MeetingReport__SA3#72

advertisement
Third Generation Partnership Project (3GPP™)
Meeting Report
for
TSG SA WG3
meeting: 72
QingDao, China, 08/07/2013 to 12/07/2013
TABLE OF CONTENTS
1
2
3
4
4.1
4.2
4.3
5
Opening of the Meeting ..................................................................................................................................... 3
Approval of Agenda and Meeting Objectives .................................................................................................... 3
IPR Reminder .................................................................................................................................................... 3
Meeting Reports................................................................................................................................................. 3
Approval of the Report from SA3 #71 ......................................................................................................... 3
Report from SA #60 ..................................................................................................................................... 3
Report from SA3-LI ..................................................................................................................................... 4
Items for early consideration ............................................................................................................................. 4
6
Reports and Liaisons from other Groups ........................................................................................................... 4
6.1
3GPP Working Groups................................................................................................................................. 4
6.2
IETF ............................................................................................................................................................. 4
6.3
ETSI SAGE .................................................................................................................................................. 4
6.4
GSMA .......................................................................................................................................................... 5
6.5
3GPP2 .......................................................................................................................................................... 5
6.6
OMA ............................................................................................................................................................ 5
6.7
TCG.............................................................................................................................................................. 5
6.8
oneM2M ....................................................................................................................................................... 6
6.9
Other Groups ................................................................................................................................................ 6
7
Work Areas ........................................................................................................................................................ 6
7.1
IP Multimedia Subsystem (IMS) Security ................................................................................................... 6
7.1.1
Media Plane Security .............................................................................................................................. 6
7.1.1.1
Study on Extended IMS media plane security features ..................................................................... 6
7.1.1.2
Extended IMS media plane security features .................................................................................... 6
7.1.2
Other Common IMS Issues .................................................................................................................... 8
7.2
Network Domain Security .......................................................................................................................... 10
7.3
UTRAN Network Access Security............................................................................................................. 10
7.4
GERAN Network Access Security............................................................................................................. 10
7.5
GAA ........................................................................................................................................................... 11
7.5.1
Security enhancements for usage of GBA from the browser ............................................................... 11
7.5.2
GBA extensions for re-use of SIP Digest credentials ........................................................................... 11
7.5.3
Other GAA Issues................................................................................................................................ 11
7.6
Multimedia Broadcast/Multicast Service (MBMS) .................................................................................... 11
7.7
SAE/LTE Security ..................................................................................................................................... 11
7.7.1
TS 33.401 Issues ................................................................................................................................... 11
7.7.2
TS 33.402 Issues ................................................................................................................................... 12
7.7.3
Relay Node Security ............................................................................................................................. 13
7.7.4
EEA3 and EIA3 Issues ......................................................................................................................... 13
7.7.5
Other SAE/LTE Security Issues ........................................................................................................... 13
7.8
Security Aspects of Home (e)NodeB ......................................................................................................... 13
7.8.1
TS 33.320 Issues ................................................................................................................................... 14
7.8.2
TR 33.820 Issues .................................................................................................................................. 14
7.9
Security Aspects related to Machine-Type Communication ...................................................................... 14
7.10
Security Aspects of Public Warning System .............................................................................................. 28
7.11
Firewall Traversal ...................................................................................................................................... 38
7.11.1
Study on Firewall Traversal ................................................................................................................. 38
7.11.2
Tunnelling of UE Services over Restrictive Access Networks ............................................................. 38
7.12
Security Aspects of WLAN Network Selection for 3GPP Terminals ........................................................ 41
7.13
Security Aspects of Proximity-based Services ........................................................................................... 46
7.14
Other areas ................................................................................................................................................. 50
8
Studies ............................................................................................................................................................. 51
8.1
Study on Security aspects of Integration of Single Sign-On (SSO) frameworks with 3GPP networks ..... 51
8.2
Security Study on Spoofed Call Detection and Prevention ........................................................................ 53
8.3
Study Item on Security Assurance Methodology for 3GPP Network Elements ........................................ 53
8.4
Other Study Areas ...................................................................................................................................... 64
9
Review and Update of Work Plan ................................................................................................................... 65
10
Future Meeting Dates and Venues ................................................................................................................... 65
11
Any Other Business ......................................................................................................................................... 65
12
Close ................................................................................................................................................................ 66
Annex A: List of contribution documents ........................................................................................................................ 67
Annex B: List of change requests ..................................................................................................................................... 78
Annex C: Lists of liaisons ................................................................................................................................................. 80
C1: Incoming liaison statements ....................................................................................................................................... 80
C2: Outgoing liaison statements ....................................................................................................................................... 81
Annex D: List of agreed/approved new and revised Work Items ..................................................................................... 82
Annex E: List of action items ........................................................................................................................................... 83
Annex F: List of participants ............................................................................................................................................ 84
Annex H: List of future meetings ..................................................................................................................................... 86
1
Opening of the Meeting
Lydia on behalf of the host (Huawei) gave a warm welcome to the SA3 delegates.
2
Approval of Agenda and Meeting Objectives
S3-130600
Agenda
Source: WG Chairman
Abstract:
Decision:
3
The document was approved.
IPR Reminder
The attention of the delegates to the meeting of this Technical Specification Group was drawn to the fact that 3GPP
Individual Members have the obligation under the IPR Policies of their respective Organizational Partners to inform
their respective Organizational Partners of Essential IPRs they become aware of.
The delegates were asked to take note that they were thereby invited:
to investigate whether their organization or any other organization owns IPRs which were, or were likely to become
Essential in respect of the work of 3GPP.
to notify their respective Organizational Partners of all potential IPRs, e.g., for ETSI, by means of the IPR Information
Statement and the Licensing declaration forms (http://www.etsi.org/WebSite/document/Legal/IPRforms.doc)
4
Meeting Reports
4.1
Approval of the Report from SA3 #71
S3-130603
Report from last SA3 meeting
Source: ETSI Secretariat
Abstract:
Discussion:
The action point of last meeting was closed as Ericsson has prepared the requested pseudoCR
Decision:
4.2
The document was approved.
Report from SA #60
S3-130601
Abstract:
Discussion:
Report from last SA meeting
Source: WG Chairman
The SA3 Chairman commented that the current delay in SA2's work for Rel-12 will affect the progress of the work in
SA3 for items such as ProSe. Some of the work will be finished in May 2012.
A warning about references to external documents (non 3GPP) shall be avoided in SA3. This is a recommendation from
SA.
The Chairman asked the Rapporteurs to check the external references in their specs and make CRs where possible in
order to remove those which are unnecessary.
NTT-DoCoMo wanted to clarify how to avoid external references, the Chairman admitted that is is to be decided case
by case.
ACTION:
Decision:
4.3
All Rapporteurs should check their specifications to make sure that there are no external
references (to non 3GPP documents) as recommended by SA.
(action on: Chairman / due by: 2013-09-26)
The document was noted.
Report from SA3-LI
Greg (Sprint) gave a brief report on LI.
SA3-LI#50 – Sophia Antipolis/ETSI
Topics discussed included;
Reference versions as per SA plenary action, addressed;
IMEI availability in IMS, R10+ solution based on GRUU registration information;
ProSe, Identity and Location management aspects;
Stage 2 GBA LI;
Location Services, LI Security.
CRs and new WID out for SA3 email approval by 11/07/13.
Next meeting confirmed for Burlington,VT in October.
5
Items for early consideration
6
Reports and Liaisons from other Groups
6.1
3GPP Working Groups
6.2
IETF
Martin (AT&T) gave a brief update on the work on the spoofing area. IETF will meet in Berlin shortly. It is likely that a
working group will be created
6.3
ETSI SAGE
Aguibou (Vodafone) gave a brief summary on the work from ETSI SAGE:
SAGE has one substantial piece of work on at the moment, which is defining a second 3G authentication and key
generation algorithm. This is being done particular with a view to embedded UICCs, so that both Milenage and this
new algorithm can be pre-installed on eUICCs and available for SIM applications to use.
SAGE has made good progress in developing the algorithm, which will be based on the Keccak hash function that is
also at the heart of the upcoming SHA-3 standard. SAGE has been in touch with the Keccak design team, particularly
to learn about the details of the message padding that is likely to be used in SHA-3, so that we can align the new SAGE
algorithm with the NIST standards as far as possible.
SAGE still expect to deliver this algorithm specification, including the usual example C code and test vectors, before
the GSMA eUICC Fast Track project delivers its stage 3 specifications.
One question on which SA3's advice would be welcome is how to turn the new SAGE algorithm specification into
public standards that operators and vendors are happy to use. Milenage is published as a 3GPP standard (TS 35.206),
but other crypto algorithms have been published by GSMA. What route should we take this time? Who does SAGE
need to liaise with in order to publish as 3GPP documents?
6.4
GSMA
Loic (Orange) gave a brief comment on GSMA-SG:
During their latest meeting in Lyon, there was discussion on the GSMA participation in the SECAM work. It was
decided that the Network Equipment Security Assurance Group (NESAG) will be established and mobilized the when
the need arises. The only news at this stage is that this group will be established and that there was sufficient member
support to commit GSMA SG to participate and support the initiative.
6.5
3GPP2
Anand (Qualcomm) gave a brief update on the work of 3GPP2:
Similar to 3GPP, 3GPP2 also has an M2M requirement for binding of cdma2000 access subscription to specific M2M
device or a group of MTC devices and the 3GPP2 security group (TSG-SX WG4) has been evaluating various solution
approaches. At the 3GPP2 meeting in June 2013, a network based enforcement solution for cdma2000 1xRTT system
based on MEID authentication was baselined and will be published as S.S0152 (Security Framework for Binding of
Access Subscription with Devices). The necessary stage 3 enhancements for 1x air interface and network enhancements
has started.
6.6
OMA
6.7
TCG
Tdoc S3-130708 gives an update on TCG work:
1: Trusted Mobility Solution (TMS)
TNC WG is studying use cases for BYOD. The Use Case Document and BYOD Framework document are available
at the TCG TMS home page (available for TCG members only):
https://members.trustedcomputinggroup.org/apps/org/workgroup/tms_wg/
2: Mobile Platform Working Group (MPWG)
2.1 TPM 2.0 specification:
The Mobile Platform Work Group (MPWG) has created a two part specification for implementing a TPM 2.0 on a
mobile platform. The first specification describes the architecture of a device implementing TPM Mobile 2.0 and the
second part of the specification defines features of the Mobile TPM 2.0 implementation (algorithms, commands,
capabilities, etc.).
2.2 TPM Mobile security evaluation and certification
MPWG is continuing to work on TPM Mobile security evaluation and certification. Layered certification model for
TPM is being considered.
The preliminary document, TPM Mobile 2.0 Certification Strategy, is available from the MPWG portal.
TCG PC Client WG used Common Criteria methodology to develop PC Clint Protection Profile. TCG PC Client
Compliance test suite is being use as the base for use with TPM Mobile certification.
Documents are available from the MPWG portal (members only):
https://members.trustedcomputinggroup.org/apps/org/workgroup/mobilewg/documents.php
3: TCG face-to-face meeting highlights
TMS WG did not meet at the Dublin face-to-face meeting.
Global Certification Forum overview presented in Dublin at MPWG f2f meeting by Bjarke Nielsen (Qualcomm).
TPM Mobile tutorial was presented by John Mersh from ARM.
Next TCG face-to-face meeting will be in October in Osaka.
S3-130708
TCG progress report in the areas of TMS and MPWG
n/a v..
Source: Interdigital
Abstract:
This contribution provides a brief summary of the progress in TCG Trusted Mobility Solutions (TMC) and Mobile
Platform (MPWG) working groups.
Decision:
The document was noted.
6.8
oneM2M
6.9
Other Groups
7
Work Areas
7.1
IP Multimedia Subsystem (IMS) Security
7.1.1
Media Plane Security
7.1.1.1
Study on Extended IMS media plane security features
7.1.1.2
Extended IMS media plane security features
S3-130698
Abstract:
KMS based solution for immediate messaging
33.328 CR-0054 (Rel-12) v12.3.0
Source: Ericsson, ST-Ericsson
Support for immediate messaging with the KMS based solution for media plane security is agreed in the conclusions
and recommendations in TR 33.829.
Discussion:
NSN commented that these things are usually handled by CT1.
Decision:
The document was revised to S3-130832.
S3-130832
KMS based solution for immediate messaging
33.328 CR-0054 rev 1 (Rel-12) v12.3.0
Source: Ericsson, ST-Ericsson
(Replaces S3-130698)
Discussion:
It indicates what CT1 spec is affected.
Decision:
The document was agreed.
S3-130700
Secure UDPTL based T.38 fax
33.328 CR-0055 (Rel-12) v12.3.0
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was revised to S3-130833.
S3-130833
Secure UDPTL based T.38 fax
33.328 CR-0055 rev 1 (Rel-12) v12.3.0
Source: Ericsson, ST-Ericsson
(Replaces S3-130700)
Decision:
The document was agreed.
S3-130752
Secure fax progress in IETF
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
IETF active companies are encouraged to support this
Decision:
The document was noted.
7.1.2
Other Common IMS Issues
S3-130605
LS on NAT and GIBA
Source: C1-131743
Abstract:
Decision:
The document was replied to in S3-130617.
S3-130617
LS reply on NAT and GIBA
Source: S2-132323
Abstract:
Decision:
The document was noted.
S3-130835
LS reply on NAT and GIBA
Source: Ericsson, ST-Ericsson
(Replaces S3-130754)
Decision:
The document was approved.
S3-130699
Clarification regarding NAT and GIBA
33.203 CR-0200 (Rel-12) v12.1.0
Source: Ericsson, ST-Ericsson
Abstract:
CT1 has misunderstood the text
Discussion:
Anand (Qualcomm) commented it is not clear what to do when the source IP address and the IP address in the contact
header of the SIP message. This was triggered by a CR presented by Qualcomm in CT1 on changing the contact header.
What happens when there is a NAT? this is not being clarified.
NSN wanted to know more about the context of this discussion in CT1.
Decision:
The document was agreed.
S3-130834
Clarification regarding NAT and GIBA
33.203 CR-0200 rev 1 (Rel-12) v12.1.0
Source: Ericsson, ST-Ericsson
Decision:
The document was withdrawn.
S3-130754
(Draft) LS reply on NAT and GIBA
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was revised to S3-130835.
S3-130607
Reply LS on Enhancing IMEI based Lawful Interception in IMS
Source: C1-131767
Abstract:
Decision:
The document was noted.
S3-130615
Reply LS on enhancing IMEI based Lawful Interception in IMS
Source: S2-131521
Abstract:
Discussion:
Greg (SA3-LI) commented that there are no privacy issues to be addressed in the case of sending the IMEI across
networks.
Colin (BT) wondered to which network the IMEI belongs.
Greg (Sprint) commented hat it is up to SA3-LI to make this question to SA2.
Decision:
The document was replied to in S3-130836.
S3-130836
Reply to: Reply LS on enhancing IMEI based Lawful Interception in IMS
Source: Sprint
Decision:
The document was approved.
S3-130619
Reply LS on IMEI based Lawful Interceptions in IMS
Source: SA3-LI
Abstract:
Decision:
The document was noted.
S3-130779
Revised WID for Web Real Time Communication (WebRTC) Access to IMS
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Qualcomm preferred to have the objectives at a higher level, not at the level of "using SIP digest credentials". It is a bit
premature since we should consider all existing authentication aspects.
