Home eNB

4.2.2.1.10 Bidding down prevention in X2-handovers

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TBA

Requirement Name
Requirement Reference

TS 33.401 [3], clause 7.2.4.2.2

Requirement Description

"In the path-switch message, the target eNB shall send the UE EPS security capabilities received from the source eNB to the MME." as specified in TS 33.401 [3], clause 7.2.4.2.2."

Test Purpose

Verify that bidding down is prevented in X2-handovers.

Pre-Conditions

Test environment with source eNB and target eNB, and the source eNB may be simulated.

Execution Steps

The target eNB sends the path-switch message to the MME.

Expected Results

The UE EPS security capabilities are in the path-switch message.

Expected Format of Evidence

Snapshots containing the result

PDFs adb6abf31da212fe31a4a9f85653d505

4.2.2.1.11 AS protection algorithm selection in eNB change

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TBA

Requirement Name

AS protection algorithm selection in eNB change.

Requirement Reference

TS 33.401 [3], clause 7.2.4.2.2, and clause 7.2.4.2.3

Requirement Description

"The target eNB shall select the algorithm with highest priority from the UE EPS security capabilities according to the prioritized locally configured list of algorithms (this applies for both integrity and ciphering algorithms). The chosen algorithms shall be indicated to the UE in the handover command if the target eNB selects different algorithms compared to the source eNB" as specified in TS 33.401 [3], clause 7.2.4.2.2, and clause 7.2.4.2.3.

Test Purpose

Verify that AS protection algorithm is selected correctly.

Pre-Conditions

Test environment with source eNB, target eNB and MME. Source eNB and MME may be simulated.

Execution Steps

Test Case 1:

Source eNB transfers the ciphering and integrity algorithms used in the source cell to the target eNB in the handover request message.

Target eNB verifies the algorithms and selects AS algorithms which have the highest priority according to the ordered lists. Target eNB includes the algorithm in the handover command.

Test Case 2:

MME sends the UE EPS security capability to the Target eNB.

The target eNB selects the AS algorithms which have the highest priority according to the ordered lists in the HANDOVER COMMAND.

The above test cases assume that the algorithms selected by the target eNB are different from the ones received from the source eNB.

Expected Results

For both test cases:

  1. The UE checks the message authentication code on the handover command message.

  2. The MAC in the handover complete message is verified, and the AS integrity protection algorithm is selected and applied correctly.

Expected Format of Evidence

Snapshots containing the result.

PDFs 6bf18199dbc6a4194c885755c28b58ea

4.2.2.1.12 RRC and UP downlink ciphering at the eNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_eNB_DL_Cipher
Threat Reference

TBA

Requirement Name

RRC and UP downlink ciphering at the eNB.

Requirement Reference

TS 33.401 [3], clause 7.2.4.5

Requirement Description

"The eNB shall start RRC and UP downlink ciphering after sending the AS security mode command message" .

Test Purpose

To verify that the eNB performs RRC and UP downlink ciphering after sending the AS security mode command message.

Pre-Conditions
  • The UE and eNB network products are connected in the test environment. UE may be simulated.

  • The tester shall have access to the AS security context and the corresponding cryptographic keys (e.g. RRC and UP cipher keys).

  • The tester has access to Uu interface and ability to capture the Uu interface messages with the debug port enabled in the UE.

Execution Steps
  1. The tester shall POWER ON the UE to trigger the registration procedures (Attach and SMC).

  2. The tester performs packet capturing over the Uu interface using any packet analyser.

  3. The tester filters the AS SMC command message and the following RRC and UP downlink packets from eNB to UE.

  4. The tester proceeds the testing based on the parameters (algorithm identifier and algorithm distinguisher) present in the AS SMC command message.

Case 1: If the parameters refer to null ciphering algorithm, the tester verifies that the downlink packets filtered in step 3 are unciphered.

Case 2: If the parameters refer to algorithms such as SNOW, AES, ZUC, the tester verifies that the downlink packets filtered in step 3 are ciphered.

The tester also checks if the packets are ciphered in accordance with the selected algorithm stated in the AS SMC command message.

NOTE: The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [2].

Expected Results
  • The downlink packets following the AS SMC command message are ciphered except NULL ciphering algorithm case.
Expected Format of Evidence

Evidence suitable for the interface, e.g. Screenshot contains the operation results.

