Tdoc List

2016-07-29 16:20

Agenda Topic TDoc Title Source Type For Avail Treated Decision Wdrn Replaced-by Replaces
1 Opening of the Meeting                      
2 Approval of Agenda and Meeting Objectives S3‑160900 Agenda WG Chairman agenda   Yes
Yes
approved No    
3 IPR Reminder                      
4 Meeting Reports                      
4.1 Approval of the Report from SA3 #82 S3‑160901 Report from SA3#83 MCC report   Yes
Yes
approved No    
4.2 Report from SA #71 S3‑160903 Report from last SA meeting WG Chairman report   Yes
Yes
noted No    
4.3 Report from SA3-LI                      
5 Items for early consideration S3‑161118 proposed/draft reply LS on eDRX security NTT DOCOMO LS out Approval Yes
Yes
revised No S3‑161153  
    S3‑161153 Reply LS on eDRX security NTT DOCOMO LS out Approval Yes
Yes
approved No   S3‑161118
    S3‑161146 New WID on Support of EAP Re-Authentication Protocol for WLAN Interworking ORANGE WID new Agreement Yes
YesOrange noted that CT4 is discussing this week a related WID. A stage 2 feature WID in SA3 would allow them to track the changes and open a Building Block work item. Gemalto: Put Don't Know on the UICC Apps table. Nokia: Not good to have the habit of having to agree on late docs that are WIDs. This shouldn't be taken as a precedent. Nokia didn’t agree with the Objective. We shouldn’t make a work item on the SWA interface. BT clarified that 23.402 is on non-3GPP access.
revised No S3‑161152  
    S3‑161152 New WID on Support of EAP Re-Authentication Protocol for WLAN Interworking ORANGE WID new Agreement Yes
Yes
agreed No   S3‑161146
    S3‑161147 Nokia comments on S3-161118 Reply on eDRX security Nokia discussion   Yes
YesNTT-Docomo: sync between MME and eNodeB when there is a reset. Even with IMSI paging I don’t see how it is recovered. IMSI itself shouldn’t be the base for this. We shouldn’t have another round with RAN2, better to reply now. This was discussed offline.
noted No    
6.1 3GPP Working Groups S3‑160914 LS on eDRX paging timing calculation and security concern R2-164582 LS in   Yes
YesDocomo: clashing on paging needs to be resolved.
replied to No    
    S3‑160916 LS on Support of EAP Re-authentication for WLAN Interworking S2-162796 LS in   Yes
YesDiscussed together with 1146 (WID).
noted No    
    S3‑160917 LS on progress of FS_xMBMS study item S4-160837 LS in   Yes
YesNagendra (Nokia) commented that Diameter based MB2 interface should be reused. This would force SA3 to look at the security aspects. Vodafone: there is an editor's note in the TR that refers to security aspects to be dealt with SA3. It was decided to note it.
noted No    
    S3‑160919 LS on I-WLAN handling and specification withdrawal SP-160508 LS in   Yes
YesDiscussed with 1045. Ericsson will take action on this as stated in 1045.
noted No    
    S3‑161038 LS on Improvement to authentication procedure for supporting Emergency Service on WLAN S2-164273 LS in   Yes
YesNokia: 33.402 may be impacted.
noted No    
6.2 IETF                      
6.3 ETSI SAGE                      
6.4 GSMA S3‑160910 Liaison Statement on 5G Capabilities and Requirements GSMA LS in   Yes
YesPresented by David Hutton (GSMA). Vodafone: a guide to obsolete features and suplementary services? David (GSMA): this is directed to other players, not 3GPP SA3. Nokia: Interconnection network is not secure is weak. Using the Internet backbone is multiplying the security issues too. David: A secure model for IPX is the way forward. Nokia: it doesn’t help for misbehaving end points. David: We are working towards that point, e.g.more firewall mechanisms for SS7. The Chairman commented that this LS will help SA3 in the NSA work item. Interdigital: Slicing in serving network for home environment. A slice can be created on demand? David: it can be done that way or operators know who their roaming partners are and build it statically.
replied to No    
    S3‑161154 Reply to: Liaison Statement on 5G Capabilities and Requirements Ericsson LS out approval Yes
Yes
approved No    
    S3‑160937 NESAS Pilot Release Documents GSMA SECAG LS in   Yes
Yes
postponed No    
6.5 3GPP2                      
6.6 OMA                      
6.7 TCG S3‑160929 TCG progress report INTERDIGITAL COMMUNICATIONS report Information Yes
YesNokia: Network equipment subgroup? Interidigital: It's fdor routers, servers, endpoints in the network. The difference would lie in virtualization. Interdigital agreed to contribute with more info on this group.
noted No    
6.8 oneM2M                      
6.9 TC-CYBER                      
6.10 ETSI NFV security                      
6.11 Other Groups                      
7.1 SAE/LTE Security S3‑160908 LS on Protecting UE network capabilities from ‘bidding down attack GSMA FSAG LS in   Yes
Yes
replied to No    
    S3‑161216 Reply to: LS on Protecting UE network capabilities from ‘bidding down attack Qualcomm LS out approval No
Yes
approved No    
    S3‑161112 Protecting against the modification of Attach/TAU Request attacks Qualcomm Incorporated CR Approval Yes
Yes
revised No S3‑161217 S3‑160562
    S3‑161217 Protecting against the modification of Attach/TAU Request attacks Qualcomm Incorporated,Huawei CR Approval Yes
YesDiscussed together with 1133. Ericsson and Nokia supported this option.
agreed No   S3‑161112
    S3‑161133 Protecting against the modification of Attach/TAU Request attacks TELECOM ITALIA S.p.A., ORANGE CR Agreement Yes
Yes
not pursued No    
    S3‑161037 LWA editorial corrections Huawei, HiSilicon CR Agreement Yes
YesNokia and Qualcomm commented that the first change was out of scope.
revised No S3‑161220  
    S3‑161220 LWA editorial corrections Huawei, HiSilicon CR Agreement Yes
Yes
agreed No   S3‑161037
    S3‑161110 Installing PMK at the WLAN AP using EAP Blackberry, Qualcomm Incorporated CR Approval Yes
YesMCC commented that the NOTE contained the words "is required", which is incorrect since notes should not contain requirements. This was reworded.
revised No S3‑161222  
    S3‑161222 Installing PMK at the WLAN AP using EAP Blackberry, Qualcomm Incorporated CR Approval Yes
Yes
agreed No   S3‑161110
    S3‑160913 LS on PDCP ciphering for high data rates in eLWA R2-164557 LS in   Yes
Yes
replied to No    
    S3‑161223 Reply to: LS on PDCP ciphering for high data rates in eLWA Qualcomm LS out approval Yes
Yes
approved No    
    S3‑160985 Discussion paper on disabling PDCP ciphering Nokia, Intel discussion Discussion Yes
YesQualcomm: If we disable PDCP cyphering the solutions described here will not work. The concept of trusted/untrusted is not available in the serving network. We don’t agree with disabling PDCP cyphering. Nokia: RAN should work to get that information in the eNodeB (trusted/untrusted concept). Docomo: we had this discussion before, we should have PDCP active. BT: performance issue with double encryption. The UE is getting more complex. Qualcomm: the performance will not be affected. Turning on and off would be more effective.
noted No    
    S3‑160986 draft_LS response on disabling PDCP ciphering Nokia, Intel LS out Approval Yes
Yes
noted No    
    S3‑160912 LS to SA3 on LWIP counter R2-164551 LS in   Yes
Yes
noted No    
    S3‑160918 Response LS on Progress on Security for LWIP SP-160457 LS in   Yes
Yes
noted No    
    S3‑161064 LWIP - Correction of the UEs IP address Ericsson CR Agreement Yes
Yes
agreed No    
7.2.1 TS 33.116 (SCAS-SA3) S3‑161120 handling editor's notes in 33.116 NTT DOCOMO pCR Approval Yes
YesMCC commented that there cannot be VOIDs in clauses since this is a draft. Renumbering of clauses would be required.Docomo commented that they would find a way to avoid this to keep the numerous references between clauses.
revised No S3‑161231  
    S3‑161231 handling editor's notes in 33.116 NTT DOCOMO pCR Approval Yes
Yes
approved No   S3‑161120
    S3‑161134 pCR adding the test case of protecting data and information in transfer into the section 5.2.3.2.4 of TS 33.116 China Mobile Com. Corporation, ZTE, Telecom Italia pCR Approval Yes
YesDocomo: there is something similar in 942 for 33.117. Remove requirement description. This was agreed. Also adding a reference to the same text in 33.117. Nokia commented that 5.2.3.2.4 seemed quite strange to be in 33.116. This had to be checked. It was agreed to send TR 33.116 for approval.
revised No S3‑161233  
    S3‑161233 pCR adding the test case of protecting data and information in transfer into the section 5.2.3.2.4 of TS 33.116 China Mobile Com. Corporation, ZTE, Telecom Italia pCR Approval Yes
Yes
approved No   S3‑161134
    S3‑161232 New draft TS 33.116 NTT-Docomo draft TS Approval No
Yes
left for email approval No    
    S3‑161234 Cover sheet TS 33.116 NTT-Docomo TS or TR cover discussion No
Yes
left for email approval No    
7.2.2 TS 33.117 (SCAS-SA3) S3‑160935 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG pCR Approval Yes
Yes
revised No S3‑160943  
    S3‑160936 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval Yes
Yes
revised No S3‑160942  
    S3‑160942 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval Yes
YesEricsson didn’t support the test case addition. Huawei and Nokia supported Ericsson.
