[{"name":"S3-230623","title":"Reply LS on the impact of MSK update on MBS multicast session update procedure","source":"S2-2209287","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":360,"status":"replied to","reservation_date":"2023-03-02 14:19:44","uploaded":"2023-02-06 11:23:25","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-231410, S3-231410","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230623.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230651","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"SEPP to support multiple lists of root CAs.","secretary_remarks":"Source modified on 2\/7\/2023. Original source : BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6510,"status":"revised","reservation_date":"2023-07-02 14:46:15","uploaded":"2023-02-07 16:30:44","revisionof":"","revisedto":"S3-231423","release":"Rel-16","crspec":"33.501","crspecversion":"16.13.0","workitem":[{"winame":"TEI16"}],"crnumber":1526.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230651.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 13.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230652","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"SEPP to support multiple lists of root CA certificates","secretary_remarks":"Source modified on 2\/7\/2023. Original source : BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6520,"status":"revised","reservation_date":"2023-07-02 14:53:02","uploaded":"2023-02-07 16:30:44","revisionof":"","revisedto":"S3-231448","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI16"}],"crnumber":1527.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230652.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 13.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230653","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"SEPP to support multiple lists of root CA certificates","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6530,"status":"revised","reservation_date":"2023-07-02 14:56:19","uploaded":"2023-02-07 16:30:44","revisionof":"","revisedto":"S3-231449","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1528.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230653.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230656","title":"Clarification of hashing","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add the terms \u201ccryptographic\u201d and \u201cwith unique salt per record\u201d to hash algorithm requirement, purpose and expected results.\nAdd checks for correct and salted cryptographic hashing.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6560,"status":"revised","reservation_date":"2023-08-02 07:08:16","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230682","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":97.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230656.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230657","title":"Clarification of authorization verification","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add verification of user authorization.\nAccordingly, add successful authorization to the expected results.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6570,"status":"revised","reservation_date":"2023-08-02 07:13:29","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230683","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":98.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230657.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230658","title":"Clarification of brute force mitigation mechanism verification","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add pre-condition and execution step to test alternatively measures.\nMake use of CAPTCHA feature optional, to be in line with requirements.\nAdd check for incorrect CAPTCHA","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6580,"status":"revised","reservation_date":"2023-08-02 07:18:07","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230684","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":99.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230658.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230659","title":"Clarification of privilege escalation methods to check for","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add check of capabilities as additional example in pre-conditions","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6590,"status":"revised","reservation_date":"2023-08-02 07:20:52","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230685","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":100.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230659.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230660","title":"Clarification of service reachability restriction verification","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Make the test execution more generic for a variable number of network interfaces and checking for service reachability on all interfaces.\nAdd evidence for port scanner name and version and make configuration evidence more specific","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6600,"status":"revised","reservation_date":"2023-08-02 07:23:54","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230686","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":101.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230660.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230661","title":"Clarification of auto-launch verification","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add execution step to test every available type of physical port for removable media devices.\nAdd execution step to ensure that the removable media device triggers an automatic launch.\nAdd execution step to verify that there is no automatic launch when a","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6610,"status":"revised","reservation_date":"2023-08-02 07:27:03","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230687","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":102.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230661.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230662","title":"Clarification of SYN Flood attack prevention test","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Added vendor documentation describing SYN Flood attack prevention mechanism to pre-conditions.\nAdded vendor documentation check to test steps.\nAdded more precise instructions to last execution step.\nAdded executed SYN Flood attack to expected format of ev","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6620,"status":"revised","reservation_date":"2023-08-02 07:31:43","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230688","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":103.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230662.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230663","title":"Clarification of privilege verification","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Rewrite the execution steps to ensure that the web server is configured with minimal privileges.\nAdd concrete test steps to actually verify the fulfilment of the requirements.\nAdd evidence for part of the configuration that shows how the privileges are dr","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6630,"status":"revised","reservation_date":"2023-08-02 07:34:48","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230689","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":104.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230663.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230664","title":"Clarification of CGI\/Scripting component directory check","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Fixed test purpose to comply with requirements.\nAdded execution step to consult the web server configuration for CGI folders.\nRemoved irrelevant execution step concerning the system settings.\nAdded web server configuration and folder listing to format of","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6640,"status":"revised","reservation_date":"2023-08-02 07:38:05","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230690","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":105.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230664.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230665","title":"Clarification of SSI System Command Excecution test","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Added test step to actually check for the intended test purpose.\nFixed expected results to comply with test steps and purpose.\nAdded log of new test step to expected format of evidences","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6650,"status":"revised","reservation_date":"2023-08-02 07:40:42","uploaded":"2023-02-09 10:35:36","revisionof":"","revisedto":"S3-230691","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS"}],"crnumber":106.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230665.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230673","title":"Referencing GSMA for interdomain N32 certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Andreas Pashalidis","contact-id":97357,"tdoctype":"CR","for":"Approval","abstract":"Adding reference to GSMA FS.34","secretary_remarks":"Source modified on 2\/9\/2023. Original source : BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6730,"status":"revised","reservation_date":"2023-09-02 07:20:13","uploaded":"2023-02-09 07:23:06","revisionof":"","revisedto":"S3-231435","release":"Rel-17","crspec":"33.310","crspecversion":"17.5.0","workitem":[{"winame":"TEI17"}],"crnumber":146.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230673.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, 6.1.3c.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230676","title":"Discussion on AMF SCAS test for incorrectly encoded security capabilities","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"discussion","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6760,"status":"noted","reservation_date":"2023-09-02 08:07:29","uploaded":"2023-02-10 14:42:47","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"","workitem":[{"winame":"SCAS"},{"winame":" SCAS_5G"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230676.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230677","title":"Threat reference for incorrectly encoded UE security capabilities on the NG interface","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6770,"status":"revised","reservation_date":"2023-09-02 09:07:33","uploaded":"2023-02-10 14:42:47","revisionof":"","revisedto":"S3-230715","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"SCAS"},{"winame":" SCAS_5G"}],"crnumber":65.