4.2.2.1.1 Integrity protection of RRC-signalling |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_CP_DATA_INT_RRC-SIGN_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2 -- Control plane data integrity protection. |
|
| Requirement Name | Integrity protection of RRC-signalling |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify that the RRC-signalling data sent between UE and gNB over the NG RAN air interface are integrity protected. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any RRC-signalling over the NG RAN air interface is integrity protected after gNB sending AS SMC. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | 0dd451dd0d92e4129f1fd0a620323331 | |
4.2.2.1.1 Integrity protection of RRC-signalling |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_CP_DATA_INT_RRC-SIGN_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2 -- Control plane data integrity protection. |
|
| Requirement Name | Integrity protection of RRC-signalling |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify that the RRC-signalling data sent between UE and gNB over the NG RAN air interface are integrity protected. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any RRC-signalling over the NG RAN air interface is integrity protected after gNB sending AS SMC. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | 0dd451dd0d92e4129f1fd0a620323331 | |
4.2.2.1.10 Ciphering of user data based on the security policy sent by the SMF |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 → 33511-h50 33511-h60 → 33511-i00  33511-i10 → 33511-i20 → 33511-i30 33511-j00 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-CIP-SMF | |
| Threat Reference | TR 33.926 [5], clause D.2.2.8 -- Security Policy Enforcement. |
|
| Requirement Name | Ciphering of user data based on the security policy sent by the SMF |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB activates ciphering of user data based on the security policy sent by the SMF as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected based on the security policy sent by the SMF via AMF |
|
| Pre-Conditions |
|
|
| Execution Steps |
6a. Tester shall capture the user plane data sent between UE and gNB using any network analyser.
|
|
| Expected Results | When the received UP cipher protection indication is set to "required", the captured user plane data appear to be garbled (i.e. no longer plaintext) and the user plane packets are confidentiality protected based on the UP security policy sent by the SMF. When the received UP cipher protection indication is set to "not needed", the captured user plane data appear to be plaintext and the user plane packets are not confidentiality protected based on the UP security policy sent by the SMF. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | f3776c73b90069fade44fb41209f43c6 | |
4.2.2.1.10 Ciphering of user data based on the security policy sent by the SMF |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 → 33511-h50 33511-h60 →  33511-i00 33511-i10 → 33511-i20 → 33511-i30 33511-j00 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-CIP-SMF | |
| Threat Reference | TR 33.926 [5], clause D.2.2.8 -- Security Policy Enforcement. |
|
| Requirement Name | Ciphering of user data based on the security policy sent by the SMF |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB activates ciphering of user data based on the security policy sent by the SMF as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected based on the security policy sent by the SMF via AMF |
|
| Pre-Conditions |
|
|
| Execution Steps |
6a. Tester shall capture the user plane data sent between UE and gNB using any network analyser.
|
|
| Expected Results | When the received UP cipher protection indication is set to "required", the captured user plane data appear to be garbled (i.e. no longer plaintext) and the user plane packets are confidentiality protected based on the UP security policy sent by the SMF. When the received UP cipher protection indication is set to "not needed", the captured user plane data appear to be plaintext and the user plane packets are not confidentiality protected based on the UP security policy sent by the SMF. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | f3776c73b90069fade44fb41209f43c6 | |
4.2.2.1.11 Integrity of user data based on the security policy sent by the SMF |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 → 33511-h50 33511-h60 → 33511-i00  33511-i10 → 33511-i20 → 33511-i30 33511-j00 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-INT-SMF | |
| Threat Reference | TR 33.926 [5], clause D.2.2.8 -- Security Policy Enforcement. |
|
| Requirement Name | Integrity of user data based on the security policy sent by the SMF |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB activates integrity protection of user data based on the security policy sent by the SMF as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are integrity protected based on the security policy sent by the SMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | When the received UP integrity protection is set to "required", the user plane data packet contains a message authentication code and the user plane packets are integrity protected based on the security policy sent by the SMF. When the received UP interity protection is set to "not needed", the user plane data packet message authentication code is not present and the user plane packets are not integrity protected based on the security policy sent by the SMF. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | e8ace377b9de477febfaec0108a70d55 | |