revised No S3‑161237 S3‑160936
    S3‑161237 pCR to TS 33.117 adding test case for "Protecting data and information in transfer" Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑160942
    S3‑160943 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG pCR Approval Yes
Yes
revised No S3‑161236 S3‑160935
    S3‑161236 pCR to TS 33.117 on TC_CONFIDENTIAL_SYSTEM_INTERNAL_DATA Deutsche Telekom AG,NTT-Docomo pCR Approval Yes
Yes
approved No   S3‑160943
    S3‑161039 Clarification in logging access to personal data Huawei; HiSilicon pCR   Yes
Yes
revised No S3‑161221  
    S3‑161221 Clarification in logging access to personal data Huawei; HiSilicon pCR - Yes
Yes
approved No   S3‑161039
    S3‑161040 Clarification in Authentication policy Huawei; HiSilicon pCR Approval Yes
Yes
revised No S3‑161239  
    S3‑161239 Clarification in Authentication policy Huawei; HiSilicon pCR Approval Yes
Yes
approved No   S3‑161040
    S3‑161041 Clarification in Authentication policy Huawei; HiSilicon pCR Approval Yes
Yes
approved No    
    S3‑161050 pCR to TS 33.117 Editorial correction to testcase "TC_ IP_MULTICAST_HANDLING" Nokia Networks pCR   Yes
Yes
approved No    
    S3‑161052 pCR to TS 33.117 - Revision of the testcase "TC_GRATUITOUS_ARP_DISABLING Nokia Networks pCR   Yes
Yes
approved No    
    S3‑161053 pCR to TS 33.117 - Enhancing the testcase "TC_BVT_ROBUSTNESS AND FUZZ TESTING" Nokia Networks pCR   Yes
Yes
approved No    
    S3‑161116 Removing Editor’s Note in 5.2.6.2.3 TNO pCR Approval Yes
YesNokia: 33.116 has a requirement on GTP-C, and here we generalize to GTP both user and control plane. Changes in 33.117 should be compatible with what we intended with the MME in 33.116. Do we have to go through every specific entity TS every time we make a change in the general catalog? Docomo: would apply this to eNOdeB which is the other end of GTP-U? The answer was yes. Every time we make a change in the generic requirement we have to see what happens in every enitity. Nokia: we can’t have a new requirement every time we make a change. It was decided to include new requirements in the entities when a change was made in the general catalog. The document was revised for this objective.
revised No S3‑161240  
    S3‑161240 Removing Editor’s Note in 5.2.6.2.3 TNO pCR Approval Yes
Yes
approved No   S3‑161116
    S3‑161121 handling editor's notes in 33.117 NTT DOCOMO pCR Approval Yes
Yes
approved No    
    S3‑161122 pCR to 33.117 to 5.2.3.4.3.3 introducing password blacklists NTT DOCOMO INC. pCR   Yes
YesNokia commented that this was hard for the manufacturers to comply with.
revised No S3‑161238  
    S3‑161238 pCR to 33.117 to 5.2.3.4.3.3 introducing password blacklists NTT DOCOMO INC. pCR - Yes
Yes
approved No   S3‑161122
    S3‑161235 new draft TS 33.117 NTT-Docomo draft TS Approval No
Yes
left for email approval No    
    S3‑161241 Cover sheet TS 33.117 NTT-Docomo TS or TR cover Approval No
Yes
left for email approval No    
7.2.3 TS 33.zzz (SCAS_PGW) S3‑160954 pCR adding the skeleton of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia draft TS Approval Yes
Yes
revised No S3‑161242  
    S3‑161242 pCR adding the skeleton of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia draft TS Approval Yes
Yes
approved No   S3‑160954
    S3‑161012 Discussion paper for SCAS-PGW TNO discussion Discussion Yes
No
withdrawn Yes    
    S3‑161016 pCR to TS 33.250 - Adding an EN in section 5.3.3.1.2 on P-GW and traffic forwarding TNO pCR Approval Yes
YesIt was agreed to remove security objectives in 1121 and 1120. All references will be checked when renumbering the clauses, in both 33.117 and 33.926. 5.2.3 was proposed to keep it as an empty clasuse.
merged No S3‑161242  
    S3‑161124 PDN GW Security Issues TNO discussion Discussion Yes
Yes
noted No    
    S3‑161130 pCR scope of TS 33.250 China Mobile Com. Corporation, ZTE, Telecom Italia, Huawei, Hisilicon pCR Approval Yes
Yes
approved No    
    S3‑161243 TS 33.250 China Mobile draft TS Approval Yes
Yes
approved No    
7.2.4 Other S3‑161042 Remove “shall” from the TR Huawei, HiSilicon CR Approval Yes
Yes
revised No S3‑161244  
    S3‑161244 Remove “shall” from the TR Huawei, HiSilicon CR Approval Yes
Yes
agreed No   S3‑161042
    S3‑161111 WID on Security Assurance Specification for eNB Huawei, HiSilicon WID new Agreement Yes
YesBT noted that it was agreed not to do this process with several entities in parallel. Do we want to change our minds? NTT-Docomo was fine with this as long as the eNodeB was removed from the scope. Nokia agreed to cut out eNodeB. This will be a bigger step than the core network nodes, a quite different job. We should finish with the core network nodes first. Huawei: this will take a longer time so better to start soon. China Mobile agreed with having the eNodeB before the rest of core network nodes. It was agreed to go straight to the TS for the eNodeB instead of using a TR.
revised No S3‑161245  
    S3‑161245 WID on Security Assurance Specification for eNB Huawei, HiSilicon WID new Agreement Yes
Yes
agreed No   S3‑161111
7.3 Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT (EASE_EC_GSM) S3‑160955 Correction of CR implementation omissions MCC CR Agreement Yes
YesMCC commented that these were implementation errors brought to this meeting for formal agreement. These issues were agreed already in CR#0040. This CR was merged with 1092 which clashed with the figure change proposed in 1092.
merged No S3‑161179  
    S3‑161088 Remaining open issues in EASE: problem descriptions and solution proposals Ericsson discussion Decision Yes
Yes
noted No    
    S3‑161092 Corrections to EASE Ericsson CR Approval Yes
Yes
revised No S3‑161180  
    S3‑161180 Corrections to EASE Ericsson CR Approval Yes
Yes
agreed No   S3‑161092
    S3‑161108 Secure delivery of IOV-values to the MS in enhanced GPRS Ericsson CR Approval Yes
Yes
merged No S3‑161179  
    S3‑161179 Secure delivery of IOV-values to the MS in enhanced GPRS Ericsson CR Approval Yes
Yes
agreed No   S3‑161108
7.4 Security Aspects of Narrowband IOT (CIoT) S3‑160911 Reply to: LS on Clarifications on RRC Resume Request R2-164414 LS in   Yes
Yes
noted No    
    S3‑160915 Response LS on Clarifications on RRC Resume Request R3-161426 LS in   Yes
Yes
noted No    
    S3‑160984 NBIoT UP Solution CR Nokia, Ericsson CR Approval Yes
Yes
agreed No    
7.5 New GPRS algorithms for EASE (EASE_ALGOs_SA3) S3‑160928 Discussion document on the progress of EASE ALGO work item. VODAFONE Group Plc discussion Information Yes
YesNTT-Docomo commented that trying to rush it didn’t look appropiate and a delay would be acceptable. Orange: SA3 will not comment much on the specs given the lack of expertise in cryptography. Docomo commented that they have insisted on public review, not just in SA3 so external review would be also possible. MCC commented that apparently the papers would be sent on Monday of the meeting week, but they needed confirmation from ETSI. It was agreed to choose option one with an exception to be submitted to SA.
noted No    
    S3‑161138 New GPRS algorithms – status update ETSI SAGE LS in   Yes
YesVodafone commented that the algorithm specifications hadn’t in fact been sent to the French government, still stuck in ETSI's legal department. Two options are given to procceed further. Tdoc 928 discusses the options.
noted No    
    S3‑161181 Exception sheet EASE-ALGO_SA3 Vodafone WI exception request Agreement No
Yes
agreed No    
7.6.1 IP Multimedia Subsystem (IMS) Security                      
7.6.2 Network Domain Security (NDS) S3‑161055 Clarifying which RFC is relevant for ECDSA Nokia, Gemalto CR   Yes
YesNokia commented that there is a new RFC, so a decision was to be made whether to refer to the new RFC or to the old one. Ericsson: this RFC contains three variants of the same algorithm. If we go for the old RFC we have to specify further, whether to mandate three hashes. Ericsson: is there anything implemented? US Office commented that they were querying about the current status of the implementation. The Chairman commented that it made sense to delay this CR until we had more information.
postponed No    
    S3‑161148 Comment contribution to S3-161055 "Clarifying which RFC is relevant for ECDSA" Ericsson CR   No
No
withdrawn Yes    
    S3‑161149 Comments on S3-161055 "Clarifying which RFC is relevant for ECDSA" Ericsson CR   Yes
Yes
not pursued No    
7.6.3 UTRAN Network Access Security S3‑161051 Enforce mutual authentication ORANGE CR Agreement Yes
Yes
revised No S3‑161162  
    S3‑161162 Enforce mutual authentication ORANGE, Telecom Italia, Deutsche Telekom, Vodafone, Gemalto, Oberthur, Giesecke&Devrient, TeliaSonera, Vodafone CR Agreement Yes
YesNokia gave an example of quintuplet attack that should be addressed here. Prevent PLMN id being spoofed. Vodafone: MMC,MNC is translated into what we see on the screen of the UE. CESG: this is not the case on the screen of my phone. He doesn’t see the country where he is. Docomo: should we do something even if Nokia's example of attack is possible? Vodafone: put in the SIM ,MNC and MMC codes that prevent such thing. Docomo: is it worth it in terms of additional overhead? Orange: it would implementation specific to solve this issue. It was agreed to add a NOTE with a recommendation. Qualcomm: send it to CT1 for comments. Vodafone: also to CT6.
agreed No   S3‑161051
    S3‑161224 LS on enhancing legacy GSM security Qualcomm LS out Approval No
Yes
approved No    
7.6.4 GERAN Network Access Security S3‑160909 LS on Solving Legacy Security Issues GSMA FSAG LS in   Yes
Yes
replied to No    
    S3‑161049 2G Security improvements ORANGE CR Agreement Yes
Yes
revised No S3‑161161  
    S3‑161161 2G Security improvements ORANGE, Telecom Italia, Gemalto, Oberthur, Giesecke&Devrient, Vodafone, Deutsche Telekom CR Agreement Yes
YesCESG: why do you expect the base station giving you the right PLMN id? This doesn’t solve the problem. MMC,MNC is translated into a user friendly code but this is not always displayed on the screen. CESG: the fake base station could give me whatever information they want on the network id. It was agreed to have an editor's note to come back to this issue. It was also agreed to send an LS to RAN6 to ask them about these procedures.
