[{"name":"SP-180253","title":"LS from CT WG1: Reply LS on SoR mechanism","source":"CT WG1","contact":"Maurice Pope","contact-id":648,"tdoctype":"LS in","for":"Information","abstract":"SA WG3LI thanks SA WG3 and CT WG1 for their LSs in S3-180557 \/ C1-180761 regarding the CT WG1's agreement on the PLMN\/RAT selection mechanisms in the CRs attached in the LS. SA WG3LI has discussed these solutions and identified a number of Lawful Interception (LI) incompatibilities with those mechanisms as detailed by the following aspects: - There is an LI requirement to capture all data sent to and from the target. Any exchange of data prior the authentication of the target UE will not meet LI requirements; - The mechanism creates a potential end-to-end encrypted channel between the UE and the HPLMN which could be extended to allow the delivery of information other than or in addition to preferred PLMN roaming list as intended by CT WG1. This creates a capability that could be exploited to bypass LI in future. To meet LI requirements any mechanisms to be used must occur after successful authentication of the UE. Any mechanism selected by CT WG1 would need to either turn off end-to-en","secretary_remarks":"Noted","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11660,"status":"noted","reservation_date":"2018-05-04 14:36:17","uploaded":"2018-05-04 14:47:55","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA WG3-LI","Cc":"SA WG1, SA WG2, SA WG3, TSG SA, CT WG3, TSG CT","lsoriginalls":"C1-182829","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180253.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"SP-180258","title":"LS from SA WG3LI: LS on SoR mechanism","source":"SA WG3LI","contact":"Maurice Pope","contact-id":648,"tdoctype":"LS in","for":"Information","abstract":"SA WG3LI thanks SA WG3 and CT WG1 for their LSs in S3-180557 \/ C1-180761 regarding the CT WG1's agreement on the PLMN\/RAT selection mechanisms in the CRs attached in the LS. SA WG3LI has discussed these solutions and identified a number of Lawful Interception (LI) incompatibilities with those mechanisms as detailed by the following aspects: - There is an LI requirement to capture all data sent to and from the target. Any exchange of data prior the authentication of the target UE will not meet LI requirements; - The mechanism creates a potential end-to-end encrypted channel between the UE and the HPLMN which could be extended to allow the delivery of information other than or in addition to preferred PLMN roaming list as intended by CT WG1. This creates a capability that could be exploited to bypass LI in future. To meet LI requirements any mechanisms to be used must occur after successful authentication of the UE. Any mechanism selected by CT WG1 would need to either turn off end-to-en","secretary_remarks":"Noted","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11670,"status":"noted","reservation_date":"2018-05-04 14:36:17","uploaded":"2018-05-04 14:47:55","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT WG1, SA WG2, SA WG3","Cc":"TSG CT, CT WG3, TSG SA, SA WG1","lsoriginalls":"S3i180141","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180258.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"SP-180436","title":"Exception sheet 5G security phase one","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WI exception request","for":"Approval","abstract":"Expected Completion Date: September 2018. Abstract of document: The in progress security of service based interface between operators in roaming scenarios needs to be completed. The architecture of the security solution is agreed, cf. SA 3 approved draft CR S3-181937. However, details still need to be worked out during the next quarter. Standardizing the interoperator roaming interface without the security solution could lead to permanently insecure N32 interfaces, as retrofitting won't be possible and opening the opportunity for bidding down attacks. Contentious Issues: None","secretary_remarks":"Approved","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11680,"status":"approved","reservation_date":"2018-06-01 10:44:44","uploaded":"2018-06-05 14:20:02","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180436.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"SP-180452","title":"Rel-15 CRs on Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) Batch 1","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR pack","for":"Approval","abstract":"33.501 CR0018; 33.501 CR0075R1; 33.501 CR0080R1; 33.501 CR0081R1; 33.501 CR0084R1; 33.501 CR0030R1; 33.501 CR0004R1; 33.501 CR0012R1; 33.501 CR0090R1; 33.501 CR0038R2; 33.220 CR0190R1; 33.501 CR0007R2; 33.501 CR0095R2; 33.501 CR0053R2; 33.501 CR0064R4; 33.501 CR0097R2; 33.501 CR0104R1","secretary_remarks":"This CR PACK was block approved","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11690,"status":"approved","reservation_date":"2018-06-01 10:44:47","uploaded":"2018-06-04 08:45:27","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180452.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":[{"crtdoc":"S3-181150","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":18,"crrevision":"","crcategory":"D","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Editorial modification on reference"},{"crtdoc":"S3-181440","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":75,"crrevision":1.0,"crcategory":"C","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"F1-C Protection"},{"crtdoc":"S3-181458","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":80,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections related to authentication related services"},{"crtdoc":"S3-181463","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":81,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Linking increased home control to subsequent procedures"},{"crtdoc":"S3-181465","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":84,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Initiation of authentication and selection of authentication method"},{"crtdoc":"S3-181512","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":30,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Add condition for reset NAS COUNTs"},{"crtdoc":"S3-181549","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":4,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Rules on concurrent running of authentication and NAS SMC procedure"},{"crtdoc":"S3-181567","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":12,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarification on SMS over NAS"},{"crtdoc":"S3-181572","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":90,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarification of NAS MAC computation for TAU protection, algorithm selection and security activation during idle mode mobility from 5GS to EPS"},{"crtdoc":"S3-181576","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":38,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Editorials to 33.501"},{"crtdoc":"S3-181928","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.22,"crnumber":190,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.1.0","crtitle":"Assigning FC values to TS 33.501"},{"crtdoc":"S3-181935","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":7,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Remove EN for initial NAS message protection"},{"crtdoc":"S3-181980","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":95,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Multiple NAS connections"},{"crtdoc":"S3-181983","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":53,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"CR for Clause Security algorithm selection, key establishment and security mode command procedure"},{"crtdoc":"S3-182037","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":64,"crrevision":4.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections to secondary authentication procedure"},{"crtdoc":"S3-182042","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":97,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to Mapping of Security Contexts"},{"crtdoc":"S3-182043","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":104,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"KeNB derivation in 5GS to EPS handover"}],"crsinpacknumber":17},
{"name":"SP-180453","title":"Rel-15 CRs on Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) Batch 2","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR pack","for":"Approval","abstract":"33.501 CR0164; 33.501 CR0135R1; 33.501 CR0150R1; 33.501 CR0153R1; 33.501 CR0155R2; 33.501 CR0162R3; 33.501 CR0157R2; 33.501 CR0165R1; 33.501 CR0156R2; 33.501 CR0118R3; 33.501 CR0143R3; 33.501 CR0149R3; 33.501 CR0125R3; 33.501 CR0147R3; 33.501 CR0161R1; 33.501 CR0152R3; 33.501 CR0163R3","secretary_remarks":"This CR PACK was block approved","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11700,"status":"approved","reservation_date":"2018-06-01 10:44:47","uploaded":"2018-06-04 08:45:27","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180453.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":[{"crtdoc":"S3-181521","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":164,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: RRC security mechanisms"},{"crtdoc":"S3-181565","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":135,"crrevision":1.0,"crcategory":"C","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"TS 33.501 Resolving Editors notes 5.10.1 Security Visibility"},{"crtdoc":"S3-181579","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":150,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Reference corrections in clause 8"},{"crtdoc":"S3-181582","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":153,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Editorial changes to clause 10 and 12"},{"crtdoc":"S3-181929","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":155,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to Annex A : Key derivation functions \u2013 FC values (rev of CR0155)"},{"crtdoc":"S3-181968","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":162,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"IV generation for ECIES"},{"crtdoc":"S3-181981","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":157,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Security handling in state transitions"},{"crtdoc":"S3-181982","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":165,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Authentication for Untrusted non-3GPP Access"},{"crtdoc":"S3-181992","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":156,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clause 6.3.1.4-Reference_wording_error correction -based on Living CR S3-181455"},{"crtdoc":"S3-181993","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":118,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to:\nUsing additional EAP methods for primary authentication"},{"crtdoc":"S3-181995","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":143,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Key hierarchy, key derivation, and distribution scheme"},{"crtdoc":"S3-181996","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":149,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Reference corrections in clause 6"},{"crtdoc":"S3-182005","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":125,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Generalization of key derivation in NG-RAN to cover both gNBs and ng-eNBs"},{"crtdoc":"S3-182035","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":147,"crrevision":3.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Protection at the network or transport layer, Authorization and authentication between network functions and the NRF"},{"crtdoc":"S3-182036","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":161,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to requirements"},{"crtdoc":"S3-182049","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":152,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to definitions and abbreviations"},{"crtdoc":"S3-182092","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":163,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Security handling in mobility"}],"crsinpacknumber":17},