4.2.2.1.11 Integrity of user data based on the security policy sent by the SMF |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 → 33511-h50 33511-h60 →  33511-i00 33511-i10 → 33511-i20 → 33511-i30 33511-j00 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-INT-SMF | |
| Threat Reference | TR 33.926 [5], clause D.2.2.8 -- Security Policy Enforcement. |
|
| Requirement Name | Integrity of user data based on the security policy sent by the SMF |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB activates integrity protection of user data based on the security policy sent by the SMF as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are integrity protected based on the security policy sent by the SMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | When the received UP integrity protection is set to "required", the user plane data packet contains a message authentication code and the user plane packets are integrity protected based on the security policy sent by the SMF. When the received UP interity protection is set to "not needed", the user plane data packet message authentication code is not present and the user plane packets are not integrity protected based on the security policy sent by the SMF. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | e8ace377b9de477febfaec0108a70d55 | |
4.2.2.1.12 AS algorithms selection |
Home → gNB → 18.1.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-AS-alg-select_gNB | |
| Threat Reference | TR 33.926 [5], D.2.2.5 -- AS algorithm selection and use |
|
| Requirement Name | AS algorithms selection |
|
| Requirement Reference | TS 33.501 [2], clause 6.7.3.0 and clause 5.11.2. |
|
| Requirement Description | The serving network selects the algorithms to use dependent on: the UE security capabilities of the UE, the configured allowed list of security capabilities of the currently serving network entity as specified in TS 33.501 [2], clause 5.11.2. "Each gNB/ng-eNB is configured via network management with lists of algorithms which are allowed for usage. There is one list for integrity algorithms, and one for ciphering algorithms. These lists are ordered according to a priority decided by the operator." as specified in TS 33.501 [2], clause 6.7.3.0. |
|
| Test Purpose | Verify that the gNB selects the algorithms with the highest priority in its configured list. |
|
| Pre-Conditions | Test environment with the gNB has been pre-configured with allowed security algorithms with priority. |
|
| Execution Steps |
|
|
| Expected Results | The gNB initiates the SECURITY MODE COMMAND message that includes the chosen algorithm with the highest priority according to the ordered lists and is contained in the UE NR security capabilities. The MAC in the AS SECURITY MODE COMPLETE message is verified, and the AS protection algorithms are selected and applied correctly. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 75482ec33b08e8be7217125ce93c1cd5 | |
4.2.2.1.12 AS algorithms selection |
Home → gNB → 18.0.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-AS-alg-select_gNB | |
| Threat Reference | TR 33.926 [5], D.2.2.5 -- AS algorithm selection and use |
|
| Requirement Name | AS algorithms selection |
|
| Requirement Reference | TS 33.501 [2], clause 6.7.3.0 and clause 5.11.2. |
|
| Requirement Description | The serving network selects the algorithms to use dependent on: the UE security capabilities of the UE, the configured allowed list of security capabilities of the currently serving network entity as specified in TS 33.501 [2], clause 5.11.2. "Each gNB/ng-eNB is configured via network management with lists of algorithms which are allowed for usage. There is one list for integrity algorithms, and one for ciphering algorithms. These lists are ordered according to a priority decided by the operator." as specified in TS 33.501 [2], clause 6.7.3.0. |
|
| Test Purpose | Verify that the gNB selects the algorithms with the highest priority in its configured list. |
|
| Pre-Conditions | Test environment with the gNB has been pre-configured with allowed security algorithms with priority. |
|
| Execution Steps |
|
|
| Expected Results | The gNB initiates the SECURITY MODE COMMAND message that includes the chosen algorithm with the highest priority according to the ordered lists and is contained in the UE NR security capabilities. The MAC in the AS SECURITY MODE COMPLETE message is verified, and the AS protection algorithms are selected and applied correctly. |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 75482ec33b08e8be7217125ce93c1cd5 | |
4.2.2.1.13 Key refresh at the gNB |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | TC_GNB_KEY_REFRESH_DRB_ID | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case : |
|
| Requirement Name | Key refresh at the gNB |
|
| Requirement Reference | TS 33.501 [2], clause 6.9.4.1; TS 38.331 [6], clause 5.3.1.2 |
|
