑181495
S3‑181833 Certificate-based N3IWF authentication in non-3GPP access Ericsson discussion Endorsement
7.2.11non-3GPP access
Yes
Yes
revised No S3‑181917  
S3‑181834 Use of certificates for IKEv2 in non-3GPP access Ericsson other Agreement
7.2.11non-3GPP access
Yes
Yes
revised No S3‑182045 S3‑181574
S3‑181835 Adding Evaluation for Solution 1.1 of TR33.811 CATR, China Mobile, China Unicom pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
merged No S3‑181931  
S3‑181836 Discussion of the content on the protection of IP based interface and the gNB internal interfaces Ericsson discussion Discussion
7.2.12NDS
Yes
Yes
noted No    
S3‑181837 Clarification of the IPsec implementation requirements Ericsson CR Agreement
7.2.12NDS
Yes
Yes
MCC commented that it wasn't possible to change the title and content to something completely different. It was suggested to add it as a new sub-clause. Also, that it was better to mention "shall be done as in RFCxx" instead of "shall be implemented as in RFCxx".
 
revised No S3‑182046  
S3‑181838 Protection of internal gNB interfaces Ericsson CR Agreement
7.2.12NDS
Yes
Yes
ORANGE: bringing security gateways back? They didn’t agree with having this possiblity.
Huawei had some issues with this CR since it was giving some implementation proposals that had incomplete scenarios. They commented that requirements from other clauses were repeated here. All different deployment issues needed to be evaluated here.
Ericsson pointed out that protection in F1 needed to be finished this meeting.
 
revised No S3‑182047  
S3‑181839 Introduction of DTLS for protection of Xn-C and N2 itnerfaces Ericsson CR Agreement
7.2.12NDS
Yes
Yes
TIM: what's the advantage here of adding this new option when it is said that Ipsec is better?
Ericsson: if IPSEC is used. It is optional to use it.
ORANGE: we may need to modify TS 33.210.
 
revised No S3‑182048  
S3‑181840 Corrections of references to sub-clauses Ericsson CR Agreement
7.2.4AS security
Yes
Yes
agreed No    
S3‑181841 Clarifications to used NAS COUNT’s at mapping of security contexts Ericsson other Agreement
7.2.10Interworking
Yes
Yes
merged No S3‑182042 S3‑181571
S3‑181842 Corrections and clarifications to Handover from EPS to 5GS over N26 Ericsson other Agreement
7.2.10Interworking
Yes
Yes
merged No S3‑182041 S3‑181570
S3‑181843 Corrections and clarification to handover from 5GS to EPS over N26 Ericsson other Agreement
7.2.10Interworking
Yes
Yes
merged No S3‑182043 S3‑181329
S3‑181844 Update to clause 6.7.2 and Annex F.4 Ericsson other Agreement
7.2.5NAS security
Yes
Yes
merged No S3‑181983 S3‑181518
S3‑181845 Discussion on the need for exception sheet on TS 33.501 Ericsson discussion Discussion
7.2.16Others
Yes
Yes
The Chair asked the room if companies thought that there was a need for an exception sheet:
ORANGE, KPN, Vodafone supported this.
Qualcomm: RAN groups will not complete dual connectivity until September so we may have to continue working on it.
The general feeling was that an exception sheet was needed in order to complete SBA. The Chair asked to be very precise with the reasons for having this exception agreed in the plenary. Everything else should be frozen and topics that need to be completed needed to be precised.
Nokia commented that SA3 didn’t know if dual connectivity work was needed so it was better not to mention it.
BT clarified that the late drop referred to ASN.1 and not to very late 5G features, so SA3 should not use this for the exception.
It was agreed to have an exception sheet only for the SBA topic.Ericsson pointed out that not all SBA was open so it should be detailed what issues in SBA security were needed.
The Chair asked if there was any understanding of issues in RAN that may impact SA3. Ericsson commented that dual connectivity was work in progress and that they could bring cat-F CRs to address this in SA3. The Chair commented that he would mention this issue in his report and that the SA Chair would mention it as well in TSG RAN.
 
 
 
 
 
noted No    
S3‑181846 Corrections and clarifications to idle mode mobility from EPS to 5GS over N26 Ericsson CR Agreement
7.2.10Interworking
Yes
Yes
agreed No    
S3‑181847 Multiple NAS connections Ericsson other Agreement
7.2.5NAS security
Yes
Yes
merged No S3‑181980 S3‑181547
S3‑181848 Dual Connectivity - introduction Ericsson other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑181984 S3‑181517
S3‑181849 Dual Connectivity - dc procedures Ericsson other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑181984 S3‑181517
S3‑181850 Dual Connectivity - other procedures Ericsson other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑181984 S3‑181517
S3‑181851 Dual Connectivity - keys and algorithms Ericsson other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑181984 S3‑181517
S3‑181852 Dual Connectivity - other security mechanisms Ericsson other Agreement
7.2.4AS security
Yes
Yes
merged No S3‑181984 S3‑181517
S3‑181853 Skeleton proposal for TR on CIoT security (FS_CIoT_sec_5G) Ericsson other Agreement
8.7Other study areas
Yes
Yes
approved No    
S3‑181854 Scope proposal for TR on CIoT security (FS_CIoT_sec_5G) Ericsson other Agreement
8.7Other study areas
Yes
Yes
revised No S3‑182078  
S3‑181855 Steering of Roaming: new Key Issue KPN N.V. other Approval
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
Vodafone: HPLMN choosing between the networks that the UE can see is not a standardization issue.
Qualcomm: this is not a security issue. T-Mobile agreed.
 
noted No    
S3‑181856 Steering of Roaming: New Solution KPN N.V. other Approval
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
noted No    
S3‑181857 Update to the SoR living doc: finalizing the high level requirements and key issues Ericsson other Agreement
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
Vodafone commented that a CR for SoR had gone through so there was no point inhaving this document and the next two.
This was finally approved to be included in the Living Document.
approved No    
S3‑181858 Update to the SOR living doc: conclusions Ericsson other Agreement
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
approved No    
S3‑181859 Discussion on RAN2 LS on security for inactive state Samsung discussion Endorsement
7.2.4AS security
Yes
Yes
noted No    
S3‑181860 Discussion on RAN2 LS on security keys for generation of shortResumeMAC-I Samsung discussion Endorsement
7.2.4AS security
Yes
Yes
noted No    
S3‑181861 Discussion on RAN2 LS on reporting Integrity check failure for DRB to network Samsung discussion Endorsement
7.2.4AS security
Yes
Yes
noted No    
S3‑181862 Definition and abbreviation China Mobile, Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE: many of these abbreviations are not used in the document. Ericsson confimed this.
MCC: don’t refer to draft versions.
 