Decision:
The document was revised to S3-130837.
S3-130837
Revised WID for Web Real Time Communication (WebRTC) Access to IMS
Source: Ericsson, ST-Ericsson
(Replaces S3-130779)
Decision:
7.2
The document was approved.
Network Domain Security
S3-130726
Multiple operator certificates enrolment
Source: Huawei, HiSilicon, TeliaSonera
Abstract:
Decision:
The document was withdrawn.
S3-130824
Update of S3-130726 Multiple operator certificates enrolment
Source: Huawei, Hisilicon, TeliaSonera, Vodafone
Abstract:
Discussion:
BT commented that the NEM (Network Element Manager) is not subject to Network Sharing.
NSN agreed with BT and commented that there is only one NEM, and that may be a problem.
Greg commented that network sharing management is being handled in SA5 and also in SA1; comments on NEM here
are being a bit premature since this scenario hasn't been worked on yet.
Huawei commented that there are some findings on this issue in SA5.
Magnus (TeliaSonera) commented that this is the kind of input we need to provide to other groups.
The Chairman commented that we need to check what the current status in SA1 is. A Work Item might be needed here
to be proposed in future meetings (although NSN believes that there is no need to work on this).The quantity of this
work needs to be measured and maybe a WI could be proposed.
There was no consensus on the models proposed by Huawei.
Decision:
The document was noted.
7.3
UTRAN Network Access Security
7.4
GERAN Network Access Security
S3-130606
LS on MS's reaction to network's choice of an unsupported ciphering algorithm
Source: C1-131749
Abstract:
Decision:
The document was noted.
S3-130608
Reply LS to the LS on Optimization of the IMS Information and Security Parameters for CS to
PS SRVCC from GERAN to E-UTRAN/HSPA
Source: C1-132535
Abstract:
Decision:
7.5
The document was noted.
GAA
7.5.1
Security enhancements for usage of GBA from the browser
7.5.2
GBA extensions for re-use of SIP Digest credentials
7.5.3
Other GAA Issues
7.6
Multimedia Broadcast/Multicast Service (MBMS)
7.7
SAE/LTE Security
7.7.1
TS 33.401 Issues
S3-130611
Reply LS on Follow-up LS on KeNB re-keying
Source: R2-131538
Abstract:
Decision:
The document was noted.
S3-130769
Discussion on KeNB re-keying
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
Decision:
The document was noted.
S3-130771
Revision of clause on KeNB re-keying
33.401 CR-0522 (Rel-12) v12.8.0
Source: Qualcomm, Nokia Corporation, Nokia Siemens Networks, Alcatel-Lucent, AT&T, Orange
Abstract:
Discussion:
Huawei: would this be mandatory or optional?
ZTE:It is up to MME to decide, it is not clear in the CR.
Ericsson: It should be clarified: KeNB re-keying from the same KASME optional for implementation or for use? NSN
replied that optional for the implementation.
Decision:
The document was revised to S3-130838.
S3-130838
Revision of clause on KeNB re-keying
33.401 CR-0522 rev 1 (Rel-12) v12.8.0
Source: Qualcomm, Nokia Corporation, Nokia Siemens Networks, Alcatel-Lucent, AT&T, Orange
(Replaces S3-130771)
Decision:
The document was agreed.
7.7.2
TS 33.402 Issues
S3-130671
Correction of the editorial errors and the incorrect description
33.402 CR-0114 (Rel-11) v11.4.0
Source: Huawei, HiSilicon
Abstract:
Discussion:
Qualcomm didn't agree with removing the reference to 9.3.1.2 in section 6.1.
It was agreed to change it to Rel-12 since this is not an essential correction for a frozen Release (11).
Decision:
The document was revised to S3-130839.
S3-130839
Correction of the editorial errors and the incorrect description
33.402 CR-0114 rev 1 (Rel-12) v12.0.0
Source: Huawei, HiSilicon
(Replaces S3-130671)
Decision:
The document was agreed.
7.7.3
Relay Node Security
7.7.4
EEA3 and EIA3 Issues
7.7.5
Other SAE/LTE Security Issues
7.8
Security Aspects of Home (e)NodeB
S3-130628
Response LS on H(e)NB Access Control Verification
TS 33.320 v..
Source: 3GPP SA WG3
Abstract:
Proposed Response LS to the 3GPP RAN3 on H(e)NB Access Control Verification.
Decision:
The document was revised to S3-130841.
S3-130841
Response LS on H(e)NB Access Control Verification
TS 33.320 v..
Source: 3GPP SA WG3
(Replaces S3-130628)
Decision:
The document was agreed.
S3-130629
Access mode verification for H(e)NBs
33.320 CR-0094 rev 2 (Rel-12) v11.6.0
Source: NSN, Ericsson, ST Ericsson, Alcatel-Lucent
Abstract:
Following an exchange of LSs with RAN3, SA3 concluded that verification of the access mode is only required if the
network determined during S1 set-up that the H(e)NB operates in closed access mode. Corresponding text added in
sec.4.4.9.
Decision:
The document was revised to S3-130840.
S3-130840
Access mode verification for H(e)NBs
33.320 CR-0094 rev 3 (Rel-12) v11.6.0
Source: NSN, Ericsson, ST Ericsson, Alcatel-Lucent
(Replaces S3-130629)
Decision:
The document was agreed.
7.8.1
TS 33.320 Issues
7.8.2
TR 33.820 Issues
7.9
Security Aspects related to Machine-Type Communication
S3-130610
LS on interaction of oneM2M with Underlying Networks
Source: oneM2M Technical Plenary
Abstract:
Decision:
The document was replied to in S3-130842.
S3-130842
Reply to: LS on interaction of oneM2M with Underlying Networks
Source: China Mobile
Decision:
The document was approved.
S3-130800
Reply LS on interaction of oneM2M with Underlying Networks
Source: S2-132326
Abstract:
Decision:
The document was noted.
S3-130612
Reply LS on evaluation of MTCe solutions
Source: R2-132189
Abstract:
Decision:
The document was noted.
S3-130618
LS on requesting input on security aspects for MTCe solutions
Source: S2-132327
Abstract:
Decision:
The document was replied to in S3-130843.
S3-130843
Reply to: LS on requesting input on security aspects for MTCe solutions
Source: Intel
Decision:
The document was revised to S3-130889.
S3-130889
Reply to: LS on requesting input on security aspects for MTCe solutions
Source: Intel
(Replaces S3-130843)
Decision:
The document was approved.
S3-130732
MME overload threat analysis
33.868 v..
Source: Intel
Abstract:
NAS overload threat through NAS based solutions for MTC small data transmission and the corresponding editor's note
is deleted.
Discussion:
Intel commented that this is a solution for small data, not all the user data.
NTT-DocoMo commented that we need to have the NAS packets cheaper than the SMS. Extra load in the MME has a
price issue.
NSN commented that this is different from making revenue.
ALU had some objections on the changes proposed by Intel.
NTT-DoCoMo proposed to keep the original text and add this new text as well by removing the word "conventional".
NEC supported this.
Intel didn't agree with this, Achim proposed to reword the deleted sentences NSN proposed some additional wording.
Decision:
The document was revised to S3-130844.
S3-130844
MME overload threat analysis
33.868 v..
Source: Intel
(Replaces S3-130732)
Decision:
The document was approved.
S3-130758
Clarification of small data fast path threats and requirements
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Some objections from NSN since the attack details are not clear enough. An update was created to address these
discussions.
Decision:
The document was revised to S3-130846.
S3-130846
Clarification of small data fast path threats and requirements
Source: Ericsson, ST-Ericsson
(Replaces S3-130758)
Decision:
The document was approved.
S3-130778
More details on fast path security protocol
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
NSN proposed to add some more text clarifying several details on the MME and the SDTSec
Decision:
The document was revised to S3-130848.
S3-130848
More details on fast path security protocol
Source: Ericsson, ST-Ericsson
(Replaces S3-130778)
Decision:
The document was approved.
S3-130686
Security context synchronization when SGW relocates for fast path solution
Source: Huawei, HiSilicon
Abstract:
Discussion:
It was proposed to reformulate the text in the handover cases.
Decision:
The document was revised to S3-130849.
S3-130849
Security context synchronization when SGW relocates for fast path solution
Source: Huawei, HiSilicon
(Replaces S3-130686)
Decision:
The document was approved.
S3-130775
Security Evaluation of MTCe SDDTE Solution 6A
Source: Nokia Corporation, Nokia Siemens Networks, Intel, China Unicom, ZTE
Abstract:
Decision:
The document was revised to S3-130850.
S3-130850
Security Evaluation of MTCe SDDTE Solution 6A
Source: Nokia Corporation, Nokia Siemens Networks, Intel, China Unicom, ZTE
(Replaces S3-130775)
Abstract:
Merging S3-130775 and S3-130827
Decision:
The document was approved.
S3-130827
Comments on Tdocs 0775 on Security Evaluation of MTCe SDDTE Solution 6A
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Ericsson commented that complexity and resource consumption are not security issues.
Some of the work proposed here is already taken into account in S2 contributions.
Huawei supported NSN in the bullet "Separation between security contexts for small data fast path and for regular EPS
bearer". They didn’t agree with removing it. The separation is done in the UE.
It was proposed to merge both documents to address Ericson's comments.
Decision:
The document was revised to S3-130850.
S3-130660
MTCe Connectionless Solution: Enhancements
Source: Alcatel-Lucent
Abstract:
Discussion:
NSN queried about the capability of the cookie that the MME sends to the eNodeB. They also queried about the
possible impact on MME. ALU replied that SA2 is aware about this.
Huawei requested some changes and this was taken offline in a revised document.
Decision:
The document was revised to S3-130851.
S3-130851
MTCe Connectionless Solution: Enhancements
Source: Alcatel-Lucent
(Replaces S3-130660)
Decision:
The document was approved.
S3-130661
MTCe Connectionless Solution Threat Scenarios
Source: Alcatel-Lucent
Abstract:
Discussion:
Ericsson wanted to consider other scenarios where the eNodeB is unprotected and there are no "off hours". An editor's
note was added for this use case.
Huawei also wanted to point out the additional processing load on the eNodeB
It was revised to address this and other comments
Decision:
The document was revised to S3-130852.
S3-130852
MTCe Connectionless Solution Threat Scenarios
Source: Alcatel-Lucent
(Replaces S3-130661)
Decision:
The document was approved.
S3-130685
Security problems on small data connectionless solution
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was revised to S3-130851.
S3-130818
ALU Comments on S3-130685
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130851.
S3-130743
Security aspects of connectionless Data Transmission
Source: Samsung
Abstract:
Discussion:
China Mobile had an issue with having different eNodeBs using the same key.
Decision:
The document was revised to S3-130853.
S3-130853
Security aspects of connectionless Data Transmission
Source: Samsung
(Replaces S3-130743)
Decision:
The document was approved.
S3-130662
MTCe Connectionless Solution Evaluation Changes
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130858.
S3-130858
MTCe Connectionless Solution Evaluation Changes
Source: Alcatel-Lucent
(Replaces S3-130662)
Decision:
The document was approved.
S3-130776
Security Evaluation of MTCe SDDTE Solution 6B
Source: Nokia Corporation, Nokia Siemens Networks, Intel, China Unicom
Abstract:
Decision:
The document was revised to S3-130858.
S3-130820
ALU Comments on S3-130776
Source: Alcatel-Lucent
Abstract:
Discussion:
Intel: resource consumption is security related.
Decision:
The document was revised to S3-130858.
S3-130746
MTC-IWF based security solution remaining issues
Source: NEC Corporation
Abstract:
Discussion:
ALU challenged the proposals from NEC.
Decision:
The document was noted.
S3-130747
pCR: Modification to MTC-IWF based security solution for small data transmission
Source: NEC Corporation
Abstract:
Discussion:
Intel had some concerns on these contributions since this could lead to a change in the network architecture. Achim
(Intel) wanted to send a LS to SA2, but wasn't sure about how to present this new solution.
NEC said that this would be part of solution 3.
Decision:
The document was revised to S3-130861.
S3-130861
pCR: Modification to MTC-IWF based security solution for small data transmission
Source: NEC Corporation
(Replaces S3-130747)
Decision:
The document was approved.
S3-130745
SDT: Evaluation of SA2 remaining solutions
Source: NEC Corporation
Abstract:
Discussion:
China Mobile and Intel challenged the last sentence : "Solution 1, 2, 3, 6a, 6b, and 8 of SA2 can only partially fulfil the
security requirements for Small Data Transmission described in clause 5.7.3."
Decision:
The document was revised to S3-130862.
S3-130862
SDT: Evaluation of SA2 remaining solutions
Source: NEC Corporation
(Replaces S3-130745)
Decision:
The document was approved.
S3-130774
Security Evaluation of MTCe SDDTE solutions - Overall
Source: Nokia Corporation, Nokia Siemens Networks, Intel, China Unicom
Abstract:
Discussion:
Quite many objections on the Overall Evaluation section:
Samsung, Huawei and Ericsson wanted to remove the sentence "Among solutions in category “CP”, solution 3 has been
concluded as having no security impact"
NSN preferred to keep it, but adding "security functionality impact". It was agreed another wording proposed by NSN.
ALU also had problems with some of the conclusions, so some offline work was needed in order to tackle all the
comments from the companies.
Decision:
The document was revised to S3-130862.
S3-130690
draft Reply LS on input on security aspects for MTCe solutions
33.868 v..
Source: Intel
Abstract:
Decision:
The document was noted.
S3-130687
Discussion on reply LS on requesting input on security aspects for MTCe solutions from SA2
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was revised to S3-130843.
S3-130742
Discussion on draft reply LS on SDDTE security aspects
Source: Samsung
Abstract:
Discussion:
Huawei proposed to go for a table for the mapping and do an overall analysis of the solutions.
ALU found this proposal clearer.
The Chairman found this approach more useful, combining the table and the overall solution analysis.
Decision:
The document was revised to S3-130843.
S3-130668
HSS filtering for discussion
Source: ZTE Corporation
Abstract:
Discussion:
NSN found this not security related, but something to be handled in SA2.
Decision:
The document was noted.
S3-130669
HSS filtering SMS-delivered device trigger message
23.682 CR-0075 (Rel-11) v..
Source: ZTE Corporation, China Unicom
Abstract:
Discussion:
The Chairman commented that this should be aligned with our own TS in Rel-12.
Decision:
The document was revised to S3-130863.
S3-130863
HSS filtering SMS-delivered device trigger message
23.682 CR-0075 rev 1 (-) v..
Source: ZTE Corporation, China Unicom
(Replaces S3-130669)
Decision:
The document was agreed.
S3-130683
Network based filtering solution
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130684
Clarification of information elements related to device trigger in SMS based device trigger
message
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130755
Aligning TP Protocol Id in draft TS 33.187
Source: Ericsson, ST-Ericsson
Abstract:
-
Decision:
The document was approved.
S3-130688
Security requirement of preventing MTC device triggers coming from normal UEs
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130748
Updates on triggering with regular GBA
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130750
Triggering with GBA push over Tsms
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130751
Updates on Triggering with GBA push over Tsp
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130739
Security requirements on MTC
Source: China Unicom
Abstract:
-
Discussion:
Samsung: we should wait for solution and then go for the requirement in our TS.
BT: this is different from the SA1 requirement, we should wait for the requirement from SA1 before jumping into
solutions.