agreed No   S3‑161049
7.6.5 Generic Authentication Architecture (GAA)                      
7.6.6 Multimedia Broadcast/Multicast Service (MBMS)                      
7.6.7 Security Aspects of Home(e)NodeB (H(e)NB)                      
7.6.8 Security Aspects related to Machine-Type Communication ((e)MTC)                      
7.6.9 Security Aspects of Isolated E-UTRAN Operation for Public Safety (IOPS)                      
7.6.10 Security of MCPTT (MCPTT) S3‑160906 LS response on LS on confidentiality protection of an identity in a value of an XML attribute of an XML element of an XML document included in a SIP message. C1-162978 LS in   Yes
YesCESG commented that SA3 had already commented that there is nothing to do here. Why does CT1 want to investigate an option where we have said this is not feasible? Why discussing this in CT1 and not in SA3?
replied to No    
    S3‑161225 Reply to: LS response on LS on confidentiality protection of an identity in a value of an XML attribute of an XML element of an XML document included in a SIP message. CESG LS out approval Yes
Yes
approved No    
    S3‑160907 LS on identification of originating MCPTT ID in GMS C1-163039 LS in   Yes
Yes
replied to No    
    S3‑161151 LS Reply to S3-160907 (C1-163039) Motorola Solutions Danmark A/S LS out Approval Yes
Yes
revised No S3‑161226 S3‑160973
    S3‑161226 LS Reply to S3-160907 (C1-163039) Motorola Solutions Danmark A/S LS out Approval Yes
Yes
approved No   S3‑161151
    S3‑160967 Signing of Access Tokens Motorola Solutions Danmark A/S CR Agreement Yes
Yes
revised No S3‑161195  
    S3‑161195 Signing of Access Tokens Motorola Solutions Danmark A/S CR Agreement Yes
Yes
agreed No   S3‑160967
    S3‑160968 Fix Identity Management interface Motorola Solutions Danmark A/S CR Agreement Yes
Yes
revised No S3‑161227  
    S3‑161227 Fix Identity Management interface Motorola Solutions Danmark A/S CR Agreement Yes
Yes
agreed No   S3‑160968
    S3‑161062 Correcting GMK revokation in TS 33.179 CESG CR Agreement Yes
Yes
agreed No    
    S3‑161143 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval Yes
Yes
revised No S3‑161228 S3‑161036
    S3‑161228 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval Yes
Yes
agreed No   S3‑161143
    S3‑160934 Correction of some implementation errors MCC CR Agreement Yes
Yes
agreed No    
    S3‑161035 Corrections to 33.179 HUAWEI TECHNOLOGIES Co. Ltd. CR Approval Yes
Yes
revised No S3‑161229  
    S3‑161229 Corrections to 33.179 HUAWEI TECHNOLOGIES Co. Ltd. CR Approval Yes
Yes
agreed No   S3‑161035
    S3‑161061 Clarifications to 33.179 CESG CR Agreement Yes
Yes
agreed No    
    S3‑160972 R-14 mission critical TS strategy Motorola Solutions Danmark A/S discussion Endorsement Yes
YesNokia supported approach #2. This was agreed by SA3 as well.
endorsed No    
    S3‑160971 New work item for Security Architecture for Mission Critical Services Motorola Solutions Danmark A/S WID new Agreement Yes
Yes
revised No S3‑161196  
    S3‑161196 New work item for Security Architecture for Mission Critical Services Motorola Solutions Danmark A/S WID new Agreement Yes
Yes
agreed No   S3‑160971
    S3‑160938 Recording and discreet listening of private communications Airbus Group SAS discussion Endorsement Yes
YesCESG commented that they preferred solution1. BT commented that recordings can be kept for a long time. We need a requirement for end users.Both features are needed. Motorola didn’t have a preference on the options. CESG commented that more discussion was needed. Maybe to be discussed in SA3-LI? BT: the LI community are not the end users of this. CESG proposed to send an LS to SA3-LI and SA6.
noted No    
    S3‑160973 SA3 response to LS S3-160907 (C1-162780) Motorola Solutions Danmark A/S LS out Approval Yes
Yes
revised No S3‑161151  
    S3‑161036 Clarification on floor control signalling protection Huawei, HiSilicon CR Approval Yes
Yes
revised No S3‑161143  
    S3‑161171 Discussion of GMK revocation issue CESG discussion discussion Yes
Yes
noted No    
    S3‑161230 Clarification on the requirement of recording and discrete listening CESG LS out Approval Yes
Yes
approved No    
7.6.11 Security for Enhancements to Proximity-based Services - Extensions (eProSe-Ext-SA3)                      
7.6.12 Other work items S3‑161045 I-WLAN feature withdrawal Ericsson discussion   Yes
YesVodafone: did SA agree on a WID for this work? Anand (Chairman) replied that this will go under TEI13.
endorsed No    
8.1 Study on Security for Proximity-based Services (FS_ProSe_Sec) S3‑161139 Solution for Key Issue #7.3.3 on spatial replay Ericsson discussion Endorsement Yes
YesNokia: the attack is still possible even with this solution, it is contained. Ericsson: it will be only possible within a cell. It was proposed to have a living document to work on during several meetings. This was agreed. Qualcomm commented that this could end up in a CR if succcessful. Ntt-Docomo: this happens only in ProSe? Ericsson: the scope is not limited to Prose. It exists since 2006 and it's called "wormhole attack". The proposal in 1139 was endorsed by the group.
revised No S3‑161248  
    S3‑161248 Solution for Key Issue #7.3.3 on spatial replay Ericsson discussion Endorsement Yes
YesThis is the skeleton for a living document.
noted No   S3‑161139
8.2 TR on Security Assurance scheme for 3GPP network products (33.916) (SCAS-SA3TR) S3‑161119 handling editor's notes in 33.916 NTT DOCOMO pCR Approval Yes
Yes
approved No    
    S3‑161145 Handling editor's notes in 33.916 related to figures NTT DOCOMO INC. pCR Approval Yes
Yes
approved No    
    S3‑161246 new draft TR 33.916 NTT-Docomo draft TR Approval No
Yes
left for email approval No    
    S3‑161247 Cover sheet TR 33.916 NTT-Docomo TS or TR cover Approval No
Yes
left for email approval No    
8.3 Study on EGPRS Access Security Enhancements with relation to cellular IoT (FS_EASE_IoT)                      
8.4 Study on IMS Enhanced Spoofed Call Prevention and Detection (FS_ESCAPADES)                      
8.5 Study on security aspects for LTE support of V2X services (FS_V2XLTE) S3‑161026 Adding Architecture section Huawei, HiSilicon pCR Approval Yes
YesNokia: we should refer to the TS, not the TR in SA2.
merged No S3‑161155  
    S3‑161155 Adding Architecture section Huawei, HiSilicon, Ericsson, Qualcomm pCR Approval Yes
YesMerge of 1026,1098,1137.
approved No   S3‑161026
    S3‑161098 Baseline architecture for V2X Qualcomm Incorporated pCR Approval Yes
Yes
merged No S3‑161155  
    S3‑161137 High level description of V2XLTE architecture Ericsson LM pCR   Yes
Yes
merged No S3‑161155  
    S3‑161024 Adding References and Definitions and Abbreviations Huawei, HiSilicon pCR Approval Yes
Yes
revised No S3‑161156  
    S3‑161156 Adding References and Definitions and Abbreviations Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161024
    S3‑161025 Corrections to TR 33.885 Huawei, HiSilicon pCR Approval Yes
Yes
revised No S3‑161157  
    S3‑161157 Corrections to TR 33.885 Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161025
    S3‑160981 V2X Discussion on privacy requirements by regulation Nokia discussion   Yes
YesOrange: the operators are aligned with this, no problems with LTE related procedures in EU. It’s already compliant. In the US part, we identify network identities linked to billing identity, not V2X identities. The security network is not impacted, it's about the identity part. This is outside the scope of 3GPP. Vodafone: we can use these V2X identities in our specs. Orange: in SA3 we don’t work at application level. It’s a separate issue from the IMSI. Qualcomm: it's up to SA1 to decide on the regulator requirements.An LS was sent for clarification already. They are meeting in August. Ericsson: ITS document on privacy issues should also be considered here.
noted No    
    S3‑160982 V2X Annex on privacy by regulation EU Nokia pCR   Yes
YesWaiting for SA1 to take action.
postponed No    
    S3‑160983 V2X Annex on privacy by regulation US Nokia pCR   Yes
YesWaiting for SA1 to take action.
postponed No    
    S3‑160993 V2X privacy - a way forward LG Electronics France discussion Discussion Yes
YesThere is no decision on having IMSI anonymised. Orange doesn’t agree with this. The Chairman asked whether there was anyone agreeing with proposal one. No one replied, so this was gone. Orange: we sent an LS to SA1 already since we didn’t understand those requirements. We don’t need to send this LS. Ericsson preferred to have clarification on this privacy regulation by sending this LS. Vodafone commented that V2X is a 5G feature and expressed their surprise of this not being in NSA. Huawei: it is defined for LTE now. Vodafone: so this is not working in 5G? The Chairman commented that V2X is potentially in 5G. Vodafone: the privacy in 5G may have an effect on the solution we find for V2X.
noted No    
    S3‑160994 Draft LS on V2X privacy clarification LG Electronics France LS out Approval Yes
YesVodafone: does this mean that we have to create a special case for V2X? Not clear. The Chairman commented that since proposal one in the previous contribution was discarded the content here could not be sent.
noted No    
    S3‑160996 Update of V2X attach id obfuscation LG Electronics France pCR Approval Yes
YesOrange: Anonimty with respect to the third party who knows the IMSI. So there is no anonimity. It doesn’t solve the problem. We are also waiting for SA1's response. Huawei: this is a study that can be continued without having to submit it for the next SA plenary as originally planned. Orange wanted an editor's note with their comments: anonymity with respect to the third party.This was agreed.
revised No S3‑161158  
    S3‑161158 Update of V2X attach id obfuscation LG Electronics France pCR Approval Yes
Yes
approved No   S3‑160996
    S3‑161094 Correcting a requirement for Vehicle UE Privacy (V2X) Qualcomm Incorporated pCR Approval Yes
YesOrange: this depends on the response from SA1.