PDFs 67314f0573727263b9e9a887d770cc2c

4.2.2.1.13 Map a UE NR security capability

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_MAP_NR_SEC_CAP
Threat Reference

TBA

Requirement Name

Map a UE NR security capability

Requirement Reference

TS 33.401 [3], clause E.3.10.2

Requirement Description

" The MeNB that does not have the UE NR security capabilities shall create them as follow:

  • Set the support of NEA0, 128-NEA1, 128-NEA2, 128-NEA3, NIA0, 128-NIA1, 128-NIA2, 128-NIA3 to the same as EEA0, 128-EEA1, 128-EEA2, 128-EEA3, EIA0, 128-EIA1, 128-EIA2, 128-EIA3 respectively; and

  • Set the rest of the bits to 0." as specified in TS 33.401 [3], clause E.3.10.2.

Test Purpose

To verify that the eNB creates mapped UE NR security capabilities.

Pre-Conditions
  • The eNB and gNB network products are connected in the test environment. The gNB may be simulated.

  • Tester shall have access to trigger dual connection to a gNB.

  • The Tester shall have access to the X2 interface.

Execution Steps
  1. The MeNB does not receive UE NR security capabilities from S1 Initial Context Setup Request message.

  2. The MeNB sends SN Addition Request Message to the SgNB.

  3. The tester checkes if the NR security capabilities are included in SN Addition Request Message.

Expected Results

The SN Addition Request Message contains UE NR security capabilities, i.e. NEA0, 128-NEA1, 128-NEA2, 128-NEA3, NIA0, 128-NIA1, 128-NIA2, 128-NIA3

Expected Format of Evidence

Evidence suitable for the interface, e.g. Screenshot contains the operation results.

PDFs f44665f618e89dc524e4a575e6378a2b

4.2.2.1.14 UE NR security capability is only sent to a SgNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_NR_SEC_CAP_SENT
Threat Reference

TBA

Requirement Name

UE NR security capability is only sent to a SgNB

Requirement Reference

TS 33.401 [3], clause E.3.4.3

Requirement Description

"When adding SgNB while establishing an EN-DC connection, the MeNB shall send these created UE NR security capabilities to the SgNB. Other than for adding an SgNB, the created UE NR security capabilities shall not be sent from the MeNB." as specified in TS 33.401 [3], clause E.3.4.3.

Test Purpose

To verify that the UE NR security capabilities are only sent to a SgNB.

Pre-Conditions
  • The UE, gNB and eNB network products are connected in the test environment. UE and gNB may be simulated.

  • The tester shall have access to the X2 interface.

Execution Steps
  1. The tester triggers MeNB to send SN addition Request message to a SgNB.

  2. The tester triggers UE HO from MeNB to another eNB.

  3. The tester checks if the UE NR security capabilities were sent in the X2 interface in both step 1 and step 2.

Expected Results

The UE NR security capabilities are only sent to the SgNB.

Expected Format of Evidence

Evidence suitable for the interface, e.g. Screenshot contains the operation results.

PDFs 107dea8ce0cb0a2ba1cfdb0f3670d3e1

4.2.2.1.15 Bidding down prevention in X2-handovers when target eNB receives a NR security capability

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_BID_DOWN_X2
Threat Reference

TBA

Requirement Name
Requirement Reference

TS 33.401 [3], clause E.3.4.3

Requirement Description

" A target eNB that has received the UE NR security capabilities during handover shall include the UE NR security capabilities in the S1-PATH SWITCH-REQUEST message." as specified in TS 33.401 [3], clause E.3.4.3."

Test Purpose

Verify that bidding down is prevented in X2-handovers when target eNB receives a NR security capability.

Pre-Conditions

Test environment with source eNB and target eNB, and the source eNB may be simulated.

Execution Steps

The target eNB sends the path-switch message to the MME.

Expected Results

The UE NR security capability is in the path-switch message.

Expected Format of Evidence

Snapshots containing the result.

PDFs 35e9febf2f21ee8409537138a4839886

4.2.2.1.16 Integrity protection of user data between the UE and the eNB

Home eNB18.1.0
33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC-UP-DATA-INT_eNB
Threat Reference

TBD

Requirement Name

Integrity protection of user data between the UE and the eNB.

Requirement Reference

TS 33.401 [3], clause 5.1.4.

