7.3.1.1 Unauthorized detection of target under LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_LOG_LEAK | |
| Threat Reference | T-LOG-01 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that general privileged administrators cannot detect whether an a-priori chosen subscriber is under LI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. |
|
| Expected Format of Evidence | The tester submits a human-readable diff and a plain-language conclusion whether the general privileged admin can use this log leak method to ascertain that LI is occurring. |
|
| PDFs | 117fee0b83c2128fcc379f96dde3635c | |
7.3.1.10 LI_X1 HTTP connection is disallowed |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_X1_HTTP_DISALLOWED | |
| Threat Reference | T-CONFIG-02, T-INTERFACE-SEC-10 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, |
|
| Test Purpose | To verify that non secured X1 connection attempts fail. |
|
| Pre-Conditions | ||
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The HTTP transaction fails. |
|
| Expected Format of Evidence | Any suitable evidence (e.g. output of netcat or packet capture), or plain language description of the failure. |
|
| PDFs | 71713ed1c52eb96e8115d4f3fbd9d0c4 | |
7.3.1.11 LI_X1 is protected by TLS |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS | |
| Threat Reference | T-CONFIG-02 [Editor's Note: this test is relevant whether this is configurable or hard-coded]{.mark} - T-INTERFACE-SEC-10 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, [Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)]{.mark} [Editor's Note: Mutually authenticated TLS]{.mark} |
|
| Test Purpose | To verify that TLS is used to protect LI_X1. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The HTTPS transaction from execution step 1 succeeds. The HTTP transaction from execution step 2 does not succeed [(fails at the transport layer).]{.mark} |
|
| Expected Format of Evidence | Any suitable evidence (e.g. output of netcat or packet capture). |
|
| PDFs | 594c385ade80a5e2f1ce58c543e23cb6 | |
7.3.1.12 LI_X1 is protected by TLS - failure for other reasons |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS | |
| Threat Reference | T-CONFIG-02 [Editor's Note: this test is relevant whether this is configurable or hard-coded]{.mark} - T-INTERFACE-SEC-10 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, [Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)]{.mark} [Editor's Note: Mutually authenticated TLS]{.mark} |
|
| Test Purpose | The tester shall prove that using anything else but a valid certificate will fail. [Editor's Note: write separate tests for the following:]{.mark} [e.g.:]{.mark} [1. expired certs]{.mark} [2. revoked certs]{.mark} [3. cert IDs don't match the LI_X1 IDs]{.mark} [4. LI_X1 ID (or other parameters) missing altogether]{.mark} [5. NEID in LI_X1 doesn't match the NEID of the POI under test]{.mark} [6. valid cert that hangs under the wrong root of trust]{.mark} [7. partial vs full cert chain verification by the POI (root of trust is valid, but the sub-CA is wrong)]{.mark} |
|
| Pre-Conditions | 1. 2.
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The HTTPS transaction from execution step 1 succeeds. The HTTP transaction from execution step 2 does not succeed [(fails at the transport layer).]{.mark} |
|
| Expected Format of Evidence | Any suitable evidence (e.g. output of netcat or packet capture). [Editor's note: Write MOAT: The tester shall verify that ALL interfaces are not vulnerable to the top (20?) common OWASP vulnerabilities / CBE]{.mark}s |
|
| PDFs | 4d93225c4c42ed78bd1e58b4d27efacc | |
7.3.1.2 Unauthorized detection of target under LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_CONFIG_DIFF_ANALYSIS | |
| Threat Reference | T-CONFIG-02 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that general privileged administrators (e.g., config reviewers, system auditors) cannot detect that interception is taking place by analysing configuration files before and after LI provisioning. [Editor's note: configuration aspects other than configuration files are not covered by this test case.]{.mark} |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
a. new service entries b. altered service entries c. any difference that could indicate LI activity |
|
| Expected Results | The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. |
|
| Expected Format of Evidence | The tester submits a human-readable diff and a plain language conclusion on whether any observed changes in config can be used to infer the presence of an LI target. |
|
| PDFs | 96f70ee84c148f5cb6810f06b44120a0 | |
7.3.1.3 Unauthorized detection of LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_CPU_METHOD_ONE | |
| Threat Reference | T-RES-CPU-03 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. |
|
| Expected Format of Evidence | The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity. |
|