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230677.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230678","title":"New SCAS test on valid UE security capability encoding while AS security establishment","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6780,"status":"revised","reservation_date":"2023-09-02 09:12:31","uploaded":"2023-02-10 14:42:47","revisionof":"","revisedto":"S3-230716","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"SCAS"},{"winame":" SCAS_5G"}],"crnumber":23.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230678.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230679","title":"New WID on 5G Security Assurance Specification (SCAS) for the Policy Control Function (PCF)","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"WID new","for":"Agreement","abstract":"The objective is to develop the SCAS for the PCF network product class, with the aims to:\n-\tidentify critical assets and threats of the PCF not already identified in TR 33.926\n-\tdevelop and\/or adapt PCF specific security functional requirements and relate","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6790,"status":"revised","reservation_date":"2023-09-02 09:52:34","uploaded":"2023-02-10 14:45:04","revisionof":"","revisedto":"S3-231187","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230679.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230680","title":"New WID on 5G Security Assurance Specification (SCAS) for the Unified Data Repository (UDR)","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"WID new","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6800,"status":"revised","reservation_date":"2023-09-02 09:59:33","uploaded":"2023-02-10 14:45:04","revisionof":"","revisedto":"S3-231190","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230680.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230681","title":"Need for SCAS Improvements","source":"Deutsche Telekom AG","contact":"Sven Lachmund","contact-id":62366,"tdoctype":"discussion","for":"Endorsement","abstract":"The ecosystem on network equipment evaluation, established by NESAS, requires improvements of SCAS documents to ensure their applicability in practice. It is proposed to SA3 to work on improving SCAS.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6810,"status":"noted","reservation_date":"2023-09-02 13:02:25","uploaded":"2023-02-10 13:26:40","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230681.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230682","title":"Clarification of hashing","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add the terms \u201ccryptographic\u201d and \u201cwith unique salt per record\u201d to hash algorithm requirement, purpose and expected results.\nAdd checks for correct and salted cryptographic hashing.","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6820,"status":"revised","reservation_date":"2023-09-02 15:38:23","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230656","revisedto":"S3-231193","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":97.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230682.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230683","title":"Clarification of authorization verification","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add verification of user authorization.\nAccordingly, add successful authorization to the expected results.","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6830,"status":"agreed","reservation_date":"2023-09-02 15:40:52","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230657","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":98.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230683.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.4.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230684","title":"Clarification of brute force mitigation mechanism verification","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add pre-condition and execution step to test alternatively measures.\nMake use of CAPTCHA feature optional, to be in line with requirements.\nAdd check for incorrect CAPTCHA","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6840,"status":"agreed","reservation_date":"2023-09-02 15:42:31","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230658","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":99.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230684.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.4.3.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230685","title":"Clarification of privilege escalation methods to check for","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add check of capabilities as additional example in pre-conditions","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6850,"status":"revised","reservation_date":"2023-09-02 15:44:27","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230659","revisedto":"S3-231194","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":100.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230685.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.4.1.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230686","title":"Clarification of service reachability restriction verification","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Make the test execution more generic for a variable number of network interfaces and checking for service reachability on all interfaces.\nAdd evidence for port scanner name and version and make configuration evidence more specific","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6860,"status":"agreed","reservation_date":"2023-09-02 15:46:38","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230660","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":101.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230686.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230687","title":"Clarification of auto-launch verification","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Add execution step to test every available type of physical port for removable media devices.\nAdd execution step to ensure that the removable media device triggers an automatic launch.\nAdd execution step to verify that there is no automatic launch when a","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6870,"status":"agreed","reservation_date":"2023-09-02 15:48:17","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230661","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":102.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230687.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.3.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230688","title":"Clarification of SYN Flood attack prevention test","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Added vendor documentation describing SYN Flood attack prevention mechanism to pre-conditions.\nAdded vendor documentation check to test steps.\nAdded more precise instructions to last execution step.\nAdded executed SYN Flood attack to expected format of ev","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6880,"status":"agreed","reservation_date":"2023-09-02 15:50:26","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230662","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":103.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230688.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.3.1.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230689","title":"Clarification of privilege verification","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Rewrite the execution steps to ensure that the web server is configured with minimal privileges.\nAdd concrete test steps to actually verify the fulfilment of the requirements.\nAdd evidence for part of the configuration that shows how the privileges are dr","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6890,"status":"not pursued","reservation_date":"2023-09-02 15:52:25","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230663","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":104.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230689.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230690","title":"Clarification of CGI\/Scripting component directory check","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Fixed test purpose to comply with requirements.\nAdded execution step to consult the web server configuration for CGI folders.\nRemoved irrelevant execution step concerning the system settings.\nAdded web server configuration and folder listing to format of","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6900,"status":"agreed","reservation_date":"2023-09-02 15:54:23","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230664","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":105.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230690.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.4.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230691","title":"Clarification of SSI System Command Execution test","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"Added test step to actually check for the intended test purpose.\nFixed expected results to comply with test steps and purpose.\nAdded log of new test step to expected format of evidences","secretary_remarks":"Title modified on 2\/10\/2023. Original title : Clarification of SSI System Command Excecution test<br\/><br\/>Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6910,"status":"revised","reservation_date":"2023-09-02 15:56:01","uploaded":"2023-02-10 14:41:50","revisionof":"S3-230665","revisedto":"S3-231196","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":106.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230691.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.4.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230707","title":"Discussion paper of UPU implementation gaps","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"discussion","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7070,"status":"noted","reservation_date":"2023-10-02 14:41:02","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230707.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230708","title":"Enhancement in UPU procedure to protect UPU header-sol1","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7080,"status":"not pursued","reservation_date":"2023-10-02 14:41:02","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1533.