4.2.1.1 De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_DE-CONCEAL_SUPI_from_SUCI_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.1, Incorrect SUCI de-concealment. |
|
| Requirement Name | De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Requirement Reference | TS 33.501 [2], clause 5.8.2. |
|
| Requirement Description | The SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI as specified in TS 33.501 [2], clause 5.8.2. |
|
| Test Purpose | Verify that the SIDF De-conceals the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Tester shall capture the procedure between UDM and AUSF over N13 interface, AMF and AUSF over N12 interface using any network analyser. For every implemented protection scheme the tester repeats the following steps:
|
|
| Expected Results | SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 89204d960eb085f347a73e124026025f | |
4.2.1.1 De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | TC_DE-CONCEAL_SUPI_from_SUCI_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.1, Incorrect SUCI de-concealment. |
|
| Requirement Name | De-concealment of SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Requirement Reference | TS 33.501 [2], clause 5.8.2. |
|
| Requirement Description | The SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI as specified in TS 33.501 [2], clause 5.8.2. |
|
| Test Purpose | Verify that the SIDF De-conceals the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Pre-Conditions |
|
|
| Execution Steps | Tester shall capture the entire authentication procedure between UE and AMF over N1, N12 and N13 interface using any network analyser.
|
|
| Expected Results | SIDF resolves the SUPI from the SUCI based on the protection scheme used to generate the SUCI. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 0632fb0a1641535185c06808f1fd6783 | |
4.2.1.2 Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_INVALID_PUBKEY_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.3 with reference to SECG SEC 1 [8] clause 2.3.4. |
|
| Requirement Description | Output: An elliptic curve point P, or "invalid" as specified [8], clause 2.3.4. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses an ECIES protection scheme and contains an invalid point as the UE's public key for Profile B. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The UDM/SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | 75ed551247da987a84e667b6017ab4b9 | |
4.2.1.2 Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_INVALID_PUBKEY_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an ECIES protection scheme with an invalid public key. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.3 with reference to SECG SEC 1 [8] clause 2.3.4. |
|
| Requirement Description | Output: An elliptic curve point P, or "invalid" as specified [8], clause 2.3.4. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses an ECIES protection scheme and contains an invalid point as the UE's public key for Profile B. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The UDM/SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | 10da2bf0365d85f36f65c3028502de74 | |
4.2.1.3 Rejection of SUCIs using an uncompressed point with Profile B. |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_NO_COMPRESSION_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an uncompressed point with Profile B. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.4.0. |
|
| Requirement Description | Profile B shall use point compression to save overhead as specified in TS 33.501 [2], clause C.3.4.0. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses the ECIES Profile B protection scheme and contains an uncompressed point as the UE's public key. |
|
| Pre-Conditions | Tester shall have access to the HN's public key for SUCI decryption with Profile B. |
|
| Execution Steps |
|
|
| Expected Results | The SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | 2e9af5734531ada4ff24ac6e58d4e412 | |
4.2.1.3 Rejection of SUCIs using an uncompressed point with Profile B. |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | TC_REJECT_SUCI_PROFILE_B_NO_COMPRESSION_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.6, Invalid public key. |
|
| Requirement Name | Rejection of SUCIs using an uncompressed point with Profile B. |
|
| Requirement Reference | TS 33.501 [2], clause C.3.4.0. |
|
| Requirement Description | Profile B shall use point compression to save overhead as specified in TS 33.501 [2], clause C.3.4.0. |
|
| Test Purpose | Verify that the SIDF rejects the SUCI if it uses the ECIES Profile B protection scheme and contains an uncompressed point as the UE's public key. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The SIDF rejects the SUCI, and the UDM sends a Nudm_UEAuthentication_Get Response message with an HTTP status code "403 Forbidden" and may include additional error information in the response body (in "ProblemDetails" element) as specified in TS 29.503 [9], clause 5.4.2.2.2, 2b.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (e.g., pcap file). |
|
| PDFs | f40d7c48384b75dbb6e631fa658761a9 | |
4.2.2.1 Synchronization failure handling |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_SYNC_FAILURE_HANDLING_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.2, Synchronization failure. |
|
| Requirement Name | Synchronization failure handling |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.3.3.2. |
|
| Requirement Description | When the UDM/ARPF receives an Nudm_UEAuthentication_Get Request message with a "synchronisation failure indication" it acts as described in TS 33.102 [7], clause 6.3.5 where ARPF is mapped to HE/AuC. The UDM/ARPF sends an Nudm_UEAuthentication_Get Response message with a new authentication vector for either EAP-AKA' or 5G-AKA depending on the authentication method applicable for the user to the AUSF as specified in TS 33.501 [2], clause 6.1.3.3.2. |
|
| Test Purpose | Verify that synchronization failure is recovered correctly in the home network. |
|
| Pre-Conditions | Test environment with an AUSF. The AUSF or AMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The UDM sends an Nudm_UEAuthentication_Get Response message with a new authentication vector to the AUSF.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot, packet capture or application log containing the operational results. |
|
| PDFs | 6cc947b96cc67dc080ef18795621327f | |
4.2.2.1 Synchronization failure handling |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | TC_SYNC_FAILURE_HANDLING_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.2, Synchronization failure. |
|
| Requirement Name | Synchronization failure handling |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.3.3.2. |
|
| Requirement Description | When the UDM/ARPF receives an Nudm_UEAuthentication_Get Request message with a "synchronisation failure indication" it acts as described in TS 33.102 [7], clause 6.3.5 where ARPF is mapped to HE/AuC. The UDM/ARPF sends an Nudm_UEAuthentication_Get Response message with a new authentication vector for either EAP-AKA' or 5G-AKA depending on the authentication method applicable for the user to the AUSF as specified in TS 33.501 [2], clause 6.1.3.3.2. |
|
| Test Purpose | Verify that synchronization failure is recovered correctly in the home network. |
|
| Pre-Conditions | Test environment with an AUSF. The AUSF or AMF may be simulated. |
|
| Execution Steps |
|
|
| Expected Results | The UDM sends an Nudm_UEAuthentication_Get Response message with a new authentication vector to the AUSF.
