4.2.2.1 Confidentiality protection of user data transported over N3 interface. |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_UP_DATA_CONF_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data ". |
|
| Requirement Name | Confidentiality protection of user data transported over N3 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | "The transported user data between gNB and UPF shall be confidentiality protected." As specified in TS 33.501 [2], clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are confidentiality protected over N3 interface. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between gNB and UPF is confidentiality protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | ffacc27a363d1073c341e309c55d8c70 | |
4.2.2.1 |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_UP_DATA_CONF_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data ".
|
|
| Requirement Name | Confidentiality protection of user data transported over N3 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | The transported user data between gNB and UPF is confidentiality protected as specified in TS 33.501 [2], clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are confidentiality protected over N3 interface. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between gNB and UPF is confidentiality protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 7d0c2f034f2c2d3dacfb4f5b9782a446 | |
4.2.2.2 Integrity protection of user data transported over N3 interface |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_UP_DATA_INT_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data" |
|
| Requirement Name | Integrity protection of user data transported over N3 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | "The transported user data between gNB and UPF shall be integrity protected" as specified in TS 33.501 [2], clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are integrity protected over N3 interface. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance to the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between gNB and UPF is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 5a573a3fee3eaac471b8accafe3c92da | |
4.2.2.2 Integrity protection of user data transported over N3 interface |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_UP_DATA_INT_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data"
|
|
| Requirement Name | Integrity protection of user data transported over N3 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | The transported user data between gNB and UPF is integrity protected as specified in TS 33.501 [2], clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are integrity protected over N3 interface. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance to the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between gNB and UPF is integrity protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 67be7135e789355697838d4b246520d4 | |
4.2.2.3 Replay protection of user data transported over N3 interface |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_UP_DATA_REPLAY_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data" |
|
| Requirement Name | Replay protection of user data transported over N3 interface |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | "The transported user data between gNB and UPF shall be replay protected." As specified in TS 33.501, clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are replay protected. The following procedure is executed if UPF supports IPsec. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between UE and UPF is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | ce0c75b3e92699ca8d4365357c989f07 | |
4.2.2.3 Replay protection of user data transported over N3 interface |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_UP_DATA_REPLAY_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data"
|
|
| Requirement Name | Replay protection of user data transported over N3 interface |
|
| Requirement Reference | TS 33.501 [2], Clause 9.3 |
|
| Requirement Description | The transported user data between gNB and UPF is replay protected as specified in TS 33.501, clause 9.3. |
|
| Test Purpose | Verify that the transported user data between gNB and UPF are replay protected. The following procedure is executed if UPF supports IPsec. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported between UE and UPF is replay protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 5bfe26e51c90729ce9f03a9a6e1c5482 | |