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230708.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230709","title":"Enhancement in UPU procedure to protect UPU header-sol1","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7090,"status":"not pursued","reservation_date":"2023-10-02 14:41:02","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1534.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230709.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1, 14.1.4, A.19a","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230710","title":"Enhancement in UPU procedure to protect UPU header-Sol2","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : Enhancement in UPU procedure to protect UPU header-sol2<br\/><br\/>Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7100,"status":"not pursued","reservation_date":"2023-10-02 14:41:03","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1535.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230710.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1, 14.1.4, A.19","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230711","title":"Enhancement in UPU procedure to protect UPU header-Sol2","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : Enhancement in UPU procedure to protect UPU header-sol2<br\/><br\/>Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7110,"status":"not pursued","reservation_date":"2023-10-02 14:41:04","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1536.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230711.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.15.2.1, 14.1.4, A.19","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230712","title":"Correction in N5CW device authentication","source":"Nokia, Nokia Shanghai Bell,","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7120,"status":"not pursued","reservation_date":"2023-10-02 14:41:04","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.501","crspecversion":"16.13.0","workitem":[{"winame":"TEI16"}],"crnumber":1537.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230712.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230713","title":"Correction in N5CW device authentication","source":"Nokia, Nokia Shanghai Bell,","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7130,"status":"not pursued","reservation_date":"2023-10-02 14:41:05","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI16"}],"crnumber":1538.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230713.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230714","title":"Correction in N5CW device authentication","source":"Nokia, Nokia Shanghai Bell","contact":"Saurabh Khare","contact-id":90999,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7140,"status":"not pursued","reservation_date":"2023-10-02 14:41:06","uploaded":"2023-02-13 11:12:43","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1539.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230714.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"7A.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230715","title":"Threat reference for incorrectly encoded UE 5G security capabilities on the AMF NG interface","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 2\/10\/2023. Original title : Threat reference for incorrectly encoded UE security capabilities on the NG interface<br\/><br\/>Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7150,"status":"not pursued","reservation_date":"2023-10-02 14:58:56","uploaded":"2023-02-10 15:15:51","revisionof":"S3-230677","revisedto":"","release":"Rel-17","crspec":"33.926","crspecversion":"17.6.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":65.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230715.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230716","title":"New SCAS test on valid UE security capability encoding while AS security establishment","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/10\/2023. Original source : BSI (DE)","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7160,"status":"not pursued","reservation_date":"2023-10-02 15:00:36","uploaded":"2023-02-10 15:15:51","revisionof":"S3-230678","revisedto":"","release":"Rel-17","crspec":"33.512","crspecversion":"17.3.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":23.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230716.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230745","title":"[33.180] R16 Clarify protected KmsResponse payloads","source":"Motorola Solutions, Inc","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Refers the reader to clause 9.3.4.2 for instructions on encrypting a KmsResponse payload.","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Motorola Solutions Danmark A\/S","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7450,"status":"revised","reservation_date":"2023-10-02 22:11:37","uploaded":"2023-02-13 12:48:24","revisionof":"","revisedto":"S3-231415","release":"Rel-16","crspec":"33.180","crspecversion":"16.11.0","workitem":[{"winame":"MCXSec"}],"crnumber":205.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230745.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"9.3.4.2, D.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230746","title":"[33.180] R16 Clarify protected KmsResponse payloads (mirror)","source":"Motorola Solutions, Inc","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"mirror","secretary_remarks":"Title modified on 2\/13\/2023. Original title : [33.180] R17 Clarify protected KmsResponse payloads (mirror)<br\/><br\/>Source modified on 2\/13\/2023. Original source : Motorola Solutions Danmark A\/S","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7460,"status":"revised","reservation_date":"2023-10-02 22:14:33","uploaded":"2023-02-13 12:48:24","revisionof":"","revisedto":"S3-231416","release":"Rel-17","crspec":"33.180","crspecversion":"17.8.0","workitem":[{"winame":"MCXSec"}],"crnumber":206.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230746.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"9.3.4.2, D.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230747","title":"[33.180] R16 Fix XML schema","source":"Motorola Solutions, Inc","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add TrK-ID and Signature-ID to schema","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Motorola Solutions Danmark A\/S","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7470,"status":"agreed","reservation_date":"2023-10-02 22:17:00","uploaded":"2023-02-13 12:48:24","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.180","crspecversion":"16.11.0","workitem":[{"winame":"MCXSec"}],"crnumber":207.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230747.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"D.3.5.3 (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230748","title":"[33.180] R17 Fix XML schema (mirror)","source":"Motorola Solutions, Inc","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"mirror","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Motorola Solutions Danmark A\/S","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7480,"status":"agreed","reservation_date":"2023-10-02 22:18:52","uploaded":"2023-02-13 12:48:24","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.180","crspecversion":"17.8.0","workitem":[{"winame":"MCXSec"}],"crnumber":208.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230748.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"D.3.5.3 (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230768","title":"Including SNPN ID in SBA and N32 related descriptions","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7680,"status":"revised","reservation_date":"2023-12-02 08:28:09","uploaded":"2023-02-13 15:44:41","revisionof":"","revisedto":"S3-231604","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"5G_eSBA_Ph2"}],"crnumber":1547.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230768.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 5.9.2.4, 13.2.2.4.2, 13.4.1.2.2, 14.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230769","title":"Including SNPN ID in SBA and N32 related descriptions","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7690,"status":"revised","reservation_date":"2023-12-02 08:29:23","uploaded":"2023-02-13 15:47:30","revisionof":"","revisedto":"S3-231605","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"5G_eSBA_Ph2"}],"crnumber":1548.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230769.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 5.9.2.4, 13.2.2.4.2, 13.4.1.2.2, 14.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230804","title":"Clarification to the UPU procedures","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8040,"status":"not pursued","reservation_date":"2023-12-02 21:12:22","uploaded":"2023-02-13 12:57:37","revisionof":"S3-223331","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"},{"winame":" 5GS_Ph1-SEC"}],"crnumber":1488.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230804.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230805","title":"Discussion on issue with UPU MAC calculation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8050,"status":"noted","reservation_date":"2023-12-02 21:12:23","uploaded":"2023-02-13 12:57:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230805.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230806","title":"Resolving the EN on CAA level ID during UUAA procedures","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8060,"status":"not pursued","reservation_date":"2023-12-02 21:12:23","uploaded":"2023-02-13 12:59:51","revisionof":"S3-223332","revisedto":"","release":"Rel-17","crspec":"33.256","crspecversion":"17.2.0","workitem":[{"winame":"ID_UAS"}],"crnumber":9.0,"crrevision":4.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230806.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2.1.2, 5.2.1.3, 5.2.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230807","title":"Removing the ENs on passing the CAA-level ID to UE during revocation","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Qualcomm Incorporated","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8070,"status":"not pursued","reservation_date":"2023-12-02 21:12:23","uploaded":"2023-02-13 12:59:51","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.256","crspecversion":"17.2.0","workitem":[{"winame":"ID_UAS"}],"crnumber":20.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230807.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2.1.5, 5.2.