| Requirement Description | Key refresh is possible for K~gNB~, K~RRC-enc~, K~RRC-int~, K~UP-enc~, and K~UP-int~ (if available), and is to be initiated by the gNB/ng-eNB when a PDCP COUNTs are about to be re-used with the same Radio Bearer identity and with the same K~gNB~. as specified in TS 33.501 [2], clause 6.9.4.1. The network is responsible for avoiding reuse of the COUNT with the same RB identity and with the same key, e.g. due to the transfer of large volumes of data, release and establishment of new RBs, and multiple termination point changes for RLC-UM bearers and multiple termination point changes for RLC-AM bearer with SN terminated PDCP re-establishment (COUNT reset) due to SN only full configuration whilst the key stream inputs (i.e. bearer ID, security key) at MN have not been updated. In order to avoid such re-use, the network e.g. uses different RB identities for RB establishments, change the AS security key, or an RRC_CONNECTED to RRC_IDLE/RRC_INACTIVE and then to RRC_CONNECTED transition as specified in TS 38.331 [6], clause 5.3.1.2. |
|
| Test Purpose | Verify that the gNB performs K~gNB~ refresh when DRB-IDs are about to be reused under the following conditions:
|
|
| Pre-Conditions | The UE, AMF and SMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | Before DRB ID reuse, the gNB takes a new K~gNB~ into use by e.g. triggering an intra-cell handover or triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. |
|
| Expected Format of Evidence | Part of log that shows all the DRB identities and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot. |
|
| PDFs | 96c6867808241780fc1bee0f91a35024 | |
4.2.2.1.13 Key refresh at the gNB |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | TC_GNB_KEY_REFRESH_DRB_ID | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case : |
|
| Requirement Name | Key refresh at the gNB |
|
| Requirement Reference | TS 33.501 [2], clause 6.9.4.1; TS 38.331 [6], clause 5.3.1.2 |
|
| Requirement Description | Key refresh is possible for K~gNB~, K~RRC-enc~, K~RRC-int~, K~UP-enc~, and K~UP-int~ (if available), and is to be initiated by the gNB/ng-eNB when a PDCP COUNTs are about to be re-used with the same Radio Bearer identity and with the same K~gNB~. as specified in TS 33.501 [2], clause 6.9.4.1. The network is responsible for avoiding reuse of the COUNT with the same RB identity and with the same key, e.g. due to the transfer of large volumes of data, release and establishment of new RBs, and multiple termination point changes for RLC-UM bearers and multiple termination point changes for RLC-AM bearer with SN terminated PDCP re-establishment (COUNT reset) due to SN only full configuration whilst the key stream inputs (i.e. bearer ID, security key) at MN have not been updated. In order to avoid such re-use, the network e.g. uses different RB identities for RB establishments, change the AS security key, or an RRC_CONNECTED to RRC_IDLE/RRC_INACTIVE and then to RRC_CONNECTED transition as specified in TS 38.331 [6], clause 5.3.1.2. |
|
| Test Purpose | Verify that the gNB performs K~gNB~ refresh when DRB-IDs are about to be reused under the following conditions:
|
|
| Pre-Conditions | The UE, AMF and SMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | Before DRB ID reuse, the gNB takes a new K~gNB~ into use by e.g. triggering an intra-cell handover or triggering a transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. |
|
| Expected Format of Evidence | Part of log that shows all the DRB identities and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot. |
|
| PDFs | 96c6867808241780fc1bee0f91a35024 | |
4.2.2.1.14 Bidding down prevention in Xn-handovers |
Home → gNB → 18.1.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-Xn-handover_bid_down_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.6 Bidding Down on Xn-Handover |
|
| Requirement Name | Bidding Down Prevention |
|
| Requirement Reference | TS 33.501 [2], clause 6.7.3.1 |
|
| Requirement Description | In the Path-Switch message, the target gNB/ng-eNB sends the UE's 5G security capabilities received from the source gNB/ng-eNB to the AMF. as specified in TS 33.501 [2], clause 6.7.3.1. |
|
| Test Purpose | Verify that bidding down is prevented in Xn-handovers. |
|
| Pre-Conditions | Test environment with source gNB and target gNB, and the source gNB may be simulated. |
|
| Execution Steps | The target gNB sends the path-switch message to the AMF. |
|
| Expected Results | The UE NR security capabilities are in the path-switch message. |
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 943a9a66486c291176787a13fd668ed4 | |
4.2.2.1.14 Bidding down prevention in Xn-handovers |
Home → gNB → 18.0.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-Xn-handover_bid_down_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.6 Bidding Down on Xn-Handover |
|
| Requirement Name | Bidding Down Prevention |
|
| Requirement Reference | TS 33.501 [2], clause 6.7.3.1 |
|
| Requirement Description | In the Path-Switch message, the target gNB/ng-eNB sends the UE's 5G security capabilities received from the source gNB/ng-eNB to the AMF. as specified in TS 33.501 [2], clause 6.7.3.1. |
|
| Test Purpose | Verify that bidding down is prevented in Xn-handovers. |
|
| Pre-Conditions | Test environment with source gNB and target gNB, and the source gNB may be simulated. |
|
| Execution Steps | The target gNB sends the path-switch message to the AMF. |
|
| Expected Results | The UE NR security capabilities are in the path-switch message. |