revised No S3‑182069 S3‑181799
S3‑181863 Addition of authorization for slice management interface solution China Mobile,Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
ORANGE: what's the local policy about?
China Mobile: it's operator dependent.
ORANGE: verification by IP address is not viable from security perspective.
Ericsson: the paragraph starts with mutual authentication.
 
 
approved No   S3‑181800
S3‑181864 Addition of security procedures between network slicing management functions China Mobile, Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑182064 S3‑181804
S3‑181865 New solution for Security of Service Based Architecture TIM, InterDigital other Approval
7.2.13.2Other
Yes
Yes
revised No S3‑181918  
S3‑181866 Solution for KI#2 Motorola Mobility, Lenovo pCR  
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
merged No S3‑182076  
S3‑181867 Authorization of Application Function’s requests Samsung, MSI, Huawei CR Approval
7.2.12NDS
Yes
Yes
agreed No    
S3‑181868 Clarification of the error handling if 5G-GUTI was used Motorola Mobility, Lenovo draftCR  
7.2.8Primary authentication
Yes
Yes
merged No S3‑181990 S3‑181453
S3‑181869 Security Mechanism for Steering of Roaming Samsung, Qualcomm Incorporated, Ericsson, T-Mobile US CR Approval
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
Nokia, Interdigital,Huawei,Deutsche Telekom,NEC supported this contribution.
Vodafone,IDEMIA and ORANGE didn't support this for the TS, only for the living document.
Vodafone queried the purpose of the living document.
Qualcomm replied that the living document would analize all the issues and help to develop a solution. Since CT1 has progressed, there is no point in working on the living document.
The Chair proposed to escalate this CR to SA plenary.
Vodafone: in CT1 there are substantial CRs about this issue.
ORANGE: there are CRs in CT1 by the same companies proposing this CR here. Qualcomm replied that such CRs were not changing the CT1 solution at all.
ORANGE: we can't rely on what they are doing this week in their meeting. Qualcomm replied that the baseline was the LS that was sent to SA3.
Samsung commented that there was an alignment with the stage 2 work of CT1.
Alf (Docomo) queried the objecting companies about the implications of objecting to this solution. No security for their solution? Alf added that this was the wrong place to evaluate CT1's design and object to it.
BT commented that this CR should be cat-B as it was adding a new security feature.
 
 
revised No S3‑182010  
S3‑181870 Clarification to Emergency Session handling Motorola Mobility, Lenovo draftCR Approval
7.2.16Others
Yes
Yes
Qualcomm: it doesn't bring any value.
noted No   S3‑181568
S3‑181871 Clarification on CAPIF–2e Security Samsung, Huawei pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
merged No S3‑181974  
S3‑181872 CAPIF – API invoker onboarding EN resolution Samsung, MSI pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181989  
S3‑181873 [DRAFT] Reply LS to S3-181619 (R2-1806490) on reporting Integrity check failure for DRB to network from RAN WG2 Lenovo LS out  
7.2.4AS security
Yes
Yes
Qualcomm had a preference for this solution rather than the one in 861. Nokia and Intel as well.
Ericsson commented that the Samsung proposal in 861 was a useful feature. Huawei and Interdigital agreed with Samsung.
Qualcomm: when having the CRC failure the UE will recover in the next transmission. If there is a man in the middle there is no guranteee that the report will reach the network. KPN agreed that this was a rare case, there was no added value in this reporting.
BT supported Samsung: it should be reported back. Docomo added that this report had to be integrity protected, it didn’t seem to be an useful feature.
This discussion was taken offline.
 
 
 
revised No S3‑181998  
S3‑181874 CAPIF – Method 2 clarification Samsung, MSI pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
BT: Inter operator communication is not independent of the third party.
Alf (Docomo) commented that it was worth considering extending the scope of TS 33.310. This was noted as a possible action point in future meetings.
 
approved No    
S3‑181875 CAPIF – Method 3 clarifications Samsung R&D Institute India pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
merged No S3‑181978  
S3‑181876 Prevention of PEI modification Motorola Mobility, Lenovo, OPPO, vivo, Qualcomm draftCR Approval
7.2.14Privacy
Yes
Yes
ORANGE didn’t agree with the requirement.This was reworded to " the PEI shall be securely stored in the UE". Qualcomm proposed "integrity protected" and this was included.
 
 
revised No S3‑181971 S3‑181462
S3‑181877 CAPIF support for NEF external exposure interface Samsung, MSI, Huawei CR  
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
It was commented that the categroy should  be B.
agreed No    
S3‑181878 CAPIF support for T8 interface Samsung, MSI, Huawei CR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
agreed No    
S3‑181879 Clarfication to 6.4.1 NAS security general LG Electronics CR Agreement
7.2.5NAS security
Yes
Yes
agreed No    
S3‑181880 Clarifications to 6.9.2 key handling in handover (rev of CR0125) LG Electronics CR Agreement
7.2.3Mobility
Yes
Yes
revised No S3‑182005 S3‑181354
S3‑181881 Clarifications to Annex D.3 Integrity algorithms LG Electronics CR Agreement
7.2.16Others
Yes
Yes
agreed No    
S3‑181882 Clarifications to Annex A : Key derivation functions – FC values (rev of CR0155) LG Electronics CR Agreement
7.2.16Others
Yes
Yes
revised No S3‑181929 S3‑181454
S3‑181883 5G FC values in 33.220 LG Electronics CR Agreement
7.2.16Others
Yes
Yes
merged No S3‑181928  
S3‑181884 pCR to TR33.834 - New Key Issue - Synchronisation of long term keys Vodafone España SA pCR Approval
8.4Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15)
Yes
Yes
ORANGE: we had a conclusion in the TR. What’s the plan now?
Vodafone: we objected to the conclusion and we didn’t close the work item yet since we objected having this TR sent for approval. There are several issues that we have found as key issues that justify this study to carry on in Rel-16.
ORANGE: we have concluded the study item and now we bring more key issues.
ORANGE: the meeting report from last meeting stated that Vodafone would bring new key issues, but that doesn't mean that we agreed with the new key issues being brought.
KPN supported Vodafone and was unhappy the way the study seemed to have been ended. Gemalto supported KPN.
 