approved No    
    S3‑161095 Hiding the subscriber IMSI from the serving network for V2X Qualcomm Incorporated pCR Approval Yes
YesOrange: how does the MME discover the home network and how is the request of authorization is routed? Qualcomm: CT1 will probably decide eventually. Orange: we don’t know the deployment options, so not true that there is one HSS in there. Todor didn’t understand how the privacy issue is handled here. The MCC needs to be provided. Orange: Home PLMN instead of Home V2X network. Orange: Auth vector request is routed for the second option is more an stage 2 option than stage 3. BT: agree with Todor, and also this is not aligned with 5G proposals. Interdigital: encryption of the IMSI is random. Qualcomm agreed. It was agreed to have an editor's note. CESG: denial of service attack to the HSS needs to be considered. Nokia: step 2 in 6.x.2.1 means additional complexity and there are other ways to get around that. CESG: LI aspects to be considered as well. A group of editor's notes will include these and more concerns from the companies.
revised No S3‑161163  
    S3‑161163 Hiding the subscriber IMSI from the serving network for V2X Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161095
    S3‑161096 Reattach procedure for Vehicle UE Identity Privacy Qualcomm Incorporated pCR Approval Yes
YesNokia: large load on the eNodeB. It was agreed on having an editor's note on this.
revised No S3‑161164  
    S3‑161164 Reattach procedure for Vehicle UE Identity Privacy Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161096
    S3‑161097 Vehicle UE privacy based on data traversing the network Qualcomm Incorporated pCR Approval Yes
YesEricsson: There is a NAT so you can’t see the IP of the UE. Qualcomm: if the NAT address doesn’t change it's ok. Ericsson: the IP address needs to be changed everytime the UE attaches, then. Qualcomm: this is one of the proposals. Huawei: the application layer doesn't know what the lower layer is doing. Nokia: we need to study the performance impact on the HSS.
revised No S3‑161165  
    S3‑161165 Vehicle UE privacy based on data traversing the network Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161097
    S3‑161021 Key issue about data communication security between network entities Huawei, HiSilicon pCR Approval Yes
Yes
revised No S3‑161166  
    S3‑161166 Key issue about data communication security between network entities Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161021
    S3‑161022 Key issue about V2I broadcast communication security Huawei, HiSilicon pCR Approval Yes
YesOrange: who authorizes the UE in the second requirement? Huawei: The network. It was also commented that requirements should be written in active voice to avoid ambiguities on who is doing the action.
revised No S3‑161167  
    S3‑161167 Key issue about V2I broadcast communication security Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161022
    S3‑161027 Data communication security between network entities Huawei, HiSilicon pCR Approval Yes
Yes
approved No    
    S3‑161029 Security for V2X Broadcast Communication: Life Time of Credentials Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
revised No S3‑161168  
    S3‑161168 Security for V2X Broadcast Communication: Life Time of Credentials Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑161029
    S3‑161030 Security for V2X Broadcast Communication: Replay Protection Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
approved No    
    S3‑161031 Security for V2X Broadcast Communication: Introducing Temporary ID management Function for V2X Data Source Accountability Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
YesNokia: is it in scope to add new identities? Huawei: it's part of the security architecture. Orange: no impact on network level identities, this influences application layer IDs. Added a note and an editor's note concerning Orange and BT's comments.
revised No S3‑161169  
    S3‑161169 Security for V2X Broadcast Communication: Introducing Temporary ID management Function for V2X Data Source Accountability Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑161031
    S3‑161136 Solution for communication security with V2X network entities Ericsson LM pCR   Yes
Yes
approved No    
    S3‑160980 V2X requirement on updating of crypto Nokia pCR   Yes
YesCESG pointed out the issue of management of updating the algorithms. This was put in an editor's note. Klaus: clarify security maintaninability in the requirement. This was agreed.
revised No S3‑161172  
    S3‑161172 V2X requirement on updating of crypto Nokia pCR - Yes
Yes
approved No   S3‑160980
    S3‑161099 Legitimacy of V2X messages on key issue for data source accountability Qualcomm Incorporated pCR Approval Yes
Yes
revised No S3‑161173  
    S3‑161173 Legitimacy of V2X messages on key issue for data source accountability Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161099
    S3‑161132 Solution for authorization and accountability in V2X systems Ericsson pCR   Yes
Yes
revised No S3‑161174  
    S3‑161174 Solution for authorization and accountability in V2X systems Ericsson pCR - Yes
Yes
approved No   S3‑161132
    S3‑161028 Key issue about security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval Yes
YesNokia: it may be applicable to the whole V3 interface. It was agreed to remove "configuration" in the requirements so it is applicable to all data. Interdigital proposed to reword "eavesdropping", it was not the correct term. Qualcomm proposed " stored in a confidentiality protected way". This was agreed.
revised No S3‑161175  
    S3‑161175 Key issue about security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161028
    S3‑161023 Security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval Yes
Yes
revised No S3‑161176  
    S3‑161176 Security of UE to V2X Control Funtion interface Huawei, HiSilicon pCR Approval Yes
Yes
approved No   S3‑161023
    S3‑161072 pCR to 33.885 - New Key Issue on Detectability of Malicious behaviour TNO pCR Approval Yes
YesEricsson: safety related aspects are out of scope. There are other SDOs dealing with this. We cannot address faulty mechanisms here. They proposed to add and editor's note questioning the vailidy of this. Interdigital: the networks should detect strange behaviour in the car (e.g. sensing ice in a summer day). BT: selecting disabling determined devices is a possibility but out of scope. Huawei: the requirement is to disabling the sending of the erroneous data but not disabling the whole device. Orange: there are no requirements here, let's put editor's notes addressing these issues. This was agreed.
revised No S3‑161177  
    S3‑161177 pCR to 33.885 - New Key Issue on Detectability of Malicious behaviour TNO pCR Approval Yes
Yes
approved No   S3‑161072
    S3‑161178 New draft TR 33.885 Huawei draft TR Approval No
Yes
left for email approval No    
8.6 Study on Architecture and Security for Next Generation System (FS_NSA) S3‑161131 LS on "Next Generation" Security Requirements S2-164280 LS in   Yes
Yes
replied to No   S3‑161034
    S3‑161182 Reply to: LS on "Next Generation" Security Requirements Vodafone LS out approval Yes
Yes
approved No    
    S3‑161046 LS to SA1 on factory automation requirements ORANGE LS out Approval Yes
Yes
revised No S3‑161159  
    S3‑161159 LS to SA1 on factory automation requirements ORANGE LS out Approval Yes
YesInterdigital didn’t agree with the use of the UE here. UE is AKA and IMSI. If we expand from UE to add the definition of device. You program the answer, which is IMSI + AKA. Orange: you authenticate the customer, not the device. Orange: we should talk about UE in 5G, not UE in 4G. Interdigital: if we don’t say device the answer will be programmed. Nokia: generalize UE for 5G. Nokia: better not to discuss issues related to SA1's TR since they will start a TS soon and it will not be relevant anymore. Oberthur: no requirement outside the factory. Ericsson: we should take a look at clause 6 in TR 22.862. Ericsson: the LS is asking for changes in SA1 TRs that are closed already. Qualcomm: there are more than one authentication methods, they didn’t understand what the problema was with not having clear "alternative authentication methods". Claus (G&D): there is still confusion on these identifiers. It doesn’t hurt to send this to SA1. China Mobile supported sending this LS. Orange: seven companies supporting this LS, two don’t support it. Ericsson commented that there is a difference in the wording, not on sending the LS. Qualcomm had the same opinion. This had to be taken offline.
approved No   S3‑161046
    S3‑160924 pCR to 33.899 - update of the Introduction section VODAFONE Group Plc pCR Approval Yes
YesEricsson and Docomo commented that reference to 3GPP working groups and work items should be removed. They also commented that when referring to white papers of other organizations there should be references to them. This was confirmed by MCC.
revised No S3‑161184  
    S3‑161184 pCR to 33.899 - update of the Introduction section VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160924
    S3‑160925 pCR to TR 33.899 - update of section 4.2 High level security requirements VODAFONE Group Plc pCR Approval Yes
YesOrange suggested to add a clause on signalling. Claus (G&D): difference between service, network service and NextGen services? Vodafone: to distinguish the new services that don’t exist in legacy networks. Claus (G&D): we should distinguish the different services. Juniper: an editor's note on the need for clear definitions for these services. Qualcomm: no need to have different clauses, the radio interface clause is too detailed to be high level. NTT-Docomo: subscriber privacy left out? It was agreed to be added.
revised No S3‑161185  
    S3‑161185 pCR to TR 33.899 - update of section 4.2 High level security requirements VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160925
    S3‑161109 Availability of the control plane in Next Gen TNO pCR Approval Yes
YesOrange supported this contribution. Interdigital: why only UE? It would be for anything connected to the network. It was agreed to add an editor's note on the lack of definition or terminology about UE. BT: the attacks can come from false networks too.
merged No S3‑161185  
    S3‑160977 NSA Adding new security area on broadcast multicast Nokia pCR   Yes
Yes
revised No S3‑161186  
    S3‑161186 NSA Adding new security area on broadcast multicast Nokia pCR - Yes
Yes
approved No   S3‑160977
    S3‑160978 NSA new security area on interworking and migration Nokia pCR   Yes
YesMCC commented that all references to 3GPP working groups, working methods, tdoc numbers and so on should be removed from the Introduction. The specification should refer to other 3GPP specifications in this case. It was agreed to move such references to the Editor's note in the Introduction.
revised No S3‑161188  
    S3‑161188 NSA new security area on interworking and migration Nokia pCR - Yes
Yes
approved No   S3‑160978
    S3‑160991 Security aspects of Connectionless RAN-CN interface Nokia pCR Approval Yes
YesEricsson: no need to describe all solutions, just enumerate them.
revised No S3‑161189  
    S3‑161189 Security aspects of Connectionless RAN-CN interface Nokia pCR Approval Yes
Yes
approved No   S3‑160991
    S3‑160926 pCR to 33.899 - update of 5.1.2 Security assumptions (Architectural aspects of 5G security) VODAFONE Group Plc pCR Approval No
No
withdrawn Yes    
    S3‑161117 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval Yes
Yes
revised No S3‑161150  
    S3‑160952 pCR to TR 33.899: Proposal of key hierarchy for 5G security NEC pCR Approval Yes
YesVodafone: no requirements without security threats. Interdigital: one set of control plane keys in the figure. A slice is not a complete network from end to end. This contribution was discussed with the similar 1101 from Qualcomm. Qualcomm: is the control plane the same for all slices? NEC: only one common control plane. Vodafone: it is likely that there will slices in both user and control planes. Nokia: control function common or split is still being discussed in SA2. Orange: slicing is also being defined in RAN so we also depend on their outcome. NEC: Key hierarchy should be defined separately from the architecture.