4.2.2.4 Protection of user data transported over N9 interface Within a PLMN |
Home → UPF → 17.1.0 |
| 33513-h00 →  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_UP_DATA_CONF_UPF_N9 | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data " |
|
| Requirement Name | Protection of user data transported over N9 within a PLMN. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.9 |
|
| Requirement Description | As specified in clause 9.9 in TS 33.501 [2], "Interfaces internal to the 5G Core can be used to transport signalling data as well as privacy sensitive material, such as user and subscription data, or other parameters, such as security keys. Therefore, confidentiality and integrity protection is required. For the protection of the non-SBA internal interfaces, such as N4 and N9, NDS/IP shall be used as specified in [3]." |
|
| Test Purpose | Verify that the protection mechanism implemented for user data transport over N9 interface in a PLMN conforms to the selected security profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported on N9 within a PLMN is protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 8bb62edcbd2c89b936d9453712438e8a | |
4.2.2.4 Protection of user data transported over N9 interface Within a PLMN |
Home → UPF → 19.0.0 |
| 33513-h00 → 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_UP_DATA_CONF_UPF_N9 | |
| Threat Reference | TR 33.926 [7], Clause L.2.2, "No protection or weak protection for user plane data "
|
|
| Requirement Name | Protection of user data transported over N9 within a PLMN. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.9 |
|
| Requirement Description | As specified in clause 9.9 in TS 33.501 [2], interfaces internal to the 5G Core can be used to transport signalling data as well as privacy sensitive material, such as user and subscription data, or other parameters, such as security keys. Therefore, confidentiality and integrity protection is required. For the protection of the non-SBA internal interfaces, such as N4 and N9, NDS/IP is used as specified in TS 33.501 [2], clause 9.9 . |
|
| Test Purpose | Verify that the protection mechanism implemented for user data transport over N9 interface in a PLMN conforms to the selected security profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The user data transported on N9 within a PLMN is protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 94a803cdb007672891a04cea25ff90e5 | |
4.2.2.5 Signalling Data Protection |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 → 33513-j00 | |
| Test Name | TC_CP_DATA_CONF _UPF_N4 | |
| Threat Reference | TR 33.926 [7], Clause L.2.3, "No protection or weak protection for signalling data over N4 interface" |
|
| Requirement Name | Protection of signalling data transported over N4 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.9 |
|
| Requirement Description | As specified in clause 9.9 in TS 33.501 [2], "Interfaces internal to the 5G Core can be used to transport signalling data as well as privacy sensitive material, such as user and subscription data, or other parameters, such as security keys. Therefore, confidentiality and integrity protection is required. For the protection of the non-SBA internal interfaces, such as N4 and N9, NDS/IP shall be used as specified in [3]." |
|
| Test Purpose | Verify that the protection mechanism implemented for signalling data transmitted over N4 conforms to selected security profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The signalling data transported over N4 interface is protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 530f586e2089f1f76cd660ca29ad06e8 | |
4.2.2.5 Signalling Data Protection |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10 →  33513-j00 | |
| Test Name | TC_CP_DATA_CONF_UPF_N4 |
|
| Threat Reference | TR 33.926 [7], Clause L.2.3, "No protection or weak protection for signalling data over N4 interface"
|
|
| Requirement Name | Protection of signalling data transported over N4 interface. |
|
| Requirement Reference | TS 33.501 [2], Clause 9.9 |
|
| Requirement Description | As specified in clause 9.9 in TS 33.501 [2], interfaces internal to the 5G Core can be used to transport signalling data as well as privacy sensitive material, such as user and subscription data, or other parameters, such as security keys. Therefore, confidentiality and integrity protection is required. For the protection of the non-SBA internal interfaces, such as N4 and N9, NDS/IP is used as specified in TS 33.501 [2], clause 9.9. |