approved No    
S3‑181885 SBA: HTTP Message rewriting Nokia, NTT DOCOMO CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
withdrawn Yes    
S3‑181886 pCR to TR 33.834 – new key issue, undetected key leakage Vodafone España SA pCR Approval
8.4Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15)
Yes
Yes
approved No    
S3‑181887 pCR to TR 33.834 - new key issue - Impacts of frequent use of LTKUP procedures Vodafone España SA pCR Approval
8.4Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15)
No
Yes
withdrawn Yes    
S3‑181888 pCR to 33.834 - new key issue - User interaction as part of the LTKUP procedures Vodafone España SA pCR Approval
8.4Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15)
Yes
Yes
noted No    
S3‑181889 SBA: Annex G – End to End Message flow between SEPPs Nokia CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181890 SBA: Message protection using JOSE Nokia, NCSC CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
revised No S3‑181948  
S3‑181891 SBA: Discussion paper on SEPP to SEPP N32 message structure Nokia discussion Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
noted No    
S3‑181892 Generic description of security elements Nokia CR  
7.2.16Others
Yes
Yes
ORANGE: we never saw that the AUSF could be outside the operator's network.
Qualcomm: we have this in the TS already, it's not new.
 
not pursued No    
S3‑181893 Generic security domain description clarification Nokia CR  
7.2.16Others
Yes
Yes
It clashes with 961.
 
merged No S3‑182050  
S3‑181894 Integrating SEAF requirements under AMF Nokia CR  
7.2.16Others
Yes
Yes
Qualcomm: we don’t need this.
It was clarified that these requirements were being moved. Qualcomm commented that there was a clause dedicated to SEAF requirements already and they should have gone there.
 
 
not pursued No    
S3‑181895 Collection of editorial changes Nokia CR  
7.2.16Others
Yes
Yes
not pursued No   S3‑181438
S3‑181896 Clarifications to: Security handling in state transitions Nokia, Ericsson, Huawei, HiSilicon CR  
7.2.10Interworking
Yes
Yes
not pursued No   S3‑181456
S3‑181897 Update in clause UP security mechanism and Xn-HO procedure OPPO CR Approval
7.2.4AS security
Yes
Yes
not pursued No    
S3‑181898 [MCPTT] Definition of KMS XML Schema namespace NCSC CR Agreement
7.10.11Security of MCPTT (MCPTT)
Yes
Yes
agreed No    
S3‑181899 [MCSEC] Definition of KMS XML Schema namespace NCSC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
Yes
Yes
agreed No    
S3‑181900 [eMCSEC] Definition of KMS XML Schema namespace NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No    
S3‑181901 [MCSEC] Addition of note to say that temporary group regroup mechanism is not secured. NCSC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
Yes
Yes
revised No S3‑181954  
S3‑181902 [eMCSEC] Addition of note to say that temporary group regroup mechanism is not secured. NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
revised No S3‑181953  
S3‑181903 [MCSEC] Inclusion of MCData message types as defined by CT1 NCSC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
Yes
Yes
agreed No    
S3‑181904 [eMCSEC] Inclusion of MCData message types as defined by CT1 NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No    
S3‑181905 [MCSEC] LS on removal of Temporary Group Regroup procedures NCSC LS out Approval
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
revised No S3‑181952  
S3‑181906 Reply LS on security for inactive state R2-1806457 LS in  
7.2.15Incoming and outgoing LSes
Yes
Yes
Related docs are 706, 784,859,693,694.
Ericsson: this is a RAN2 agreement and there is no security concern to be solved in SA3. We cannot revert RAN2 decisions.
Samsung: the same key should not be used, that's the concern.
Ericsson: it is not clear what the requirement is. The source node knows all the keys, what is that we are trying to hide to the source node?
Qualcomm: the UE receives the NCC, it derives the new key and then it can forget the previous key.
This discussion was taken offline.
 
replied to No    
S3‑181907 Living Document: Security of PLMN/RAT selection policies for roaming Samsung other  
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
revised No S3‑182011  
S3‑181908 SBA: HTTP Message rewriting Nokia, NTT DOCOMO CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
Ericsson doubted about the efficiency of this procedure. They suggested to check with CT4  whether this was efficient. Do we have the competence to decided whether this is efficient enough? Nokia agreed.
 
not pursued No    
S3‑181909 Correction for TS 33.501 clauses 3.1, 5.3.10, 5.11.2, and 6.9.2.3.4 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
not pursued No    
S3‑181910 CR for Deletion of Editor Notes in 6.4.2 Nokia other Approval
7.2.5NAS security
Yes
Yes
merged No S3‑181980  
S3‑181911 [CAPIF_SEC] 33.122 Update to API onboarding Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181977 S3‑181656
S3‑181912 [CAPIF_SEC] 33.122 Update to Method 3 Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑181978 S3‑181657
S3‑181913 [eMCSEC] Making Annex J normative NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No    
S3‑181914 [eMCSEC] Definition of KMS Redirect Request message format NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No    
S3‑181915 [eMCSEC] Reply LS on protected payload message types and Elements for Authenticating Requests (EARs) NCSC LS out Approval
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
revised No S3‑181951  
S3‑181916 Commets on S3-181715 KPN N.V. other Approval
7.2.13.2Other
Yes
Yes
noted No    
S3‑181917 Commenting contribution on S3-181833 "Certificate-based N3IWF authentication in non-3GPP access" Motorola Mobility, Lenovo discussion  
7.2.11non-3GPP access
Yes
Yes
Qualcomm: Implement in 33.501 what was agreed for ePDG in 33.402.
 
noted No   S3‑181833
S3‑181918 New solution for Security of Service Based Architecture Telecom Italia S.p.A., InterDigital other Approval
7.2.13.2Other
Yes
Yes
KPN didn’t support this.
Docomo: which entity would generate the keys? We would need a key generation entity that everybody would have to trust, and then who's reponsible for the policy?
Docomo: no time to work this out and incorporate this solution into the TS.
Lot of details are missing.
 
revised No S3‑181958 S3‑181865
S3‑181919 Nokia comments on S3-181830 Protection scheme selection Nokia discussion Endorsement
7.2.14Privacy
Yes
Yes
noted No    
S3‑181920 Comments on S3-181786 “On the ciphering of broadcasted positioning data” Ericsson discussion Endorsement
6.13GPP Working Groups
Yes
Yes
Qualcomm agreed with this proposal.
 