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230844","title":"Authorization of NF service consumers for data access via DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8440,"status":"not pursued","reservation_date":"2023-02-13 02:37:31","uploaded":"2023-02-13 10:00:59","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNA_Ph2"}],"crnumber":1554.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230844.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230845","title":"Authorization of NF service consumers for data access via DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"German Peinado","contact-id":93903,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8450,"status":"not pursued","reservation_date":"2023-02-13 02:42:42","uploaded":"2023-02-13 10:00:59","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNA_Ph2"}],"crnumber":1555.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230845.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230853","title":"Clarification on SoR AF","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8530,"status":"revised","reservation_date":"2023-02-13 04:01:55","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"S3-231186","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1556.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230853.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230854","title":"Address EN on S-NSSAI mapping","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8540,"status":"not pursued","reservation_date":"2023-02-13 04:01:57","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1557.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230854.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230855","title":"Address EN on AF Authorization","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8550,"status":"revised","reservation_date":"2023-02-13 04:01:58","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"S3-231406","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1558.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230855.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230856","title":"Address issue in NSSAA procedures for multiple registration","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8560,"status":"revised","reservation_date":"2023-02-13 04:01:58","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"S3-231188","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1559.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230856.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230857","title":"draft LS on issues in NSSAA procedures for multiple registration","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8570,"status":"noted","reservation_date":"2023-02-13 04:01:59","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230857.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230858","title":"Address ENs in revocation procedures","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : Address EN\u00a0on revocation<br\/><br\/>Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8580,"status":"not pursued","reservation_date":"2023-02-13 04:01:59","uploaded":"2023-02-13 10:08:35","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.256","crspecversion":"17.2.0","workitem":[{"winame":"ID_UAS"}],"crnumber":21.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230858.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2.1.5, 5.2.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230875","title":"Clarification on unused HTTP methods - Rel16","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8750,"status":"agreed","reservation_date":"2023-02-13 04:04:18","uploaded":"2023-02-13 07:29:37","revisionof":"","revisedto":"","release":"Rel-16","crspec":"33.117","crspecversion":"16.9.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":107.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230138","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230875.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230876","title":"Clarification on unused HTTP methods - Rel17","source":"Huawei, HiSilicon","contact":"Bo Zhang","contact-id":49401,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8760,"status":"agreed","reservation_date":"2023-02-13 04:04:19","uploaded":"2023-02-13 07:29:37","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":108.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230138","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230876.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230891","title":"Add Context_Remove into table 7.1.1-1","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8910,"status":"not pursued","reservation_date":"2023-02-13 06:03:11","uploaded":"2023-02-13 09:30:03","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":145.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230891.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230892","title":"Change NF to AAnF Service Consumer in 6.6 and 6.7","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8920,"status":"not pursued","reservation_date":"2023-02-13 06:03:12","uploaded":"2023-02-13 09:30:03","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":146.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-230892.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-230970","title":"Contribution","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":9700,"status":"withdrawn","reservation_date":"2023-02-13 08:10:11","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"SERP"}],"crnumber":1560.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231031","title":"CR on control-plane procedure in MBS","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10310,"status":"revised","reservation_date":"2023-02-13 08:17:37","uploaded":"2023-02-13 13:35:25","revisionof":"","revisedto":"S3-231408","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1561.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231031.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex W.4.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231032","title":"Reply LS on the impact of MSK update on MBS multicast session update procedure","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10320,"status":"revised","reservation_date":"2023-02-13 08:17:38","uploaded":"2023-02-13 13:35:25","revisionof":"","revisedto":"S3-231410","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-230623","lsto":"SA2","Cc":"SA4, CT1, CT4","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231032.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231048","title":"Clarification on NEF\u2019s authorization to AF","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10480,"status":"agreed","reservation_date":"2023-02-13 08:21:25","uploaded":"2023-02-13 13:35:25","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":147.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230147","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231048.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231050","title":"SCAS release dependency proposal","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10500,"status":"noted","reservation_date":"2023-02-13 08:26:51","uploaded":"2023-02-13 13:35:25","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231050.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231055","title":"Protection of RRC Resume Request message","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10550,"status":"noted","reservation_date":"2023-02-13 08:47:46","uploaded":"2023-02-13 13:35:25","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"SERP"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231055.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231058","title":"Clarification on user consent in EC","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10580,"status":"not pursued","reservation_date":"2023-02-13 09:02:17","uploaded":"2023-02-13 10:23:11","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.558","crspecversion":"17.3.0","workitem":[{"winame":"eEDGE_5GC"}],"crnumber":10.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231058.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231064","title":"CR to TS 33.501 - Addition of Operator Roaming Hub definition in R17","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10640,"status":"revised","reservation_date":"2023-02-13 09:03:25","uploaded":"2023-02-13 12:13:32","revisionof":"","revisedto":"S3-231317","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1562.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231064.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231078","title":"Clarification on user consent Rel-17","source":"Ericsson","contact":"Helena Flygare","contact-id":93435,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10780,"status":"not pursued","reservation_date":"2023-02-13 10:01:13","uploaded":"2023-02-13 10:55:10","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1563.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231078.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2; 5.9.2.3; 12.X (NEW); Annex V.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231080","title":"Clarification on user consent Rel-18","source":"Ericsson","contact":"Helena Flygare","contact-id":93435,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10800,"status":"not pursued","reservation_date":"2023-02-13 10:09:38","uploaded":"2023-02-13 10:55:10","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1564.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231080.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"2; 5.9.2.3; 12.X (NEW); Annex V.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231085","title":"Security aspects of MSGin5G Service in rel-18","source":"China Mobile","contact":"Chang Liu","contact-id":96828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10850,"status":"revised","reservation_date":"2023-02-13 10:22:59","uploaded":"2023-02-13 10:59:54","revisionof":"","revisedto":"S3-231547","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"DUMMY"}],"crnumber":1565.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231085.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231087","title":"AAnF sending GPSI to internal AKMA AF","source":"China Mobile","contact":"Chang Liu","contact-id":96828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10870,"status":"revised","reservation_date":"2023-02-13 10:23:01","uploaded":"2023-02-13 10:59:54","revisionof":"","revisedto":"S3-231422","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":148.