The Chairman stated that we should go forward this way.
Decision:
The document was noted.
S3-130709
pCR to TR 33.868: Provisioning of HSS-generated KME for MTCe IMEI Binding
TR 33.868 v..
Source: Alcatel-Lucent
Abstract:
This pCR introduces a replacement text for TR 33.868 section 5.4.4.2.3.3 on provisioning of the symmetric devicespecific key KME. As in previous proposal, the KME is generated by the HSS. Two approached are shown: in one the
KME
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130710
pCR to TR 33.868: Provisioning of UE-generated KME for MTCe IMEI Binding
TR 33.868 v..
Source: Alcatel-Lucent
Abstract:
This pCR introduces additional alternative for TR 33.868 section 5.4.4.2.3.3.3 on provisioning of the symmetric devicespecific key KME. In this alternative, the KME is generated by the ME.
Discussion:
NSN challenged this contribution. Some offline discussions were needed and eventually it was approved.
Decision:
The document was approved.
S3-130711
Editorial cleanup of sec.5.4.4.2.3.1 and 5.4.4.2.3.2
TR 33.868 v..
Source: Alcatel-Lucent
Abstract:
This pCR proposes clarifications of TR 33.868 sec. 5.4.4.2.3.1 and 5.4.4.2.3.2. In addition, the text describing
provisioning of the symmetric key is moved to a new section, as proposed in a separate pCR.
Discussion:
Telecom Italia: if an operator wants to implement this, does it have to upgrade the HSS to be able to perform this
feature? Does this have a cost?
ALU: it depends on the scenario, in some cases there are changes.
Approved with modifications
Decision:
The document was approved.
S3-130695
Conclusion on USIM/ME binding solution
Source: Morpho Cards, Gemalto
Abstract:
Discussion:
Deutsche Telekom welcomed the introduction of a table summarizing all the criteria, but found it difficult to find and
standardize a single solution that fits all.
One UE based solution and one network based solution was proposed by BT.
Morpho Cards: more than one solution on each side would be too complex. Going for one solution in the device side
and another in the network side would be the way to go.
The Chairman found it hard to agree on a table during the meeting. He suggested to stay in the facts rather than using a
table, since it is always hard to reach a consensus here. Everything will be open now but the next meeting might need
show of hands in order to see how many support each solution.
Decision:
The document was noted.
S3-130801
comments to S3-130695
Source: China Mobile
Abstract:
Decision:
The document was noted.
S3-130819
ALU Comments on S3-130695
Source: Alcatel-Lucent
Abstract:
Decision:
The document was noted.
S3-130731
Solution of restricting the USIM to specific UEs
Source: Nokia, Nokia Siemens Networks, Ericsson, ST-Ericsson, Samsung
Abstract:
Decision:
The document was noted.
S3-130729
CR to 23.060: Solution of restricting the USIM to specific UEs
Source: Ericsson, ST-Ericsson, Nokia, Nokia Siemens Networks
Abstract:
Decision:
The document was noted.
S3-130730
CR to 23.401: Solution of restricting the USIM to specific UEs
Source: Ericsson, ST-Ericsson, Nokia, Nokia Siemens Networks
Abstract:
Decision:
The document was noted.
S3-130656
secure connection
Source: China Mobile
Abstract:
Decision:
The document was approved.
S3-130785
EAP/PANA-based Solution for Secure Connection
Source: Samsung
Abstract:
Discussion:
The Chairman to group all EAP based solutions, then the EAP-AKA based solutions and so on.
Later the similarities between the solutions and differences will be studied.
Approved with modifications
Decision:
The document was approved.
S3-130657
secure connection evaluation
Source: China Mobile
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130793
pCR to TR 33.868: evaluation of Secure Connection
TR 33.868 v..
Source: Gemalto, Morpho Cards
Abstract:
pCR to TR 33.868: evaluation of Secure Connection
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130658
lightweight M2M consideration
Source: China Mobile
Abstract:
Discussion:
The Chairman asked whether it would be possible to have more information on this issue for next meeting.
NSN asked how this work is related to the work in OneM2M. It was concluded that maybe LS could be a tool to align
with them.
Decision:
The document was noted.
S3-130740
Network based method for privacy concern
Source: China Unicom
Abstract:
Decision:
The document was Left for email approval and approved.
S3-130749
33.868: Missing References and Hanging Paragraphs
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was Left for email approval and approved.
S3-130828
Secure Connection details on GBA based solutions
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was noted.
S3-130829
Update of 729: CR to 23.060: Solution of restricting the USIM to specific UEs
Source: Ericsson, ST-Ericsson, Nokia, Nokia Siemens Networks, TeliaSonera
Abstract:
Decision:
The document was noted.
S3-130830
Update of 730: pCR to 23.401: Solution of restricting the USIM to specific UEs
Source: Ericsson, ST-Ericsson, Nokia, Nokia Siemens Networks, TeliaSonera
Abstract:
Decision:
The document was noted.
S3-130831
update of S3-130731 Solution of restricting the USIM to specific UEs
Source: Nokia, Nokia Siemens Networks, Ericsson, ST-Ericsson, Samsung, TeliaSonera
Abstract:
Decision:
The document was noted.
S3-130845
Draft TR MTCe
33.868 v..
Source: Rapporteur
Decision:
The document was approved.
S3-130864
New draft TS MTCe
Source: Rapporteur
Decision:
The document was approved.
S3-130890
Version of TR MTCe after email approval
Source: Rapporteur
Decision:
The document was Left for email approval and approved.
7.10
Security Aspects of Public Warning System
S3-130664
Evaluation of UE capability for OTA based PWS security
Source: ZTE Corporation, China Unicom
Abstract:
Discussion:
Approved with modifications.
Decision:
The document was approved.
S3-130665
Evaluation of UICC capability for OTA based PWS security
Source: ZTE Corporation, China Unicom
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130666
PWS Security Requirement Analysis-mod by hy-ztev2-clear
Source: CATR, ZTE Corporation
Abstract:
Decision:
The document was noted.
S3-130667
Some PWS Requirement vs Security Solutions Analysis-v4
Source: ZTE Corporation, China Unicom
Abstract:
Discussion:
NSN suggested that in requirement 3 it should be clarified that the user is roaming to a visiting network in China. ZTE
agreed, but Vodafone didn't agree to mention an specific country. They should be general and not regional
requirements.
The Chairman proposed to talk about CCSA requirements instead of regional requirements.
Sprint queried about the difference between this requirement and the SA1 requirement. The Chairman replied that the
difference is that there is no requirement for roaming in SA1.
ZTE clarified that the requirements in the Discussion section are taken from the CCSA document.
NTT DoCoMo wanted to let SA1 know about these requirements and include them in their requirements. NSN
commented that this is already covered since they mention national roaming.
Some offline work on the table was needed.
Decision:
The document was revised to S3-130866.
S3-130866
Some PWS Requirement vs Security Solutions Analysis-v4
Source: ZTE Corporation, China Unicom
(Replaces S3-130667)
Discussion:
NSN: there are no security requirements anymore.
Noted, waiting for the official statement from CCSA
Decision:
The document was noted.
S3-130675
Open issues in generalized certificate-based approach for PWS
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130676
Deleting Editor's note in section 7.3.1
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130677
Removal of editor's note for SAI
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130678
Discussion about IDs in the warning message
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130679
Editor's note on 2G subscribers over UTRAN
Source: Huawei, HiSilicon
Abstract:
Discussion:
The Chairman proposed to have the working assumption that 2G subscribers will not be considered.
The group agreed.
Decision:
The document was noted.
S3-130680
Mechanisms of NAS solution for GSM/GPRS
Source: Huawei, HiSilicon
Abstract:
Discussion:
NSN wanted to clarify how the attack is resolved with more text in the draft TR.BT also wanted to have a better
analysis on this.
Decision:
The document was noted.
S3-130681
Clarification for parameters included in NAS_based solution
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130682
Corrections on NAS_based solution for GERAN
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was approved.
S3-130689
pCR on Considerations on networks in disaster areas
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
The current text does not provide any information on the network in a box. This pseudo-change request provides
clarification on this term.
Decision:
The document was approved.
S3-130757
Clarifications on Implicit Certificate approach
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was noted.
S3-130759
pCR: Clarifications on PWS CA update message for Implicit Certificates
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was approved.
S3-130760
pCR: Clarifications on Timestamps for Implicit Certificates
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was approved.
S3-130761
pCR: Clarifications on Roaming and application of Implicit Certificates
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was approved.
S3-130763
Security considerations on implicit certificates with Keyed MAC signature
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was noted.
S3-130768
Conclusion on Signature Algorithms
TR 33.869 v..
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Vodafone disagreed with the conclusion. TeliaSonera agreed.
Decision:
The document was noted.
S3-130694
Improvement CA update from USIM
Source: BlackBerry, Vodafone
Abstract:
The following proposes a simpler way to update CA certificate within the ME from the USIM by relying on the USIM
initialisation procedure rather than creating new (U)SIM toolkit commands.
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130702
Restrictions on signature length in PWS security
TR 33.869 v..
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
NSN asked whether ETWS is used anywhere else in Japan. NTT-DoCoMo saw no point in this issue.
Decision:
The document was noted.
S3-130701
Resolution of editor's notes in OTA based PWS security solution
TR 33.869 v..
Source: Ericsson, ST-Ericsson, Gemalto, Morpho Cards
Abstract:
Discussion:
NSN requested to mention CT6 in an editor's note. It was approved with this modification
Decision:
The document was approved.
S3-130712
Threat section restructuring pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
This pCR proposes to change the placement of the threat section in the TR because a threat analysis should come before
the requirements which are a consequence of the threats.
Discussion:
Vodafone didn't agree with this structure being clearer.
TeliaSonera and BT supported this new structure.
Some offline discussions were needed in order to agree on a new structure, and finally noted.
Decision:
The document was noted.
S3-130713
Threat discussion pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
This pCR applies editorial changes to the security threat section (introducing headlines) and proposes some additions.
The subsection on the placement of the node does not specifically mention the threat of a public key compromise. This
is added as a new
Decision:
The document was approved.
S3-130714
Requirement on origin and integrity of public key pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
PWS security requirement proposal
Decision:
The document was approved.
S3-130777
Securely distinguishing between genuine and false warning notifications without signature
TR 33.869 v..
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was revised to S3-130867.
S3-130867
Securely distinguishing between genuine and false warning notifications without signature
TR 33.869 v..
Source: Ericsson, ST-Ericsson
(Replaces S3-130777)
Decision:
The document was approved.
S3-130715
Circumvention attack pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
This pCR provides a description of an attack we call the PWS security circumvention attack. It is shown that it is, under
certain conditions, possible for an attacker to circumvent PWS security implemented in a particular country,
independently of the pub
Discussion:
BT pointed out that even Bluetooth could be used as an access network for these attacks.
Approved with modifications
Decision:
The document was approved.
S3-130716
Requirement to avoid circumvention attack pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
A companion pCR in S3-130715 provides a description of the PWS security circumvention attack. This pCR introduces
a requirement that the circumvention attack shall be prevented.
Discussion:
Vodafone didn't agree with the use of "shall".
Huawei pointed out that the use of "shall" in a TR is not correct.
The Chairman proposed to name this section "additional potential requirements" that could be used in the TS. This was
endorsed by the group.
Approved with modifications.
Decision:
The document was approved.
S3-130717
Circumvention attack-measures pCR PWS
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
A companion pCR in S3-130715 provides a description of the PWS security circumvention attack. This pCR introduces
potential countermeasures.
Discussion:
ZTE thinks that the circumvention attack can be solved in one country which have the security requirement if the Cons
of the solutions are acceptable
Decision:
The document was revised to S3-130867.
S3-130718
Considerations to PWS UE settings pCR
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
Depending on SA3 decisions whether PWS security for roamers is considered (at all, in the first step, or later), this
section will point out possible threats due to PWS settings in the UE.
Decision:
The document was revised to S3-130888.
S3-130888
Considerations to PWS UE settings pCR
Source: Nokia Corporation, Nokia Siemens Networks
(Replaces S3-130718)
Decision:
The document was approved.
S3-130764
Text for scope and abbreviations and removal of editor's notes
TR 33.869 v..
Source: Ericsson, ST-Ericsson
Abstract:
-
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130765
PWS and PWS Security Requirements
TR 33.869 v..
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
China Unicom asked about the deletion of the reception of warning messages in the roaming area.
BT: there is no security requirement for roaming users
Decision:
The document was revised to S3-130868.
S3-130868
PWS and PWS Security Requirements
TR 33.869 v..
Source: Ericsson, ST-Ericsson
(Replaces S3-130765)
Discussion:
The sentence "A solution for PWS security will be able to support national roaming" found" was found controversial
by some companies like Vodafone and NSN.
An editor's note about the requirement needing some clarification was agreed.
Decision:
The document was approved.
S3-130693
Rework of PWS security requirements
Source: BlackBerry, Vodafone
Abstract:
Discussion:
Qualcomm found the requirement of the mechanism to indicate the PWS-UE the credentials to use for verification of
the authenticity of the warning notification, very hard to implement.
Ericsson was in the same line.
Vodafone: no need to worry about this, the regulator will take care of it.
It was agreed to change it adding a "may"
Approved with modifications
Decision:
The document was approved.
S3-130753
Way forward on TR33.869
Source: Research In Motion UK Ltd., Vodafone
Abstract:
Decision:
The document was noted.
S3-130756
pCR: Conclusion section of TR33.869
Source: Research In Motion UK Ltd., Vodafone
Abstract:
Discussion:
NSN found it too early to make any conclusions.
BT leaned to support the conclusion but it needed more time to consider it.
China Unicom commented that they would support the conclusion if it considered different solutions for different
regions.
The Chairman found it hard to reach a conclusion during this meeting, although there was some support for the implicit
certificate solution. A conclusion should be reached next meeting including a show of hands if necessary.
Decision:
The document was noted.
S3-130722
Implicit Certificates and CA updating
33.269 CR-0001 (Rel-12) v..
Source: Research In Motion UK Ltd.
Abstract:
Decision:
The document was noted.
S3-130865
new draft TR PWS
Source: Rapporteur
Decision:
The document was Left for email approval and approved.
S3-130871
LS to SA1 on PWS security requirements
Source: NTT Docomo
Discussion:
Vodafone didn’t agree with SA3 sending this kind of LS. It should be delivered by SA,SA1.
TeliaSonera supported sending it.
NTTDocomo needed official input from CCSA before setting down the requirements, but Vodafone didn't see it
necessary.
The Chairman clarified that official input from organizations must come through LS and not from companies. The
Chairman proposed that companies who are active in CCSA could work it out in CCSA in order to make them send an
official LS to SA3 for the next meeting.
Decision:
7.11
The document was noted.
Firewall Traversal
S3-130614
Reply LS on Notifications on Firewall Traversal from LS Reply SA2 S2-130722 and CT1 C1-
130773
Source: S1-133279
Abstract:
Discussion:
Prashant (Oracle) commented that CT1 is waiting for SA3's response.
Orange: UE and WiFi access point, accessing to the P-CSSCF there might a firewall in the middle but no ePDG in the
path. How do you manage this kind of access? The UE couldn't have access to IMS due to this firewall.
It was proposed to send a LS to CT1,but NSN didn't see a reason for that before seeing more contributions.