endorsed No    
S3‑181921 TLS and Routing Solutions Update Ericsson other Approval
7.2.13.2Other
Yes
Yes
After Nokia's query, Ericsson clarified that Authentication and authorization in step 2 wasn't needed for this context.
Revised to introduce this change.
revised No S3‑181957  
S3‑181922 SBA: Initial handshake between two SEPPs Nokia CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No    
S3‑181923 Comments to S3-181826 Nokia discussion Discussion
7.2.13.2Other
Yes
Yes
withdrawn Yes    
S3‑181924 LS on Removal of LTE specific terminology from Group Communication System Enablers TS 22.468 S1-181249 LS in discussion
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
NCSC commented that there is no reference in the current TS but there is in the TR. This will be fixed in the next meeting and an action item was recorded for this.
ORANGE asked about the meaning of removing "over LTE". If this means that whatever works in 4G works in 5G this would not work since some security features don’t work in 5G. This might imply that a TR for 5G would be needed since the architecture in 5G is different.
ORANGE understood that what SA3 had done till now was for 4G.
Ericsson commented that this was not the purpose of the LS, but just changing the reference.
NCSC: they have only changed the name of the document, not the content. The functionality has not changed.
There was confusion in the room on the impact of this LS on SA3, including topics outside Mission Critical.
Ericsson commented that the LS should be noted. This is just about removing references and consider this for the future. Qualcomm agreed.
Motorola commented that there was a WID on Mission Critical in 5G.
The Chair found that the general opinion was to send an LS in search of clarification.
 
 
 
replied to No    
S3‑181925 Reply LS to RAN2 on Bluetooth/WLAN measurement collection in MDT S5-183626 LS in discussion
6.13GPP Working Groups
Yes
Yes
Qualcomm: why is Bluetooth wanted here?
China Mobile: connection IDs may imply some privacy issues. RAN2 will reply and put SA3 in copy.
BT: collecting data in MDT brings privacy concerns in general. We have seen this before.
Docomo: collecting SSIDs has brought problems in Europe before.
This LS was taken offline in order to understand better the issue.
 
 
 
postponed No    
S3‑181926 Security solution for encryption of broadcast positioning information Qualcomm Incorporated LS out Approval
6.13GPP Working Groups
Yes
Yes
Incorporates Ericsson's comments in 920.
 
approved No   S3‑181785
S3‑181927 Clarify that both split bearers and SCG bearer may need security resources at the SgNB Qualcomm Incorporated CR Agreement
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
agreed No   S3‑181773
S3‑181928 Assigning FC values to TS 33.501 Qualcomm Incorporated,LG CR Agreement
7.1EPC enhancements to support 5G New Radio via Dual Connectivity (EDCE5) (Rel-15)
Yes
Yes
agreed No   S3‑181771
S3‑181929 Clarifications to Annex A : Key derivation functions – FC values (rev of CR0155) LG Electronics CR Agreement
7.2.16Others
Yes
Yes
agreed No   S3‑181882
S3‑181930 Reply to: LS on UE capability related to integrity protection of DRBs Qualcomm LS out approval
7.2.15Incoming and outgoing LSes
Yes
Yes
approved No    
S3‑181931 Evaluation of Authentication for slice management interface solution Huawei, HiSilicon, CMCC,CATR, China Mobile, China Unicom,CATT pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
revised No S3‑182065 S3‑181673
S3‑181932 Editorial correction to clause 6.12.5 on SIDF NEC Corporation,Nokia CR Agreement
7.2.14Privacy
Yes
Yes
agreed No   S3‑181750
S3‑181933 LS response on Initial NAS message protection Qualcomm Incorporated LS out Approval
7.2.5NAS security
Yes
Yes
approved No   S3‑181768
S3‑181934 Proposed updates to the CR on initial NAS protection (S3-181544) Qualcomm Incorporated other Approval
7.2.5NAS security
Yes
Yes
merged No S3‑181935 S3‑181769
S3‑181935 Remove EN for initial NAS message protection Qualcomm CR Agreement
7.2.5NAS security
Yes
Yes
agreed No   S3‑181544
S3‑181936 LS on Security Requirements for API Design Deutsche Telekom AG LS out Agreement
7.2.13.2Other
Yes
Yes
approved No   S3‑181717
S3‑181937 Clause structure proposal for the application layer solution Ericsson,Nokia draftCR Agreement
7.2.13.1Interconnect (SEPP related)
No
Yes
approved No    
S3‑181938 [MCPTT] 33.179 R13 Add GMK management Motorola Solutions Germany CR Agreement
7.10.11Security of MCPTT (MCPTT)
Yes
Yes
It was clarified that the information was already present in the Rel-13 and Rel-14 versions of the spec and that this correction was for alignment.
agreed No   S3‑181659
S3‑181939 [MCSec] 33180 R14 technical clarification for a proxy usage Airbus DS SLC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
No
Yes
agreed No   S3‑181605
S3‑181940 [eMCSec] 33180 R15 technical clarification for a proxy usage Airbus DS SLC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
No
Yes
agreed No   S3‑181606
S3‑181941 pCR to Living doc: Protection Policies KPN N.V. other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
approved No   S3‑181732
S3‑181942 [CAPIF_SEC] 33.122 Onboarding flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182023 S3‑181652
S3‑181943 [CAPIF_SEC] 33.122 Authentication and Authorization flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
Huawei: not comfortable to describe the same thing in two places.
Motorola: this is all informative. The is written in a generic way so the procedure will not impact the flow.
It was agreed to move both 942 and 943 into an informative annex.
 