Requirement Description

"User plane packets between the eNB and the UE may be integrity protected on the Uu interface. " in clause 5.1.4

Test Purpose

To verify that the user data packets are integrity protected over the Uu interface.

Pre-Conditions
  • The eNB network product shall be connected in emulated/real network environments. UE may be simulated.

  • The tester shall have knowledge of integrity algorithm and integrity protection keys.

  • The tester can capture the message via the Uu interface, or can capture the message at the UE.

  • The tester shall enable user plane integrity protection and ensure that EIA0 is disabled at the eNB.

Execution Steps
  1. The tester triggers the eNB to send a RRCConnectionReconfiguration message with integrity protection indication "on" to the UE.

  2. The tester checks that any user data sent by eNB after sending the RRCConnectionReconfiguration message and while the UE is in active state is integrity protected.

Expected Results

Any user plane packets sent between UE and eNB over the Uu interface after eNB sending RRCConnectionReconfiguration is integrity protected.

Expected Format of Evidence

Evidence suitable for the interface e.g. Screenshot containing the operational results.

PDFs 01def2d03cb93422bff7cbcdb26173ce

4.2.2.1.17 Local UP integrity protection configuration

Home eNB18.1.0
33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_LOCAL_UP_INTEGRITY_PROTECTION_CONFIGURATION
Threat Reference

TBD

Requirement Name

Select the right UP integrity protection policy.

Requirement Reference

TS 33.401 [2] clause 7.3.3

Requirement Description

" The eNB shall be locally configured with UP integrity protection policy. " in clause 7.3.3

Test Purpose

To verify that the eNB is locally configured with a UP integrity protection policy

Pre-Conditions
  • The eNB network product shall be connected in emulated/real network environments. UE and MME may be simulated.

  • The eNB is locally configured to activate UP integrity protection by default if no UP integrity protection policy is received from MME.

  • Tester shall have knowledge of integrity algorithm and integrity protection keys.

  • The tester can capture the message via the Uu interface, or can capture the message at the UE.

  • The tester shall disable EIA0 at the eNB.

Execution Steps
  1. The tester triggers the MME to send an EPS security capability message with EIA7 indicating the UP integrity protection is supported by the UE to the eNB. But the tester also configures the MME to not send a UP integrity protection policy to the eNB.

  2. The eNB sends a RRCConnectionReconfiguration message with integrity protection indication "on" to the UE.

  3. The tester checks that any user data sent by eNB after sending the RRCConnectionReconfiguration message and while the UE is in active state is integrity protected.

Expected Results

Any user plane packets sent between UE and eNB over the Uu interface after eNB sending the RRCConnectionReconfiguration message is integrity protected.

Expected Format of Evidence

Evidence suitable for the interface e.g. Screenshot containing the operational results.

Text of local configuration of the UP intergrity protection at the eNB.

PDFs 3d2b962d86e97ddbdf2aa5f0d158073c

4.2.2.1.18 UP IP policy selection

Home eNB18.1.0
33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_ UP_IP_POLICY_Selection
Threat Reference

TBD

Requirement Name

Select the right UP IP policy.

Requirement Reference

TS 33.401 [2] clause 7.3.3

Requirement Description

" If the eNB receives UP integrity protection policy from the MME, the eNB shall use the received UP integrity protection policy, otherwise, the eNB shall use the locally configured UP integrity protection policy if EIA7 in the EPS security capability indicates that the UE supports user plane integrity protection with EPC. " in clause 7.3.3

Test Purpose

To verify that the UP IP policy sent from the MME is used by the eNB.

Pre-Conditions
  • The eNB network product shall be connected in emulated/real network environments. UE and MME may be simulated.

  • The eNB locally UP IP is set to NOT NEEDED.

  • Tester shall have knowledge of integrity algorithm and integrity protection keys.

  • The tester can capture the message via the Uu interface, or can capture the message at the UE.

  • The tester shall disable EIA0 at the eNB.

Execution Steps
  1. The tester triggers the MME to send a EPS security capability message with EIA7 indicating the UP IP is supported by the UE to the eNB. But the tester also configures the MME to send a UP IP policy with REQUIRED to the eNB.

  2. The eNB sends a RRCConnectionReconfiguration message with integrity protection indication "on" to the UE.

  3. The tester checks that any user data sent by eNB after sending the RRCConnectionReconfiguration message and while the UE is in active state is integrity protected.