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231087.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231095","title":"Update to security aspects of eNA in 33.501 for Rel-17","source":"China Mobile","contact":"Chang Liu","contact-id":96828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10950,"status":"not pursued","reservation_date":"2023-02-13 10:23:02","uploaded":"2023-02-13 10:57:00","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNA_Ph2"}],"crnumber":1566.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231095.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231096","title":"Update to security aspects of eNA in 33.501 for Rel-18","source":"China Mobile","contact":"Chang Liu","contact-id":96828,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10960,"status":"not pursued","reservation_date":"2023-02-13 10:23:03","uploaded":"2023-02-13 10:57:00","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNA_Ph2"}],"crnumber":1567.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231096.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231118","title":"Modified f5* function for Milenage - Rel-17","source":"THALES, Idemia","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Agreement","abstract":"Modified f5* function to avoid keystream re-use during re-synchronization","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11180,"status":"not pursued","reservation_date":"2023-02-13 10:42:52","uploaded":"2023-02-13 12:42:59","revisionof":"","revisedto":"","release":"Rel-17","crspec":"35.206","crspecversion":"17.0.0","workitem":[{"winame":"TEI17"}],"crnumber":2.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231118.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231119","title":"Add restriction for multi registrations in two PLMNs","source":"Nokia, Nokia Shanghai Bell","contact":"Jing Ping","contact-id":68419,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11190,"status":"not pursued","reservation_date":"2023-02-13 10:44:58","uploaded":"2023-02-13 11:25:38","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1568.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231119.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.9.5.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231120","title":"Discussin paper on control on NSSAA procedures for multi registrations in two PLMNs","source":"Nokia, Nokia Shanghai Bell","contact":"Jing Ping","contact-id":68419,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11200,"status":"withdrawn","reservation_date":"2023-02-13 10:44:59","uploaded":"2023-02-13 11:25:38","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231120.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231121","title":"control on NSSAA procedures for multi registrations in two PLMNs","source":"Nokia, Nokia Shanghai Bell","contact":"Jing Ping","contact-id":68419,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11210,"status":"revised","reservation_date":"2023-02-13 10:44:59","uploaded":"2023-02-13 11:25:38","revisionof":"","revisedto":"S3-231407","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1569.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231121.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.2, 16.3, 16.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231137","title":"Modified f5* function for Milenage - Rel-18","source":"THALES, Idemia","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Agreement","abstract":"Modified f5* function to avoid keystream re-use during re-synchronization for Milenage Rel-18","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11370,"status":"not pursued","reservation_date":"2023-02-13 10:47:51","uploaded":"2023-02-13 12:42:59","revisionof":"","revisedto":"","release":"Rel-18","crspec":"35.206","crspecversion":"17.0.0","workitem":[{"winame":"TEI18"}],"crnumber":3.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231137.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231138","title":"Modified f5* function for Tuak - Rel-17","source":"THALES, Idemia","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Agreement","abstract":"Modified f5* function to avoid keystream re-use during re-synchronization for Tuak Rel-17","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11380,"status":"not pursued","reservation_date":"2023-02-13 10:49:54","uploaded":"2023-02-13 12:42:59","revisionof":"","revisedto":"","release":"Rel-17","crspec":"35.231","crspecversion":"17.0.0","workitem":[{"winame":"TEI17"}],"crnumber":6.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231138.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231139","title":"Modified f5* function for Tuak - Rel-18","source":"THALES, Idemia","contact":"Mireille Pauliac","contact-id":82739,"tdoctype":"CR","for":"Agreement","abstract":"Modified f5* function to avoid keystream re-use during re-synchronization for Tuak Rel-18.","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11390,"status":"not pursued","reservation_date":"2023-02-13 10:53:05","uploaded":"2023-02-13 12:42:59","revisionof":"","revisedto":"","release":"Rel-18","crspec":"35.231","crspecversion":"17.0.0","workitem":[{"winame":"TEI18"}],"crnumber":7.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231139.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231145","title":"Aligning DNS and ICMP security for non-3GPP access with 3GPP access","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson<br\/><br\/>Source modified on 13\/02\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11450,"status":"revised","reservation_date":"2023-02-13 10:53:15","uploaded":"2023-02-13 12:51:09","revisionof":"","revisedto":"S3-231412","release":"Rel-18","crspec":"33.402","crspecversion":"17.0.0","workitem":[{"winame":"TEI18"}],"crnumber":148.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231145.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"2, Annex X (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231146","title":"Adding recommendation to use one-to-one relation between SNPN and CH AAA","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson<br\/><br\/>Source modified on 13\/02\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11460,"status":"not pursued","reservation_date":"2023-02-13 10:53:15","uploaded":"2023-02-13 12:51:09","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNPN"}],"crnumber":1570.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231146.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"Annex I.2.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231147","title":"Adding recommendation to use one-to-one relation between SNPN and CH AAA","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson<br\/><br\/>Source modified on 13\/02\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11470,"status":"not pursued","reservation_date":"2023-02-13 10:53:17","uploaded":"2023-02-13 12:51:09","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNPN"}],"crnumber":1571.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231147.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"Annex I.2.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231148","title":"SEPP to include and verify the source PLMN-ID","source":"Ericsson [was: Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon]","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson [was: Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon]","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11480,"status":"revised","reservation_date":"2023-02-13 10:53:17","uploaded":"2023-02-13 13:12:31","revisionof":"","revisedto":"S3-231606","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1572.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231148.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 5.9.3.2x (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231149","title":"SEPP to include and verify the source PLMN-ID","source":"Ericsson [was: Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon]","contact":"Christine Jost","contact-id":49662,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson [was: Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon]","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11490,"status":"revised","reservation_date":"2023-02-13 10:53:18","uploaded":"2023-02-13 13:12:31","revisionof":"","revisedto":"S3-231607","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1573.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231149.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.9.3.2, 5.9.3.2x (new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231165","title":"SERP-Draft LS on SERP.docx","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11650,"status":"noted","reservation_date":"2023-02-13 10:57:14","uploaded":"2023-02-13 11:30:38","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN, RAN2, RAN3","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231165.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231166","title":"CR to TS 33.501 on the Protection of the RRC Resume Request message","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : SERP-CR to TS 33.501 on the Protection of the RRC Resume Request message<br\/><br\/>Source modified on 2\/13\/2023. Original source : Apple","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11660,"status":"not pursued","reservation_date":"2023-02-13 10:57:14","uploaded":"2023-02-13 11:27:31","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"SERP"}],"crnumber":1575.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231166.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":true,"cn_affected":true,"clauses_affected":"5.2.3, 5.3.3, 5.4 , 6.8.2.1.1, 6.8.2.1.2, 6.8.2.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231171","title":"CR on 33203-AES-GCM\/GMAC in IMS SIP security","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11710,"status":"withdrawn","reservation_date":"2023-02-13 10:57:16","uploaded":"2023-02-13 13:40:18","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.203","crspecversion":"17.1.0","workitem":[{"winame":"eCryptPr"}],"crnumber":267.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231171.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231175","title":"SCP requirements update related to source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11750,"status":"revised","reservation_date":"2023-02-13 11:14:20","uploaded":"2023-02-13 16:11:29","revisionof":"","revisedto":"S3-231417","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1576.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231175.