revised No S3‑182024 S3‑181653
S3‑181944 Format of message protection policies Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
No
Yes
withdrawn Yes    
S3‑181945 Living document: SBA for 5G phase one China Mobile other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
approved No    
S3‑181946 Issuing of protection policies Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
No
Yes
withdrawn Yes    
S3‑181947 Rationale for integrity protection of the N32 interface NCSC other Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
approved No    
S3‑181948 SBA: Message protection using JOSE Nokia, NCSC CR Agreement
7.2.13.1Interconnect (SEPP related)
Yes
Yes
not pursued No   S3‑181890
S3‑181949 Applying JWE and JWS for N32 application layer solution Ericsson other Approval
7.2.13.1Interconnect (SEPP related)
No
Yes
withdrawn Yes    
S3‑181950 Discussion on Malicious Messages on N32 Deutsche Telekom AG discussion Endorsement
7.2.13.1Interconnect (SEPP related)
No
Yes
endorsed No   S3‑181716
S3‑181951 [eMCSEC] LS on Elements for Authenticating Requests (EARs) NCSC LS out Approval
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
approved No   S3‑181915
S3‑181952 [MCSEC] LS on removal of Temporary Group Regroup procedures NCSC LS out Approval
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
approved No   S3‑181905
S3‑181953 [MCSEC] Addition of note to say that temporary group regroup mechanism is not secured. NCSC CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No   S3‑181902
S3‑181954 [MCSEC] Addition of note to say that temporary group regroup mechanism is not secured. NCSC CR Agreement
7.10.18Security of the Mission Critical Service (MCSec)
Yes
Yes
agreed No   S3‑181901
S3‑181955 Addition of SBA security requirements for SEPP and NF Deutsche Telekom,Huawei CR Agreement
7.2.13.1Interconnect (SEPP related)
No
Yes
Only the requirement stays.
Requirements from 950 are incorporated here.
 
agreed No   S3‑181803
S3‑181956 LS on TLS and inter-PLMN routing Ericsson LS out Approval
7.2.13.2Other
Yes
Yes
approved No   S3‑181827
S3‑181957 TLS and Routing Solutions Update Ericsson other Approval
7.2.13.2Other
Yes
Yes
approved No   S3‑181921
S3‑181958 New solution for Security of Service Based Architecture Telecom Italia S.p.A., InterDigital other Approval
7.2.13.2Other
Yes
Yes
approved No   S3‑181918
S3‑181959 Corrections to section 13.4.1.1 China Mobile Com. Corporation CR Approval
7.2.13.2Other
No
Yes
agreed No   S3‑181792
S3‑181960 Clarifications to: Protection at the network or transport layer, Authorization and authentication between network functions and the NRF Ericsson CR Agreement
7.2.13.2Other
Yes
Yes
revised No S3‑182035 S3-181486
S3‑181961 Correction for TS 33.501 subclause 4.1 InterDigital, Inc. CR Approval
7.2.13.2Other
Yes
Yes
revised No S3‑182050 S3‑181639
S3‑181962 The granularity of NF service discovery China Mobile CR Agreement
7.2.13.2Other
Yes
Yes
agreed No   S3‑181487
S3‑181963 New Study on Security Aspects of the 5G Service Based Architecture Deutsche Telekom AG SID new Approval
8.8New study item proposals
Yes
Yes
It was commented that a SID would be needed for a Rel-16 study of SA2 activity in Rel-16.
DT: changes in Rel-16 will be quite substantial.
Vodafone: it is more sensible to have a TR for both Rel-15 and Rel-16.
Nokia supported having separate SIDs.
This was agreed in the end.
 
agreed No   S3‑181713
S3‑181964 TR FS_SBA-Sec Deutsche Telekom AG other Approval
7.2.13.2Other
No
Yes
revised No S3‑182090 S3‑181714
S3‑181965 Work Plan input from Rapporteurs MCC other -
9.2Rapporteur input on status of WID or SID
No
Yes
noted No   S3‑181604
S3‑181966 Cover sheet TR SBA Deutsche Telekom other Approval
7.2.13.2Other
Yes
Yes
approved No    
S3‑181967 ME-USIM negotiation for SUCI calculation in ME Apple, Deutsche Telekom, Sony, KPN, China Mobile, Qualcomm Incorporated, BT Group,Intel other Agreement
7.2.14Privacy
Yes
Yes
merged No S3‑181970 S3‑181711
S3‑181968 IV generation for ECIES Apple,Ericsson CR Agreement
7.2.14Privacy
Yes
Yes
agreed No   S3‑181495
S3‑181969 Clarification on counter for ECIES Ericsson other Agreement
7.2.14Privacy
Yes
Yes
merged No S3‑181968 S3‑181831
S3‑181970 Clarification to Subscription identifier privacy China Mobile CR Agreement
7.2.14Privacy
Yes
Yes
agreed No   S3‑181496
S3‑181971 Prevention of PEI modification Motorola Mobility, Lenovo, OPPO, vivo, Qualcomm draftCR Approval
7.2.14Privacy
No
Yes
merged No S3‑182036 S3‑181876
S3‑181972 pCR on Onboarding procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181737
S3‑181973 pCR on introducing offboarding procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182018 S3‑181738
S3‑181974 pCR on CAPIF-1e security procedure NEC Corporation,Samsung, Motorola,Huawei pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182021 S3‑181741
S3‑181975 pCR on clarification of authroization information in CAPIF-2, 2e procedures NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181742
S3‑181976 pCR on clarifcation of access token generation in CAPIF-2e method 3 NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
No
Yes
withdrawn Yes    
S3‑181977 [CAPIF_SEC] 33.122 Update to API onboarding Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182016 S3‑181911
S3‑181978 [CAPIF_SEC] 33.122 Update to Method 3 Motorola Solutions Germany,Samsung,NEC pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182022 S3‑181912
S3‑181979 Clarifications to: Security handling in mobility Qualcomm,ZTE,NEC CR Agreement
7.2.5NAS security
Yes
Yes
revised No S3‑182092 S3‑181511
S3‑181980 Multiple NAS connections Ericsson,ZTE,Huawei,Qualcomm,Nokia CR Agreement
7.2.5NAS security
Yes
Yes
It was endorsed that SA3 still needs to look at some of the mobility use cases in multi-NAS to ensure the procedures for handling NAS Security context do not cause problems. An example of when they may be an issue is when the UE performs a mobility procedure on 3GPP and causes the non-3GPP access to move AMF. The new AMF may not be able to use the security context that was in use on the old AMF (e.g. due to horizontal K_AMF change or different supported algorithms on the AMFs). This means that once the non-3GPP context has moved to the new AMF, the UE and new AMF will not be able to exchange secured NAS messages using the old security context.
agreed No   S3‑181547
S3‑181981 Clarifications to: Security handling in state transitions NEC,Nokia,Ericsson CR Agreement
7.2.5NAS security
Yes
Yes
agreed No   S3‑181456
S3‑181982 Authentication for Untrusted non-3GPP Access NEC,Huawei,Nokia,Ericsson CR Agreement
7.2.5NAS security
Yes
Yes
agreed No   S3‑181574
S3‑181983 CR for Clause Security algorithm selection, key establishment and security mode command procedure Ericsson CR Agreement
7.2.5NAS security
Yes
Yes
agreed No   S3‑181518
S3‑181984 Security procedures for dual connectivity Huawei,Ericsson, Qualcomm draftCR Approval
7.2.16Others
Yes
Yes
approved No   S3‑181710
S3‑181985 Security procedures for dual connectivity Huawei, Hisilicon,Qualcomm,Ericsson CR Approval
7.2.4AS security
Yes
Yes
agreed No   S3‑181695
S3‑181986 Correction for TS 33.501 subclause 6.6.1 InterDigital, Inc. CR Approval
7.2.4AS security
No
Yes
withdrawn Yes    
S3‑181987 Clarifications to: UP security mechanisms Interdigital,Huawei, LG CR Agreement
7.2.4AS security
Yes
Yes
agreed No   S3‑181520
S3‑181988 Correcting Figure 6.13-1 on gNB periodic local authentication procedure NEC Corporation CR Approval
7.2.4AS security
Yes
Yes
agreed No   S3‑181788
S3‑181989 CAPIF – API invoker onboarding EN resolution Samsung, MSI pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182017 S3‑181872
S3‑181990 Clarifications to: Authentication procedures Ericsson CR Agreement
7.2.8Primary authentication
Yes
Yes
agreed No   S3‑181453
S3‑181991 Correction to: 3GPP 5G profile for EAP-AKA' Ericsson CR Agreement
7.2.8Primary authentication
Yes
Yes
agreed No   S3‑181758
S3‑181992 Clause 6.3.1.4-Reference_wording_error correction -based on Living CR S3-181455 CATT CR Agreement
7.2.8Primary authentication
Yes
Yes
agreed No   S3‑181730
S3‑181993 Clarifications to: Using additional EAP methods for primary authentication CATT CR Agreement
7.2.8Primary authentication
Yes
Yes
agreed No   S3‑181718
S3‑181994 Reply to: LS on security keys for generation of shortResumeMAC-I for UP EDT Samsung LS out approval
7.10.19Security Aspects of Narrowband IOT (CIoT)
Yes
Yes
Qualcomm, Ericsson,DT: preference for the new key for the second answer.
 