Expected Results

Any user plane packets sent between UE and eNB over the Uu interface after eNB sending the RRCConnectionReconfiguration message is integrity protected according to the UP IP policy sent by the MME.

Expected Format of Evidence

Evidence suitable for the interface e.g. Screenshot containing the operational results.

PDFs 5e6c6954ac9cea2837e608f60aa6fdd4

4.2.2.1.19 UP IP policy selection in S1 Handover

Home eNB18.1.0
33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_ UP_IP_POLICY_Selection_S1_Handover
Threat Reference

TR 33.926 [4], clause C.2.2.[a]{.mark}, UP integrity protection policy selection

Requirement Name

Select the right UP IP policy in S1 handover.

Requirement Reference

TS 33.401 [2] clause 7.3.3

Requirement Description

" At an S1-handover, the source MME shall send the UE's UP integrity protection policy and the UE EPS security capability to the target eNB via the target MME. Besides, the source eNB shall also send the UE's UP integrity protection policy if received from the source MME to the target eNB in a source-to-target container. The target eNB shall use the UE capability indicating support of UP IP in EPS together with the UP integrity protection policy received from the MME and ignore the UP integrity protection received in the source-to-target container. If the target eNB does not receive the UP integrity protection policy from the MME, the target eNB shall use the UE capability indicating support of UP IP in EPS together with the UP integrity protection policy received from the source eNB. If both policies from MME and source eNB are absent, but EIA7 in the EPS security capability indicates that the UE supports use of user plane protection with EPC, the eNB shall use locally configured UP integrity protection policy." in clause 7.3.3

Test Purpose

To verify that the eNB has correct selection on UP IP policy in S1 handover

Pre-Conditions
  • The target eNB network product shall be connected in emulated/real network environments. UE, source eNB and MME may be simulated.

  • The target eNB locally UP IP is set to NOT NEEDED.

  • The tester shall have knowledge of integrity algorithm and integrity protection keys.

  • The tester can capture the message via the Uu interface, or can capture the message at the UE.

Execution Steps

Test Case 1:

  1. The tester triggers the source MME to send EPS security capability with EIA7 to the target eNB indicating the UP IP is supported by the UE. Furthermore, the tester triggers the source MME to send a UP IP policy with REQUIRED to the target eNB.

  2. The source eNB sends UP IP policy with NOT NEEDED in the source-to-target container to the target eNB.

  3. The target eNB sends a RRCConnectionReconfiguration message with integrity protection indication "on" to the UE.

  4. The tester checks that any user data sent by the target eNB after sending the RRCConnectionReconfiguration message and before UE enters CM-Idle state is integrity protected.

Test Case 2:

  1. The tester triggers the source MME to send EPS security capability with EIA7 to the target eNB indicating the UP IP is supported by the UE. Furthermore, the tester prepares the MME to not send a UP IP policy to the target eNB.

  2. The source eNB sends UP IP policy with REQUIRED in the source-to-target container to the target eNB.

  3. The target eNB sends a RRCConnectionReconfiguration message with integrity protection indication "on" to the UE.

  4. The tester checks that any user data sent by eNB after sending the RRCConnectionReconfiguration message and before UE enters CM-Idle state is integrity protected.

Test Case 3:

  1. The tester configures the target eNB to make sure the local UP IP is set to REQUIRED.

  2. The tester triggers the source MME to send EPS security capability with EIA7 to the target eNB indicating the UP IP is supported by the UE. Furthermore, the tester prepares the MME to not send a UP IP policy to the target eNB.

  3. The source eNB does not send UP IP policy in the source-to-target container to the target eNB.

  4. The target eNB sends a RRCConnectionReconfiguration message with integrity protection indication "off to the UE ".

  5. The tester checks that any user data sent by eNB after sending the RRCConnectionReconfiguration message and before UE enters CM-Idle state is not integrity protected.

Expected Results

For all test cases, any user plane packets sent between UE and eNB over the Uu interface after eNB sending the RRCConnectionReconfiguration message are integrity protected.

Expected Format of Evidence

Evidence suitable for the interface e.g. Screenshot containing the operational results.

For each test case: Configuration of UP IP of target eNB, source eNB and UP IP policy sent by MME.