revised No S3‑161192  
    S3‑161192 pCR to TR 33.899: Proposal of key hierarchy for 5G security NEC pCR Approval Yes
Yes
approved No   S3‑160952
    S3‑160966 Security for serving functions not in physical protected place ZTE Corporation pCR Approval Yes
YesInterdigital: access networks are not insecure in principle. Vodafone: access networks are harder to protect, it does not necessarily means that are insecure. We need a mechanism to know where to locate the function. Close or far is not enough. What do they mean? Vodafone: this document needs heavy re-wording.
revised No S3‑161193  
    S3‑161193 Security for serving functions not in physical protected place ZTE Corporation pCR Approval No
Yes
approved No   S3‑160966
    S3‑161044 pCR to TR 33.899: UEs with Asymmetric Keys VODAFONE Group Plc pCR Approval Yes
YesGemalto: one key is a weakness. If you attack this key everything is down. They didn’t agree with the contribution. Huawei and BT supported the contribution. This was taken offline. Claus (G&D): quantum key cryptography is too far away. Vodafone: this is a TR. Gemalto supported this sentence.
revised No S3‑161259  
    S3‑161259 pCR to TR 33.899: UEs with Asymmetric Keys VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑161044
    S3‑161067 pCR to TR 33.899 v0.3.0 "Architecture - modifying key issue titles" Nokia pCR   Yes
Yes
approved No    
    S3‑161069 pCR to TR 33.899 v0.3.0 "Architecture - security features on AN-CN interfaces" Nokia pCR   Yes
Yes
approved No    
    S3‑161070 pCR to TR 33.899 v0.3.0 "Architecture - security features on CN-CN interfaces" Nokia pCR   Yes
Yes
approved No    
    S3‑161135 pCR to TR 33.899: Security Implications of Low Latency VODAFONE Group Plc pCR Approval Yes
Yes
revised No S3‑161194  
    S3‑161194 pCR to TR 33.899: Security Implications of Low Latency VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑161135
    S3‑161002 PCR of User Plane Security Protection Huawei, HiSilicon, Deutsche Telekom AG, Vodafone pCR   Yes
YesNokia: Key issue description looks more like a solution. Orange: why do we need KMS as a separate function for key derivation? We can reuse what we have. Huawei: it’s a logical entity, it can be located anywhere. Ericsson clarified that this describes a session based security solution. LG: there is no negotiation procedure here. Qualcomm: There are different policies and we need to clarify where they are coming from (e.g. policy control). Nokia: there is a risk of confusion when using "policy control" since it could be confused with the PCRF.
revised No S3‑161197  
    S3‑161197 PCR of User Plane Security Protection Huawei, HiSilicon, Deutsche Telekom AG, Vodafone pCR - Yes
Yes
approved No   S3‑161002
    S3‑160964 An overview of NextGen security architecture ZTE Corporation pCR Approval Yes
YesEricsson: virtualised or not they are network functions (VsF in figure). Orange: network access security and secure access to services. What's the intention here? ZTE: it's coming from 33.401. Orange: what is the trusted storage computing? Where is this figure coming from? Huawei: no connection from the 3GPP AN to the core network. ZTE: this is coming from 33.401 and 23.799, combined with some modifications. Orange: we need to be clear on where this figure is coming from. Nokia didn’t agree with the figure capturing SA2 agreements. 3GPP AN access, network slice connections don’t capture the agreements. We need to wait for SA2 before having such a figure. BT: it would be good to agree on a figure like this for 33.401.Orange supported this, although they didn’t agree on this one.
noted No    
    S3‑161101 pCR solution to Key # 1.2 on the need a security anchor Qualcomm Incorporated pCR Approval Yes
YesVodafone: The solution is as vulnerable as the equivalent solution in LTE (with Kasme). Qualcomm: we cannot assume all credentials will be in HSS.. Ericsson supported Orange: this should be read in the context of SA2, how they specify the AAA entity. Qualcomm: maybe an editor's note about a decision that needs to be taken on the split storage of credentials. Nokia: in 33.402 we split AAA and HSS already. Orange: AAA is only used in non 3GPP access, do we need it now for all use cases? It’s an open issue. Huawei: CP-AU can be in both home or visited network. Nokia: it is for further study whether CP-AU can change when the UE moves. Huawei: we need to decided whether in NextGen we will have an HSS or not.
revised No S3‑161191  
    S3‑161191 pCR solution to Key # 1.2 on the need a security anchor Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161101
    S3‑160945 pCR to TR 33.899: Radio interface user plane integrity protection, Solution details VODAFONE Group Plc pCR Approval Yes
Yes
approved No    
    S3‑160927 pCR to 33.899 - Reword section 5.2.3.2.2 and 5.2.3.3 as per editors notes VODAFONE Group Plc pCR Approval No
No
withdrawn Yes    
    S3‑160946 pCR to TR 33.899: Authentication section introduction VODAFONE Group Plc pCR Approval Yes
Yes
revised No S3‑161198  
    S3‑161198 pCR to TR 33.899: Authentication section introduction VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160946
    S3‑161065 Key Issue #2.1: Authentication framework INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes1123 proposed a similar issue, so both tdocs were merged.
merged No S3‑161199  
    S3‑161074 pCR to TR 33.899 v0.3.0 "Authentication framework - key issue" Nokia pCR   Yes
Yes
approved No    
    S3‑161075 pCR to TR 33.899 v0.3.0 "Authentication framework - requirements" Nokia pCR   Yes
YesOrange: the second requirement does not correspond to the current SA2 specification. Nokia commented that this was taken probably from a previous version of the SA2 spec.
revised No S3‑161201  
    S3‑161201 pCR to TR 33.899 v0.3.0 "Authentication framework - requirements" Nokia pCR - Yes
Yes
approved No   S3‑161075
    S3‑160939 Key issue #2.4: Device identifier authentication INTERDIGITAL COMMUNICATIONS pCR Approval Yes
YesQualcomm suggested for Non tampered: secure and protected instead. Interdigital disagreed. BT: associated device identity credentials and not just credentials storage. Claus:we haven’t agreed on device credentials, agree with BT. Device auth more than device identifier auth. Nokia: device auth is a key issue, auth without credentials would be too difficult. Gemalto didn’t agree with addressing the issue of having device authentication as the only auth needed and performed. The editor's note was removed.
revised No S3‑161202  
    S3‑161202 Key issue #2.4: Device identifier authentication INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes
approved No   S3‑160939
    S3‑161127 pCR complete the section 5.2.3.6 China Mobile Com. Corporation pCR Approval Yes
YesVodafone: this is not adding anything. Nokia agreed.
noted No    
    S3‑161123 pCR adding the potential security requirements into the section 5.2.3.7 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval Yes
YesBT wanted to keep the back off mechanism.TNO supported this since they also propose it in 1073. Ericsson commented that the second requirement on back off should go away.
merged No S3‑161199  
    S3‑161199 pCR adding the potential security requirements into the section 5.2.3.7 China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval Yes
Yes
approved No   S3‑161123
    S3‑160975 pCR to TR 33.899: Authentication of the user VODAFONE Group Plc pCR Approval Yes
YesNokia: Associating the user with the device is associating two identities. Vodafone: the device is the UE. The content will be reviewed according to the discussion on the definition of device.
revised No S3‑161260  
    S3‑161260 pCR to TR 33.899: Authentication of the user VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160975
    S3‑161003 Key Issue of Security for Service Provider Connection Huawei, HiSilicon, Deutsche Telekom AG, KPN pCR   Yes
YesOrange: where are the requirements for SA3 in 22.861? It was decided to check this offline. Orange: No defintion of service provider in 3GPP -> it becomes third party in the contribution.
revised No S3‑161203  
    S3‑161203 Key Issue of Security for Service Provider Connection Huawei, HiSilicon, Deutsche Telekom AG, KPN pCR - Yes
Yes
approved No   S3‑161003
    S3‑161001 Resolving Editor’s notes in Key Issue #2.1 Authentication framwork Huawei, HiSilicon pCR Approval Yes
Yes
noted No    
    S3‑161018 pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service Nokia pCR Approval Yes
Yes
revised No S3‑161204  
    S3‑161204 pCR to TR 33.899 New key issue - Secondary authentication by 3rd party service Nokia pCR Approval Yes
Yes
approved No   S3‑161018
    S3‑161125 pCR choice of authentication methods China Mobile Com. Corporation, Huawei, Hisilicon pCR Approval Yes
YesVodafone: the threat is a bit OK. China Mobile: one IMSI can have several credentials. It's one possibility. Huawei supported this. Ericsson: the IMSI is one key identifier, I don’t get it. There should be two identifiers. Vodafone: who chooses the auth methods? Nokia: this is not a valid requirement. China Mobile: we avoid any negotiation, the choice of auth methods needs to be performed. We need to decide which auth methods are to be chosen. Qualcomm supported the idea of having several auth methods. The second requirement is not a requirement but a solution. Ericsson: it becomes a network selection problem then.
postponed No    
    S3‑161073 pCR to add a solution 'back-off timer' for key issue 5.2.3.7 TNO pCR Approval Yes
Yes
revised No S3‑161200  
    S3‑161200 pCR to add a solution 'back-off timer' for key issue 5.2.3.7 TNO pCR Approval Yes
Yes
approved No   S3‑161073
    S3‑161043 pCR to TR 33.899: Enhancing DH session key derivation VODAFONE Group Plc pCR Approval Yes
Yes
approved No    
    S3‑161076 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - candidate methods" Nokia pCR   Yes
Yes
approved No    
    S3‑161077 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - transport considerations" Nokia pCR   Yes
YesSamsung: RAN should be included for the transport of authentication. Huawei: AAA in home network or visited network? Nokia: this is still open. It was agreed to add an editor's note on this.
revised No S3‑161205  
    S3‑161205 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - transport considerations" Nokia pCR - Yes
Yes
approved No   S3‑161077
    S3‑161078 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - efficiency considerations" Nokia pCR   Yes
Yes
revised No S3‑161206  
    S3‑161206 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - efficiency considerations" Nokia pCR - Yes
Yes
approved No   S3‑161078
    S3‑161079 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - general information flow" Nokia pCR   Yes
YesOrange: third party auth server is not clear to exist in 5G according to the requirements. An editor's note was added to address this issue.