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 943a9a66486c291176787a13fd668ed4 | |
4.2.2.1.15 AS protection algorithm selection in gNB change |
Home → gNB → 18.1.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | Alg_select_change_gNB | |
| Threat Reference | TR 33.926 [5], D.2.2.5 -- AS algorithm selection and use |
|
| Requirement Name | AS protection algorithm selection in gNB change. |
|
| Requirement Reference | TS 33.501 [2], clauses 6.7.3.1 and 6.7.3.2 |
|
| Requirement Description | The target gNB/ng-eNB selects the algorithm with highest priority from the received 5G security capabilities of the UE according to the prioritized locally configured list of algorithms (this applies for both integrity and ciphering algorithms). The chosen algorithms are indicated to the UE in the Handover Command message if the target gNB/ng-eNB selects different algorithms compared to the source gNB/ng-eNB as specified in TS 33.501 [2], clause 6.7.3.1, and clause 6.7.3.2. |
|
| Test Purpose | Verify that AS protection algorithm is selected correctly. |
|
| Pre-Conditions | Test environment with source gNB, target gNB and AMF. Source gNB and AMF may be simulated. |
|
| Execution Steps | Test Case 1: Source gNB transfers the ciphering and integrity algorithms used in the source cell to the target gNB in the handover request message. Target gNB verifies the algorithms and selects AS algorithms which have the highest priority according to the ordered lists. Target gNB includes the algorithm in the handover command. Test Case 2: AMF sends the UE NR security capability to the Target gNB. The target gNB selects the AS algorithms which have the highest priority according to the ordered lists in the HANDOVER COMMAND. The above test cases assume that the algorithms selected by the target gNB are different from the ones received from the source gNB. |
|
| Expected Results | For both test cases:
|
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 2e85e3bb2fa3dfb8b629abdd827d1c21 | |
4.2.2.1.15 AS protection algorithm selection in gNB change |
Home → gNB → 18.0.0 |
| 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | Alg_select_change_gNB | |
| Threat Reference | TR 33.926 [5], D.2.2.5 -- AS algorithm selection and use |
|
| Requirement Name | AS protection algorithm selection in gNB change. |
|
| Requirement Reference | TS 33.501 [2], clauses 6.7.3.1 and 6.7.3.2 |
|
| Requirement Description | The target gNB/ng-eNB selects the algorithm with highest priority from the received 5G security capabilities of the UE according to the prioritized locally configured list of algorithms (this applies for both integrity and ciphering algorithms). The chosen algorithms are indicated to the UE in the Handover Command message if the target gNB/ng-eNB selects different algorithms compared to the source gNB/ng-eNB as specified in TS 33.501 [2], clause 6.7.3.1, and clause 6.7.3.2. |
|
| Test Purpose | Verify that AS protection algorithm is selected correctly. |
|
| Pre-Conditions | Test environment with source gNB, target gNB and AMF. Source gNB and AMF may be simulated. |
|
| Execution Steps | Test Case 1: Source gNB transfers the ciphering and integrity algorithms used in the source cell to the target gNB in the handover request message. Target gNB verifies the algorithms and selects AS algorithms which have the highest priority according to the ordered lists. Target gNB includes the algorithm in the handover command. Test Case 2: AMF sends the UE NR security capability to the Target gNB. The target gNB selects the AS algorithms which have the highest priority according to the ordered lists in the HANDOVER COMMAND. The above test cases assume that the algorithms selected by the target gNB are different from the ones received from the source gNB. |
|
| Expected Results | For both test cases:
|
|
| Expected Format of Evidence | Snapshots containing the result. |
|
| PDFs | 2e85e3bb2fa3dfb8b629abdd827d1c21 | |
4.2.2.1.18 Key update at the gNB on dual connectivity |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_GNB_DC_KEY_UPDATE_DRB_ID | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case 1: |
|
| Requirement Name | Key update at the gNB on dual connectivity |
|
| Requirement Reference | TS 33.501 [2], clause 6.10.2.1; clause 6.10.2.2.1;clause 6.10.3.1. |
|
| Requirement Description | When executing the procedure for adding subsequent radio bearer(s) to the same SN, the MN is expected to, for each new radio bearer, assign a radio bearer identity that has not previously been used since the last K~SN~ change. If the MN cannot allocate an unused radio bearer identity for a new radio bearer in the SN, due to radio bearer identity space exhaustion, the MN is expected to increment the SN Counter and compute a fresh K~SN~, and then is expected to perform a SN Modification procedure to update the K~SN~ as specified in TS 33.501 [2], clause 6.10.2.1. The MN is expected to refresh the root key of the 5G AS security context associated with the SN Counter before the SN Counter wraps around. Refreshing the root key is done using intra cell handover as described in subclause 6.7.3.3 of TS 33.501 [2]. When the root key is refreshed, the SN Counter is reset to '0' as defined above. in that same clause; as specified in TS 33.501 [2], clause 6.10.3.1.