approved No    
S3‑181995 Clarifications to: Key hierarchy, key derivation, and distribution scheme CATT,NEC,ZTE,Ericsson,Nokia CR Approval
7.2.1Key hierarchy
Yes
Yes
agreed No   S3‑181729
S3‑181996 Reference corrections in clause 6 Huawei, NEC,CATT,HiSilicon CR Agreement
7.2.1Key hierarchy
Yes
Yes
agreed No   S3-181578
S3‑181997 Reply SA3 LS on security for inactive state Huawei, Hisilicon LS out Approval
7.2.4AS security
Yes
Yes
approved No   S3‑181706
S3‑181998 Reply LS to S3-181619 (R2-1806490) on reporting Integrity check failure for DRB to network from RAN WG2 Lenovo LS out -
7.2.4AS security
Yes
Yes
approved No   S3‑181873
S3‑181999 CR on Clause 6.6 UP security mechanism with security policy Nokia other Approval
7.2.3Mobility
Yes
Yes
merged No S3‑181987 S3‑181680
S3‑182000 Resolving Editor’s Note on Requirements for OpenAPI specifications Deutsche Telekom other discussion
7.2.13.2Other
Yes
Yes
approved No    
S3‑182001 Security requirements for API invoker onboarding Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181696
S3‑182002 Relocation of topology hiding Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182020 S3‑181698
S3‑182003 Security procedures for updating security method Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181700
S3‑182004 Updates to clause 6.9.3 NEC other Approval
7.2.3Mobility
Yes
Yes
Revised content from S3-181787, it shows the changes from 511.
merged No S3‑181979  
S3‑182005 Generalization of key derivation in NG-RAN to cover both gNBs and ng-eNBs LG Electronics,Ericsson CR Agreement
7.2.3Mobility
Yes
Yes
agreed No   S3‑181880
S3‑182006 Update to clause 6.7.2: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
merged No S3‑181983 S3‑181760
S3‑182007 Update to clause 6.1.3: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
merged No S3‑181990 S3‑181761
S3‑182008 Update to Annex B: ngKSI and ABBA Ericsson other Agreement
7.2.6Security context
Yes
Yes
merged No S3‑181993 S3‑181762
S3‑182009 Reply to: Reply LS on SoR mechanism Samsung LS out approval
7.7PLMN RAT selection (Steering of Roaming)
No
Yes
withdrawn Yes    
S3‑182010 Security Mechanism for Steering of Roaming Samsung, Qualcomm Incorporated, Ericsson, T-Mobile US CR Approval
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
The Chair proposed to have this CR agreed having minuted the objections from the companies.
Vodafone,IDEMIA and ORANGE objected to this CR.
After offline discussions with the MCC manager it was commented that a working agreement could be announced. The Chair declared that he would do this and hence this was noted in the minutes and sent to be published in the 3GPP website (http://www.3gpp.org/specifications-groups/working-agreements).
 
 
agreed No   S3‑181869
S3‑182011 Living Document: Security of PLMN/RAT selection policies for roaming Samsung other -
7.7PLMN RAT selection (Steering of Roaming)
Yes
Yes
Vodafone asked what the proper way of closing a living document was. He queried whether there was more work anticipated or not once that the CR was agreed here and approved in the plenary.
Qualcomm: let's wait for the other groups, in case they ask of something else.
The Chair commented that the living document could stay since companies were free of bringing documents whenever they wanted to.
 