revised No S3‑161207  
    S3‑161207 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - general information flow" Nokia pCR - Yes
Yes
approved No   S3‑161079
    S3‑161080 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - alternatives" Nokia pCR   Yes
Yes
revised No S3‑161208  
    S3‑161208 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - alternatives" Nokia pCR - Yes
Yes
approved No   S3‑161080
    S3‑161082 pCR to TR 33.899 v0.3.0 "Authentication framework - solution A - initial evaluation" Nokia pCR   Yes
Yes
approved No    
    S3‑161081 EAP Encapsulation Protocol Samsung pCR Approval Yes
YesHuawei: CP-AU is not the right term. Samsung: it's the key. Discussed together with 1084.
revised No S3‑161210  
    S3‑161210 EAP Encapsulation Protocol Samsung pCR Approval Yes
Yes
approved No   S3‑161081
    S3‑161084 New solution to security area #2: EAP authentication framework Ericsson pCR   Yes
YesQualcomm: CP-AU in home network, similar to AAA server. Nokia: CP-AU, AAA terminology is ambiguous and their definitions are unclear according to SA2's work. A decision needs to be made in SA3 to clarify the terminology. Samsung;s 1081 and Ericsson's 1084 are using different terminology.It was concluded to add editor's notes on 1207,1210,1209 for this.
revised No S3‑161209  
    S3‑161209 New solution to security area #2: EAP authentication framework Ericsson pCR - Yes
Yes
approved No   S3‑161084
    S3‑161105 Solution for Key issue #2.4: Device identifier authentication Qualcomm Incorporated pCR Approval Yes
YesVodafone: every operator's AAA needs to have all certificate devices. It might be an issue for new parties coming to the market. Roaming is also an issue. An editor's note was added. BT: nuimber of subscriptions and number of devices are different. Scaling is an issue. Interdigital: what is the secure storage/secure part of the device? Qualcomm: it is defined in another contribution. Orange: the operator depends on the manufacturer CA or third party CA here, this is against the requirements.
revised No S3‑161211  
    S3‑161211 Solution for Key issue #2.4: Device identifier authentication Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161105
    S3‑161086 pCR to TR 33.899 v0.3.0 "Replacing solution 2.2 with reference to solution 3.1" Nokia pCR   Yes
Yes
revised No S3‑161267  
    S3‑161267 pCR to TR 33.899 v0.3.0 "Replacing solution 2.2 with reference to solution 3.1" Nokia pCR - Yes
Yes
approved No   S3‑161086
    S3‑160947 pCR to TR 33.899: Radio interface key exchange protocol VODAFONE Group Plc pCR Approval Yes
Yes
revised No S3‑161268  
    S3‑161268 pCR to TR 33.899: Radio interface key exchange protocol VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160947
    S3‑161087 pCR to TR 33.899 v0.3.0 "Evaluation of Solution #3.1: Including a key exchange..." Nokia pCR   Yes
Yes
revised No S3‑161269  
    S3‑161269 pCR to TR 33.899 v0.3.0 "Evaluation of Solution #3.1: Including a key exchange..." Nokia pCR - Yes
Yes
approved No   S3‑161087
    S3‑160948 pCR to TR 33.899: interception of radio interface keys sent between operator entities VODAFONE Group Plc pCR Approval Yes
YesEricsson: this is not really a requirement. It was agreed to re-word the requirements and the key-issue details.
revised No S3‑161270  
    S3‑161270 pCR to TR 33.899: interception of radio interface keys sent between operator entities VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160948
    S3‑160949 pCR to TR 33.899: UE action if network does not update session keys VODAFONE Group Plc pCR Approval Yes
Yes
revised No S3‑161271  
    S3‑161271 pCR to TR 33.899: UE action if network does not update session keys VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160949
    S3‑161100 pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys Qualcomm Incorporated pCR Approval Yes
Yes
revised No S3‑161273  
    S3‑161273 pCR on allowing non-radio interface keys to be refreshed in the existing key issue on Refreshing radio interface keys Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161100
    S3‑160979 NSA - 5.3.3.3 - addressing ENs on bidding down attack and requirements reformulation Nokia pCR   Yes
Yes
approved No    
    S3‑161113 pCR to 33.899 - Resolution of EN in 5.3.3.2.3 TNO pCR Approval Yes
YesQualcomm suggested removing e2e as editorial change. This was agreed.
revised No S3‑161272  
    S3‑161272 pCR to 33.899 - Resolution of EN in 5.3.3.2.3 TNO pCR Approval Yes
Yes
approved No   S3‑161113
    S3‑161007 Threats for Security Context Sharing Huawei, HiSilicon,Deutsche Telekom AG, China Mobile pCR   Yes
Yes
revised No S3‑161274  
    S3‑161274 Threats for Security Context Sharing Huawei, HiSilicon,Deutsche Telekom AG, China Mobile pCR - Yes
Yes
approved No   S3‑161007
    S3‑161106 Finalising Key issue #3.5: Unnecessary dependence of keys between security layers Qualcomm Incorporated pCR Approval Yes
YesNokia: requirement not clear. NTT-Docomo: the requirement is good but it needs re-wording. Orange: what does "unnecessary" mean?
revised No S3‑161275  
    S3‑161275 Finalising Key issue #3.5: Unnecessary dependence of keys between security layers Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161106
    S3‑161144 The storage of security context Huawei; HiSilicon; China Mobile pCR Approval Yes
YesMCC: the NOTE should be an editor's note. Ericsson: remove the "must" and add "shall".
revised No S3‑161276 S3‑161009
    S3‑161276 The storage of security context Huawei; HiSilicon; China Mobile pCR Approval Yes
Yes
approved No   S3‑161144
    S3‑161010 Security context for connectionless mode Huawei; HiSilicon pCR Approval Yes
YesEricsson: the key details are not clear. This can be any threat.An editor's note was added. MCC: remove the SMARTER term and add reference to 22.891 Connectionless becomes small data.
revised No S3‑161277  
    S3‑161277 Security context for connectionless mode Huawei; HiSilicon pCR Approval Yes
Yes
approved No   S3‑161010
    S3‑160998 Solution for NSA security context sharing LG Electronics France pCR Approval Yes
YesNokia: this only applies to trusted access, not untrusted access. Some other comments from Nokia were treated offline.
noted No    
    S3‑161005 Security Context and Key Management Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
YesNokia found the auth and security derivation flow not clear. The term seccurity context is used in different ways. Orange: What is supplicant? Huawei: this is defined in SA2. The Chairman suggested to refer to the solution in SA2 and change the text accordingly. Nokia: some access special module in the UE is requesting authentication. This is for further study,
revised No S3‑161278  
    S3‑161278 Security Context and Key Management Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑161005
    S3‑161011 pCR adding security assumptions in security area 5.4 THALES pCR Approval Yes
YesNokia suggested to remove the second paragraph. The first paragraph is a description of the architecture that should go to another part of the specification. This was finally noted.
noted No    
    S3‑161019 Discussion on the necessity to reinforce the radio air interface for the next generation system THALES discussion Discussion Yes
YesNokia: this is a notion that everything we have done from GSM is insecure. Thales: it’s not a standalone solution but a brick in the wall of a whole set of new solutions. We need to consider new kinds of solutions as well.
noted No   S3‑161014
    S3‑161017 pCR adding key issue in security area 5.4 THALES pCR Approval Yes
YesNokia: Disclosure of auth parameters belongs to the privacy issues addressed somewhere else. Nokia: Also,some part of this text is already adressed in one of the Vodafone's contributions, security areas 2 and 3. Thales: refer to the signalling data before the auth is established to make it more generic. Nokia: this is not a threat, physical layer signalling, not to be addressed in SA3. Thales: all the attacks are coming this way now, we need to address this in 5G.
noted No    
    S3‑161083 Key issue Security requirements on gNB Ericsson pCR Approval Yes
YesNokia: what virtual deployments of gNodeB? Ericsson: this was discussed in RAN. Nokia wanted an editor's note for more explanation on this core deployment,
revised No S3‑161279  
    S3‑161279 Key issue Security requirements on gNB Ericsson pCR Approval Yes
Yes
approved No   S3‑161083
    S3‑161085 Key issue Security aspects of dual connectivity Ericsson pCR Approval Yes
YesBT: in 33.401 we talk about dual connectivity already, Nokia: is this dual connectivity scenarios or interworking scenarios? Ericsson: this is dual connecitvity. Nokia: where to put this? It's a new security area. MCC: not possible to reference a tdoc (SA plenary doc in this case). BT: Restrict to the scenarios that the plenary/operators endorsed in that document. It was agreed to reword the text that referred to the tdoc and remove the referencce.
revised No S3‑161280  
    S3‑161280 Key issue Security aspects of dual connectivity Ericsson pCR Approval Yes
Yes
approved No   S3‑161085
    S3‑161104 pCR on New key issue on on-demand AS integrity protection in NextGen systems Qualcomm Incorporated pCR Approval Yes
YesOrange: User or control plane? Qualcomm: user plane traffic. Nokia: a similar problem happens in LTE, not only in 5G. I would like to add a note about this. Orange: the requirement is for the user plane, please specify that.
revised No S3‑161281  
    S3‑161281 pCR on New key issue on on-demand AS integrity protection in NextGen systems Qualcomm Incorporated pCR Approval Yes
Yes
approved No   S3‑161104
    S3‑160992 pCR to TR 33.899: Network public keys VODAFONE Group Plc pCR Approval Yes
YesEricsson suggested to add an editor's note. Orange: managing a global CA is a problem among the operators. Vodafone: this is an evaluation of the solution. Orange: it's for FFS if it's achievable.