|
|
| Test Purpose | Verify that the gNB under test acting as a Master Node (MN) performs K~SN~ update when DRB-IDs are about to be reused. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. text representation of the captured SN Modification Request message. Test Case 2: |
|
| PDFs | 1251c40aaaae9e86bb7e88e33beeecec | |
4.2.2.1.18 Key update at the gNB on dual connectivity |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_GNB_DC_KEY_UPDATE_DRB_ID | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case 1: |
|
| Requirement Name | Key update at the gNB on dual connectivity |
|
| Requirement Reference | TS 33.501 [2], clause 6.10.2.1; clause 6.10.2.2.1;clause 6.10.3.1. |
|
| Requirement Description | When executing the procedure for adding subsequent radio bearer(s) to the same SN, the MN is expected to, for each new radio bearer, assign a radio bearer identity that has not previously been used since the last K~SN~ change. If the MN cannot allocate an unused radio bearer identity for a new radio bearer in the SN, due to radio bearer identity space exhaustion, the MN is expected to increment the SN Counter and compute a fresh K~SN~, and then is expected to perform a SN Modification procedure to update the K~SN~ as specified in TS 33.501 [2], clause 6.10.2.1. The MN is expected to refresh the root key of the 5G AS security context associated with the SN Counter before the SN Counter wraps around. Refreshing the root key is done using intra cell handover as described in subclause 6.7.3.3 of TS 33.501 [2]. When the root key is refreshed, the SN Counter is reset to '0' as defined above. in that same clause; as specified in TS 33.501 [2], clause 6.10.3.1.
|
|
| Test Purpose | Verify that the gNB under test acting as a Master Node (MN) performs K~SN~ update when DRB-IDs are about to be reused. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. text representation of the captured SN Modification Request message. Test Case 2: |
|
| PDFs | 1251c40aaaae9e86bb7e88e33beeecec | |
4.2.2.1.18(2) Key update at the gNB on dual connectivity |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_GNB_DC_KEY_UPDATE_SN_COUNTER | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case 1: |
|
| Requirement Name | Key update at the gNB on dual connectivity |
|
| Requirement Reference | TS 33.501 [2], clause 6.10.2.1; clause 6.10.2.2.1;clause 6.10.3.1. |
|
| Requirement Description | When executing the procedure for adding subsequent radio bearer(s) to the same SN, the MN is expected to, for each new radio bearer, assign a radio bearer identity that has not previously been used since the last K~SN~ change. If the MN cannot allocate an unused radio bearer identity for a new radio bearer in the SN, due to radio bearer identity space exhaustion, the MN is expected to increment the SN Counter and compute a fresh K~SN~, and then is expected to perform a SN Modification procedure to update the K~SN~ as specified in TS 33.501 [2], clause 6.10.2.1. The MN is expected to refresh the root key of the 5G AS security context associated with the SN Counter before the SN Counter wraps around. Refreshing the root key is done using intra cell handover as described in subclause 6.7.3.3 of TS 33.501 [2]. When the root key is refreshed, the SN Counter is reset to '0' as defined above. in that same clause; as specified in TS 33.501 [2], clause 6.10.3.1.
|
|
| Test Purpose | Verify that the gNB under test acting as a Master Node (MN) performs K~NG-RAN~( AS root key) update when SN COUNTER is about to wrap around. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Part of log that shows the SN Counter values before and after wrapping around and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot. |
|
| PDFs | 41fe58200dec282dbc8734775b00b088 | |
4.2.2.1.18(2) Key update at the gNB on dual connectivity |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC_GNB_DC_KEY_UPDATE_SN_COUNTER | |
| Threat Reference | TR 33.926 [5], clause D.2.2.7 Key Reuse Test Case 1: |
|
| Requirement Name | Key update at the gNB on dual connectivity |
|
| Requirement Reference | TS 33.501 [2], clause 6.10.2.1; clause 6.10.2.2.1;clause 6.10.3.1. |
|
| Requirement Description | When executing the procedure for adding subsequent radio bearer(s) to the same SN, the MN is expected to, for each new radio bearer, assign a radio bearer identity that has not previously been used since the last K~SN~ change. If the MN cannot allocate an unused radio bearer identity for a new radio bearer in the SN, due to radio bearer identity space exhaustion, the MN is expected to increment the SN Counter and compute a fresh K~SN~, and then is expected to perform a SN Modification procedure to update the K~SN~ as specified in TS 33.501 [2], clause 6.10.2.1. The MN is expected to refresh the root key of the 5G AS security context associated with the SN Counter before the SN Counter wraps around. Refreshing the root key is done using intra cell handover as described in subclause 6.7.3.3 of TS 33.501 [2]. When the root key is refreshed, the SN Counter is reset to '0' as defined above. in that same clause; as specified in TS 33.501 [2], clause 6.10.3.1.
