4.2.2.2 Per-user based packet filtering |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | ||
| Threat Reference | TR 33.926 [10], clause B.2.3.1 Failure to assign unique TEID or Charging ID for a session. |
|
| Requirement Name | Per-user based packet filtering |
|
| Requirement Reference | TS 23.401 [6], clause 4.4.3.3 |
|
| Requirement Description | This requirement is identical to per-user based packet filtering (by e.g. deep packet inspection) as specified in TS 23.401, clause 4.4.3.3. |
|
| Test Purpose | Verify that PGW supports a Per-user based packet filtering. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The PGW can filter the packets per- user according the configured filtering policy, e.g. the PGW forwards the packets from the UE1 to SGi in the step 2 and drops the packets from the UE2 in the step 3. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation results, pcap file demonstrating that the UE2's packets are correctly received but unavailable on the SGi interface while the UE1's packets are correctly sent to SGi. |
|
| PDFs | 207a773aeff98b2cc7dbb6a0dc467006 | |
4.2.2.3 Charging ID Uniqueness |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | ||
| Threat Reference | TR 33.926 [10], clause B.2.5.1 Failure to assign unique TEID or Charging ID for a session |
|
| Requirement Name | Charging ID Uniqueness |
|
| Requirement Reference | TS 32.251 [8], clause 5.1.1 |
|
| Requirement Description | "Every IP-CAN bearer shall be assigned a unique identity number for billing purposes. (i.e. the Charging Id)" as specified in 3GPP TS 32.251 [8], clause 5.1.1. Note: A charging ID is not assigned to more than one active IP-CAN bearers at the same time. The reuse of Charging ID is possible after an IP-CAN session has been terminated and the Charging ID related to this IP-CAN session has been released. |
|
| Test Purpose | Verify that the Charging ID value set in the Information Element Bearer Context within a CreateSessionResponse is unique. |
|
| Pre-Conditions | Test environment with P-GW and S-GW, PCRF. PCRF and S-GW may be real nodes or simulated. The tester is able to trace traffic between the P-GW and the S-GW (real or simulated) |
|
| Execution Steps |
a. A Success cause. b. The P-GW's F-TEID for control plane c. The PDN Address Allocation (PAA) d. A Bearer Contexts Created.
|
|
| Expected Results | The Charging ID assigned to every IP-CAN bearer requested by different CreateSessionRequest is unique. |
|
| Expected Format of Evidence | Files containing the triggered GTP messages (e.g. pcap trace). |
|
| PDFs | 056381d513b7773ed908ad0b3ec7ca3e | |
4.2.2.4 TEID UNIQUENESS |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | ||
| Threat Reference | TR 33.926 [10], clause B.2.5.1 Failure to assign unique TEID or Charging ID for a session |
|
| Requirement Name | TEID Uniqueness |
|
| Requirement Reference | TS 23.060 [9], clause 14.6 |
|
| Requirement Description | "The TEID is a unique identifier within one IP address of a logical node." as specified in TS 23.060 [9], clause 14.6. Note: A TEID is not assigned to more than one active GTP tunnel at the same time.The reuse of TEID is possible after a GTP tunnel has been terminated and the TEID related to this GTP tunnel has been released. |
|
| Test Purpose | Verify that the TEID generated for each new GTP tunnel is unique for both control and user plane. |
|
| Pre-Conditions | Test environment with P-GW and S-GW, PCRF. PCRF and S-GW may be real nodes or simulated. The tester is able to trace traffic between the P-GW and the S-GW (real or simulated) |
|
| Execution Steps |
a. A Success cause. b. The P-GW's F-TEID for control plane c. The PDN Address Allocation (PAA). d. A Bearer Contexts Created.