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231176","title":"SCP requirements update related to source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11760,"status":"revised","reservation_date":"2023-02-13 11:16:07","uploaded":"2023-02-13 16:18:47","revisionof":"","revisedto":"S3-231418","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1577.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231176.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231186","title":"Clarification on SoR-AF","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : Clarification on SoR AF<br\/><br\/>Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11860,"status":"revised","reservation_date":"2023-02-13 11:21:37","uploaded":"2023-02-13 11:32:13","revisionof":"S3-230853","revisedto":"S3-231426","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1556.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231186.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"6.14.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231188","title":"Address issues in NSSAA procedures for multiple registration","source":"Huawei, HiSilicon","contact":"Zander (Zhongding) Lei","contact-id":66556,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : Address issue in NSSAA procedures for multiple registration<br\/><br\/>Source modified on 2\/13\/2023. Original source : Huawei, HiSilicon","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11880,"status":"not pursued","reservation_date":"2023-02-13 11:26:35","uploaded":"2023-02-13 11:32:13","revisionof":"S3-230856","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1559.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231188.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.3, 16.4, 16.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231191","title":"pCR to Living CR S3-231148_SEPP to include and verify the source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11910,"status":"revised","reservation_date":"2023-02-13 11:29:16","uploaded":"2023-02-13 16:20:27","revisionof":"","revisedto":"S3-231394","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231191.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231193","title":"Clarification of hashing","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"Add the terms \u201ccryptographic\u201d and \u201cwith unique salt per record\u201d to hash algorithm requirement, purpose and expected results.\nAdd checks for correct and salted cryptographic hashing.","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Federal Office for Information Security (BSI), Deutsche Telekom","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11930,"status":"not pursued","reservation_date":"2023-02-13 11:34:45","uploaded":"2023-02-13 11:39:21","revisionof":"S3-230682","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":97.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231193.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231194","title":"Clarification of privilege escalation methods to check for","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"Add check of capabilities as additional example in pre-conditions","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Federal Office for Information Security (BSI), Deutsche Telekom","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11940,"status":"not pursued","reservation_date":"2023-02-13 11:36:28","uploaded":"2023-02-13 11:39:21","revisionof":"S3-230685","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":100.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231194.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.2.4.1.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231196","title":"Clarification of SSI System Command Execution test","source":"Federal Office for Information Security (BSI), Deutsche Telekom","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"Added test step to actually check for the intended test purpose.\nFixed expected results to comply with test steps and purpose.\nAdded log of new test step to expected format of evidences","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Federal Office for Information Security (BSI), Deutsche Telekom","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11960,"status":"agreed","reservation_date":"2023-02-13 11:37:47","uploaded":"2023-02-13 11:39:21","revisionof":"S3-230691","revisedto":"","release":"Rel-17","crspec":"33.117","crspecversion":"17.2.0","workitem":[{"winame":"eSCAS_5G"}],"crnumber":106.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230137","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231196.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":true,"cn_affected":true,"clauses_affected":"4.3.4.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231241","title":"R18 Update I.2.2.2.1 for limitations of AAA server (mirror)","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12410,"status":"not pursued","reservation_date":"2023-02-13 11:54:22","uploaded":"2023-02-13 14:15:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNPN"}],"crnumber":1578.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231241.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231242","title":"R17 Update I.2.2.2.1 for limitations of AAA server","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12420,"status":"not pursued","reservation_date":"2023-02-13 11:54:22","uploaded":"2023-02-13 14:15:03","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNPN"}],"crnumber":1579.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231242.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231243","title":"R17 Update Subscription and unsubscription procedure of NSACF notification service","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12430,"status":"merged","reservation_date":"2023-02-13 11:54:23","uploaded":"2023-02-13 14:15:03","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1580.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231243.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231244","title":"R18 Update Subscription and unsubscription procedure of NSACF notification service (mirror)","source":"Xiaomi communications","contact":"Wei Lu","contact-id":90295,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12440,"status":"not pursued","reservation_date":"2023-02-13 11:54:24","uploaded":"2023-02-13 14:15:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1581.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231244.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231284","title":"KAF lifetime and Ua* protocol recommendations","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12840,"status":"revised","reservation_date":"2023-02-13 12:25:23","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"S3-231421","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":151.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231284.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"5.2, 6.4.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231285","title":"Rel17 Clarification on AF authorization for the NSACF notification procedure","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12850,"status":"merged","reservation_date":"2023-02-13 12:25:23","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1583.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231285.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231286","title":"Rel17 Alignment of NSACF notification procedure with existing procedures","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12860,"status":"not pursued","reservation_date":"2023-02-13 12:25:24","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1584.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231286.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231287","title":"Rel18 Clarification on AF authorization for the NSACF notification procedure","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12870,"status":"not pursued","reservation_date":"2023-02-13 12:25:25","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1585.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231287.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231288","title":"Rel18 Alignment of NSACF notification procedure with existing procedures","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12880,"status":"not pursued","reservation_date":"2023-02-13 12:25:25","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"eNS2_SEC"}],"crnumber":1586.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231288.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"16.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231289","title":"Living document for SERP: draftCR to TS 33.501 on the Protection of the RRC Resume Request message","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12890,"status":"noted","reservation_date":"2023-02-13 12:25:26","uploaded":"2023-02-13 13:33:24","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"SERP"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231289.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231295","title":"Discussion on Resumecause protection","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12950,"status":"noted","reservation_date":"2023-02-13 12:29:48","uploaded":"2023-02-13 13:38:58","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":[{"winame":"SERP"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231295.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231297","title":"Living document for SERP: draftCR to TS 33.501 on the Protection of the RRC Resume Request message","source":"Samsung","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12970,"status":"noted","reservation_date":"2023-02-13 12:29:48","uploaded":"2023-02-13 13:38:58","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"SERP"}],"crnumber":"","crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231297.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231305","title":"[IAB][Rel-17] IAB inter-CU topology adaptation procedure","source":"Samsung, Huawei, HiSilicon","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13050,"status":"not pursued","reservation_date":"2023-02-13 12:29:49","uploaded":"2023-02-13 13:38:58","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1588.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231305.