|
|
| Test Purpose | Verify that the gNB under test acting as a Master Node (MN) performs K~NG-RAN~( AS root key) update when SN COUNTER is about to wrap around. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results |
|
|
| Expected Format of Evidence | Part of log that shows the SN Counter values before and after wrapping around and the intra-cell handover or the transition from RRC_CONNECTED to RRC_IDLE or RRC_INACTIVE and then back to RRC_CONNECTED. This part can be presented, for example, as a screenshot. |
|
| PDFs | 41fe58200dec282dbc8734775b00b088 | |
4.2.2.1.19 UP security activation in Inactive scenario |
Home → gNB → 18.1.0 |
| 33511-h00 → 33511-h10 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 33511-j10 33511-j20 | |
| Test Name | TC_GNB_INACTIVE_TO_ACTIVE | |
| Threat Reference | TR 33.926 [5], clause D.2.2.9 State transition from inactive state to connected state. |
|
| Requirement Name | UP security activation in Inactive scenario |
|
| Requirement Reference | TS 33.501 [2], clause 6.8.2.1.3. |
|
| Requirement Description | If the UP security activation status can be supported in the target gNB/ng-eNB, the target gNB/ng-eNB uses the UP security activations that the UE used at the last source cell. Otherwise, the target gNB/ng-eNB responds with an RRC Setup message to establish a new RRC connection with the UE as specified in TS 33.501 [2], clause 6.8.2.1.3. |
|
| Test Purpose | Verify that the target gNB/ng-eNB uses the UP security activation status to activate the UP security. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The gNB sends RRC Setup message to the UE. |
|
| Expected Format of Evidence | Screenshot containing the operational results. |
|
| PDFs | fa8a8ac60b8b6c0dcece26201f5536cb | |
4.2.2.1.19 UP security activation in Inactive scenario |
Home → gNB → 18.0.0 |
| 33511-h00 → 33511-h10 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 33511-j10 33511-j20 | |
| Test Name | TC_GNB_INACTIVE_TO_ACTIVE | |
| Threat Reference | TR 33.926 [5], clause D.2.2.9 State transition from inactive state to connected state. |
|
| Requirement Name | UP security activation in Inactive scenario |
|
| Requirement Reference | TS 33.501 [2], clause 6.8.2.1.3. |
|
| Requirement Description | If the UP security activation status can be supported in the target gNB/ng-eNB, the target gNB/ng-eNB uses the UP security activations that the UE used at the last source cell. Otherwise, the target gNB/ng-eNB responds with an RRC Setup message to establish a new RRC connection with the UE as specified in TS 33.501 [2], clause 6.8.2.1.3. |
|
| Test Purpose | Verify that the target gNB/ng-eNB uses the UP security activation status to activate the UP security. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The gNB sends RRC Setup message to the UE. |
|
| Expected Format of Evidence | Screenshot containing the operational results. |
|
| PDFs | fa8a8ac60b8b6c0dcece26201f5536cb | |
4.2.2.1.2 Integrity protection of user data between the UE and the gNB |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-INT_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.4 -- User plane data integrity protection. |
|
| Requirement Name | Integrity protection of user data between the UE and the gNB. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of user data between the UE and the gNB as specified in TS 33.501 [2], clause 5.3.3.
|
|
| Test Purpose | To verify that the user data packets are integrity protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any user plane packets sent between UE and gNB over the NG RAN air interface after gNB sending RRCConnectionReconfiguration is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | a0845f54b0c6b99da83be375f740e5fd | |
4.2.2.1.2 Integrity protection of user data between the UE and the gNB |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-INT_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.4 -- User plane data integrity protection. |
|
| Requirement Name | Integrity protection of user data between the UE and the gNB. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of user data between the UE and the gNB as specified in TS 33.501 [2], clause 5.3.3.
