4.2.1.1 De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI |
Home → UDM → 18.2.0 |
| 33514-h00 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | TC_DE-CONCEAL_SUPI_from_SUCI_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.1, Incorrect SUCI de-concealment. |
|
| Requirement Name | De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Requirement Reference | TS 33.501 [2], clause 5.8.2. |
|
| Requirement Description | The SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI as specified in TS 33.501 [2], clause 5.8.2. |
|
| Test Purpose | Verify that the SIDF De-conceals the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Tester shall capture the entire authentication procedure between UE and AMF over N1, N12 and N13 interface using any network analyser.
|
|
| Expected Results | SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 0632fb0a1641535185c06808f1fd6783 | |
4.2.1.2 Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
Home → UDM → 18.2.0 |
|  33514-i20 33514-i30 33514-j00 → 33514-j10 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_INVALID_PUBKEY_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.3 with reference to SECG SEC 1 [8] clause 2.3.4. |
|
| Requirement Description | Output: An elliptic curve point P, or "invalid" as specified [8], clause 2.3.4. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses an ECIES protection scheme and contains an invalid point as the UE's public key for Profile B. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The UDM/SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | 10da2bf0365d85f36f65c3028502de74 | |
4.2.1.3 Rejection of SUCIs using an uncompressed point with Profile B. |
Home → UDM → 18.2.0 |
|  33514-i20 33514-i30 33514-j00 → 33514-j10 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_NO_COMPRESSION_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an uncompressed point with Profile B. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.4.0. |
|
| Requirement Description | Profile B shall use point compression to save overhead as specified in TS 33.501 [2], clause C.3.4.0. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses the ECIES Profile B protection scheme and contains an uncompressed point as the UE's public key. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | f40d7c48384b75dbb6e631fa658761a9 | |
4.2.2.1 Synchronization failure handling |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 33514-i10 →  33514-i20 33514-i30 33514-j00 33514-j10 | |
| Test Name | TC_SYNC_FAILURE_HANDLING_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.2, Synchronization failure. |
|
| Requirement Name | Synchronization failure handling |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.3.3.2. |
|
| Requirement Description | When the UDM/ARPF receives an Nudm_UEAuthentication_Get Request message with a "synchronisation failure indication" it acts as described in TS 33.102 [7], clause 6.3.5 where ARPF is mapped to HE/AuC. The UDM/ARPF sends an Nudm_UEAuthentication_Get Response message with a new authentication vector for either EAP-AKA' or 5G-AKA depending on the authentication method applicable for the user to the AUSF as specified in TS 33.501 [2], clause 6.1.3.3.2. |
|
| Test Purpose | Verify that synchronization failure is recovered correctly in the home network. |
|
| Pre-Conditions | Test environment with an AUSF. The AUSF or AMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The UDM sends an Nudm_UEAuthentication_Get Response message with a new authentication vector to the AUSF.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot, packet capture or application log containing the operational results. |
|
| PDFs | 4c689fedf9a169d5ea96dce94e03d5a5 | |
4.2.2.2 Storing of authentication status of UE by UDM |
Home → UDM → 18.2.0 |
| 33514-h00 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 → 33514-j00 → 33514-j10 | |
| Test Name | TC_AUTH_STATUS_STORE_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.3, Failure to store of authentication status. |
|
| Requirement Name | Storing of authentication status of UE by UDM. |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.4.1a |
|
| Requirement Description | The UDM stores the authentication status of the UE (SUPI, authentication result, timestamp, and the serving network name) after authentication as specified in TS 33.501 [2], clause 6.1.4.1a. |
|
| Test Purpose | Verify that the UDM under test stores the authentication status of UE, which is identical to the UE authentication information sent to/from the AUSF and the AMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The storing of authentication status (SUPI, authentication result, timestamp, and the serving network name) of UE at the UDM is verified. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture.
|
|
| PDFs | e6289db881cf18a7afd015bd7012c0a7 | |
4.2.7.1 UP Security enforcement configuration for TSC service |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 33514-i10  33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "After the 5GS TSC-enabled UE is authenticated and data connection is set up, any data received from a TSC bridge or another 5GS TSC-enabled UE shall be transported between DS-TT (in the UE) and NW-TT (in the UPF) in a protected way using the mechanisms for UP security as described in clause 6.6. The UP security enforcement information shall be set to "required" for data transferred from gNB to a 5GS TSC-enabled UE. This is also applicable to the gPTP messages sent in the user plane." as specified in TS 33.501 [2], clause L.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security enforcement information is set to "required" for dedicated TSC service. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the TSC service. The security policy is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security enforcement information are set to "required". |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | dd737ba47acf39486fa6902cfd0c069c | |
4.2.8.1 UP security policy configuration for 5G LAN service |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 33514-i10  33514-i20 → 33514-i30 33514-j00 33514-j10 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "To reduce incremental complexity added by security, all PDU sessions associated with a specific 5G LAN group should have the same UP security policy. When generating the policy enforcement information, and to avoid the redundant double protection, the SMF may consider information by a DN-AAA about DN protection mechanisms already applied." as specified in TS 33.501 [2], clause K.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security policy is set to the same for all the 5G LAN UEs. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the 5G LAN service. The security policy of the 5G LAN service is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security policy1 and UP security policy2 are the same. |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 733e1931f01c54e3a5fbbfa0deb63c61 | |