Decision:
The document was replied to in S3-130879.
S3-130879
Reply to SA1: LS on Notifications on Firewall Traversal
Source: Oracle
Decision:
The document was approved.
7.11.1
Study on Firewall Traversal
S3-130721
TURAN:pCR: Update to FW traversal flow chart
Source: Oracle
Abstract:
Decision:
The document was approved.
S3-130869
Draft TR for Firewall Traversal
Source: Rapporteur
Decision:
The document was approved.
7.11.2
Tunnelling of UE Services over Restrictive Access Networks
S3-130767
Correction of Specification of Tunnelling of UE Services over Restrictive Access Networks -
IMS case
33.203 CR-0201 (Rel-12) v12.2.0
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
Discussion:
Orange: this is very unclear and I support this clarification very much.
Qualcomm didn't support these changes because it would modify architecture decisions.
As proposed by Orange, there was consensus that requirements on iFire in 22.228 are not limited to EPC,i.e. 4G
technology, but apply to any IP transport between UE and the IM CN.
Decision:
The document was revised to S3-130883.
S3-130883
Correction of Specification of Tunnelling of UE Services over Restrictive Access Networks -
IMS case
33.203 CR-0201 rev 1 (Rel-12) v12.2.0
Source: Nokia Corporation, Nokia Siemens Networks
(Replaces S3-130767)
Decision:
The document was agreed.
S3-130720
TURAN: IMS FW traversal CR, update to flowchart
33.20 CR-0198 (Rel-12) v12.1.0
Source: Oracle
Abstract:
Decision:
The document was revised to S3-130870.
S3-130870
TURAN: IMS FW traversal CR, update to flowchart
33.20 CR-0198 rev 1 (Rel-12) v12.1.0
Source: Oracle
(Replaces S3-130720)
Discussion:
Fixes errors on CR cover and throughout the CR
Decision:
The document was agreed.
S3-130780
Missing caption and hanging paragraph
33.203 CR-0202 (Rel-12) v12.2.0
Source: Ericsson, ST-Ericsson
Abstract:
-
Decision:
The document was agreed.
S3-130697
Firewall traversal for IMS services based on ICE
33.203 CR-0199 (Rel-12) v12.2.0
Source: Ericsson, ST-Ericsson, Huawei
Abstract:
This CR describes a solution for firewall traversal for IMS signalling and media based on SIP over TLS and ICE. A
placeholder for this solution already exists in TS 33.203.
Discussion:
Huawei and Oracle supported removing the Editor's note "ICE TCP is required for TCP based media (e.g. MSRP) but is
not yet supported in TS 23.228 [3] and TS 24.229 [8]. These specifications need to be updated."
Vodafone,Qualcomm and Deutsche Telekom didn't fully support these solutions.
NSN considered too difficult to go for one solution during this meeting.
Ericsson: in environments where we use ICE this would be the preferred choice.
Decision:
The document was revised to S3-130872.
S3-130872
Firewall traversal for IMS services based on ICE
33.203 CR-0199 rev 1 (Rel-12) v12.2.0
Source: Ericsson, ST-Ericsson, Huawei
(Replaces S3-130697)
Decision:
The document was agreed.
S3-130724
discussion of firewall traversal for IMS plane based on ICE and Media over TCP
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was noted.
S3-130725
Firewall traversal for IMS plane based on ICE and Media over TCP
33.203 CR-0203 (-) v..
Source: Huawei , HiSilicon
Abstract:
Decision:
The document was revised to S3-130847.
S3-130847
Firewall traversal for IMS plane based on ICE and Media over TCP
33.203 CR-0203 rev 1 (Rel-12) v12.2.0
Source: Huawei , HiSilicon
(Replaces S3-130725)
Discussion:
Ericsson: this optimization works in a limited set of scenarios. We prefer to have this solution in a TR first.
Oracle supported this contribution.
NSN didn't support it either.
The Chairman commented that more information on the benefits were needed and also contact with other groups to get
more information on the architecture.
Decision:
7.12
The document was noted.
Security Aspects of WLAN Network Selection for 3GPP Terminals
S3-130672
Categorize key issues in TR33.865
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130670
WLAN_NS TR33.869 reference and abbreviations
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130791
33.865 WLAN: Proposal for structure and editorial corrections
Source: Ericsson, ST-Ericsson
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130674
Trusted relationship of the WLAN network
Source: Huawei, HiSilicon
Abstract:
Decision:
The document was revised to S3-130877.
S3-130877
Trusted relationship of the WLAN network
Source: Huawei, HiSilicon
(Replaces S3-130674)
Decision:
The document was approved.
S3-130736
Security requirement for key issues
Source: China Unicom
Abstract:
Discussion:
NSN wondered about the impact on the user experience.
BT: the access would be overloaded. To some extent, this is work for IEEE.
NSN proposed that the practical feasibility of this solution is left for further study. China Mobile supported this, but
finally the contribution was noted.
The Chairman invited more contributions with solutions to solve these problems.
Decision:
The document was noted.
S3-130799
security requirements for WLAN network selection
Source: Samsung
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130738
Enhancement to Key issue- Interaction between WLAN network selection and networkprovided policies for WLAN selection
Source: China Unicom
Abstract:
Discussion:
Discussed together with China Mobile's S3-130653.
It was commented that we had agreed on requirements of confidentiality protection, so all ANDSF traffic is already
protected. China mobile pointed out that this is about conflict between policies and not in scope of SA3.
There was more support for deleting the issue as China Mobile proposed in S3-130653.
Decision:
The document was noted.
S3-130653
Discussion on WLAN key issue
Source: China Mobile
Abstract:
Decision:
The document was approved.
S3-130733
Threat in key issue- Use WLAN load Information for network selection
Source: China Unicom
Abstract:
Discussion:
NSN: the consequence is just bad user's experience. Not convinced that this is a real issue. Qualcomm supported this by
saying this is out of scope of 3GPP.
BT supported including this threat.
The Chairman proposed to leave this description but with an editor's note saying that is unclear whether 3GPP can do
something about it.
Intel commented that this wasn't a valid threat.
Decision:
The document was noted.
S3-130734
Threat in key issue - Use WLAN Access Network Type and Venue Information for network
selection
Source: China Unicom
Abstract:
Discussion:
Intel: the user knows where he is despite the information sent by this WLAN.
BT: we don’t care about the WLAN but about the service. It's an automatic service.
The handset application changes some parameters according to the location.
Intel: this is not the threat explained here.
The Chairman proposed to explain better this threat and asset whether this is something we need to take care about or
not
Decision:
The document was noted.
S3-130735
Common threats in key issues
Source: China Unicom
Abstract:
Discussion:
The Chairman proposed that everything seems to lead to the working assumption is that WLAN access information
will be treated as untrusted. We won't consider potential threats and counter measures that are related to this untrusted
information.
BT wasn't fully convinced by this but didn't object.
NSN: what is left to be done if we take that working assumption?(they supported the working assumption)
Samsung: We would only do something about the information that is coming from 3GPP networks.
The working assumption was endorsed.
Decision:
The document was noted.
S3-130673
Key issue: Hotspot 2.0 indication element
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130737
Solution of support WLAN access through roaming agreements
Source: China Unicom
Abstract:
Discussion:
The solution wasn't completely understood by some companies, so it was eventually noted.
Decision:
The document was noted.
S3-130766
33.865 WLAN: Observations on Solution 1
Source: Ericsson, ST-Ericsson
Abstract:
-
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130788
solution of supporting security protection for WLAN network selection
Source: Samsung
Abstract:
Decision:
The document was withdrawn.
S3-130789
Authentication for communication with WLAN network
Source: Samsung
Abstract:
Decision:
The document was withdrawn.
S3-130792
security requirements for WLAN network selection
Source: Samsung
Abstract:
Decision:
The document was withdrawn.
S3-130798
Authentication for communication with WLAN network
Source: Samsung
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130797
Solution of supporting security protection for WLAN network selection
Source: Samsung
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130873
Draft TR WLAN NS
33.865 v..
Source: Rapporteur
Decision:
The document was approved.
7.13
Security Aspects of Proximity-based Services
S3-130613
LS on Feedback on Proximity Services and Lawful Interception
Source: S1-132171
Abstract:
Decision:
The document was noted.
S3-130616
Reply LS on Proximity Services and Lawful Interception
Source: S2-131522
Abstract:
Decision:
The document was noted.
S3-130781
Proposed overview text for Prose
Source: Qualcomm Incorporated
Abstract:
Discussion:
Adrian (Qualcomm) commented that all this content is taken from SA1.
Approved with modifications
Decision:
The document was approved.
S3-130744
Security for ProSe system
Source: NEC Corporation
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130727
Security requirement for ProSe architecture
Source: Huawei, HiSilicon
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130782
Inclusion of the SA2 architecture in the Prose TR
Source: Qualcomm Incorporated
Abstract:
Decision:
The document was noted.
S3-130783
Proposed configuration data key issue for Prose
Source: Qualcomm Incorporated
Abstract:
Discussion:
Morpho: I don't know why this authorization should be there.
It was agreed to remove it.
Approved with modifications
Decision:
The document was approved.
S3-130654
Security analysis for restricted ProSe discovery
Source: China Mobile
Abstract:
Discussion:
Overlapping text with 784 can be fixed in a pCR for the next meeting.
Decision:
The document was approved.
S3-130784
Proposed new key issue on Restricted Direct Discovery for the Prose TR
Source: Qualcomm Incorporated
Abstract:
Discussion:
Vodafone: there are privacy issues.
Approved with modifications
Decision:
The document was approved.
S3-130655
Security analysis for restricted ProSe communication
Source: China Mobile
Abstract:
Discussion:
NEC proposed to add that it's a one-to-one communication
Approved with modifications
Decision:
The document was approved.
S3-130786
Proposed key issue for 1-1 communication
Source: Qualcomm Incorporated
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130728
Authentication for ProSe UE
Source: Huawei, HiSilicon
Abstract:
Discussion:
Intel didn’t find this contribution relevant since it seems to imply that there is a single solution for authentication.
Decision:
The document was noted.
S3-130773
ProSe authentication
33.cde v..
Source: Intel
Abstract:
Mutual authentication of ProSe enabled Public Safety UEs when not in network coverage is added as key issue.
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130795
ProSe accounting considerations
Source: Qualcomm Incorporated
Abstract:
Discussion:
Intel queried whether SA5 Charging group should be contacted since it involves the operator's policy.
Deutsche Telekom: It is an operator’s decision whether they want to charge based on information provided by the UE.
We support removing the editor's note.
China Mobile had problems with the analysis and didn't support the conclusion. They found it incomplete.
Deutsche Telekom: there is no solution for this fundamental problem.
Finally the proposal was agreed and the paragraph below was requested to be recorded in the minutes:
The editor's note in the ProSe SA2 TR: "Whether such UE-provided info can be considered a trusted source of
information to base accounting procedures on or whether other solutions need to be developed is subject to SA3
evaluation." was studied in SA3 as requested by SA2 and it was agreed that it can be removed from the TR.
Decision:
The document was approved.
S3-130796
ProSe discovery id semantics and operator risks
Source: Qualcomm Incorporated
Abstract:
Discussion:
In the clause 6.1.1.2.3.2of the ProSe SA2 TR [1], the following Editor’s Note calls for a study of control and risk
relating to semantics of discovery identifiers (also referred to as expression codes) shared between UEs :
Editor’s note: Risks to an operator arising from the possibility of liability for improper use of ProSe service due to the
lack of control on the semantic of the expression codes shared with the interested parties by the application layer need
to be studied by SA3.
SA3 has studied the above editor’s note as requested by SA2 and believe that it can be removed from the SA2 TR
Decision:
The document was noted.
S3-130787
Proposed solution for configuration data delivery in ProSe
Source: Qualcomm Incorporated
Abstract:
-
Decision:
The document was approved.
S3-130790
Security for restricted ProSe direct discovery
Source: Qualcomm Incorporated
Abstract:
Decision:
The document was approved.
S3-130794
Solution for ProSe one-to-one communications
Source: Qualcomm Incorporated
Abstract:
Decision:
The document was revised to S3-130884.
S3-130884
Proposed resolutions for comments on Solution for ProSe one to one communications
Source: Qualcomm Incorporated
(Replaces S3-130794)
Decision:
The document was approved.
S3-130825
Comments on S3-130794 Solution for ProSe one-to-one communications
Source: Nokia Corporation, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130884.
S3-130882
Draft TR Prose
Source: Rapporteur
Decision:
The document was approved.
7.14
Other areas
S3-130719
Abstract:
Discussion:
Updated WID proposal GCSE_LTE security
Source: Nokia Siemens Networks
Blackberry, Qualcomm,At&T,Huawei, Samsung and others supported the WI.
China Mobile wanted to extend the schedule, but Bengt commented that this could be seen as an extension of stage 2 of
Rel-12 not finishing in December.
Bengt will comment in SA that SA3 will do as much as possible to finish it for Rel-12 but it will be most likely finished
in March 2014.
It was accepted to put SA#64 as target.
Decision:
The document was revised to S3-130880.
S3-130880
Updated WID proposal GCSE_LTE security
Source: Nokia Siemens Networks
(Replaces S3-130719)
Decision:
The document was approved.
8
Studies
8.1
Study on Security aspects of Integration of Single Sign-On (SSO)
frameworks with 3GPP networks
S3-130609
LS/o on draft Recommendation ITU-T X.sap-8, Efficient multi-factor authentication
mechanisms using mobile devices
Source: ITU-T SG17
Abstract:
Decision:
The document was postponed.
S3-130703
PCR to 33.895: Editor's Note #1, 2, 3 in Sections 8.3.1 and 8.3.2
33.895 v..
Source: Interdigital, AT&T
Abstract:
This PCR is one of the series of PCRs attempting to resolve Editor's Notes in Section 8.3.2. It addresses three Editor's
Notes with regards to reuse of existing solutions. It also adds one new reference to PAPE in Section 2.
Decision:
The document was Left for email approval and approved.
S3-130704
PCR to 33.895: Editor's Note #5 in Section 8.3.2
33.895 v..
Source: Interdigital, AT&T
Abstract:
This PCR resolves Editor's Note in Section 8.3 of TR 33.895 v.0.6.0
Decision:
The document was Left for email approval and approved.
S3-130705
PCR to 33.895: Editor's Notes #4 and 6 in Section 8.3.2
33.895 v..
Source: Interdigital, AT&T
Abstract:
This PCR is one of the series of PCRs resolving the Editors Notes in Section 8.3.2. This particular PCR resolves the
following Editor's Notes : Editor's note: The high level diagram above has to be harmonized with more detailed call
flow examples pro
Decision:
The document was Left for email approval and approved.
S3-130706
PCR to 33.895: Editor's Note #7, 8 in Section 8.3.2.1
33.895 v..
Source: Interdigital, AT&T
Abstract:
This PCR resolves Editor's Note in Section 8.3 of TR 33.895 v.0.6.0
Decision:
The document was Left for email approval and approved.
S3-130707
PCR to 33.895: Editor's Note #9 in Section 8.3.2.1
33.895 v..
Source: Interdigital, AT&T
Abstract:
This PCR resolves Editor's Note in Section 8.3 of TR 33.895 v.0.6.0
Decision:
The document was Left for email approval and approved.
S3-130723
Alternative method for two-factor authentication
TR 33.895 v..