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231306","title":"[IAB][Rel-18] IAB inter-CU topology adaptation procedure","source":"Samsung, Huawei, HiSilicon","contact":"Rohini Rajendran","contact-id":83984,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13060,"status":"not pursued","reservation_date":"2023-02-13 12:29:49","uploaded":"2023-02-13 13:38:58","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1589.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231306.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231317","title":"Addition of Operator Roaming Hub definition in R17","source":"Vodafone","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : CR to TS 33.501 - Addition of Operator Roaming Hub definition in R17<br\/><br\/>Source modified on 2\/13\/2023. Original source : VODAFONE Group Plc","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13170,"status":"revised","reservation_date":"2023-02-13 12:37:32","uploaded":"2023-02-13 12:43:17","revisionof":"S3-231064","revisedto":"S3-231413","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1562.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231317.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"3.1 and 13.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231318","title":"CR on control-plane procedure in MBS","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13180,"status":"merged","reservation_date":"2023-02-13 12:38:58","uploaded":"2023-02-13 12:46:13","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"5MBS"}],"crnumber":1590.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231318.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex W.4.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231319","title":"Authentication of AUN3 devices behind RG","source":"CableLabs, Nokia, Nokia Shanghai Bell, Rogers Communications, Thales, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13190,"status":"not pursued","reservation_date":"2023-02-13 12:41:33","uploaded":"2023-02-13 13:09:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"DUMMY"}],"crnumber":1591.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231319.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231321","title":"Authentication for UE behind 5G-RG and FN-RG using NSWO","source":"CableLabs, Rogers Communications, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13210,"status":"not pursued","reservation_date":"2023-02-13 12:46:51","uploaded":"2023-02-13 13:09:28","revisionof":"","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"NSWO_5G"}],"crnumber":1592.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231321.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231322","title":"Discussin paper on control on NSSAA procedures for multi registrations in two PLMNs","source":"Nokia, Nokia Shanghai Bell","contact":"Jing Ping","contact-id":68419,"tdoctype":"discussion","for":"Endorsement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13220,"status":"noted","reservation_date":"2023-02-13 12:48:30","uploaded":"2023-02-13 12:53:31","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231322.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231325","title":"Authentication for UE behind 5G-RG and FN-RG using NSWO","source":"CableLabs, Rogers Communications, Charter Communications","contact":"Tao Wan","contact-id":79074,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13250,"status":"revised","reservation_date":"2023-02-13 12:50:14","uploaded":"2023-02-13 13:09:28","revisionof":"","revisedto":"S3-231405","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"NSWO_5G"}],"crnumber":1593.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231325.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231326","title":"CR on control-plane procedure in MBS","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Ericsson","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13260,"status":"merged","reservation_date":"2023-02-13 12:51:41","uploaded":"2023-02-13 12:56:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"5MBS"}],"crnumber":1594.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231326.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex W.4.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231352","title":"Reply LS on the impact of MSK update on MBS multicast session update procedure","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":370,"status":"merged","reservation_date":"2023-02-13 13:14:48","uploaded":"2023-02-13 13:19:24","revisionof":"","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":[{"winame":"5MBS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-230623","lsto":"SA2","Cc":"SA4, CT1, CT4","lsoriginalls":"S2-2209287","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231352.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231353","title":"Correction to Clause 7A.2.1","source":"Lenovo","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13530,"status":"agreed","reservation_date":"2023-02-13 13:20:48","uploaded":"2023-02-13 13:48:42","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1595.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-230143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231353.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231376","title":"Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13760,"status":"revised","reservation_date":"2023-02-13 14:28:12","uploaded":null,"revisionof":"","revisedto":"S3-231378","release":"Rel-18","crspec":"33.203","crspecversion":"17.1.0","workitem":[{"winame":"eCryptPr"}],"crnumber":268.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231378","title":"Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 2\/13\/2023. Original source : Apple Computer Trading Co. Ltd","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13780,"status":"not pursued","reservation_date":"2023-02-13 14:35:19","uploaded":"2023-02-13 14:47:08","revisionof":"S3-231376","revisedto":"","release":"Rel-17","crspec":"33.203","crspecversion":"17.1.0","workitem":[{"winame":"eCryptPr"}],"crnumber":268.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231378.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":true,"ran_affected":false,"cn_affected":true,"clauses_affected":"Annex I","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231379","title":"User consent check by DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13790,"status":"revised","reservation_date":"2023-02-13 14:37:35","uploaded":"2023-02-13 15:10:22","revisionof":"","revisedto":"S3-231383","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1597.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231379.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231380","title":"User consent check by DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13800,"status":"revised","reservation_date":"2023-02-13 14:40:42","uploaded":"2023-02-13 15:10:22","revisionof":"","revisedto":"S3-231382","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1598.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231380.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231382","title":"User consent check information by DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : User consent check by DCCF<br\/><br\/>Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13820,"status":"not pursued","reservation_date":"2023-02-13 15:24:52","uploaded":"2023-02-13 15:30:33","revisionof":"S3-231380","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1598.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231382.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231383","title":"User consent check information by DCCF","source":"Nokia, Nokia Shanghai Bell","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Title modified on 2\/13\/2023. Original title : User consent check by DCCF<br\/><br\/>Source modified on 2\/13\/2023. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13830,"status":"not pursued","reservation_date":"2023-02-13 15:27:27","uploaded":"2023-02-13 15:30:33","revisionof":"S3-231379","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"UC3S_SEC"}],"crnumber":1597.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231383.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231394","title":"pCR to Living CR S3-231148_SEPP to include and verify the source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11911,"status":"approved","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-231191","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"","workitem":[{"winame":"TEI17"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231394.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231404","title":"EU 5G Scheme phase 2","source":"ENISA","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"other","for":"Presentation","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":140400,"status":"noted","reservation_date":"2023-02-20 14:22:06","uploaded":"2023-02-20 14:22:06","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231404.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231405","title":"Authentication for UE behind 5G-RG and FN-RG using NSWO","source":"CableLabs, Rogers Communications, Charter Communications","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13251,"status":"agreed","reservation_date":"2023-02-22 09:43:27","uploaded":"2023-02-22 09:43:27","revisionof":"S3-231325","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1593.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-230143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231405.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231406","title":"Address EN on AF Authorization","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":8551,"status":"not pursued","reservation_date":"2023-02-24 11:27:00","uploaded":"2023-02-24 11:27:00","revisionof":"S3-230855","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1558.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231406.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231407","title":"control on NSSAA procedures for multi registrations in two PLMNs","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11211,"status":"not pursued","reservation_date":"2023-02-24 15:29:16","uploaded":"2023-02-24 15:29:16","revisionof":"S3-231121","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1569.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231407.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231408","title":"CR on control-plane procedure in MBS","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10311,"status":"agreed","reservation_date":"2023-02-24 10:06:11","uploaded":"2023-02-24 10:06:11","revisionof":"S3-231031","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1561.