PDFs d0c34a2e494312ba16d8671e3fd9e9d7

4.2.2.1.20 Bidding down prevention for UP IP Policy

Home eNB18.1.0
33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TR 33.926 [4], clause C.2.2.a, bidding down for UP IP Policy

Requirement Name
Requirement Reference

TS 33.401 [3], clause 7.3.3

Requirement Description

"Further, in the Path-Switch message, the target eNB shall send the UE's UP integrity protection policy and corresponding E-RAB ID to the MME. The sent UP integrity protection policy can either be the one received from source eNB or the locally configured one if the target eNB does not receive it from the source eNB, but the EIA7 in the EPS security capability indicates that the UE supports user plane integrity protection with EPC. " as specified in TS 33.401 [3], clause 7.3.3.

Test Purpose

Verify that bidding down for UP IP policy is prevented in X2-handovers.

Pre-Conditions
  • The target eNB network product shall be connected in emulated/real network environments. UE, source eNB and MME may be simulated.
Execution Steps

Test Case 1:

  • The tester configures the target eNB with UP IP set to NOT NEEDED.

  • The tester triggers the source eNB to send EPS security capability with EIA7 to the MME indicating the UP IP is supported and UP IP policy with REQUIRED in Handover Request message to the target eNB.

  • The target eNB sends path-switch request message with UP IP policy with REQUIRED to the MME.

Test Case 2:

  • The tester configures the target eNB with UP IP set to REQUIRED.

  • The tester triggers the source eNB to send EPS security capability with EIA7 to the MME indicating the UP IP is supported in Handover Request message to the target eNB. The tester prepares the source eNB to not send UP IP policy in the Handover Request message.

  • The target eNB sends path-switch request message with UP IP policy with REQUIRED to the MME.

Expected Results

For both test casees, the UP IP policy with REQUIRED is in the path-switch request message.

Expected Format of Evidence

Snapshots containing the result.

For each test case: Configuration of UP IP of target eNB, source eNB and UP IP policy sent by MME.

PDFs 67cb0130a71eb92421afb8688c321232

4.2.2.1.3 User plane data ciphering and deciphering at the eNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC-DATA-CIP-eNB-Uu
Threat Reference

TR 33.926 [4], clause C.2.2.3 -- User plane data ciphering and deciphering at eNB.

Requirement Name

User plane data ciphering and deciphering at eNB

Requirement Reference

TS 33.401 [3], clause 5.3.4

Requirement Description

"The eNB shall cipher and decipher user plane packets between the Uu reference point and the S1/X2 reference points." as specified in TS 33.401 [3], clause 5.3.4.

Test Purpose

To verify that the user data packets are confidentiality protected over the air interface.

Pre-Conditions
  • The eNB network product shall be connected in emulated/real network environments. UE and the MME may be simulated,

  • The tester can capture the messages via the air interface.

  • The tester shall enable the user plane ciphering protection and ensure EEA0 is not used.

Execution Steps
  1. The UE sends an attach request to the MME.

  2. The MME sends a KeNB and the UE security capability to the eNB.

  3. eNB selects an algorithm and sends AS SMC to the UE,

  4. eNB receive AS SMP from the UE.

Expected Results

User plane packets sent by the eNB after eNB sending AS SMC is ciphered.

Expected Format of Evidence

Evidence suitable for the interface e.g. Screenshot containing the operational results.

PDFs f09e49465bd197ba5eb67cbf167fa90a

4.2.2.1.3(2) User plane data ciphering and deciphering at the eNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC-DATA-CIP-eNB-S1/X2
Threat Reference

TR 33.926 [4], clause C.2.2.3 -- User plane data ciphering and deciphering at eNB.

Requirement Name

User plane data ciphering and deciphering at eNB

Requirement Reference

TS 33.401 [3], clause 5.3.4

Requirement Description

"The eNB shall cipher and decipher user plane packets between the Uu reference point and the S1/X2 reference points." as specified in TS 33.401 [3], clause 5.3.4.

Test Purpose

To verify that the user data packets are confidentiality protected over the air interface.

Pre-Conditions
Execution Steps
Expected Results
Expected Format of Evidence
PDFs 2083daa5f6687041c1fd055c2e0a98be

4.2.2.1.5 AS algorithms selection

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TBA

Requirement Name

AS algorithms selection

Requirement Reference

TS 33.401 [3], clause 7.2.4.1; TS 33.401 [3], clause 7.2.4.2.1

Requirement Description

" The serving network shall select the algorithms to use dependent on: the UE security capabilities of the UE, and the configured allowed list of security capabilities of the currently serving network entity." as specified in TS 33.401 [3], clause 7.2.4.1".