approved No   S3‑181907
S3‑182012 LS OUT on OAuth2.0 C4-184465 LS in discussion
7.2.13.2Other
Yes
Yes
replied to No    
S3‑182013 Reply LS to LS on Security for NEF Northbound APIs Huawei, Hisilicon LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182014 S3‑181635
S3‑182014 Reply LS to LS on Security for NEF Northbound APIs Huawei, Hisilicon LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑182013
S3‑182015 Draft TS 33.122 Samsung draft TS Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑182016 [CAPIF_SEC] 33.122 Update to API onboarding Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181977
S3‑182017 CAPIF – API invoker onboarding EN resolution Samsung, MSI pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181989
S3‑182018 pCR on introducing offboarding procedure NEC Corporation pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181973
S3‑182019 LS on CAPIF specification work in SA3 Samsung LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
revised No S3‑182027 S3‑181745
S3‑182020 Relocation of topology hiding Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑182002
S3‑182021 pCR on CAPIF-1e security procedure NEC Corporation,Samsung, Motorola,Huawei pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181974
S3‑182022 [CAPIF_SEC] 33.122 Update to Method 3 Motorola Solutions Germany,Samsung,NEC pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181978
S3‑182023 [CAPIF_SEC] 33.122 Onboarding flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181942
S3‑182024 [CAPIF_SEC] 33.122 Authentication and Authorization flow Motorola Solutions Germany pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181943
S3‑182025 Editorial corrections and deleting Editor's Note to TS 33.122 v0.2.0 Huawei, Hisilicon pCR Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181699
S3‑182026 Output of SBA evening sessions (21/22 May 2018) Deutsche Telekom report Information
7.13.1
Yes
Yes
noted No    
S3‑182027 LS on CAPIF specification work in SA3 Samsung LS out Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No   S3‑182019
S3‑182028 Cover sheet TS 33.122 Samsung draft TS Approval
7.6Security Aspects of Common API Framework for 3GPP Northbound APIs (CAPIF_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑182029 Evaluation of integrity protection of NSST China Mobile Com. Corporation,Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181801
S3‑182030 [eMCSec] 33180 R15 Migration KMS clarification Motorola Solutions Germany CR Agreement
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
agreed No   S3‑181658
S3‑182031 Reply to: LS on Removal of LTE specific terminology from Group Communication System Enablers TS 22.468 NCSC LS out approval
7.3Mission Critical Security Enhancements (eMCSec) (Rel-15)
Yes
Yes
approved No    
S3‑182032 ID linkage verification in secondary authentication Huawei, HiSilicon, China Southern Power Grid, China Unicom other Agreement
7.2.9Secondary authentication
Yes
Yes
noted No   S3‑181712
S3‑182033 Reply to: LS OUT on OAuth2.0 Huawei LS out approval
7.2.13.2Other
Yes
Yes
approved No    
S3‑182034 Clarifications on service authorization Huawei, HiSilicon other Agreement
7.2.13.2Other
Yes
Yes
merged No S3‑181962 S3‑181721
S3‑182035 Clarifications to: Protection at the network or transport layer, Authorization and authentication between network functions and the NRF Ericsson CR Agreement
7.2.13.2Other
No
Yes
agreed No   S3‑181960
S3‑182036 Clarifications to requirements Lenovo,Nokia, Gemalto,CATT,Lenovo,Motorola Mobility,Ericsson,ZTE CR Agreement
7.2.14Privacy
Yes
Yes
agreed No   S3‑181462
S3‑182037 Corrections to secondary authentication procedure Huawei,HiSilicon,Interdigital, CATT,NEC,Nokia CR discussion
7.2.9Secondary authentication
Yes
Yes
agreed No   S3‑181569
S3‑182038 Clause 11.1.2 Add EAP failure processing-based on Living CR S3-181569 CATT, China Mobile other Approval
7.2.9Secondary authentication
Yes
Yes
merged No S3‑182037  
S3‑182039 Clarification on UE ID in clause 11.1.2 NEC other Agreement
7.2.9Secondary authentication
Yes
Yes
merged No S3‑182037  
S3‑182040 Clarifications on unused 5G authentication vectors, and remaning authentication data Nokia,Ericsson CR Agreement
7.2.10Interworking
Yes
Yes
agreed No   S3‑181349
S3‑182041 Clarifications to: Handover from EPS to 5GS over N26 Qualcomm CR Agreement
7.2.10Interworking
Yes
Yes
revised No S3‑182093 S3‑181570
S3‑182042 Clarifications to Mapping of Security Contexts Ericsson CR Agreement
7.2.10Interworking
Yes
Yes
agreed No   S3‑181571
S3‑182043 KeNB derivation in 5GS to EPS handover Ericsson CR discussion
7.2.10Interworking
Yes
Yes
agreed No   S3‑181329
S3‑182044 CR clarifications to Clause 7.2 on UE Id in EAP-5G. Nokia other Approval
7.2.11non-3GPP access
No
Yes
merged No S3‑181982 S3‑181686
S3‑182045 Use of certificates for IKEv2 in non-3GPP access Ericsson,Qualcomm,Nokia other Agreement
7.2.11non-3GPP access
Yes
Yes
merged No S3‑182982 S3‑181834
S3‑182046 Clarification of the IPsec implementation requirements Ericsson CR Agreement
7.2.12NDS
Yes
Yes
agreed No   S3‑181837
S3‑182047 Protection of internal gNB interfaces Ericsson CR Agreement
7.2.12NDS
Yes
Yes
ORANGE asked to be minuted: For the Next meeting DTLS over SCTP should be a separated clause. The reference to RFC 6083 needs to be fixed as well.
 
agreed No   S3‑181838
S3‑182048 Introduction of DTLS for protection of Xn-C and N2 itnerfaces Ericsson CR Agreement
7.2.12NDS
Yes
Yes
agreed No   S3‑181839
S3‑182049 Clarifications to definitions and abbreviations NEC Corporation CR Approval
7.2.16Others
Yes
Yes
agreed No   S3‑181748
S3‑182050 Correction for TS 33.501 subclause 4.1 Nokia,Interdigital CR -
7.2.16Others
Yes
Yes
agreed No   S3‑181961
S3‑182051 Correction for TS 33.501 subclause 5.11.2 InterDigital, Inc. CR Approval
7.2.16Others
Yes
Yes
agreed No   S3‑181641
S3‑182052 Network Xn-handover handling – correction of indicator name Ericsson other Agreement
7.2.3Mobility
No
Yes
withdrawn Yes    
S3‑182053 Clause 6.12.2-Routing registration request using SUCI-based on Living CR S3-181496 CATT CR Agreement
7.2.14Privacy
Yes
Yes
The content of this CR will be brought in a future meeting waiting for SA2's results.
 