Source: Ericsson, ST-Ericsson, AT&T
Abstract:
Decision:
The document was Left for email approval and approved.
S3-130762
Using user consent for GBA and SSO
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was Left for email approval and revised to S3-130891.
S3-130891
Using user consent for GBA and SSO
Source: Ericsson, ST-Ericsson
Abstract:
Decision:
The document was approved.
S3-130887
Draft TR SSO
Source: Rapporteur
Decision:
The document was Left for email approval and approved.
8.2
Security Study on Spoofed Call Detection and Prevention
8.3
Study Item on Security Assurance Methodology for 3GPP Network
Elements
S3-130814
SECAM comments on 647 and 692
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130855.
S3-130822
Comments on S3-130646,S3-130647,S3-130652 etc and related to S3-130633 and S3-130632
Source: China Mobile
Abstract:
Decision:
The document was noted.
S3-130636
Test methodology and skills requirement owner
Source: China Mobile
Abstract:
Decision:
The document was revised to S3-130874.
S3-130874
Test methodology document - Update of 636 after the evening session 2
Source: CMCC
(Replaces S3-130636)
Decision:
The document was approved.
S3-130633
Vulnerability testing activities
Source: China Mobile, Orange, TeliaSonera, China Unicom
Abstract:
Decision:
The document was revised to S3-130859.
S3-130812
SECAM comments on 633
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130859.
S3-130859
Vulnerability testing activities and accreditation
Source: China Mobile, Orange, TeliaSonera, China Unicom, Nokia Siemens Network
(Replaces S3-130812)
Decision:
The document was approved.
S3-130647
Vulnerability Testing framework
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130855.
S3-130855
Clarification on VT and definitions
Source: Nokia Siemens Networks, Orange, China Mobile
(Replaces S3-130647)
Decision:
The document was approved.
S3-130691
comments to S3-130647
Source: China Mobile
Abstract:
Decision:
The document was revised to S3-130855.
S3-130692
[SECAM] Comments on S3-130647 - Vulnerability testing framework
Source: Orange
Abstract:
-
Decision:
The document was revised to S3-130855.
S3-130802
[SECAM] comments on contribution S3-130647
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130855.
S3-130632
Difference between security compliance testing and vulnerability testing
Source: China Mobile, BT Group, China Unicom, NSN, Teliasonera
Abstract:
Decision:
The document was noted.
S3-130811
SECAM comments on 632
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was noted.
S3-130652
[SECAM] Criteria for compliance tester accreditation
Source: Orange
Abstract:
Decision:
The document was revised to S3-130860.
S3-130860
Update of S3-130652 after the first evening session
Source: Orange
(Replaces S3-130652)
Decision:
The document was approved.
S3-130803
[SECAM] comments on contribution S3-130652
Source: Alcatel-Lucent
Abstract:
-
Decision:
The document was revised to S3-130860.
S3-130816
SECAM comments on 652
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130860.
S3-130630
clarification on hardening requirements
Source: China Mobile, TeliaSonera, BT, Orange, China Unicom, NSN
Abstract:
Decision:
The document was approved.
S3-130646
Details on the content and structure of the SAS and what can be reused from CC on this specific
point
Source: Ericsson, Orange, Telecom Italia
Abstract:
Decision:
The document was revised to S3-130875.
S3-130875
SAS Writing - Update of 646 after the evening session 2
Source: Telecom Italia, Orange, Ericsson, China Unicom
(Replaces S3-130646)
Decision:
The document was approved.
S3-130807
[SECAM] comments on contribution S3-130646
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130875.
S3-130813
SECAM comments on 646
Source: Nokia Siemens Networks
Abstract:
-
Decision:
The document was revised to S3-130875.
S3-130631
Operator's Operational requirements
Source: China Mobile, BT
Abstract:
Decision:
The document was noted.
S3-130643
Semantics consistency in security requirements description
Source: China Unicom, ZTE Corporation
Abstract:
Decision:
The document was revised to S3-130875.
S3-130649
SECAM - terminological clarification on Security Requirements and Security Assurance
Specifications
Source: Nokia Siemens Networks
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130620
[SECAM] SAS instantiation
Source: Orange
Abstract:
Decision:
The document was revised to S3-130856.
S3-130808
SECAM comments on 620
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130856.
S3-130856
SAS instantiation content after the first evening session
Source: Nokia Siemens Networks, Orange
(Replaces S3-130808)
Decision:
The document was approved.
S3-130659
Comments on 130620
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130856.
S3-130625
[SECAM] SAS instantiation usage and evaluation
Source: Orange
Abstract:
Decision:
The document was revised to S3-130857.
S3-130810
SECAM comments on 625
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130857.
S3-130857
SAS instantiation evaluation and compliance testing activities
Source: Nokia Siemens Network, Orange
(Replaces S3-130810)
Decision:
The document was approved.
S3-130806
[SECAM] comments on contribution S3-130625
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130857.
S3-130635
SAS instantiation evaluation
Source: China Mobile
Abstract:
Decision:
The document was revised to S3-130821.
S3-130821
SECAM comments on S3-130625
Source: China Mobile
Abstract:
Decision:
The document was revised to S3-130857.
S3-130621
[SECAM] Operational guidance
Source: Orange, Alcatel-Lucent, Nokia Corporation, Nokia Siemens Networks
Abstract:
Decision:
The document was approved.
S3-130634
Discussion on ToE
Source: China Mobile
Abstract:
Decision:
The document was revised to S3-130876.
S3-130639
[SECAM] Scope of evaluation, use of TOE and TSF
Source: Orange
Abstract:
Decision:
The document was revised to S3-130876.
S3-130876
TOE/TSF, scope of evaluation – Update after the evening session 2
Source: Orange, Nokia Siemens Networks, Ericsson,China Mobile
(Replaces S3-130639)
Decision:
The document was approved.
S3-130770
[SECAM] Merge of S3-130634 and S3-130639 (on TOE/TSF definition and use)
Source: Orange, China Mobile, Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130876.
S3-130772
[SECAM] Merge attempt of S3-130770 and S3-130648 (TOE/TSF definition)
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130876.
S3-130648
Clarification of TOE and TSF - Discussion and pCR
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130876.
S3-130815
SECAM comments on 648 and 770
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130876.
S3-130823
[SECAM] comments on contribution S3-130770
Source: Alcatel-Lucent
Abstract:
Decision:
The document was revised to S3-130876.
S3-130622
[SECAM] Vendor development process and lifecycle management - discussion
Source: Orange
Abstract:
Decision:
The document was noted.
S3-130623
[SECAM] Vendor development process and lifecycle management - pCR
Source: Orange
Abstract:
Discussion:
Approved with modifications (combined with 804)
Decision:
The document was approved.
S3-130804
[SECAM] comments on contribution S3-130623
Source: Alcatel-Lucent
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130644
Life cycle management
Source: China Unicom, Orange, China Mobile, ZTE Corporation
Abstract:
Discussion:
Approved with modifications
Decision:
The document was approved.
S3-130627
[SECAM] Clarification of the term Certification Body in M2
Source: Orange
Abstract:
Decision:
The document was revised to S3-130817.
S3-130650
SECAM - Umbrella organization example for accreditation labs
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130817.
S3-130817
SECAM merger of 627 and 650
Source: Orange, Nokia Siemens Networks
Abstract:
Decision:
The document was approved.
S3-130638
Requirement for Accreditation Body
Source: Huawei, HiSilicon, China Unicom
Abstract:
Decision:
The document was noted.
S3-130637
self-declaration and certification
Source: Huawei, Hisilicon, China Unicom
Abstract:
Decision:
The document was approved.
S3-130640
[SECAM] Editorial improvements
Source: Orange
Abstract:
Decision:
The document was noted.
S3-130826
Comments on S3-130640 Section 5.2.8.x
Source: Juniper Networks
Abstract:
Decision:
The document was approved.
S3-130642
Clarification on the overview of methodology 2
Source: China Unicom, ZTE Corporation
Abstract:
Decision:
The document was revised to S3-130875.
S3-130641
Generalize the environment of functions and nodes to cover NFV scenarios
Source: China Unicom
Abstract:
Decision:
The document was Left for email approval and revised to S3-130892.
S3-130892
Generalize the environment of functions and nodes to cover NFV scenarios
Source: China Unicom
Abstract:
Decision:
The document was approved.
S3-130645
Scope of Core Network Products
Source: China Unicom, ZTE Corporation
Abstract:
Decision:
The document was Left for email approval and approved.
S3-130626
[SECAM] Generic consideration (partial vs full compliance)
Source: Orange
Abstract:
Decision:
The document was Left for email approval and approved.
S3-130624
[SECAM] TR conclusion and next steps
Source: Orange
Abstract:
Decision:
The document was revised to S3-130878.
S3-130809
SECAM comments on 624
Source: Nokia Siemens Networks
Abstract:
Decision:
The document was revised to S3-130878.
S3-130878
TR 33.805 conclusion -merge
Source: Nokia Siemens Networks, Orange, Juniper Networks
(Replaces S3-130809)
Decision:
The document was approved.
S3-130651
Work Item on Security Assurance Specification for 3GPP Network Products
Source: TeliaSonera
Abstract:
This is a new work item for the specification work of Security Assurance Specification(s) for 3GPP Network Products.
Decision:
The document was withdrawn.
S3-130663
Comments on 130634
Source: Alcatel-Lucent
Abstract:
Decision:
The document was withdrawn.
S3-130805
[SECAM] comments on contribution S3-130624
Source: Alcatel-Lucent
Abstract:
Decision:
The document was withdrawn.
S3-130854
SECAM evening sessions at SA3#72 – minutes
Source: Orange
Decision:
The document was noted.
S3-130885
First version of SECAM draft TR
Source: Rapporteur
Decision:
The document was Left for email approval and approved.
S3-130886
Second version of SECAM draft TR
Source: Rapporteur
Decision:
The document was Left for email approval and approved.
8.4
Other Study Areas
S3-130741
Study on Subscriber Privacy Impact in 3GPP
Source: AT&T, CATR, CATT, China Telecom, China Unicom, Ericsson, HiSilicon, Huawei, Intel,
InterDigital, KPN, Nokia Corporation, Nokia Siemens Networks, Samsung, ST-Ericsson, TeliaSonera, TNO, ZTE
Corporation
Abstract:
Decision:
The document was revised to S3-130881.
S3-130881
Study on Subscriber Privacy Impact in 3GPP
Source: AT&T, CATR, CATT, China Telecom, China Unicom, Ericsson, HiSilicon, Huawei, Intel,
InterDigital, KPN, Nokia Corporation, Nokia Siemens Networks, Samsung, ST-Ericsson, TeliaSonera, TNO, ZTE
Corporation
(Replaces S3-130741)
Decision:
9
The document was approved.
Review and Update of Work Plan
S3-130604
SA3 WorkPlan
Source: ETSI Secretariat
Abstract:
Discussion:
Rapporteurs are asked to send the progress on their WIs after the meeting to the Chairman and Secretary.
Decision:
10
The document was noted.
Future Meeting Dates and Venues
S3-130602
SA3 meeting calendar
Source: ETSI Secretariat
Abstract:
Discussion:
November 17th-November 21st 2014
Mega meeting next year
Decision:
11
The document was noted.
Any Other Business
Next meeting will have the elections. Candidates are welcome.
Possibly there will be a joint meeting with SA2 in the next meeting in San Francisco. SA2 may send LS related to the
WIs we have dependency on.
S3-130696
Updates on SA3 guidelines
Source: ETSI Secretariat
Abstract:
Decision:
12
The document was noted.
Close
The Chairman thanked Huawei for the hosting, MCC for the support and the delegates for the hard work.
After this, the meeting was closed.