| PDFs | 40771cdcd812b30c7992a35150ab293c | |
7.3.1.4 Unauthorized detection of LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | LI_EMBEDDED_UNAUTHORISED_INTERCEPTION_DETECTION_CPU_METHOD_TWO | |
| Threat Reference | T-RES-CPU-04 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that non-LI authorized network administrators cannot detect whether the LI function in an NF is performing interception. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
a. Continuously monitors the CPU utilization b. Records the raw CPU utilization measurements at the following steps of the call: i. STEP 1 (Initial INVITE is seen at the NF) ii. STEP 2 (call is answered) iii. STEP 3 (BYE is seen at the NF) iv. STEP 4 (Session is closed)
|
|
| Expected Results | The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. |
|
| Expected Format of Evidence | The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively, along with a plain-language conclusion whether the non-LI-authorised admin can use the CPU utilization side channel to detect LI. |
|
| PDFs | 8db169f528b4331e7faac3fbf5fccf0f | |
7.3.1.5 Unauthorized detection of target under LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_BANDWIDTH_METHOD | |
| Threat Reference | T-RES-NET-05 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. |
|
| Expected Format of Evidence | The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity. |
|
| PDFs | 3eba3af35017d13195630af9d8cd3b40 | |
7.3.1.6 Detection of LI via Timing Anomalies |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED _TIMING_SIGNATURE_LEAK | |
| Threat Reference | T-TIMING-06 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that LI activity cannot be detected by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active. |
|
| Expected Format of Evidence | A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies. [Editor's Note: The group has discussed tests up to here (specifically, 7, 8, 9 haven't been discussed - but 10 and further have.)]{.mark} |
|
| PDFs | 0c2573d7e7cc85d6ee16f88db3421d6a | |
7.3.1.7 Detection of MDF to LEMF LI Product Flow via Timing Anomalies |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_MDF_LEMF_LI_PRODUCT_TIMING_SIGNATURE_LEAK | |
| Threat Reference | T-TIMING-07 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that internal administrators with access to MDF/LEMF transport segments cannot detect the presence of LI activity by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active. |
|
| Expected Format of Evidence | A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies. |
|
| PDFs | 2f71837606faf9969dbbfde45dfb43a1 | |
7.3.1.8 Interruption of POI-MDF Link |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_POI-MDF_LINK_FAULT_CONDITIONS | |
| Threat Reference | T-INTERRUPTION-07 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | To ensure that the LI system does not exhibit differential behaviour during delivery path faults between POI and MDF, such that an internal administrator without LI privilege cannot distinguish whether LI is active based on service degradation patterns. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
a. Gaps b. Jitter or misaligned timestamps c. Recovery mechanisms triggered (e.g., buffering, retransmit) d. Log entries on the NF
|
|
| Expected Results | The NF is expected to behave in the same way in both cases (LI active and not active). |
|
| Expected Format of Evidence | Packet trace timestamps, POI/MDF log excerpts, and human-readable summary of whether the system degraded gracefully or failed differently in the two cases. |
|
| PDFs | 5536b29dfb26b61502b1377b9ab3e797 | |
7.3.1.9 Unauthorized detection of target under LI |
Home → LI embedded → 0.0.b |
|  33129-2-00b | |
| Test Name | TC_LI_EMBEDDED_SESSION_COUNT_ANALYSIS | |
| Threat Reference | T-SESSION-COUNT-09 |
|
| Requirement Name | Undetectability by Non-Authorized Parties. |
|
| Requirement Reference | TS 33.126 R6.6-30. |
|
| Requirement Description | The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 |
|
| Test Purpose | Ensure that lawful interception provisioning does not create observable differences in TLS session counts or handshake patterns that could be used to infer LI activity. |
|
| Pre-Conditions |
|
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | It is expected that the TLS metrics are be indistinguishable between surveilled and non-surveilled flows. LI MDF must not be visible as secondary TLS endpoints or cause measurable handshake side effects. |
|
| Expected Format of Evidence | The tester supplies a TLS session count comparison and an interpretation of whether a general privileged observer could detect LI activity from the metrics. [Editor's note: for the next message (TLS) cast a wider net:]{.mark} [1. reverse direction]{.mark} [2. X2/3]{.mark} [3. send X1 commands on an X2/3 (or other SBI) interface]{.mark} |
|
| PDFs | 93b466c270304d44884af4b30b13e725 | |