|
| Test Purpose | Verify that the protection mechanism implemented for signalling data transmitted over N4 conforms to selected security profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | The requirement mentioned in this clause is tested in accordance with the procedure mentioned in clause 4.2.3.2.4 of TS 33.117 [3]. |
|
| Expected Results | The signalling data transported over N4 interface is protected. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | b9b2822f2ceb7bfc7cf4b09f94d21b68 | |
4.2.2.6 TEID uniqueness |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 → 33513-i10 33513-j00 | |
| Test Name | TC_TEID_ID_UNIQUENESS_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.4, "Failure to assign unique TEID for a session" |
|
| Requirement Name | TEID uniqueness. |
|
| Requirement Reference | ||
| Requirement Description | "Allocation and release of CN Tunnel Info is performed when a new PDU Session is established or released. This functionality is supported either by SMF or UPF, based on operator's configuration on the SMF" as specified in TS 23.501[4], clause 5.8.2.3.1. "Tunnel Endpoint Identifier (TEID): This field unambiguously identifies a tunnel endpoint in the receiving GTP U protocol entity. The receiving end side of a GTP tunnel locally assigns the TEID value the transmitting side has to use" as specified in TS 29.281[5], clause 5.1. "The TEID is a unique identifier within one IP address of a logical node." As specified in TS 23.060 [6], clause 14.6. |
|
| Test Purpose | Verify that the TEID generated by UPF under test for each new GTP tunnel is unique. |
|
| Pre-Conditions | Test environment is set up with SMF, which may be real or simulated, and UPF under test. The tester is able to trace traffic between the UPF under test and the SMF (real or simulated). SMF configures UPF under test to generate the TEIDs. |
|
| Execution Steps |
|
|
| Expected Results | The F-TEID set in each different N4 session establishment response is unique. |
|
| Expected Format of Evidence | Files containing the triggered GTP messages (e.g. pcap trace). |
|
| PDFs | ce9b9d3830aea259e2604d62fe9c73db | |
4.2.2.6 TEID uniqueness |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 → 33513-i10  33513-j00 | |
| Test Name | TC_TEID_ID_UNIQUENESS_UPF | |
| Threat Reference | TR 33.926 [7], Clause L.2.4, "Failure to assign unique TEID for a session" |
|
| Requirement Name | TEID uniqueness. |
|
| Requirement Reference | ||
| Requirement Description | Allocation and release of CN Tunnel Info is performed when a new PDU Session is established or released. This functionality is supported either by SMF or UPF, based on operator's configuration on the SMF as specified in TS 23.501[4], clause 5.8.2.3.1. Tunnel Endpoint Identifier (TEID): This field unambiguously identifies a tunnel endpoint in the receiving GTP U protocol entity. The receiving end side of a GTP tunnel locally assigns the TEID value the transmitting side has to use as specified in TS 29.281[5], clause 5.1. The TEID is a unique identifier within one IP address of a logical node as specified in TS 23.060 [6], clause 14.6. |
|
| Test Purpose | Verify that the TEID generated by UPF under test for each new GTP tunnel is unique. |
|
| Pre-Conditions | Test environment is set up with SMF, which may be real or simulated, and UPF under test. The tester is able to trace traffic between the UPF under test and the SMF (real or simulated). SMF configures UPF under test to generate the TEIDs. |
|
| Execution Steps |
|
|
| Expected Results | The F-TEID set in each different N4 session establishment response is unique. |
|
| Expected Format of Evidence | Files containing the triggered PFCP messages (e.g. pcap trace). |
|
| PDFs | 9d5658266349c49fe203f4622e5e29b3 | |
4.2.2.7 IPUPS |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_IPUPS_PACKET_HANDLING | |
| Threat Reference | TR 33.926 [7], Clause L.2.5, "invalid user plane data forwarding"
|
|
| Requirement Name | IPUPS packeting handling |
|
| Requirement Reference | TS 33.501[8], clause 5.9.3.4 |
|
| Requirement Description | "The IPUPS shall only forward GTP-U packets that contain an F-TEID that belongs to an active PDU session and discard all others." as specified in TS 33.501[5], clause 5.9.3.4. |
|
| Test Purpose | Verify that the packets not belonging to an active PDU session is discarded. |
|