Report prepared by: Mirko
Annex A: List of contribution documents
Document
S3130600
S3130601
S3130602
S3130603
S3130604
S3130605
S3130606
S3130607
S3130608
S3130609
S3130610
S3130611
S3130612
S3130613
S3130614
S3130615
S3130616
S3130617
S3130618
S3130619
S3130620
S3130621
Title
Source
Decision
Replaces
Agenda
WG Chairman
approved
-
Replaced
by
-
Report from last SA meeting
WG Chairman
noted
-
-
SA3 meeting calendar
ETSI Secretariat
noted
-
-
Report from last SA3 meeting
ETSI Secretariat
approved
-
-
SA3 WorkPlan
ETSI Secretariat
noted
-
-
LS on NAT and GIBA
C1-131743
replied to
-
-
LS on MS's reaction to
network's choice of an
unsupported ciphering
algorithm
Reply LS on Enhancing IMEI
based Lawful Interception in
IMS
Reply LS to the LS on
Optimization of the IMS
Information and Security
Parameters for CS to PS
SRVCC from GERAN to EUTRAN/HSPA
LS/o on draft
Recommendation ITU-T
X.sap-8, Efficient multi-factor
authentication mechanisms
using mobile devices
LS on interaction of oneM2M
with Underlying Networks
Reply LS on Follow-up LS on
KeNB re-keying
Reply LS on evaluation of
MTCe solutions
LS on Feedback on Proximity
Services and Lawful
Interception
Reply LS on Notifications on
Firewall Traversal from LS
Reply SA2 S2-130722 and
CT1 C1-130773
Reply LS on enhancing IMEI
based Lawful Interception in
IMS
Reply LS on Proximity
Services and Lawful
Interception
LS reply on NAT and GIBA
C1-131749
noted
-
-
C1-131767
noted
-
-
C1-132535
noted
-
-
ITU-T SG17
postponed
-
-
oneM2M Technical Plenary
replied to
-
-
R2-131538
noted
-
-
R2-132189
noted
-
-
S1-132171
noted
-
-
S1-133279
replied to
-
-
S2-131521
replied to
-
-
S2-131522
noted
-
-
S2-132323
noted
-
-
LS on requesting input on
security aspects for MTCe
solutions
Reply LS on IMEI based
Lawful Interceptions in IMS
[SECAM] SAS instantiation
S2-132327
replied to
-
-
SA3-LI
noted
-
-
Orange
revised
-
[SECAM] Operational
guidance
Orange, Alcatel-Lucent, Nokia
Corporation, Nokia Siemens
approved
-
S3130856
-
S3130622
S3130623
S3130624
S3130625
S3130626
S3130627
S3130628
S3130629
S3130630
S3130631
S3130632
S3130633
S3130634
S3130635
S3130636
S3130637
S3130638
S3130639
S3130640
S3130641
S3130642
S3130643
S3130644
S3130645
S3130646
S3130647
S3130648
S3130649
Networks
Orange
noted
-
-
Orange
approved
-
-
Orange
revised
-
Orange
revised
-
Orange
approved
-
S3130878
S3130857
-
Orange
revised
-
3GPP SA WG3
revised
-
NSN, Ericsson, ST Ericsson,
Alcatel-Lucent
China Mobile, TeliaSonera, BT,
Orange, China Unicom, NSN
China Mobile, BT
revised
-
approved
-
S3130817
S3130841
S3130840
-
noted
-
-
China Mobile, BT Group, China
Unicom, NSN, Teliasonera
noted
-
-
revised
-
Discussion on ToE
China Mobile, Orange,
TeliaSonera, China Unicom
China Mobile
revised
-
SAS instantiation evaluation
China Mobile
revised
-
Test methodology and skills
requirement owner
self-declaration and
certification
Requirement for Accreditation
Body
[SECAM] Scope of
evaluation, use of TOE and
TSF
[SECAM] Editorial
improvements
Generalize the environment
of functions and nodes to
cover NFV scenarios
Clarification on the overview
of methodology 2
Semantics consistency in
security requirements
description
Life cycle management
China Mobile
revised
-
Huawei, Hisilicon, China Unicom
approved
-
S3130859
S3130876
S3130821
S3130874
-
Huawei, HiSilicon, China Unicom
noted
-
-
Orange
revised
-
S3130876
Orange
noted
-
-
China Unicom
revised
-
S3130892
China Unicom, ZTE Corporation
revised
-
China Unicom, ZTE Corporation
revised
-
S3130875
S3130875
China Unicom, Orange, China
Mobile, ZTE Corporation
China Unicom, ZTE Corporation
approved
-
-
approved
-
-
Ericsson, Orange, Telecom Italia
revised
-
S3130875
Nokia Siemens Networks
revised
-
Nokia Siemens Networks
revised
-
Nokia Siemens Networks
approved
-
S3130855
S3130876
-
[SECAM] Vendor
development process and
lifecycle management discussion
[SECAM] Vendor
development process and
lifecycle management - pCR
[SECAM] TR conclusion and
next steps
[SECAM] SAS instantiation
usage and evaluation
[SECAM] Generic
consideration (partial vs full
compliance)
[SECAM] Clarification of the
term Certification Body in M2
Response LS on H(e)NB
Access Control Verification
Access mode verification for
H(e)NBs
clarification on hardening
requirements
Operator's Operational
requirements
Difference between security
compliance testing and
vulnerability testing
Vulnerability testing activities
Scope of Core Network
Products
Details on the content and
structure of the SAS and what
can be reused from CC on
this specific point
Vulnerability Testing
framework
Clarification of TOE and TSF
- Discussion and pCR
SECAM - terminological
clarification on Security
S3130650
S3130651
S3130652
S3130653
S3130654
S3130655
S3130656
S3130657
S3130658
S3130659
S3130660
S3130661
S3130662
S3130663
S3130664
S3130665
S3130666
S3130667
S3130668
S3130669
S3130670
S3130671
S3130672
S3130673
S3130674
S3130675
S3130676
S3130677
S3-
Requirements and Security
Assurance Specifications
SECAM - Umbrella
organization example for
accreditation labs
Work Item on Security
Assurance Specification for
3GPP Network Products
[SECAM] Criteria for
compliance tester
accreditation
Discussion on WLAN key
issue
Security analysis for
restricted ProSe discovery
Security analysis for
restricted ProSe
communication
secure connection
Nokia Siemens Networks
revised
-
S3130817
TeliaSonera
withdrawn
-
-
Orange
revised
-
S3130860
China Mobile
approved
-
-
China Mobile
approved
-
-
China Mobile
approved
-
-
China Mobile
approved
-
-
secure connection evaluation
China Mobile
approved
-
-
lightweight M2M
consideration
Comments on 130620
China Mobile
noted
-
-
Alcatel-Lucent
revised
-
MTCe Connectionless
Solution: Enhancements
MTCe Connectionless
Solution Threat Scenarios
MTCe Connectionless
Solution Evaluation Changes
Comments on 130634
Alcatel-Lucent
revised
-
Alcatel-Lucent
revised
-
Alcatel-Lucent
revised
-
Alcatel-Lucent
withdrawn
-
S3130856
S3130851
S3130852
S3130858
-
Evaluation of UE capability
for OTA based PWS security
Evaluation of UICC capability
for OTA based PWS security
PWS Security Requirement
Analysis-mod by hy-ztev2clear
Some PWS Requirement vs
Security Solutions Analysisv4
HSS filtering for discussion
ZTE Corporation, China Unicom
approved
-
-
ZTE Corporation, China Unicom
approved
-
-
CATR, ZTE Corporation
noted
-
-
ZTE Corporation, China Unicom
revised
-
S3130866
ZTE Corporation
noted
-
-
HSS filtering SMS-delivered
device trigger message
WLAN_NS TR33.869
reference and abbreviations
Correction of the editorial
errors and the incorrect
description
Categorize key issues in
TR33.865
Key issue: Hotspot 2.0
indication element
Trusted relationship of the
WLAN network
Open issues in generalized
certificate-based approach for
PWS
Deleting Editor's note in
section 7.3.1
Removal of editor's note for
SAI
Discussion about IDs in the
ZTE Corporation, China Unicom
revised
-
Huawei, HiSilicon
approved
-
S3130863
-
Huawei, HiSilicon
revised
-
S3130839
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
revised
-
Huawei, HiSilicon
approved
-
S3130877
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
130678
S3130679
S3130680
S3130681
S3130682
S3130683
S3130684
S3130685
S3130686
S3130687
S3130688
S3130689
S3130690
S3130691
S3130692
S3130693
S3130694
S3130695
S3130696
S3130697
S3130698
S3130699
S3130700
S3130701
S3130702
S3130703
S3130704
S3-
warning message
Editor's note on 2G
subscribers over UTRAN
Mechanisms of NAS solution
for GSM/GPRS
Clarification for parameters
included in NAS_based
solution
Corrections on NAS_based
solution for GERAN
Network based filtering
solution
Clarification of information
elements related to device
trigger in SMS based device
trigger message
Security problems on small
data connectionless solution
Security context
synchronization when SGW
relocates for fast path
solution
Discussion on reply LS on
requesting input on security
aspects for MTCe solutions
from SA2
Security requirement of
preventing MTC device
triggers coming from normal
UEs
pCR on Considerations on
networks in disaster areas
draft Reply LS on input on
security aspects for MTCe
solutions
comments to S3-130647
Huawei, HiSilicon
noted
-
-
Huawei, HiSilicon
noted
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
revised
-
Huawei, HiSilicon
revised
-
S3130851
S3130849
Huawei, HiSilicon
revised
-
S3130843
Huawei, HiSilicon
approved
-
-
Nokia Corporation, Nokia Siemens
Networks
Intel
approved
-
-
noted
-
-
China Mobile
revised
-
[SECAM] Comments on S3130647 - Vulnerability testing
framework
Rework of PWS security
requirements
Improvement CA update from
USIM
Conclusion on USIM/ME
binding solution
Updates on SA3 guidelines
Orange
revised
-
S3130855
S3130855
BlackBerry, Vodafone
approved
-
-
BlackBerry, Vodafone
approved
-
-
Morpho Cards, Gemalto
noted
-
-
ETSI Secretariat
noted
-
-
Firewall traversal for IMS
services based on ICE
KMS based solution for
immediate messaging
Clarification regarding NAT
and GIBA
Secure UDPTL based T.38
fax
Resolution of editor's notes in
OTA based PWS security
solution
Restrictions on signature
length in PWS security
PCR to 33.895: Editor's Note
#1, 2, 3 in Sections 8.3.1 and
8.3.2
PCR to 33.895: Editor's Note
#5 in Section 8.3.2
PCR to 33.895: Editor's Notes
Ericsson, ST-Ericsson, Huawei
revised
-
Ericsson, ST-Ericsson
revised
-
Ericsson, ST-Ericsson
agreed
-
S3130872
S3130832
-
Ericsson, ST-Ericsson
revised
-
Ericsson, ST-Ericsson, Gemalto,
Morpho Cards
approved
-
S3130833
-
Ericsson, ST-Ericsson
noted
-
-
Interdigital, AT&T
approved
-
-
Interdigital, AT&T
approved
-
-
Interdigital, AT&T
approved
-
-
130705
S3130706
S3130707
S3130708
S3130709
S3130710
S3130711
S3130712
S3130713
S3130714
S3130715
S3130716
S3130717
S3130718
S3130719
S3130720
S3130721
S3130722
S3130723
S3130724
S3130725
S3130726
S3130727
S3130728
S3130729
S3130730
S3130731
S3130732
S3130733
#4 and 6 in Section 8.3.2
PCR to 33.895: Editor's Note
#7, 8 in Section 8.3.2.1
PCR to 33.895: Editor's Note
#9 in Section 8.3.2.1
TCG progress report in the
areas of TMS and MPWG
pCR to TR 33.868:
Provisioning of HSSgenerated KME for MTCe
IMEI Binding
pCR to TR 33.868:
Provisioning of UE-generated
KME for MTCe IMEI Binding
Editorial cleanup of
sec.5.4.4.2.3.1 and
5.4.4.2.3.2
Threat section restructuring
pCR PWS
Threat discussion pCR PWS
Interdigital, AT&T
approved
-
-
Interdigital, AT&T
approved
-
-
Interdigital
noted
-
-
Alcatel-Lucent
approved
-
-
Alcatel-Lucent
approved
-
-
Alcatel-Lucent
approved
-
-
Nokia Corporation, Nokia Siemens
Networks
Nokia Corporation, Nokia Siemens
Networks
Nokia Corporation, Nokia Siemens
Networks
noted
-
-
approved
-
-
approved
-
-
Nokia Corporation, Nokia Siemens
Networks
Nokia Corporation, Nokia Siemens
Networks
approved
-
-
approved
-
-
Nokia Corporation, Nokia Siemens
Networks
Nokia Corporation, Nokia Siemens
Networks
Nokia Siemens Networks
revised
-
revised
-
revised
-
Oracle
revised
-
Oracle
approved
-
S3130867
S3130888
S3130880
S3130870
-
Research In Motion UK Ltd.
noted
-
-
Ericsson, ST-Ericsson, AT&T
approved
-
-
Huawei, HiSilicon
noted
-
-
Huawei , HiSilicon
revised
-
S3130847
Huawei, HiSilicon, TeliaSonera
withdrawn
-
-
Huawei, HiSilicon
approved
-
-
Huawei, HiSilicon
noted
-
-
CR to 23.060: Solution of
restricting the USIM to
specific UEs
CR to 23.401: Solution of
restricting the USIM to
specific UEs
Solution of restricting the
USIM to specific UEs
MME overload threat analysis
Ericsson, ST-Ericsson, Nokia,
Nokia Siemens Networks
noted
-
-
Ericsson, ST-Ericsson, Nokia,
Nokia Siemens Networks
noted
-
-
Nokia, Nokia Siemens Networks,
Ericsson, ST-Ericsson, Samsung
Intel
noted
-
-
revised
-
Threat in key issue- Use
WLAN load Information for
China Unicom
noted
-
S3130844
-
Requirement on origin and
integrity of public key pCR
PWS
Circumvention attack pCR
PWS
Requirement to avoid
circumvention attack pCR
PWS
Circumvention attackmeasures pCR PWS
Considerations to PWS UE
settings pCR
Updated WID proposal
GCSE_LTE security
TURAN: IMS FW traversal
CR, update to flowchart
TURAN:pCR: Update to FW
traversal flow chart
Implicit Certificates and CA
updating
Alternative method for twofactor authentication
discussion of firewall traversal
for IMS plane based on ICE
and Media over TCP
Firewall traversal for IMS
plane based on ICE and
Media over TCP
Multiple operator certificates
enrolment
Security requirement for
ProSe architecture
Authentication for ProSe UE
S3130734
S3130735
S3130736
S3130737
S3130738
S3130739
S3130740
S3130741
S3130742
S3130743
S3130744
S3130745
S3130746
S3130747
S3130748
S3130749
S3130750
S3130751
S3130752
S3130753
S3130754
S3130755
S3130756
S3130757
S3130758
S3-
network selection
Threat in key issue - Use
WLAN Access Network Type
and Venue Information for
network selection
Common threats in key
issues
Security requirement for key
issues
Solution of support WLAN
access through roaming
agreements
Enhancement to Key issueInteraction between WLAN
network selection and
network-provided policies for
WLAN selection
Security requirements on
MTC
Network based method for
privacy concern
Study on Subscriber Privacy
Impact in 3GPP
China Unicom
noted
-
-
China Unicom
noted
-
-
China Unicom
noted
-
-
China Unicom
noted
-
-
China Unicom
noted
-
-
China Unicom
noted
-
-
China Unicom
approved
-
-
AT&T, CATR, CATT, China
Telecom, China Unicom, Ericsson,
HiSilicon, Huawei, Intel,
InterDigital, KPN, Nokia
Corporation, Nokia Siemens
Networks, Samsung, ST-Ericsson,
TeliaSonera, TNO, ZTE
Corporation
Samsung
revised
-
S3130881
revised
-
Samsung
revised
-
S3130843
S3130853
NEC Corporation
approved
-
-
SDT: Evaluation of SA2
remaining solutions
MTC-IWF based security
solution remaining issues
pCR: Modification to MTCIWF based security solution
for small data transmission
Updates on triggering with
regular GBA
33.868: Missing References
and Hanging Paragraphs
Triggering with GBA push
over Tsms
Updates on Triggering with
GBA push over Tsp
Secure fax progress in IETF
NEC Corporation
revised
-
NEC Corporation
noted
-
S3130862
-
NEC Corporation
revised
-
S3130861
Ericsson, ST-Ericsson
approved
-
-
Ericsson, ST-Ericsson
approved
-
-
Ericsson, ST-Ericsson
approved
-
-
Ericsson, ST-Ericsson
approved
-
-
Ericsson, ST-Ericsson
noted
-
-
Way forward on TR33.869
Research In Motion UK Ltd.,
Vodafone
Ericsson, ST-Ericsson
noted
-
-
revised
-
Ericsson, ST-Ericsson
approved
-
S3130835
-
Research In Motion UK Ltd.,
Vodafone
Research In Motion UK Ltd.
noted
-
-
noted
-
-
Ericsson, ST-Ericsson
revised
-
S3130846
Research In Motion UK Ltd.
approved
-
-
Discussion on draft reply LS
on SDDTE security aspects
Security aspects of
connectionless Data
Transmission
Security for ProSe system
(Draft) LS reply on NAT and
GIBA
Aligning TP Protocol Id in
draft TS 33.187
pCR: Conclusion section of
TR33.869
Clarifications on Implicit
Certificate approach
Clarification of small data fast
path threats and
requirements
pCR: Clarifications on PWS
130759
S3130760
S3130761
S3130762
S3130763
S3130764
S3130765
S3130766
S3130767
S3130768
S3130769
S3130770
S3130771
S3130772
S3130773
S3130774
S3130775
S3130776
S3130777
S3130778
S3130779
S3130780
S3130781
S3130782
S3130783
S3130784
S3-
CA update message for
Implicit Certificates
pCR: Clarifications on
Timestamps for Implicit
Certificates
pCR: Clarifications on
Roaming and application of
Implicit Certificates
Using user consent for GBA
and SSO
Security considerations on
implicit certificates with Keyed
MAC signature
Text for scope and
abbreviations and removal of
editor's notes
PWS and PWS Security
Requirements
33.865 WLAN: Observations
on Solution 1
Correction of Specification of
Tunnelling of UE Services
over Restrictive Access
Networks - IMS case
Conclusion on Signature
Algorithms
Discussion on KeNB rekeying
[SECAM] Merge of S3130634 and S3-130639 (on
TOE/TSF definition and use)
Revision of clause on KeNB
re-keying
[SECAM] Merge attempt of
S3-130770 and S3-130648
(TOE/TSF definition)
ProSe authentication
Security Evaluation of MTCe
SDDTE solutions - Overall
Security Evaluation of MTCe
SDDTE Solution 6A
Security Evaluation of MTCe
SDDTE Solution 6B
Securely distinguishing
between genuine and false
warning notifications without
signature
More details on fast path
security protocol
Revised WID for Web Real
Time Communication
(WebRTC) Access to IMS
Missing caption and hanging
paragraph
Proposed overview text for
Prose
Inclusion of the SA2
architecture in the Prose TR
Proposed configuration data
key issue for Prose
Proposed new key issue on
Restricted Direct Discovery
for the Prose TR
EAP/PANA-based Solution
Research In Motion UK Ltd.