"Each eNB shall be configured via network management with lists of algorithms which are allowed for usage. There shall be one list for integrity algorithms, and one for ciphering algorithms. These lists shall be ordered according to a priority decided by the operator." as specified in TS 33.401 [3], clause 7.2.4.2.1.

Test Purpose

Verify that the eNB selects the algorithms with the highest priority in its configured list.

Pre-Conditions

Test environment with the eNB has been pre-configured with allowed security algorithms with priority.

Execution Steps
  1. The UE sends attach request message to the eNB.

  2. The eNB receives S1 context setup request message.

  3. The eNB sends the SECURITY MODE COMMAND message.

  4. The UE replies with the AS SECURITY MODE COMPLETE message.

Expected Results

The eNB initiates the SECURITY MODE COMMAND message that includes the chosen algorithm with the highest priority according to the ordered lists and is contained in the UE EPS security capabilities.

The MAC in the AS SECURITY MODE COMPLETE message is verified, and the AS protection algorithms are selected and applied correctly.

Expected Format of Evidence

Sample copies of the log files.

PDFs 6a8a53ae0b588586a9963fed1cdc0735

4.2.2.1.6 Verify RRC integrity protection

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference
Requirement Name

The check of RRC integrity

Requirement Reference

TS 33.401 [3], clause 7.4.1

Requirement Description

" The supervision of failed RRC integrity checks shall be performed both in the ME and the eNB. In case of failed integrity check (i.e. faulty or missing MAC-I) is detected after the start of integrity protection, the concerned message shall be discarded. " as specified in TS 33.401 [3], clause 7.4.1.

Security Objective References: TBA

Test Purpose

Verify that the message is discarded in case of failed integrity check (i.e. faulty or missing MAC-I).

Pre-Conditions

Test environment with RRC Protection is activated at the eNB.

Execution Steps

Positive:

The eNB receives a RRC message with a right MAC-I.

Negative:

The eNB receives a RRC message with a wrong MAC-I or missing MAC-I.

Expected Results

The RRC message is discarded in the negative test.

Expected Format of Evidence

Sample copies of the log files.

PDFs c0329e2d7e58c4de5dd1c866f8f4685d

4.2.2.1.7 The selection of EIA0

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TBA

Requirement Name

The selection of EIA0

Requirement Reference

TS 33.401 [3], clause 5.1.4.2

Requirement Description

" EIA0 is only allowed for unauthenticated emergency calls " as specified in TS 33.401 [3], clause 5.1.4.2.

Test Purpose

Verify that AS NULL integrity algorithm is used correctly.

Pre-Conditions

Test environment with a UE . The UE may be simulated.

The vendor shall provide documentation describing how EIA0 is disabled or enabled.

Execution Steps

Positive:

  1. The eNB receives a UE security capability only containing EIA0 from S1 context setup message.

  2. The eNB sends AS SMC to the UE.

Negative:

  1. The eNB receives a UE security capability that contains EIA0 and other integrity algorithm(s).

  2. The eNB sends AS SMC to the UE.

Expected Results

EIA0 is only selected in the Positive test.

Expected Format of Evidence

Sample copies of the log files.

PDFs 913de142147959ad9d759ddc8634bcb7

4.2.2.1.8 Key refresh at the eNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_ENB_KEY_REFRESH_ PDCP_COUNT
Threat Reference

TR 33.926[4], clause C.2.3.1 -- Key reuse for eavesdropping

Test Case 1:

Requirement Name

Key refresh at the eNB

Requirement Reference

TS 33.401 [3], clause 7.2.9.1; TS 36.331 [5], clause 5.3.1.2.

Requirement Description

"Key refresh shall be possible for K~eNB~, K~RRC-enc~, K~RRC-int~, K~UP-int~, and K~UP-enc~ and shall be initiated by the eNB when a PDCP COUNTs is about to be re-used with the same Radio Bearer identity and with the same K~eNB~. " as specified in TS 33.401 [3], clause 7.2.9.1.

Moreover, "The eNB is responsible for avoiding reuse of the COUNT with the same RB identity and with the same K~eNB~, e.g. due to the transfer of large volumes of data, release and establishment of new RBs. In order to avoid such re-use, the eNB may e.g. use different RB identities for successive RB establishments, trigger an intra cell handover or by triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED." as specified in TS 36.331 [x], clause 5.3.1.2.