|
|
| Test Purpose | To verify that the user data packets are integrity protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Any user plane packets sent between UE and gNB over the NG RAN air interface after gNB sending RRCConnectionReconfiguration is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | a0845f54b0c6b99da83be375f740e5fd | |
4.2.2.1.4 RRC integrity check failure |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 → 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-CP-DATA-RRC-INT-CHECK_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2, Control plane data integrity protection |
|
| Requirement Name | RRC integrity check failure |
|
| Requirement Reference | TS 33.501 [2], clause 6.5.1 |
|
| Requirement Description | The RRC integrity checks are performed both in the ME and the gNB. In case failed integrity check (i.e. faulty or missing MAC-I) is detected after the start of integrity protection, the concerned message is discarded. This can happen on the gNB side or on the ME side, as specified in TS 33.501 [2], clause 6.5.1. |
|
| Test Purpose | Verify that RRC integrity check failure is handled correctly by the gNB. |
|
| Pre-Conditions | Test environment with a UE. The UE may be simulated. RRC integrity protection is activated at the gNB. |
|
| Execution Steps | 1a) The UE sends a RRC message to the gNB without MAC-I; or 1b) The UE sends a RRC message to the gNB with a wrong MAC-I. 2b) The gNB verifies the integrity of the RRC message from the UE. |
|
| Expected Results | The RRC message is discarded by the gNB after step 1a) or after step 2b). |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 856b6879ff57169c1f493235162dbe85 | |
4.2.2.1.4 RRC integrity check failure |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 → 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-CP-DATA-RRC-INT-CHECK_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2, Control plane data integrity protection |
|
| Requirement Name | RRC integrity check failure |
|
| Requirement Reference | TS 33.501 [2], clause 6.5.1 |
|
| Requirement Description | The RRC integrity checks are performed both in the ME and the gNB. In case failed integrity check (i.e. faulty or missing MAC-I) is detected after the start of integrity protection, the concerned message is discarded. This can happen on the gNB side or on the ME side, as specified in TS 33.501 [2], clause 6.5.1. |
|
| Test Purpose | Verify that RRC integrity check failure is handled correctly by the gNB. |
|
| Pre-Conditions | Test environment with a UE. The UE may be simulated. RRC integrity protection is activated at the gNB. |
|
| Execution Steps | 1a) The UE sends a RRC message to the gNB without MAC-I; or 1b) The UE sends a RRC message to the gNB with a wrong MAC-I. 2b) The gNB verifies the integrity of the RRC message from the UE. |
|
| Expected Results | The RRC message is discarded by the gNB after step 1a) or after step 2b). |
|
| Expected Format of Evidence | Sample copies of the log files. |
|
| PDFs | 856b6879ff57169c1f493235162dbe85 | |
4.2.2.1.5 UP integrity check failure |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [5], clause D.2.2.4, User plane data integrity protection |
|
| Requirement Name | UP integrity check failure |
|
| Requirement Reference | TS 33.501 [2], clause 6.6.4 |
|
| Requirement Description | If the gNB or the UE receives a PDCP PDU which fails integrity check with faulty or missing MAC-I after the start of integrity protection, the PDU is discarded as specified in TS 33.501 [2], clause 6.6.4.2. |
|
| Test Purpose | Verify that UP integrity check failure is handled correctly by the gNB. |
|
| Pre-Conditions | Test environment with a UE. The UE may be simulated. UP integrity protection is activated at the gNB. |
|
| Execution Steps | 1a) The UE sends a PDCP PDU to the gNB without MAC-I; or 1b) The UE sends a PDCP PDU to the gNB with a wrong MAC-I. 2b) The gNB verifies the integrity of the PDCP PDU from the UE. |
|
| Expected Results | The PDCP PDU is discarded by the gNB after step 1a) or after step 2b). |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | c2401ad7af841d7df5d01c307c060688 | |
4.2.2.1.5 UP integrity check failure |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 → 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | ||
| Threat Reference | TR 33.926 [5], clause D.2.2.4, User plane data integrity protection |
|
| Requirement Name | UP integrity check failure |
|
| Requirement Reference | TS 33.501 [2], clause 6.6.4 |
|
| Requirement Description | If the gNB or the UE receives a PDCP PDU which fails integrity check with faulty or missing MAC-I after the start of integrity protection, the PDU is discarded as specified in TS 33.501 [2], clause 6.6.4.2. |
|
| Test Purpose | Verify that UP integrity check failure is handled correctly by the gNB. |
|
| Pre-Conditions | Test environment with a UE. The UE may be simulated. UP integrity protection is activated at the gNB. |
|
| Execution Steps | 1a) The UE sends a PDCP PDU to the gNB without MAC-I; or 1b) The UE sends a PDCP PDU to the gNB with a wrong MAC-I. 2b) The gNB verifies the integrity of the PDCP PDU from the UE. |
|
| Expected Results | The PDCP PDU is discarded by the gNB after step 1a) or after step 2b). |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | c2401ad7af841d7df5d01c307c060688 | |
4.2.2.1.6 Ciphering of RRC-signalling |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-CP-DATA-CIP-RRC-SIGN_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.1 -- Control plane data confidentiality protection. |
|