revised No S3‑161282  
    S3‑161282 pCR to TR 33.899: Network public keys VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160992
    S3‑161089 Verification of authenticity of the cell Samsung R&D Institute UK pCR Approval Yes
Yes
revised No S3‑161257  
    S3‑161257 Verification of authenticity of the cell Samsung pCR Approval Yes
Yes
approved No   S3‑161089
    S3‑160974 3.1 Definitions - Device INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes
postponed No    
    S3‑161102 Adding requirements to the Key Issue # 5.1 and a new key issue on storage of device credentials Qualcomm Incorporated pCR Approval Yes
Yes
postponed No    
    S3‑160940 Key issue #5.1: Secure storage and processing of credentials and identities INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes
postponed No    
    S3‑161047 Additional Security Requirements on credential storage ORANGE pCR Approval Yes
Yes
revised No S3‑161160  
    S3‑161160 Additional Security Requirements on credential storage ORANGE, Telecom Italia, Gemalto, Deutsche Telekom, Oberthur, Giesecke&Devrient pCR Approval Yes
Yes
postponed No   S3‑161047
    S3‑161054 Potential requirements for credential storage Ericsson pCR   Yes
Yes
postponed No    
    S3‑160951 Key issue #6.y: Authorization decoupled from Authentication INTERDIGITAL COMMUNICATIONS pCR Approval Yes
YesEricsson: scenarios in SA2 that support this decoupling? An editor's note was added for this. Nokia: First sentence in key issue details is not true: we have user subscriber profiles.
postponed No    
    S3‑161090 pCR to TR 33.899 v0.3.0 "Network Authorization" Nokia pCR   Yes
Yes
approved No    
    S3‑160956 Split of key issue #7.1 on subscriber identifier privacy Ericsson, Nokia, Telecom Italia discussion Discussion Yes
Yes
noted No    
    S3‑160957 Update of key issue #7.2 on refreshing of temporary subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160958 New privacy key issue on concealing permanent or long-term subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
revised No S3‑161285  
    S3‑161285 New privacy key issue on concealing permanent or long-term subscriber identifier Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No   S3‑160958
    S3‑160959 New privacy key issue on concealing permanent or long-term device identifier Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160960 New privacy key issue on using effective temporary or short-term subscriber identifiers Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160961 New privacy key issue on transmitting permanent identifiers in secure interface Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160962 New privacy key issue on transmitting permanent subscriber identifiers only when needed Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160963 Deletion of key issue #7.1 on subscriber identifier privacy Ericsson, Nokia, Telecom Italia pCR Approval Yes
Yes
approved No    
    S3‑160976 New privacy key issue on temporary device identifier Nokia, Ericsson, Telecom Italia pCR   Yes
Yes
approved No    
    S3‑161071 New privacy key issue on protection of network slice identifier Nokia pCR   Yes
YesBT: we have removed the term MDD from other contributions. It was agreed to remove it. Ericsson: This is ongoing work in SA2. We should postpone it. Interdigital: privacy applies to humans. In NextGen we will have non human objects. A CCV camera doesn’t have any privacy. Huawei: the UE doesn’t have the notion of slice. Nokia: the threat is written from the attacker's point of view, not the UE.
revised No S3‑161287  
    S3‑161287 New privacy key issue on protection of network slice identifier Nokia pCR - Yes
Yes
approved No   S3‑161071
    S3‑160995 Enhancing the concealment of permanent or long-term subscriber identifier Ericsson,Telecom Italia pCR Approval Yes
Yes
revised No S3‑161288  
    S3‑161288 Enhancing the concealment of permanent or long-term subscriber identifier Ericsson,Telecom Italia pCR Approval Yes
YesAdding an editor's note as suggested by interdigital.
approved No   S3‑160995
    S3‑161103 pCR on a proposed solution for IMSI privacy Qualcomm Incorporated pCR Approval Yes
YesInterdigital: you can track the mobile by routing the labels. Same editor's note as the previous contribution. Orange: what happens when message 3 is lost? Qualcomm: an editor's note will be added to explain this.
revised No S3‑161289  
    S3‑161289 pCR on a proposed solution for IMSI privacy Qualcomm Incorporated pCR Approval No
Yes
approved No   S3‑161103
    S3‑160987 Network Slice: EN in 5.8 intro and assumptions Nokia pCR Approval Yes
YesDiscussed with 1126 since they overlap.
merged No S3‑161212  
    S3‑161212 Network Slice: EN in 5.8 intro and assumptions Nokia,Ericsson pCR Approval Yes
Yes
approved No   S3‑160987
    S3‑161129 Discussion on the trust model in Next Generation systems in relation to the network slicing security area Ericsson pCR Approval Yes
YesEricsson: we are not mandating any particular solutions, this is just informative.
revised No S3‑161214  
    S3‑161214 Discussion on the trust model in Next Generation systems in relation to the network slicing security area Ericsson pCR Approval Yes
Yes
approved No   S3‑161129
    S3‑161126 Resolution of the editor’s notes under the introductory text for security area #8 on network slicing Ericsson pCR Approval Yes
YesMerged with 987.
merged No S3‑161212  
    S3‑160950 Key Issue #8.1: Security isolation of network slices INTERDIGITAL COMMUNICATIONS pCR Approval Yes
YesVodafone: the breach can happen in the network, not only in the UE. Huawei didn’t see clear the data leakage issue. Vodafone: accessing two separate slices forces the UE to avoid the data going through to the different slices. Ericsson: how do you avoid that? BT agreed with this. LG: UE is not aware of network slices. It was agreed to add an editor's note, on the isolation of the UE from several network slices,if it's in scope. Vodafone: two interconnected UEs in different slices (e.g. wearable devices) would need to be addressed too.
merged No S3‑161213  
    S3‑160988 Network Slice: 5.8.3.1 key issue isolation of slices Nokia pCR Approval Yes
YesVodafone: we need a definition of tenant. Orange: multi tenants concept is a SA2 definition. It was agreed to have an editor's note on this and ask SA2 on the tenant,multi-tenant concepts. Ericsson: network slice type is not defined in SA2. The text in the key issue is one understanding, but it is not how it is going to work. It needs to be clarified how it is going to work in the end, there is no agreement in SA2 for this. Interdigital: also the issue of being an UE, NG UE or device what we are referring to here. Interdigital: add roaming scenarios in the potential requirements.
merged No S3‑161213  
    S3‑161114 pCR revise the details of key issue# 8.1 China Mobile Com. Corporation, China Unicom pCR Approval Yes
Yes
revised No S3‑161213  
    S3‑161213 pCR revise the details of key issue# 8.1 China Mobile Com. Corporation, China Unicom pCR Approval Yes
YesIt incorporates an editor's note of 1126.
approved No   S3‑161114
    S3‑161115 pCR : merge the requirements of key issue #8.1 China Mobile Com. Corporation, China Unicom, Huawei, Hisilicon pCR Approval Yes
YesVodafone: the 3GPP system includes more than a platform.
noted No    
    S3‑160989 Network Slice: EN in 5.8.3.2 Slice differentiation Nokia pCR Approval Yes
YesEricsson: the network selection procedure is still being discussed in SA2, still one interpretation. Vodafone: default network slice, controller node,..there are a lot of new definitions that need to be specified in the document. Adding this controller node means new threats and new requirements associated to this new definition. An editor's note was agreed for this, Ericsson: "it should be possible to define access security mechanisms" is not a real requirement, it's not how we define requirements in here. Orange and BT found the requirement vague. This had to be discussed offline.
revised No S3‑161215  
    S3‑161215 Network Slice: EN in 5.8.3.2 Slice differentiation Nokia pCR Approval Yes
Yes
approved No   S3‑160989
    S3‑161006 Detailed Requirements for Security Mechanism Differentiation for Network Slices Huawei, HiSilicon,Deutsche Telekom AG pCR Approval Yes
YesOrange disgagreed with the requirement. Only agreed with the sentence with "security policy…". Interdigital agreed with the requirement. This issue was related to the LS to SA1. Gemalto suggested an editor's note detailing that this requirement is dependent on the LS. This was agreed.
revised No S3‑161258  
    S3‑161258 Detailed Requirements for Security Mechanism Differentiation for Network Slices Huawei, HiSilicon,Deutsche Telekom AG pCR Approval Yes
Yes
approved No   S3‑161006
    S3‑161068 Key Issue #8.2 - Security mechanism differentiation for different network slices INTERDIGITAL COMMUNICATIONS pCR Approval Yes
YesNoted without presentation.
noted No    
    S3‑161008 The Authentication & Authorization Scenarios of UE Accessing into Network Slicing Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
YesEricsson: it should have been in key issue authentication. It was noted that this overlapped with several other contributions.
merged No S3‑161262  
    S3‑161262 The Authentication & Authorization Scenarios of UE Accessing into Network Slicing Huawei, HiSilicon, Deutsche Telekom AG,Nokia pCR Approval Yes
Yes
approved No   S3‑161008
    S3‑161020 FS_NSA - Update to Key Issue #8.3 – Security on UE’s access to slices Nokia pCR Approval Yes
YesEricsson: not generic enough, this is still under work in SA2. Huawei proposed to agree on the key issue details and add an editor's note to go on. This was agreed. Huawei considered that figures in 1008 were a better representation than the text in 1020. LS supported this.
merged No S3‑161262  
    S3‑161128 Clarification and resolution of the editor’s notes in key issue of UE service authorization under the security area for network slicing Ericsson LM pCR Approval Yes
Yes
revised No S3‑161261  
    S3‑161261 Clarification and resolution of the editor’s notes in key issue of UE service authorization under the security area for network slicing Ericsson LM pCR Approval No
Yes
approved No   S3‑161128
    S3‑160990 Network slice: EN in 5.8.3.7 interslice communication Nokia pCR Approval Yes
YesEricsson: there is no refrence point defined between slices. Orange agreed. It was agreed to create a document for all those definitions that need to be discussed (1263). Huawei and Orange: what is sensitivity level? It should be defined somewhere else. An editor's note was added.
revised No S3‑161264  
    S3‑161264 Network slice: EN in 5.8.3.7 interslice communication Nokia pCR Approval Yes
Yes
approved No   S3‑160990
    S3‑161140 Key hierarchy schems for network slicing ZTE Corporation pCR Approval Yes
YesIt was commented that this is related to SA2's issues that are still under discussion and not developed enough.
noted No   S3‑160965
    S3‑160953 pCR to TR 33.899: Proposal of solution for key issue of network slicing security NEC pCR Approval Yes
YesOrange: Roaming case and privacy aspects to be considered. Nokia: slice security server? How do you define this? How different is from the HSS? Interdigital: SSS has policies per slice. Orange: what are the interfaces to the HSS? We need to figure out these details. Huawei agreed.