not pursued No   S3‑181731
S3‑182054 Scope of authentication and key management for applications and 3GPP services based on 3GPP credential in 5G China Mobile Com. Corporation,Deutsche Telekom other Approval
8.7Other study areas
Yes
Yes
approved No   S3‑181814
S3‑182055 LS on clarifications to subscription privacy Vodafone LS out Approval
7.2.14Privacy
Yes
Yes
approved No    
S3‑182056 TLS 1.3 Ericsson CR Agreement
7.10.20Other work items
Yes
Yes
agreed No   S3‑181815
S3‑182057 TLS 1.3 Ericsson CR Agreement
7.10.20Other work items
Yes
Yes
Keep TLS 1.1 not recommended.
agreed No   S3‑181816
S3‑182058 Draft TR 33.834 Vodafone draft TR Approval
8.4Study on Long Term Key Update Procedures (FS_LTKUP) (Rel-15)
Yes
Yes
approved No    
S3‑182059 Study on security aspects of encrypted traffic detection and verification China Unicom, China Telecom, China Mobile, OPPO, ZTE, Huawei, HiSilicon, Intel, CATR, CATT, Alibaba Inc., Motorola Mobility, Lenovo SID new Agreement
8.8New study item proposals
Yes
Yes
noted No   S3‑181636
S3‑182060 Key Handling at RRC state transitions Huawei, Hisilicon CR Approval
7.2.4AS security
Yes
Yes
agreed No   S3‑181694
S3‑182061 Security Negotiation for RRC INACTIVE Huawei, Hisilicon,Ericsson,Qualcomm,Intel,Samsung CR Approval
7.2.4AS security
Yes
Yes
agreed No   S3‑181693
S3‑182062 Calculation of NAS MAC included in NAS Container at N2 HO Ericsson,Qualcomm CR Agreement
7.2.3Mobility
Yes
Yes
Ericsson stated that clause 6.9.2.3.3 needed further clarification. This was agreed to be added to the meeting report.
merged No S3‑181979 S3‑181753
S3‑182063 Draft TR 33.811 Huawei draft TR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑182064 Addition of security procedures between network slicing management functions China Mobile, Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181864
S3‑182065 Evaluation of Authentication for slice management interface solution Huawei, HiSilicon, CMCC,CATR, China Mobile, China Unicom,CATT pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181931
S3‑182066 Evaluation of OAuth based authorization for access to management functions solution Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181674
S3‑182067 Evaluation of NSST confidentiality protection solution Huawei, HiSilicon pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181672
S3‑182068 Conclusions Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181676
S3‑182069 Definition and abbreviation China Mobile, Huawei pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181862
S3‑182070 Introduction Huawei, HiSilicon, CMCC pCR Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No   S3‑181678
S3‑182071 Cover sheet TR 33.811 Huawei TS or TR cover Approval
8.3Study on security aspects of 5G Network Slicing Management (FS_ NETSLICE-MGT_Sec) (Rel-15)
Yes
Yes
approved No    
S3‑182072 LS on user plane integrity protection in LTE Vodafone LS out Approval
7.10.1SAE/LTE Security
Yes
Yes
approved No    
S3‑182073 Requirement for and impact of a longer MAC NCSC pCR Approval
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No   S3‑181736
S3‑182074 Draft TR 33.841 Vodafone draft TR Approval
8.5Study on Supporting 256-bit Algorithms for 5G (FS_256-Algorithms) (Rel-16)
Yes
Yes
approved No    
S3‑182075 Draft TR 33.856 OPPO draft TR Approval
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
No
Yes
approved No    
S3‑182076 a proposal for the emergency session in SRVCC of TR33.856 Huawei, Hisilicon pCR Approval
8.6Security aspects of single radio voice continuity from 5G to UTRAN (FS_5G_UTRAN_SEC) (Rel-16)
Yes
Yes
approved No   S3‑181689
S3‑182077 Draft TR 33.8bc authentication and key management for applications and 3GPP services based on 3GPP credential in 5G China Mobile other Approval
8.7Other study areas
Yes
Yes
approved No    
S3‑182078 Scope proposal for TR on CIoT security (FS_CIoT_sec_5G) Ericsson other Agreement
8.7Other study areas
Yes
Yes
approved No   S3‑181854
S3‑182079 Draft TR CIoT security Ericsson other Approval
8.7Other study areas
Yes
Yes
approved No    
S3‑182080 Exception sheet 5G security phase one NTT-Docomo WI exception request Agreement
7.2.16Others
No
Yes
agreed No    
S3‑182081 SA3 meeting calendar MCC other -
10Future Meeting Dates and Venues
Yes
Yes
May or November 2019 could be in Singapore. NAF and Huawei were to discuss that and come back with a reponse for the next meeting.
noted No   S3‑181603
S3‑182082 LS on OAuth2.0 C4-184465 LS in discussion
7.2.15Incoming and outgoing LSes
Yes
Yes
withdrawn Yes    
S3‑182083 Reply LS on AUSF/UDM instance selection and SUCI parameters C4-184576 LS in discussion
7.2.15Incoming and outgoing LSes
Yes
Yes
 
 
postponed No    
S3‑182084 LS on TLS and inter PLMN routing C4-184612 LS in discussion
7.2.15Incoming and outgoing LSes
Yes
Yes
replied to No    
S3‑182085 LS to RAN2 on Dual Connectivity Ericsson LS out discussion
7.2.4AS security
Yes
Yes
approved No    
S3‑182086 Reply LS on initial NAS message protection C1-183727 LS in discussion
7.2.15Incoming and outgoing LSes
Yes
Yes
Qualcomm: they have two meetings before we meet again, so we should send a response this meeting.
 
replied to No    
S3‑182087 Reply to: Reply LS on initial NAS message protection Qualcomm LS out approval
7.2.15Incoming and outgoing LSes
Yes
Yes
approved No    
S3‑182088 Reply to: LS on TLS and inter PLMN routing Ericsson LS out approval
7.2.15Incoming and outgoing LSes
Yes
Yes
approved No    
S3‑182089 Adding further details for EPS to 5G interworking Huawei, HiSilicon other Agreement
7.2.10Interworking
Yes
Yes
merged No S3‑182041 S3‑181722
S3‑182090 TR FS_SBA-Sec Deutsche Telekom AG other Approval
7.2.13.2Other
No
Yes
approved No   S3‑181964
S3‑182091 LS on status of security solution for interoperator interconnect (SEPP to SEPP communication) Docomo LS out Approval
7.2.13.1Interconnect (SEPP related)
Yes
Yes
approved No    
S3‑182092 Clarifications to: Security handling in mobility Qualcomm,ZTE,NEC CR Agreement
7.2.5NAS security
Yes
Yes
agreed No   S3‑181979
S3‑182093 Clarifications to: Handover from EPS to 5GS over N26 Qualcomm CR Agreement
7.2.10Interworking
Yes
Yes
agreed No   S3‑182041