|
|
| Expected Results | The F-TEID set into each different CreateSessionResponse is unique. |
|
| Expected Format of Evidence | Files containing the triggered GTP messages (e.g. pcap trace). |
|
| PDFs | 3b94e2a8b0c00ca87129dedba0c528eb | |
4.2.2.5 Mobility binding |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 → 33250-j00 | |
| Test Name | TC_PGW_MIP-AUTH_Non-3GPP | |
| Threat Reference | TBA |
|
| Requirement Name | MN-HA authentication extension validation for mobility binding during trusted non-3GPP access |
|
| Requirement Reference | TS 33.402 [11], clause 9.2.1.1 |
|
| Requirement Description | "The PDN-GW shall validate the MN-HA authentication extension" as specified in TS 33.402, clause 9.2.1.1. |
|
| Test Purpose | To test whether the PGW validates the MN-HA authentication extension correctly. |
|
| Pre-Conditions | The UE and PGW are connected in the test environment. UE is simulated. The tester has access to the S6b interface between the 3GPP AAA Server and the PDN GW. The tester has access to the MIPv4 FACoA based S2a interface between the PGW and UE. |
|
| Execution Steps | The PGW (home agent for the UE) is active in a 3GPP access network. The tester captures packets over S6b and S2a interfaces using any packet analyser. The tester filters the MN-HA Key transported in the authentication and authorization information from the 3GPP AAA server to PGW over S6b interface. The UE sends a Registration Request message to PGW via the trusted non-3GPP IP access network. The tester filters the Registration Request sent by UE to PGW and Registration Reply sent by PGW to UE over the S2a interface. The tester uses the SPI value in Registration Request to identify the MN-HA key to compute the Authenticator value of the authentication extension. The tester verifies that the computed Authenticator value is same as the Authenticator value in the Registration Request message. The tester also checks the Reply Code in the Registration Reply message to verify the correctness of the validation at PGW. |
|
| Expected Results | The Reply code is '0' in the Registration Reply message. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot contains the operation results. |
|
| PDFs | c478b9c4117b060fc75b6064d6b52e56 | |
4.2.2.6 Inactive emergency PDN connection release |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 → 33250-j00 | |
| Test Name | TC_PGW_EMRGENCY_CONNECTION-RELEASE | |
| Threat Reference | TR 33.926[10], clause B.2.4.1 Inactive Emergency PDN Connection Release |
|
| Requirement Name | Emergency PDN connection release |
|
| Requirement Reference | TS 23.401 [6], clause 5.4.4.1 |
|
| Requirement Description | "PGW shall initiate the deactivation of all bearers of the emergency PDN connection when it is inactive (i.e. not transferring any packets) for a configured period of time." as specified in TS 23.401, clause 5.4.4.1. |
|
| Test Purpose | To verify whether the PGW releases all emergency PDN connections which are inactive for a configured inactive time to prevent resource exhaustion. |
|
| Pre-Conditions | The UE, PGW and S-GW network products are connected in the test environment. UE and S-GW may be simulated. The tester has access to the PGW configuration file. The tester has access to the GTP-based S5/S8 interface. |
|
| Execution Steps |
|
|
| Expected Results | The PGW releases the inactive emergency bearers according to the configured timeout value. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot contains the operation results. |
|
| PDFs | cf8a6d718f7c9a115fd0c4becc8f7271 | |
4.2.3.5.1 Unpredictable GTP TEID |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | UNPRED_GTP_TEID | |
| Threat Reference | TR 33.926 clause 5.3.7.2 Denial of service: Implementation Flaw and clause 5.3.4.x Tampering: User Traffic Tampering. Security Objective references: tba |
|
| Requirement Name | Unpredictable GTP TEID |
|
| Requirement Reference | ||
| Requirement Description | The TEID created for usage in the GTP-C messages as well as in the GTP-U messages shall be unpredictable in order to prevent a hacker to inject GTP-U packets with a spoofed TEID into a user's session (causing e.g. overbilling problems) or to send malicious GTP-C messages to delete an established session (and causing a DoS). |
|
| Test Purpose | To verify that the GTP TEID is unpredictable |
|
| Pre-Conditions | Test environment with P-GW and S-GW, PCRF. PCRF and S-GW may be real nodes or simulated. The tester is able to trace traffic between the P-GW and the S-GW (real or simulated). |
|
| Execution Steps |
a. A Success cause. b. The P-GW's F-TEID for control plane c. The PDN Address Allocation (PAA). d. A Bearer Contexts Created.