| Pre-Conditions | Test environment is set up with a V-SMF, an H-SMF, an H-UPF and a gNB which may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | When the H-UPF is triggered to send GTP-U packets using the F-TEID assigned by the V-UPF for the N9 tunnel (step 6 in the execution steps), GTP-U packets are witnessed over the N3 tunnel. When the H-UPF is triggered to send GTP-U packets using an F-TEID different than the one assigned by the V-UPF (step 7 in the execution steps), no GTP-U packets are witnessed over the N3 tunnel. |
|
| Expected Format of Evidence | Files recording the GTP packets captured (e.g. pcap trace). |
|
| PDFs | eb75e83626218a8b3bde607c9d3e6be8 | |
4.2.2.7 IPUPS |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_IPUPS_PACKET_HANDLING | |
| Threat Reference | TR 33.926 [7], Clause L.2.5, "invalid user plane data forwarding"
|
|
| Requirement Name | IPUPS packeting handling |
|
| Requirement Reference | TS 33.501[2], clause 5.9.3.4 |
|
| Requirement Description | The IPUPS only forwards GTP-U packets that contain an F-TEID that belongs to an active PDU session and discard all others as specified in TS 33.501 [2], clause 5.9.3.4. |
|
| Test Purpose | Verify that the packets not belonging to an active PDU session is discarded. |
|
| Pre-Conditions | Test environment is set up with a V-SMF, an H-SMF, an H-UPF and a gNB which may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | When the H-UPF is triggered to send GTP-U packets using the F-TEID assigned by the V-UPF for the N9 tunnel (step 6 in the execution steps), GTP-U packets are witnessed over the N3 tunnel. When the H-UPF is triggered to send GTP-U packets using an F-TEID different than the one assigned by the V-UPF (step 7 in the execution steps), no GTP-U packets are witnessed over the N3 tunnel. |
|
| Expected Format of Evidence | Files recording the GTP packets captured (e.g. pcap trace). |
|
| PDFs | f65fa4ec8dec9106364f8efa5f5be766 | |
4.2.2.8 Protection against malformed GTP-U messages |
Home → UPF → 17.1.0 |
| 33513-h00  33513-h10 33513-h20 → 33513-i00 33513-i10 33513-j00 | |
| Test Name | TC_IPUPS_MALFORED_MESSAGES | |
| Threat Reference | TR 33.926 [7], Clause L.2.6, "Threats of malformed GTP-U messages"
|
|
| Requirement Name | Protection against malformed GTP-U messages |
|
| Requirement Reference | TS 33.501[8], clause 5.9.3.4 |
|
| Requirement Description | "The IPUPS shall discard malformed GTP-U messages." as specified in TS 33.501[8], clause 5.9.3.4. |
|
| Test Purpose | Verify that malformed messages are discarded by UPF. |
|
| Pre-Conditions | The pre-conditions in clause 4.4.4 of TS 33.117 [3] apply, except that fuzzing tools supporting GTP-U protocol is available. |
|
| Execution Steps | The execution steps follow those in clause 4.4.4 of TS 33.117 [3], except that the protocol the fuzzing tool is executed against is GTP-U and the interface is N9. |
|
| Expected Results | The expected results in clause 4.4.4 of TS 33.117 [3] apply except that the protocol and the interface contained in the testing documentation are GTP-U and N9 respectively. |
|
| Expected Format of Evidence | The expected format of evidence in clause 4.4.4 of TS 33.117 [3] apply. |
|
| PDFs | a37fa5a278004f2fcdbe78e8d9b7d899 | |
4.2.2.8 Protection against malformed GTP-U messages |
Home → UPF → 19.0.0 |
| 33513-h00 33513-h10 33513-h20 → 33513-i00 33513-i10  33513-j00 | |
| Test Name | TC_IPUPS_MALFORED_MESSAGES | |
| Threat Reference | TR 33.926 [7], Clause L.2.6, "Threats of malformed GTP-U messages"
|
|
| Requirement Name | Protection against malformed GTP-U messages |
|
| Requirement Reference | TS 33.501[2], clause 5.9.3.4 |
|
| Requirement Description | The IPUPS discards malformed GTP-U messages as specified in TS 33.501[2], clause 5.9.3.4. |
|
| Test Purpose | Verify that malformed messages are discarded by UPF. |
|
| Pre-Conditions | The pre-conditions in clause 4.4.4 of TS 33.117 [3] apply, except that fuzzing tools supporting GTP-U protocol is available. |
|
| Execution Steps | The execution steps follow those in clause 4.4.4 of TS 33.117 [3], except that the protocol the fuzzing tool is executed against is GTP-U and the interface is N9. |
|
| Expected Results | The expected results in clause 4.4.4 of TS 33.117 [3] apply except that the protocol and the interface contained in the testing documentation are GTP-U and N9 respectively. |
|
| Expected Format of Evidence | The expected format of evidence in clause 4.4.4 of TS 33.117 [3] apply. |
|
| PDFs | 6fa3226f468562b43b4d881676ce7e91 | |