approved
-
-
Research In Motion UK Ltd.
approved
-
-
Ericsson, ST-Ericsson
revised
-
Research In Motion UK Ltd.
noted
-
S3130891
-
Ericsson, ST-Ericsson
approved
-
-
Ericsson, ST-Ericsson
revised
-
Ericsson, ST-Ericsson
approved
-
S3130868
-
Nokia Corporation, Nokia Siemens
Networks
revised
-
S3130883
Ericsson, ST-Ericsson
noted
-
-
Nokia Corporation, Nokia Siemens
Networks
Orange, China Mobile, AlcatelLucent
noted
-
-
revised
-
S3130876
Qualcomm, Nokia Corporation,
Nokia Siemens Networks, AlcatelLucent, AT&T, Orange
Orange, Nokia Siemens Networks
revised
-
S3130838
revised
-
S3130876
Intel
approved
-
-
Nokia Corporation, Nokia Siemens
Networks, Intel, China Unicom
Nokia Corporation, Nokia Siemens
Networks, Intel, China Unicom,
ZTE
Nokia Corporation, Nokia Siemens
Networks, Intel, China Unicom
Ericsson, ST-Ericsson
revised
-
revised
-
S3130862
S3130850
revised
-
revised
-
Ericsson, ST-Ericsson
revised
-
Ericsson, ST-Ericsson
revised
-
Ericsson, ST-Ericsson
agreed
-
-
Qualcomm Incorporated
approved
-
-
Qualcomm Incorporated
noted
-
-
Qualcomm Incorporated
approved
-
-
Qualcomm Incorporated
approved
-
-
Samsung
approved
-
-
S3130858
S3130867
S3130848
S3130837
130785
S3130786
S3130787
S3130788
S3130789
S3130790
S3130791
S3130792
S3130793
S3130794
S3130795
S3130796
S3130797
S3130798
S3130799
S3130800
S3130801
S3130802
S3130803
S3130804
S3130805
S3130806
S3130807
S3130808
S3130809
S3130810
S3130811
S3130812
S3130813
S3130814
S3-
for Secure Connection
Proposed key issue for 1-1
communication
Proposed solution for
configuration data delivery in
ProSe
solution of supporting security
protection for WLAN network
selection
Authentication for
communication with WLAN
network
Security for restricted ProSe
direct discovery
33.865 WLAN: Proposal for
structure and editorial
corrections
security requirements for
WLAN network selection
pCR to TR 33.868: evaluation
of Secure Connection
Solution for ProSe one-to-one
communications
ProSe accounting
considerations
ProSe discovery id semantics
and operator risks
Solution of supporting
security protection for WLAN
network selection
Authentication for
communication with WLAN
network
security requirements for
WLAN network selection
Reply LS on interaction of
oneM2M with Underlying
Networks
comments to S3-130695
Qualcomm Incorporated
approved
-
-
Qualcomm Incorporated
approved
-
-
Samsung
withdrawn
-
-
Samsung
withdrawn
-
-
Qualcomm Incorporated
approved
-
-
Ericsson, ST-Ericsson
approved
-
-
Samsung
withdrawn
-
-
Gemalto, Morpho Cards
approved
-
-
Qualcomm Incorporated
revised
-
Qualcomm Incorporated
approved
-
S3130884
-
Qualcomm Incorporated
noted
-
-
Samsung
approved
-
-
Samsung
approved
-
-
Samsung
approved
-
-
S2-132326
noted
-
-
China Mobile
noted
-
-
[SECAM] comments on
contribution S3-130647
[SECAM] comments on
contribution S3-130652
[SECAM] comments on
contribution S3-130623
[SECAM] comments on
contribution S3-130624
[SECAM] comments on
contribution S3-130625
[SECAM] comments on
contribution S3-130646
SECAM comments on 620
Alcatel-Lucent
revised
-
Alcatel-Lucent
revised
-
Alcatel-Lucent
approved
-
S3130855
S3130860
-
Alcatel-Lucent
withdrawn
-
-
Alcatel-Lucent
revised
-
Alcatel-Lucent
revised
-
Orange, Nokia Siemens Networks
revised
-
SECAM comments on 624
Nokia Siemens Networks
revised
-
SECAM comments on 625
Orange, Nokia Siemens Networks
revised
-
SECAM comments on 632
Orange, Nokia Siemens Networks
noted
-
S3130857
S3130875
S3130856
S3130878
S3130857
-
SECAM comments on 633
Orange, Nokia Siemens Networks
revised
-
SECAM comments on 646
Nokia Siemens Networks
revised
-
SECAM comments on 647
and 692
SECAM comments on 648
Nokia Siemens Networks
revised
-
Nokia Siemens Networks
revised
-
S3130859
S3130875
S3130855
S3-
130815
S3130816
S3130817
S3130818
S3130819
S3130820
S3130821
S3130822
S3130823
S3130824
S3130825
S3130826
S3130827
S3130828
S3130829
S3130830
S3130831
S3130832
S3130833
S3130834
S3130835
S3130836
S3130837
S3130838
S3130839
S3130840
S3130841
S3130842
and 770
SECAM comments on 652
130876
S3130860
-
Orange, Nokia Siemens Networks
revised
-
SECAM merger of 627 and
650
ALU Comments on S3130685
ALU Comments on S3130695
ALU Comments on S3130776
SECAM comments on S3130625
Comments on S3-130646,S3130647,S3-130652 etc and
related to S3-130633 and S3130632
[SECAM] comments on
contribution S3-130770
Update of S3-130726 Multiple
operator certificates
enrolment
Comments on S3-130794
Solution for ProSe one-to-one
communications
Comments on S3-130640
Section 5.2.8.x
Comments on Tdocs 0775 on
Security Evaluation of MTCe
SDDTE Solution 6A
Secure Connection details on
GBA based solutions
Update of 729: CR to 23.060:
Solution of restricting the
USIM to specific UEs
Update of 730: pCR to
23.401: Solution of restricting
the USIM to specific UEs
update of S3-130731 Solution
of restricting the USIM to
specific UEs
KMS based solution for
immediate messaging
Secure UDPTL based T.38
fax
Clarification regarding NAT
and GIBA
LS reply on NAT and GIBA
Orange, Nokia Siemens Networks
approved
-
Alcatel-Lucent
revised
-
Alcatel-Lucent
noted
-
Alcatel-Lucent
revised
-
China Mobile
revised
-
China Mobile
noted
-
Alcatel-Lucent
revised
-
Huawei, Hisilicon, TeliaSonera,
Vodafone
noted
-
Nokia Corporation, Nokia Siemens
Networks
revised
-
S3130884
Juniper Networks
approved
-
-
Ericsson, ST-Ericsson
revised
-
S3130850
Ericsson, ST-Ericsson
noted
-
-
Ericsson, ST-Ericsson, Nokia,
Nokia Siemens Networks,
TeliaSonera
Ericsson, ST-Ericsson, Nokia,
Nokia Siemens Networks,
TeliaSonera
Nokia, Nokia Siemens Networks,
Ericsson, ST-Ericsson, Samsung,
TeliaSonera
Ericsson, ST-Ericsson
noted
-
-
noted
-
-
noted
-
-
agreed
-
Ericsson, ST-Ericsson
agreed
Ericsson, ST-Ericsson
withdrawn
S3130698
S3130700
-
Ericsson, ST-Ericsson
approved
-
Reply to: Reply LS on
enhancing IMEI based Lawful
Interception in IMS
Revised WID for Web Real
Time Communication
(WebRTC) Access to IMS
Revision of clause on KeNB
re-keying
Sprint
approved
S3130754
-
Ericsson, ST-Ericsson
approved
S3130779
-
Qualcomm, Nokia Corporation,
Nokia Siemens Networks, AlcatelLucent, AT&T, Orange
Huawei, HiSilicon
agreed
S3130771
-
agreed
S3130671
-
NSN, Ericsson, ST Ericsson,
Alcatel-Lucent
3GPP SA WG3
agreed
-
China Mobile
approved
S3130629
S3130628
-
Correction of the editorial
errors and the incorrect
description
Access mode verification for
H(e)NBs
Response LS on H(e)NB
Access Control Verification
Reply to: LS on interaction of
oneM2M with Underlying
agreed
S3130851
S3130858
S3130857
-
S3130876
-
-
-
-
S3130843
S3130844
S3130845
S3130846
S3130847
S3130848
S3130849
S3130850
S3130851
S3130852
S3130853
S3130854
S3130855
S3130856
S3130857
S3130858
S3130859
S3130860
S3130861
S3130862
S3130863
S3130864
S3130865
S3130866
S3130867
S3130868
S3-
Networks
Reply to: LS on requesting
input on security aspects for
MTCe solutions
MME overload threat analysis
Intel
revised
-
S3130889
Intel
approved
-
Draft TR MTCe
Rapporteur
approved
S3130732
-
Clarification of small data fast
path threats and
requirements
Firewall traversal for IMS
plane based on ICE and
Media over TCP
More details on fast path
security protocol
Security context
synchronization when SGW
relocates for fast path
solution
Security Evaluation of MTCe
SDDTE Solution 6A
Ericsson, ST-Ericsson
approved
S3130758
-
Huawei , HiSilicon
noted
S3130725
-
Ericsson, ST-Ericsson
approved
-
Huawei, HiSilicon
approved
S3130778
S3130686
Nokia Corporation, Nokia Siemens
Networks, Intel, China Unicom,
ZTE
Alcatel-Lucent
approved
S3130775
-
approved
-
Alcatel-Lucent
approved
Samsung
approved
S3130660
S3130661
S3130743
Orange
noted
-
-
Nokia Siemens Networks, Orange,
China Mobile
Nokia Siemens Networks, Orange
approved
-
Nokia Siemens Network, Orange
approved
S3130647
S3130808
S3130810
Alcatel-Lucent
approved
-
China Mobile, Orange,
TeliaSonera, China Unicom, Nokia
Siemens Network
Orange
approved
S3130662
S3130812
-
NEC Corporation
approved
S3130652
S3130747
NEC Corporation
approved
-
ZTE Corporation, China Unicom
agreed
Rapporteur
approved
S3130745
S3130669
-
new draft TR PWS
Rapporteur
approved
-
-
Some PWS Requirement vs
Security Solutions Analysisv4
Securely distinguishing
between genuine and false
warning notifications without
signature
PWS and PWS Security
Requirements
Draft TR for Firewall
ZTE Corporation, China Unicom
noted
S3130667
-
Ericsson, ST-Ericsson
approved
S3130777
-
Ericsson, ST-Ericsson
approved
-
Rapporteur
approved
S3130765
-
MTCe Connectionless
Solution: Enhancements
MTCe Connectionless
Solution Threat Scenarios
Security aspects of
connectionless Data
Transmission
SECAM evening sessions at
SA3#72 – minutes
Clarification on VT and
definitions
SAS instantiation content
after the first evening session
SAS instantiation evaluation
and compliance testing
activities
MTCe Connectionless
Solution Evaluation Changes
Vulnerability testing activities
and accreditation
Update of S3-130652 after
the first evening session
pCR: Modification to MTCIWF based security solution
for small data transmission
SDT: Evaluation of SA2
remaining solutions
HSS filtering SMS-delivered
device trigger message
New draft TS MTCe
approved
approved
-
-
-
-
-
-
-
-
130869
S3130870
S3130871
S3130872
S3130873
S3130874
S3130875
S3130876
S3130877
S3130878
S3130879
S3130880
S3130881
S3130882
S3130883
S3130884
S3130885
S3130886
S3130887
S3130888
S3130889
S3130890
S3130891
S3130892
Traversal
TURAN: IMS FW traversal
CR, update to flowchart
LS to SA1 on PWS security
requirements
Firewall traversal for IMS
services based on ICE
Draft TR WLAN NS
S3130720
-
-
S3130697
-
-
approved
S3130636
-
Telecom Italia, Orange, Ericsson,
China Unicom
Orange, Nokia Siemens Networks,
Ericsson,China Mobile
approved
S3130646
S3130639
-
Huawei, HiSilicon
approved
-
Nokia Siemens Networks, Orange,
Juniper Networks
Oracle
approved
S3130674
S3130809
-
Nokia Siemens Networks
approved
-
AT&T, CATR, CATT, China
Telecom, China Unicom, Ericsson,
HiSilicon, Huawei, Intel,
InterDigital, KPN, Nokia
Corporation, Nokia Siemens
Networks, Samsung, ST-Ericsson,
TeliaSonera, TNO, ZTE
Corporation
Rapporteur
approved
S3130719
S3130741
approved
-
-
Correction of Specification of
Tunnelling of UE Services
over Restrictive Access
Networks - IMS case
Proposed resolutions for
comments on Solution for
ProSe one to one
communications
First version of SECAM draft
TR
Second version of SECAM
draft TR
Draft TR SSO
Nokia Corporation, Nokia Siemens
Networks
agreed
S3130767
-
Qualcomm Incorporated
approved
S3130794
-
Rapporteur
approved
-
-
Rapporteur
approved
-
-
Rapporteur
approved
-
-
Considerations to PWS UE
settings pCR
Reply to: LS on requesting
input on security aspects for
MTCe solutions
Version of TR MTCe after
email approval
Using user consent for GBA
and SSO
Generalize the environment
of functions and nodes to
cover NFV scenarios
Nokia Corporation, Nokia Siemens
Networks
Intel
approved
S3130718
S3130843
-
Rapporteur
approved
-
-
Ericsson, ST-Ericsson
approved
-
China Unicom
approved
S3130762
S3130641
Test methodology document Update of 636 after the
evening session 2
SAS Writing - Update of 646
after the evening session 2
TOE/TSF, scope of
evaluation – Update after the
evening session 2
Trusted relationship of the