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231408.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231409","title":"CR on control-plane procedure in MBS","source":"Huawei","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":140900,"status":"agreed","reservation_date":"2023-02-24 10:06:11","uploaded":"2023-02-24 10:06:11","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1599.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231409.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231410","title":"Reply LS on the impact of MSK update on MBS multicast session update procedure","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10321,"status":"approved","reservation_date":"2023-02-24 10:06:11","uploaded":"2023-02-24 10:06:11","revisionof":"S3-231032","revisedto":"","release":"Rel-17","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-230623","lsto":"SA2","Cc":"SA4, CT1, CT4","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231410.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231411","title":"LS on modified f5* algorithms","source":"Thales","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":141100,"status":"approved","reservation_date":"2023-02-24 16:36:26","uploaded":"2023-02-24 16:36:26","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"ETSI SAGE","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231411.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231412","title":"Aligning DNS and ICMP security for non-3GPP access with 3GPP access","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11451,"status":"agreed","reservation_date":"2023-02-22 09:43:27","uploaded":"2023-02-22 09:43:27","revisionof":"S3-231145","revisedto":"","release":"Rel-18","crspec":"33.402","crspecversion":"17.0.0","workitem":[{"winame":"TEI18"}],"crnumber":148.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231412.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231413","title":"Addition of Operator Roaming Hub definition in R17","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":13171,"status":"agreed","reservation_date":"2023-02-24 11:27:00","uploaded":"2023-02-24 11:27:00","revisionof":"S3-231317","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1562.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231413.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231414","title":"Addition of Operator Roaming Hub definition in R18","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":141400,"status":"agreed","reservation_date":"2023-02-24 11:27:00","uploaded":"2023-02-24 11:27:00","revisionof":"","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1600.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231414.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231415","title":"[33.180] R16 Clarify protected KmsResponse payloads","source":"Motorola Solutions, Inc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7451,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230745","revisedto":"","release":"Rel-16","crspec":"33.180","crspecversion":"16.11.0","workitem":[{"winame":"MCXSec"}],"crnumber":205.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231415.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231416","title":"[33.180] R16 Clarify protected KmsResponse payloads (mirror)","source":"Motorola Solutions, Inc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7461,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230746","revisedto":"","release":"Rel-17","crspec":"33.180","crspecversion":"17.8.0","workitem":[{"winame":"MCXSec"}],"crnumber":206.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230139","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231416.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231417","title":"SCP requirements update related to source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11751,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-231175","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1576.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231417.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231418","title":"SCP requirements update related to source PLMN-ID","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11761,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-231176","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1577.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231418.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231421","title":"KAF lifetime and Ua* protocol recommendations","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":12841,"status":"agreed","reservation_date":"2023-02-24 10:06:11","uploaded":"2023-02-24 10:06:11","revisionof":"S3-231284","revisedto":"","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":151.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230147","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231421.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231422","title":"AAnF sending GPSI to internal AKMA AF","source":"China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":10871,"status":"agreed","reservation_date":"2023-02-22 09:43:27","uploaded":"2023-02-22 09:43:27","revisionof":"S3-231087","revisedto":"","release":"Rel-17","crspec":"33.535","crspecversion":"17.7.0","workitem":[{"winame":"AKMA"}],"crnumber":148.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230147","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231422.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231423","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6511,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230651","revisedto":"","release":"Rel-16","crspec":"33.501","crspecversion":"16.13.0","workitem":[{"winame":"TEI16"}],"crnumber":1526.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231423.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231426","title":"Clarification on SoR-AF","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11861,"status":"agreed","reservation_date":"2023-02-24 11:27:00","uploaded":"2023-02-24 11:27:00","revisionof":"S3-231186","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI18"}],"crnumber":1556.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-230143","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231426.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231435","title":"Referencing GSMA for interdomain N32 certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6731,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230673","revisedto":"","release":"Rel-17","crspec":"33.310","crspecversion":"17.5.0","workitem":[{"winame":"TEI16"}],"crnumber":146.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231435.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231448","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6521,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230652","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI16"}],"crnumber":1527.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231448.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231449","title":"Support for multiple lists of root CA certificates","source":"BSI (DE), Deutsche Telekom, Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":6531,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230653","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI16"}],"crnumber":1528.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230140","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231449.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231547","title":"Security aspects of MSGin5G Service in rel-18","source":"China Mobile","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":0,"status":"agreed","reservation_date":"2023-02-24 10:06:11","uploaded":"2023-02-24 10:06:11","revisionof":"S3-231085","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"5GMARCH_Ph2_SEC"}],"crnumber":1565.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-230145","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231547.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231603","title":"LS on Mapping of F1-C IP addresses in the IAB inter-CU topology adaptation and backhaul RLF recovery procedures","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":160300,"status":"approved","reservation_date":"2023-02-24 14:32:19","uploaded":"2023-02-24 14:32:19","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"RAN3","Cc":"RAN2","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231603.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231604","title":"Including SNPN ID in SBA and N32 related descriptions","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7681,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230768","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1547.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231604.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231605","title":"Including SNPN ID in SBA and N32 related descriptions","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":7691,"status":"agreed","reservation_date":"2023-02-23 19:15:39","uploaded":"2023-02-23 19:15:39","revisionof":"S3-230769","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1548.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231605.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231606","title":"SEPP to include and verify the source PLMN-ID","source":"Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11481,"status":"agreed","reservation_date":"2023-02-24 16:36:26","uploaded":"2023-02-24 16:36:26","revisionof":"S3-231148","revisedto":"","release":"Rel-17","crspec":"33.501","crspecversion":"17.8.0","workitem":[{"winame":"TEI17"}],"crnumber":1572.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231606.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-231607","title":"SEPP to include and verify the source PLMN-ID","source":"Ericsson, Mavenir, Nokia, Nokia Shanghai Bell, Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":12,"ainumber":"4.9","ainame":"All topics (Rel-15\/16\/17\/18 )","tdoc_agenda_sort_order":11491,"status":"agreed","reservation_date":"2023-02-24 16:36:26","uploaded":"2023-02-24 16:36:26","revisionof":"S3-231149","revisedto":"","release":"Rel-18","crspec":"33.501","crspecversion":"18.0.0","workitem":[{"winame":"TEI17"}],"crnumber":1573.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-230144","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_110_Athens\/Docs\/S3-231607.zip","group":"S3","meeting":"S3-110","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]