|
|
| Expected Results | The tester cannot predict the F-TEID in the finalCreateSessionResponse. |
|
| Expected Format of Evidence | Files containing the triggered GTP messages (e.g. pcap trace) and, if the F-TEID is predictable, a detailed description of how the F-TEID can be predicted. |
|
| PDFs | ca74974ef7ba01c6941b3f6765176484 | |
4.2.6.3 IP Address reallocation interval |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | TC_ IP-ADDRESS_REALLOCATION_INTERVAL | |
| Threat Reference | ||
| Requirement Name | IP Address Reallocation Interval |
|
| Requirement Reference | ||
| Requirement Description | The PGW shall support a mechanism to set an interval between an IP address reallocation. Security Objective references: tba. |
|
| Test Purpose | Verify that the PGW supports an IP address reallocation interval technique. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A PASS or FAIL. |
|
| PDFs | 6b2c3ca424baa17588f0f157af06d550 | |
4.2.6.4 MS/UE-Mutual Access Prevention |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | TC_ MS/UE-MUTUAL_ACCESS_PREVENTION | |
| Threat Reference | ||
| Requirement Name | MS/UE-Mutual Access Prevention |
|
| Requirement Reference | ||
| Requirement Description | The PGW shall support a mechanism to prevent MS/UE-mutual access attacks (e.g. configure a filtering rule to drop all mutual access packets). Security Objective references: tba. |
|
| Test Purpose | Verify that the Network Product supports a MS/UE-Mutual Access Prevention technique. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Using the network analyser the tester verifies that the packets are correctly received and discarded by the PGW. The tester verifies that the packets are correctly sent by the UE through the packet analyzer on the UEs.
|
|
| Expected Format of Evidence | A log from analyser to show the process. |
|
| PDFs | c99e1cf58b34d2bdd99d6cddea31997d | |
4.3.5.1 Traffic separation |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | TC_TRAFFIC_SEPARATION | |
| Threat Reference | ||
| Requirement Name | Traffic Separation |
|
| Requirement Reference | ||
| Requirement Description | The PGW shall support physical or logical separation of O&M and control plane traffic, O&M and user plane traffic, control plane and user plane traffic respectively. Note1: The security requirement in clause 4.3.5.1 of TS 33.117 (i.e. the physical or logical separation of O&M and control plane traffic) and related test case also applies to the PGW. Note2: The requirement that is different from TS 33.117[3], clause 4.3.5.1 is that the traffic separation of user plane from O&M and control plane which is considered to be PGW-specific has been take into account in present document. Security Objective references: tba. |
|
| Test Purpose | To test whether O&M traffic is separated from user plane traffic, control plane traffic is separated from user plane traffic. |
|
| Pre-Conditions | The PGW has at least one separate (logical) interface dedicated to O&M traffic and at least two (logical) interfaces for control plane traffic and user plane traffic respectively. The PGW for which the test applies and that fail to meet this precondition fail the test by definition. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The six tests should be successful, i.e. the PGW refuses traffic in all of the four steps. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. screenshot contains the operation results. |
|
| PDFs | 70d338b715f11c44c121f36900628fc9 | |
4.3.5.2 User Plane Traffic Differentiation |
Home → PGW → 18.0.0 |
| 33250-h00  33250-i00 33250-j00 | |
| Test Name | TC_USER PLANE TRAFFIC_DIFFERENTIATION | |
| Threat Reference | ||
| Requirement Name | User Plane Traffic Differentiation |
|
| Requirement Reference | ||
| Requirement Description | "The EPS shall support simultaneous exchange of IP traffic to multiple PDNs through the use of separate PDN GWs or single PDN GW" as specified in 3GPP TS 23.401 [6], clause 5.10.1. According to this, the PGW shall support the user plane traffic differentiation (e.g. enterprise, internet, etc) by setting the specific APNs, and shall support the traffic isolation based on the APNs (e.g. using VPN). Security Objective references: tba |
|
| Test Purpose |
|
|
| Pre-Conditions | The PGW has configured several APNs for the testing, and every APN is configured to associate with specific VPN (e.g. the VPN can be GRE) for user plane traffic. For example, APN1's traffic is sent and received by VPN1, and APN2's traffic is sent and received by VPN2. The PGW for which the test applies and that fail to meet this precondition fail the test by definition. |
|
| Execution Steps | Execute the following steps:
|
|
| Expected Results | The four verification should be successful. |
|
| Expected Format of Evidence | The APN traffic is sent and received by the right VPN. |
|
| PDFs | 6bb23edd5e8e6abe7cab64b4c564e0a7 | |