WLAN network
TR 33.805 conclusion -merge
Reply to SA1: LS on
Notifications on Firewall
Traversal
Updated WID proposal
GCSE_LTE security
Study on Subscriber Privacy
Impact in 3GPP
Draft TR Prose
Oracle
agreed
NTT Docomo
noted
Ericsson, ST-Ericsson, Huawei
agreed
Rapporteur
approved
CMCC
approved
approved
approved
-
-
-
-
-
-
-
Annex B: List of change requests
Document
S3-130669
S3-130863
S3-130720
S3-130870
S3-130697
S3-130872
S3-130699
S3-130834
S3-130767
S3-130883
S3-130780
S3-130725
S3-130847
S3-130629
S3-130840
S3-130698
S3-130832
Title
HSS filtering SMSdelivered device
trigger message
HSS filtering SMSdelivered device
trigger message
TURAN: IMS FW
traversal CR,
update to flowchart
TURAN: IMS FW
traversal CR,
update to flowchart
Firewall traversal
for IMS services
based on ICE
Firewall traversal
for IMS services
based on ICE
Clarification
regarding NAT and
GIBA
Clarification
regarding NAT and
GIBA
Correction of
Specification of
Tunnelling of UE
Services over
Restrictive Access
Networks - IMS
case
Correction of
Specification of
Tunnelling of UE
Services over
Restrictive Access
Networks - IMS
case
Missing caption
and hanging
paragraph
Firewall traversal
for IMS plane
based on ICE and
Media over TCP
Firewall traversal
for IMS plane
based on ICE and
Media over TCP
Access mode
verification for
H(e)NBs
Access mode
verification for
H(e)NBs
KMS based
solution for
immediate
messaging
KMS based
solution for
immediate
Source
ZTE Corporation,
China Unicom
Spec
23.682
CR
0075
Rev
-
Rel
Rel11
Cat
-
-
ZTE Corporation,
China Unicom
23.682
0075
Oracle
33.20
Oracle
WI
Decision
revised
1
-
-
-
agreed
0198
-
Rel12
B
TURAN
revised
33.20
0198
1
Rel12
B
TURAN
agreed
Ericsson, STEricsson, Huawei
33.203
0199
-
Rel12
B
TURAN
revised
Ericsson, STEricsson, Huawei
33.203
0199
1
Rel12
B
TURAN
agreed
Ericsson, STEricsson
33.203
0200
-
Rel12
D
SEC12
agreed
Ericsson, STEricsson
33.203
0200
1
Rel12
D
SEC12
withdrawn
Nokia
Corporation,
Nokia Siemens
Networks
33.203
0201
-
Rel12
F
TURAN
revised
Nokia
Corporation,
Nokia Siemens
Networks
33.203
0201
1
Rel12
F
TURAN
agreed
Ericsson, STEricsson
33.203
0202
-
Rel12
D
TURAN
agreed
Huawei , HiSilicon
33.203
0203
-
-
-
-
revised
Huawei , HiSilicon
33.203
0203
1
Rel12
-
TURAN
noted
NSN, Ericsson,
ST Ericsson,
Alcatel-Lucent
NSN, Ericsson,
ST Ericsson,
Alcatel-Lucent
Ericsson, STEricsson
33.320
0094
2
Rel12
C
TEI12,
EHNB-Sec
revised
33.320
0094
3
Rel12
C
TEI12,
EHNB-Sec
agreed
33.328
0054
-
Rel12
C
eMEDIASEC
revised
Ericsson, STEricsson
33.328
0054
1
Rel12
C
eMEDIASEC
agreed
S3-130700
S3-130833
S3-130771
messaging
Secure UDPTL
based T.38 fax
Secure UDPTL
based T.38 fax
Revision of clause
on KeNB re-keying
S3-130838
Revision of clause
on KeNB re-keying
S3-130671
Correction of the
editorial errors and
the incorrect
description
Correction of the
editorial errors and
the incorrect
description
S3-130839
Ericsson, STEricsson
Ericsson, STEricsson
Qualcomm, Nokia
Corporation,
Nokia Siemens
Networks, AlcatelLucent, AT&T,
Orange
Qualcomm, Nokia
Corporation,
Nokia Siemens
Networks, AlcatelLucent, AT&T,
Orange
Huawei, HiSilicon
33.328
0055
-
Rel12
Rel12
Rel12
B
eMEDIASEC
revised
33.328
0055
1
B
eMEDIASEC
agreed
33.401
0522
-
C
TEI12,SAES
revised
33.401
0522
1
Rel12
C
TEI12,SAES
agreed
33.402
0114
-
Rel11
F
TEI12,SAES
revised
Huawei, HiSilicon
33.402
0114
1
Rel12
F
TEI12,SAES
agreed
Annex C: Lists of liaisons
C1: Incoming liaison statements
Document
Original
Title
From
Decision
S3-130605
LS on NAT and GIBA
C1-131743
replied to
S3-130605
LS on NAT and GIBA
C1-131743
replied to
S3-130606
LS on MS's reaction to network's choice of an
unsupported ciphering algorithm
Reply LS on Enhancing IMEI based Lawful
Interception in IMS
Reply LS to the LS on Optimization of the IMS
Information and Security Parameters for CS to PS
SRVCC from GERAN to E-UTRAN/HSPA
LS/o on draft Recommendation ITU-T X.sap-8,
Efficient multi-factor authentication mechanisms
using mobile devices
LS on interaction of oneM2M with Underlying
Networks
C1-131749
noted
C1-131767
noted
C1-132535
noted
ITU-T SG17
postponed
oneM2M
Technical
Plenary
R2-131538
R2-132189
S1-132171
replied to
S1-133279
replied to
S2-131521
replied to
S2-131522
noted
S2-132323
S2-132327
noted
replied to
S2-132327
replied to
SA3-LI
Intel
noted
noted
S2-132326
noted
S3-130607
S3-130608
S3-130609
S3-130610
S3-130611
S3-130612
S3-130613
S3-130614
S3-130615
S3-130616
S3-130617
S3-130618
S3-130618
S3-130619
S3-130690
S3-130800
Reply LS on Follow-up LS on KeNB re-keying
Reply LS on evaluation of MTCe solutions
LS on Feedback on Proximity Services and Lawful
Interception
Reply LS on Notifications on Firewall Traversal from
LS Reply SA2 S2-130722 and CT1 C1-130773
Reply LS on enhancing IMEI based Lawful
Interception in IMS
Reply LS on Proximity Services and Lawful
Interception
LS reply on NAT and GIBA
LS on requesting input on security aspects for MTCe
solutions
LS on requesting input on security aspects for MTCe
solutions
Reply LS on IMEI based Lawful Interceptions in IMS
draft Reply LS on input on security aspects for MTCe
solutions
Reply LS on interaction of oneM2M with Underlying
Networks
Reply
in
S3130835
S3130754
S3130842
noted
noted
noted
S3130879
S3130836
S3130889
S3130843
C2: Outgoing liaison statements
Document
S3130835
S3130836
S3130841
S3130842
S3130879
S3130889
Title
To
Cc
LS reply on NAT and GIBA
CT1,SA2
-
reply to i/c
LS
S3-130605
Reply to: Reply LS on enhancing IMEI based
Lawful Interception in IMS
Response LS on H(e)NB Access Control
Verification
Reply to: LS on interaction of oneM2M with
Underlying Networks
Reply to SA1: LS on Notifications on
Firewall Traversal
Reply to: LS on requesting input on security
aspects for MTCe solutions
SA2,SA3-LI
-
S3-130615
RAN3
-
R3-130419
oneM2M Technical
Plenary
SA1
SA1,SA2,CT3
S3-130610
CT1,SA2
S3-130614
SA2
RAN2,RAN3,GERAN2
S3-130618
Annex D: List of agreed/approved new and revised Work Items
Document
S3130881
Title
Study on Subscriber Privacy
Impact in 3GPP
S3130837
Revised WID for Web Real
Time Communication
(WebRTC) Access to IMS
Updated WID proposal
GCSE_LTE security
S3130880
Source
AT&T, CATR, CATT, China Telecom, China Unicom,
Ericsson, HiSilicon, Huawei, Intel, InterDigital, KPN, Nokia
Corporation, Nokia Siemens Networks, Samsung, STEricsson, TeliaSonera, TNO, ZTE Corporation
Ericsson, ST-Ericsson
new/revised
new WID
Nokia Siemens Networks
revised WID
revised WID
Annex E: List of action items
Meeting/Number
S3-72/1
Agenda
item
4.2
Document
S3130601
Details
All Rapporteurs should check their
specifications to make sure that there are no
external references (to non 3GPP documents) as
recommended by SA, and remove those which
are there by using CRs.
Responsible
Chairman
Due
by
201309-26
Annex F: List of participants
Name
Representing
Status (OP)
Aldén, Magnus (Dr.)
TeliaSonera AB
3GPPMEMBER (ETSI)
Barry, Aguibou (Mr.)
VODAFONE Group Plc
3GPPMEMBER (ETSI)
Blanchard, Colin (Mr.)
BT Group Plc
3GPPMEMBER (ETSI)
Buckley, Eoin (Dr.)
Research in Motion UK Limited
3GPPMEMBER (ETSI)
Calvez, Christophe (Mr.)
EADS
3GPPMEMBER (ETSI)
Cano Soveri, Mirko (Mr.)
ETSI
3GPPORG_REP (ETSI)
Castagno, Mauro (Mr.)
TELECOM ITALIA S.p.A.
3GPPMEMBER (ETSI)
Chen, Jing (Mr.)
HUAWEI TECHNOLOGIES Co. Ltd.
3GPPMEMBER (ETSI)
Dolly, Martin (Mr.)
AT&T GNS Belgium SPRL
3GPPMEMBER (ETSI)
Escott, Adrian (Dr.)
Qualcomm Korea
3GPPMEMBER (TTA)
Fan, Dongyang (Mr.)
HUAWEI TECHNOLOGIES Co. Ltd.
3GPPMEMBER (ETSI)
Frankel, Sheila (Mrs.)
U.S. Department of Commerce
3GPPMEMBER (ATIS)
Gamishev, Todor (Mr.)
France Telecom
3GPPMEMBER (ETSI)
Gan, Lu (Ms.)
ZTE Corporation
3GPPMEMBER (CCSA)
Gao, Feng (Dr.)
China Unicom
3GPPMEMBER (CCSA)
Guo, Wei (Miss)
CATR
3GPPMEMBER (CCSA)
Habermacher, Loic (Mr.)
ORANGE SA
3GPPMEMBER (ETSI)
He, Chengdong (Mr.)
HuaWei Technologies Co., Ltd
3GPPMEMBER (CCSA)
Holtmanns, Silke (Dr.)
NOKIA UK Ltd
3GPPMEMBER (ETSI)
Horn, Guenther (Dr.)
Nokia Siemens Networks
3GPPMEMBER (ETSI)
Jerichow, Anja (Miss)
Nokia Siemens Networks Oy
3GPPMEMBER (ETSI)
Jiajia, Chen (Mr.)
HuaWei Technologies Co., Ltd
3GPPMEMBER (CCSA)
Jiang, Haiyu (Mr.)
Juniper Networks
3GPPMEMBER (ETSI)
Kohalmi, Steve (Mr.)
Juniper Networks
3GPPMEMBER (ETSI)
Kraemer, Isabelle (Miss)
France Telecom
3GPPMEMBER (ETSI)
Krainioukov, Oleg (Mr.)
Morpho Cards GmbH
3GPPMEMBER (ETSI)
Li, Zhiwei (Dr.)
Huawei Technologies France
3GPPMEMBER (ETSI)
Lu, Wei (Miss)
Nokia Siemens Networks
3GPPMEMBER (ETSI)
Luft, Achim (Mr.)
Intel
3GPPMEMBER (ATIS)
Meng, Nan (Miss)
CATR
3GPPMEMBER (CCSA)
Nair, Suresh (Mr.)
Alcatel-Lucent
3GPPMEMBER (ATIS)
Norrman, Karl (Mr.)
Ericsson Japan K.K.
3GPPMEMBER (ARIB)
Ohlsson, Oscar (Mr.)
ST-Ericsson SA
3GPPMEMBER (ETSI)
Palanigounder, Anand (Mr.)
Qualcomm Japan Inc
3GPPMEMBER (ARIB)
Pauliac, Mireille (Miss)
Gemalto N.V.
3GPPMEMBER (ETSI)
Persson, Staffan (Mr.)
Ericsson Japan K.K.
3GPPMEMBER (ARIB)
Prasad, Anand (Dr.)
NEC Corporation
3GPPMEMBER (ARIB)
Prashant, Kumar (Miss)
Oracle Corporation
3GPPMEMBER (ETSI)
Qi, Minpeng (Mr.)
China Mobile Com. Corporation
3GPPMEMBER (CCSA)
Quan, Mingming (Mr.)
Juniper Networks
3GPPMEMBER (ETSI)
Rajadurai, Rajavelsamy (Mr.)
SAMSUNG Electronics Co., Ltd.
3GPPMEMBER (ARIB)
Sahlin, Bengt (Mr.)
Telefon AB LM Ericsson
3GPPMEMBER (ETSI)
Schroeder, Stefan (Mr.)
T-Mobile Austria GmbH
3GPPMEMBER (ETSI)
Schumacher, Greg (Mr.)
Sprint Nextel Corporation
3GPPMEMBER (ATIS)
Suh, Kyungjoo Grace (Ms.)
Samsung R&D Institute UK
3GPPMEMBER (ETSI)
Wang, Jiangsheng (Mr.)
HuaWei Technologies Co., Ltd
3GPPMEMBER (ATIS)
Wang, Xiaobo (Dr.)
Huawei Technologies (UK)
3GPPMEMBER (ETSI)
WENYU, He (Mr.)
HUAWEI TECHNOLOGIES Co. Ltd.
3GPPMEMBER (ETSI)
Wong, Marcus (Mr.)
Huawei Technologies France
3GPPMEMBER (ETSI)
Wu, Hui (Miss)
Nanjing Ericsson Panda Com Ltd
3GPPMEMBER (CCSA)
Wu, Yizhuang (Miss)
HiSilicon Technologies Co., Lt
3GPPMEMBER (CCSA)
Xu, Kehang (Mr.)
China Unicom
3GPPMEMBER (CCSA)
Xu, Lydia (Ms.)
HUAWEI Technologies Japan K.K.
3GPPMEMBER (ARIB)
Xu, Yang (Mr.)
China Unicom
3GPPMEMBER (CCSA)
Ying, Jiangwei (Mr.)
Huawei Technologies Sweden AB
3GPPMEMBER (ETSI)
Yu, Bo (Mr.)
CCSA
3GPPORG_REP (CCSA)
Zhang, Dajiang (Mr.)
NOKIA Corporation
3GPPMEMBER (ETSI)
ZHANG, Xiaowei (Dr.)
NEC EUROPE LTD
3GPPMEMBER (ETSI)
Zhang, Xuwu (Mr.)
HuaWei Technologies Co., Ltd
3GPPMEMBER (CCSA)
Zhu, Judy (Mrs.)
China Mobile Com. Corporation
3GPPMEMBER (CCSA)
Zhu, Li (Dr.)
ZTE Corporation
3GPPMEMBER (CCSA)
Zugenmaier, Alf (Dr.)
NTT DOCOMO INC.
3GPPMEMBER (ARIB)
Annex H: List of future meetings
Title
3GPPSA3#51-LI
3GPPSA3#73
3GPPSA3#74
3GPPSA3#52-LI
3GPPSA3#53-LI
3GPPSA3#75
3GPPSA3#54-LI
3GPPSA3#76
3GPPSA3#55-LI
Start date
22/10/2013 09:00:00
11/11/2013 09:00:00
20/01/2014 09:00:00
04/02/2014 09:00:00
29/04/2014 09:00:00
12/05/2014 09:00:00
22/07/2014 09:00:00
25/08/2014 09:00:00
28/10/2014 09:00:00
End date (OP)
24/10/2013 17:30:00
15/11/2013 17:30:00
24/01/2014 17:30:00
06/02/2014 17:30:00
01/05/2014 17:30:00
16/05/2014 17:30:00
24/07/2014 17:30:00
29/08/2014 17:30:00
30/10/2014 17:30:00
Town
USA
San Francisco
Taipei
Sophia Antipolis
US
Sapporo (TBC)
Sophia Antipolis
Sophia Antipolis
US
Country
US
US
TW
FR
US
JP
FR
FR
US
Reference
S3-ah-31138
S3-73
S3-74
S3-ah-31149
S3-ah-31150
S3-75
S3-ah-31151
S3-76
S3-ah-31152
Download