| Requirement Name | Ciphering of RRC-signalling |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB supports ciphering of RRC-signalling as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the RRC-signalling data sent between UE and gNB over the NG RAN air interface are confidentiality protected. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Control plane packets sent to the UE after the gNB sends AS SMC is ciphered. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | 08f58189c5a7497c3d85b75d45ede32f | |
4.2.2.1.6 Ciphering of RRC-signalling |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-CP-DATA-CIP-RRC-SIGN_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.1 -- Control plane data confidentiality protection. |
|
| Requirement Name | Ciphering of RRC-signalling |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB supports ciphering of RRC-signalling as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the RRC-signalling data sent between UE and gNB over the NG RAN air interface are confidentiality protected. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | Control plane packets sent to the UE after the gNB sends AS SMC is ciphered. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | 08f58189c5a7497c3d85b75d45ede32f | |
4.2.2.1.7 Ciphering of user data between the UE and the gNB |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-CIP_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.3 -- User plane data confidentiality protection at gNB |
|
| Requirement Name | Ciphering of user data between the UE and the gNB |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB supports ciphering of user data between the UE and the gNB. as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The user plane packets sent to the UE after the gNB sends RRCConnectionReconfiguration is confidentiality protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | ede3340dbe4a9918432782a545483cd4 | |
4.2.2.1.7 Ciphering of user data between the UE and the gNB |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-CIP_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.3 -- User plane data confidentiality protection at gNB |
|
| Requirement Name | Ciphering of user data between the UE and the gNB |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.2 |
|
| Requirement Description | The gNB supports ciphering of user data between the UE and the gNB. as specified in TS 33.501 [2], clause 5.3.2. |
|
| Test Purpose | To verify that the user data packets are confidentiality protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The user plane packets sent to the UE after the gNB sends RRCConnectionReconfiguration is confidentiality protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface e.g. Screenshot containing the operational results. |
|
| PDFs | ede3340dbe4a9918432782a545483cd4 | |
4.2.2.1.8 Replay protection of user data between the UE and the gNB |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 → 33511-i00  33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-REPLAY_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.4 -- User plane data integrity protection. |
|
| Requirement Name | Replay protection of user data between the UE and the gNB. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify that the user data packets are replay protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The user plane packets sent between the UE and gNB over the NG air interface is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | b7631b293328d7be6d1f41d0ce32e2f4 | |
4.2.2.1.8 Replay protection of user data between the UE and the gNB |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 33511-h60 →  33511-i00 33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 33511-j20 | |
| Test Name | TC-UP-DATA-REPLAY_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.4 -- User plane data integrity protection. |
|
| Requirement Name | Replay protection of user data between the UE and the gNB. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify that the user data packets are replay protected over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The user plane packets sent between the UE and gNB over the NG air interface is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | b7631b293328d7be6d1f41d0ce32e2f4 | |
4.2.2.1.9 Replay protection of RRC-signalling |
Home → gNB → 18.1.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 → 33511-h60 → 33511-i00  33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-RRC-REPLAY_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2 -- Control plane data integrity protection. |
|
| Requirement Name | Replay protection of RRC-signalling. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify the replay protection of RRC-signalling between UE and gNB over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The RRC signalling over the NG RAN air interface is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | d65a683c2d5bc3482b47a0c7a2d82fe2 | |
4.2.2.1.9 Replay protection of RRC-signalling |
Home → gNB → 18.0.0 |
| 33511-h00 33511-h10 → 33511-h20 33511-h30 33511-h31 33511-h40 33511-h50 → 33511-h60 →  33511-i00 33511-i10 33511-i20 → 33511-i30 33511-j00 → 33511-j10 → 33511-j20 | |
| Test Name | TC-UP-DATA-RRC-REPLAY_gNB | |
| Threat Reference | TR 33.926 [5], clause D.2.2.2 -- Control plane data integrity protection. |
|
| Requirement Name | Replay protection of RRC-signalling. |
|
| Requirement Reference | TS 33.501 [2], clause 5.3.3 |
|
| Requirement Description | The gNB supports integrity protection and replay protection of RRC-signalling as specified in TS 33.501 [2], clause 5.3.3. |
|
| Test Purpose | To verify the replay protection of RRC-signalling between UE and gNB over the NG RAN air interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The RRC signalling over the NG RAN air interface is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g. Screenshot containing the operational results. |
|
| PDFs | d65a683c2d5bc3482b47a0c7a2d82fe2 | |