revised No S3‑161265  
    S3‑161265 pCR to TR 33.899: Proposal of solution for key issue of network slicing security NEC pCR Approval Yes
Yes
approved No   S3‑160953
    S3‑160997 Solution for Network Slicing Security LG Electronics France pCR Approval Yes
Yes
revised No S3‑161266  
    S3‑161266 Solution for Network Slicing Security LG Electronics France pCR Approval Yes
Yes
approved No   S3‑160997
    S3‑161091 Interconnection Security Key Issue Nokia pCR   Yes
Yes
postponed No    
    S3‑161093 Interconnection Security - Circles of Trust Nokia pCR   Yes
Yes
postponed No    
    S3‑161107 pCR to TR 33.899 v0.3.0 "Security visibility and configurability" Nokia pCR   Yes
Yes
postponed No    
    S3‑160999 Update of NSA security area #11 Security visibility and configurability LG Electronics France pCR Approval Yes
Yes
postponed No    
    S3‑160941 Key Issue #11.3: User control of security INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes
postponed No    
    S3‑160944 Key Issue #11.4: On demand security framework INTERDIGITAL COMMUNICATIONS pCR Approval Yes
Yes
postponed No    
    S3‑161000 Secure Mechanism to Achieve Remote Credential Provisioning for IoT devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
postponed No    
    S3‑161004 Remote Provisioning for IoT devices through a Companion UE Huawei, Hisilicon, China Mobile, Deutsche Telekom AG, KPN pCR Approval Yes
Yes
postponed No    
    S3‑160965 Key hierarchy schems for network slicing ZTE Corporation pCR Approval Yes
Yes
revised No S3‑161140  
    S3‑161009 The storage of security context Huawei; HiSilicon pCR Approval Yes
Yes
revised No S3‑161144  
    S3‑161014 Discussion on the necessity to reinforce the radio air interface for the next generation system THALES discussion Discussion Yes
Yes
revised No S3‑161019  
    S3‑161034 LS on "Next Generation" Security Requirements S2-164263 LS in   Yes
Yes
revised No S3‑161131  
    S3‑161150 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR   Yes
Yes
revised No S3‑161190 S3‑161117
    S3‑161190 pCR adding the definition of security anchor in the section 3.1 China Mobile Com. Corporation, Huawei, Hisilicon pCR - Yes
Yes
approved No   S3‑161150
    S3‑161183 Definitions for FS_NSA Nokia pCR Approval Yes
Yes
approved No    
    S3‑161187 Clause 4.1 details Ericsson pCR Approval Yes
Yes
approved No    
    S3‑161263 Editor's notes on definitions Nokia pCR Approval Yes
Yes
approved No    
    S3‑161290 New draft R 33.899 Ericsson draft TR Approval No
Yes
left for email approval No    
8.7 Study on Mission Critical Security Enhancements (FS_MC_Sec) S3‑161059 Update to study item for Study on Mission Critical Security Enhancements CESG SID revised Agreement Yes
Yes
agreed No   S3‑160727
    S3‑161066 MC_SEC 33.880 Study Template CESG draft TR Approval Yes
Yes
approved No    
    S3‑161058 Scope for Mission Critical security study CESG pCR Approval Yes
Yes
approved No    
    S3‑161057 Discussion on adding Rel-13 key issues to 33.880 CESG discussion Discussion Yes
Yes
noted No    
    S3‑161056 Adding Rel-13 Key Issues to 33.880 CESG pCR Agreement Yes
Yes
revised No S3‑161170  
    S3‑161170 Adding Rel-13 Key Issues to 33.880 CESG pCR Approval Yes
Yes
approved No   S3‑161056
    S3‑160969 Key Issue for inter-domain identity management operation Motorola Solutions Danmark A/S pCR Approval Yes
Yes
revised No S3‑161218  
    S3‑161218 Key Issue for inter-domain identity management operation Motorola Solutions Danmark A/S pCR Approval Yes
YesAirbus: add a requirement on revocation access token from old network to the visited network. Motorola: I agree with we can solve it with the existing mechanisms. It was agreed to add an editor's note.
approved No   S3‑160969
    S3‑160970 Identity management for inter-domain operation Motorola Solutions Danmark A/S pCR Approval Yes
Yes
revised No S3‑161219  
    S3‑161219 Identity management for inter-domain operation Motorola Solutions Danmark A/S pCR Approval Yes
Yes
approved No   S3‑160970
    S3‑161060 Mission Critical security study document template CESG draft TR Approval Yes
No
withdrawn Yes    
    S3‑161249 new draft TR 33.880 CESG draft TR Approval Yes
Yes
approved No    
8.8.1 Study on Subscriber Privacy Impact in 3GPP (SPI)                      
8.8.2 Security Assurance Specification for 3GPP network product classes (33.926) (SCAS)                      
8.8.3 Study on Battery Efficient Security for very low Throughput Machine Type Communication Devices S3‑160920 pCR to 33.863 - addition of recomendation section VODAFONE Group Plc pCR Approval Yes
Yes
revised No S3‑161255  
    S3‑161255 pCR to 33.863 - addition of recomendation section VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160920
    S3‑160922 pCR to 33.863 - Editorial updates VODAFONE Group Plc pCR Approval Yes
Yes
approved No    
    S3‑160930 Removing Editor’s Note in 6.1.2.2 TNO pCR Approval Yes
Yes
revised No S3‑161250  
    S3‑161250 Removing Editor’s Note in 6.1.2.2 TNO pCR Approval Yes
Yes
approved No   S3‑160930
    S3‑160931 Removing Editor’s Note in 6.1.2.3 of TR 33.863 TNO pCR Approval Yes
Yes
approved No    
    S3‑160932 Removing Editor’s Note in 6.1.2.6 TNO pCR Approval Yes
Yes
approved No    
    S3‑160933 Removing Editor’s Note in 6.2.2.2 TNO pCR Approval Yes
Yes
approved No    
    S3‑161013 Removing Editor’s Note in 6.4.2.3 TNO pCR Approval Yes
No
withdrawn Yes    
    S3‑161015 Moved EnSE functionality to Enterprise Server TNO pCR Approval Yes
YesOrange: there is no definition for enterprise server.
noted No    
    S3‑161048 Introduction to Diet-ESP Ericsson discussion Endorsement Yes
YesUS Home Office: strongly recommended not to use this protocol. This is not an official IETF document, and it was rejected due to being insecure. The Chairman clarified that SA3 is endorsing the request part, the rest is for information. Nothing will be added to the TR.
endorsed No    
    S3‑161063 pCR to TR 33.863, v1.1.1: Solution #10 (extends sol. 2): "AKA-based session key generation for application protocols" Nokia pCR   Yes
YesVodafone: update the solution evaluation to say which issues are solved. Edit the conclusions clause. BT: don't duplicate work in the groups, this is ongoing work in OneM2M. Colaboration with them could be useful. Vodafone: this is battery efficiency, very specific. BT: We need to coordinate with those who define the applications (OneM2M). Juniper: this is an end-to-end complete solution.
revised No S3‑161252  
    S3‑161252 pCR to TR 33.863, v1.1.1: Solution #10 (extends sol. 2): "AKA-based session key generation for application protocols" Nokia pCR - Yes
Yes
approved No   S3‑161063
    S3‑161032 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval Yes
Yes
revised No S3‑161141  
    S3‑161033 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
Yes
revised No S3‑161142  
    S3‑161141 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval Yes
YesVodafone: update the conclusions clause. Orange: this solution will not work with 2G. A note was added. Nokia: GUTI doesn’t have one to one correspondence with Kasme. Gemalto: Why is this better than GBA? Orange: it is being considered by GSMA IoT group. Ericsson: more efficient because of the use of HTTP. Ericsson agreed.
revised No S3‑161253 S3‑161032
    S3‑161253 A Method for IoT Service Layer Security Bootstrapping Huawei, Hisilicon pCR Approval No
Yes
approved No   S3‑161141
    S3‑161142 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval Yes
YesVodafone: it needs to be clear why it is battery efficient.
revised No S3‑161254 S3‑161033
    S3‑161254 Service Layer Security Bootstrapping Mechanism for IoT Devices Huawei, HiSilicon, Deutsche Telekom AG pCR Approval No
Yes
approved No   S3‑161142
    S3‑160923 pCR to 33.863 - Addition of annex detailing suggested normaitive changes VODAFONE Group Plc pCR Approval Yes
YesNokia wanted to evaluate the solutions from this meeting. Orange: there is no contribution from Nokia to challenge solution 8 and 9. Juniper: no time to re-evaluate all the solutions that we have right now. Nokia: the definition of the protocol itself should not be mandated here. We would agree to have the option of having other new solutions. Vodafone: Nokia's concerns are normative work concerns. This is a TR. The detail will go into normative work. Nokia: let’s put solutions in the TR and with contributions we decide which ones will go to the TS. Orange: the TR will give recommendations. Solution 8 and 9 are the way forward. We cannot have a conclusion saying that we can have any solution. Nokia: we need additional work to be done in the TS to make it modular. Vodafone commented that Nokia's rejection to this normative work is clearly delaying the work on purpose.
revised No S3‑161284  
    S3‑161284 pCR to 33.863 - Addition of annex detailing suggested normaitive changes VODAFONE Group Plc pCR Approval Yes
Yes
approved No   S3‑160923
    S3‑160921 WID for normaitive work of BEST VODAFONE Group Plc WID new Agreement Yes
YesHuawei rejected having point a. Vodafone would not agree on a WID without point a. The general agreement was to keep a).
revised No S3‑161256  
    S3‑161256 WID for normaitive work of BEST VODAFONE Group Plc WID new Agreement Yes
Yes
agreed No   S3‑160921
    S3‑161251 new draft TR 33.863 Vodafone draft TR discussion No
Yes
approved No    
    S3‑161286 Cover sheet 33.863 Vodafone TS or TR cover Approval Yes
Yes
left for email approval No    
8.8.4 Other study items                      
9 Review and Update of Work Plan S3‑160902 SA3 Work Plan MCC Work Plan   Yes
Yes
noted No    
    S3‑160905 Work Plan input from Rapporteurs MCC other   Yes
Yes
revised No S3‑161283  
    S3‑161283 Work Plan input from Rapporteurs MCC other - Yes
Yes
noted No   S3‑160905
10 Future Meeting Dates and Venues S3‑160904 SA3 meeting calendar MCC other   Yes
Yes
revised No S3‑161291  
    S3‑161291 SA3 meeting calendar MCC other - Yes
No
available No   S3‑160904
11 Any Other Business