Test Purpose

Verify that the eNB performs K~eNB~ refresh when PDCP COUNTs are about to wrap around.

Pre-Conditions

The UE may be simulated.

Execution Steps
  1. The eNB sends AS Security Mode Command message to the UE, and the UE respondswith the AS ecurity Sode Momplete messageC.

  2. The UE sends RRC messages or UP messages to the eNB with an increasing PDCP COUNT until the value wraps around.

Expected Results

The eNB triggers an intra-cell handover and takes a new K~eNB~ into use.

Expected Format of Evidence

Part of log that shows the PDCP COUNT wraping around and the intra-cell handover. This part can be presented, for example as a screenshot.

Test Case 2:

PDFs 1fecc99ece23935adfe92312259dcc06

4.2.2.1.8(2) Key refresh at the eNB

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name TC_ENB_KEY_REFRESH_DRB_ID
Threat Reference

TR 33.926[4], clause C.2.3.1 -- Key reuse for eavesdropping

Test Case 1:

Requirement Name

Key refresh at the eNB

Requirement Reference

TS 33.401 [3], clause 7.2.9.1; TS 36.331 [5], clause 5.3.1.2.

Requirement Description

"Key refresh shall be possible for K~eNB~, K~RRC-enc~, K~RRC-int~, K~UP-int~, and K~UP-enc~ and shall be initiated by the eNB when a PDCP COUNTs is about to be re-used with the same Radio Bearer identity and with the same K~eNB~. " as specified in TS 33.401 [3], clause 7.2.9.1.

Moreover, "The eNB is responsible for avoiding reuse of the COUNT with the same RB identity and with the same K~eNB~, e.g. due to the transfer of large volumes of data, release and establishment of new RBs. In order to avoid such re-use, the eNB may e.g. use different RB identities for successive RB establishments, trigger an intra cell handover or by triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED." as specified in TS 36.331 [x], clause 5.3.1.2.

Test Purpose

Verify that the eNB performs K~eNB~ refresh when DRB-IDs are about to be reused under the following conditions:

  • the successive Radio Bearer establishment uses the same RB identity while the PDCP COUNT is reset to 0, or

  • the PDCP COUNT is reset to 0 but the RB identity is increased after multiple calls and wraps around.

Pre-Conditions

The UE and MME may be simulated.

Execution Steps
  1. The eNB sends the AS Security Mode Command message to the UE.

  2. the UE responds with the AS Security Mode Complete message.

  3. A DRB is set up.

  4. DRB is set up and torn down for multiple times within one active radio connection without the UE going to idle (e.g. by the UE making multiple IMS calls, or by the MME requesting bearer setup and bearer deactivation), until the DRB ID is reused.

Expected Results

Before DRB ID reuse, the eNB takes a new K~eNB~ into use by e.g. triggering an intra-cell handover or triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED.

Expected Format of Evidence

Part of log that shows all the DRB identities and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot.

PDFs 02830906a954d0584bc50bc40cd48a58

4.2.2.1.9 AS Security Mode Command Procedure

Home eNB18.1.0
33216-h00   33216-i00    33216-i10 33216-j00   33216-j10  
Test Name
Threat Reference

TBA

Requirement Name

AS integrity algorithm selection

Requirement Reference

TS 33.401 [3], clause 7.4.2

Requirement Description

The eNB shall protect the SECURITY MODE COMMAND message with the integrity algorithm, which has the highest priority according to the ordered lists.

Test Purpose

Verify that AS integrity protection algorithm is selected and applied correctly.

Pre-Conditions

Test environment with UE. UE may be simulated.

Execution Steps

The eNB sends the SECURITY MODE COMMAND message. The UE replies with the SECURITY MODE COMPLETE message.

Expected Results
  1. The eNB has selected the integrity algorithm which has the highest priority according to the ordered lists and is contained in the UE EPS security capabilities. The eNB checks the message authentication code on the SECURITY MODE COMPLETE message.

  2. The MAC in the SECURITY MODE COMPLETE is verified, and the AS integrity protection algorithm is selected and applied correctly.

Expected Format of Evidence

Snapshots containing the result.

PDFs 32d8db1a3259e79ca47286b2ad73484f