{"name":"SP-180454","title":"Rel-15 CRs on Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) Batch 3","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR pack","for":"Approval","abstract":"33.501 CR0200; 33.501 CR0211; 33.501 CR0212; 33.501 CR0213; 33.501 CR0216; 33.501 CR0217; 33.501 CR0046R2; 33.501 CR0185R1; 33.501 CR0066R2; 33.501 CR0111R2; 33.501 CR0192R1; 33.501 CR0214R1; 33.501 CR0120R1; 33.501 CR0208R1; 33.501 CR0209R1; 33.501 CR0210R1","secretary_remarks":"One CR is subject to the SA WG3 working agreement.. Approved","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11710,"status":"approved","reservation_date":"2018-06-01 10:44:47","uploaded":"2018-06-04 08:45:27","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180454.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":[{"crtdoc":"S3-181802","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":200,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Resolving Editor\u2019s Note on USIM"},{"crtdoc":"S3-181840","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":211,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections of references to sub-clauses"},{"crtdoc":"S3-181846","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":212,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections and clarifications to idle mode mobility from EPS to 5GS over N26"},{"crtdoc":"S3-181867","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":213,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Authorization of Application Function\u2019s requests"},{"crtdoc":"S3-181879","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":216,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarfication to 6.4.1 NAS security general"},{"crtdoc":"S3-181881","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":217,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to Annex D.3 Integrity algorithms"},{"crtdoc":"S3-181962","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":46,"crrevision":2.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"The granularity of NF service discovery"},{"crtdoc":"S3-181985","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":185,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Security procedures for dual connectivity"},{"crtdoc":"S3-181987","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":66,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: UP security mechanisms"},{"crtdoc":"S3-181988","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":111,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Correcting Figure 6.13-1 on gNB periodic local authentication procedure"},{"crtdoc":"S3-181991","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":192,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Correction to: 3GPP 5G profile for EAP-AKA'"},{"crtdoc":"S3-182010","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":214,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Security Mechanism for Steering of Roaming"},{"crtdoc":"S3-182040","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":120,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications on unused 5G authentication vectors, and remaning authentication data"},{"crtdoc":"S3-182046","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":208,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarification of the IPsec implementation requirements"},{"crtdoc":"S3-182047","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":209,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Protection of internal gNB interfaces"},{"crtdoc":"S3-182048","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":210,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Introduction of DTLS for protection of Xn-C and N2 itnerfaces"}],"crsinpacknumber":16},
{"name":"SP-180455","title":"Rel-15 CRs on Security aspects of 5G System - Phase 1 (5GS_Ph1-SEC) Batch 4","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR pack","for":"Approval","abstract":"33.501 CR0107; 33.501 CR0160; 33.501 CR0118R1; 33.501 CR0128R1; 33.501 CR0194; 33.501 CR0189R1; 33.501 CR0201R1; 33.501 CR0196R1; 33.501 CR0145R5; 33.501 CR0115R3; 33.501 CR0170R2; 33.501 CR0172R1; 33.501 CR0184R1; 33.501 CR0183R1; 33.501 CR0105R3","secretary_remarks":"This CR PACK was block approved","agenda_item_sort_order":59,"ainumber":"15C.1","ainame":"(5GS_Ph1-SEC) - Security aspects of 5G System - Phase 1","tdoc_agenda_sort_order":11720,"status":"approved","reservation_date":"2018-06-01 10:44:47","uploaded":"2018-06-04 08:45:27","revisionof":"","revisedto":"","release":"Rel-15","crspec":"","crspecversion":"","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/tsg_sa\/TSG_SA\/TSGS_80\/Docs\/SP-180455.zip","group":"SP","meeting":"SP-80","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":[{"crtdoc":"S3-181334","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":107,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Delete Editor\u2019s Note in C.3.4.3"},{"crtdoc":"S3-181460","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":160,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Authentication framework"},{"crtdoc":"S3-181470","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":118,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to:\nUsing additional EAP methods for primary authentication"},{"crtdoc":"S3-181568","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":128,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"CR to Clause 10.2.1 on Emergency Call redirection"},{"crtdoc":"S3-181789","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":194,"crrevision":"","crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections to section 4.1 Security domains"},{"crtdoc":"S3-181932","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":189,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Editorial correction to clause 6.12.5 on SIDF"},{"crtdoc":"S3-181955","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":201,"crrevision":1.0,"crcategory":"C","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Addition of SBA security requirements for SEPP and NF"},{"crtdoc":"S3-181959","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":196,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Corrections to section 13.4.1.1"},{"crtdoc":"S3-181970","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":145,"crrevision":5.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarification to Subscription identifier privacy"},{"crtdoc":"S3-181990","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":115,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Authentication procedures"},{"crtdoc":"S3-182050","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":170,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Correction for TS 33.501 subclause 4.1"},{"crtdoc":"S3-182051","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":172,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Correction for TS 33.501 subclause 5.11.2"},{"crtdoc":"S3-182060","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":184,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Key Handling at RRC state transitions"},{"crtdoc":"S3-182061","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":183,"crrevision":1.0,"crcategory":"B","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Security Negotiation for RRC INACTIVE"},{"crtdoc":"S3-182093","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.501,"crnumber":105,"crrevision":3.0,"crcategory":"F","crrelease":"Rel-15","crspecversion":"15.0.0","crtitle":"Clarifications to: Handover from EPS to 5GS over N26"}],"crsinpacknumber":15}]