|
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., Screenshot, packet capture or application log containing the operational results. |
|
| PDFs | 4c689fedf9a169d5ea96dce94e03d5a5 | |
4.2.2.2 Storing of authentication status of UE by UDM |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_AUTH_STATUS_STORE_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.3, Failure to store of authentication status. |
|
| Requirement Name | Storing of authentication status of UE by UDM. |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.4.1a |
|
| Requirement Description | The UDM stores the authentication status of the UE (SUPI, authentication result, time stamp, and the serving network name) after authentication as specified in TS 33.501 [2], clause 6.1.4.1a. |
|
| Test Purpose | Verify that the UDM under test stores the authentication status of UE. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The storing of authentication status (SUPI, timestamp, and the serving network name) of UE at the UDM is verified. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet capture or screenshot/screen-capture.
|
|
| PDFs | e48f63657d9106849c09b8560a1af77f | |
4.2.2.2 Storing of authentication status of UE by UDM |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | TC_AUTH_STATUS_STORE_UDM | |
| Threat Reference | TR 33.926 [4], clause E.2.2.3, Failure to store of authentication status. |
|
| Requirement Name | Storing of authentication status of UE by UDM. |
|
| Requirement Reference | TS 33.501 [2], clause 6.1.4.1a |
|
| Requirement Description | The UDM stores the authentication status of the UE (SUPI, authentication result, timestamp, and the serving network name) after authentication as specified in TS 33.501 [2], clause 6.1.4.1a. |
|
| Test Purpose | Verify that the UDM under test stores the authentication status of UE, which is identical to the UE authentication information sent to/from the AUSF and the AMF. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The storing of authentication status (SUPI, authentication result, timestamp, and the serving network name) of UE at the UDM is verified. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture.
|
|
| PDFs | e6289db881cf18a7afd015bd7012c0a7 | |
4.2.7.1 UP Security enforcement configuration for TSC service |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_UP_SECURITY_ENFORCEMENT_CONFIGURATION | |
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "After the 5GS TSC-enabled UE is authenticated and data connection is set up, any data received from a TSC bridge or another 5GS TSC-enabled UE shall be transported between DS-TT (in the UE) and NW-TT (in the UPF) in a protected way using the mechanisms for UP security as described in clause 6.6. The UP security enforcement information shall be set to "required" for data transferred from gNB to a 5GS TSC-enabled UE. This is also applicable to the gPTP messages sent in the user plane." as specified in TS 33.501 [2], clause L.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security enforcement information is set to "required" for dedicated TSC service. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the TSC service. The security policy is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security enforcement information are set to "required". |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | da584699cc096c942323394fb7185aaa | |
4.2.7.1 UP Security enforcement configuration for TSC service |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "After the 5GS TSC-enabled UE is authenticated and data connection is set up, any data received from a TSC bridge or another 5GS TSC-enabled UE shall be transported between DS-TT (in the UE) and NW-TT (in the UPF) in a protected way using the mechanisms for UP security as described in clause 6.6. The UP security enforcement information shall be set to "required" for data transferred from gNB to a 5GS TSC-enabled UE. This is also applicable to the gPTP messages sent in the user plane." as specified in TS 33.501 [2], clause L.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security enforcement information is set to "required" for dedicated TSC service. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the TSC service. The security policy is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security enforcement information are set to "required". |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | dd737ba47acf39486fa6902cfd0c069c | |
4.2.8.1 UP security policy configuration for 5G LAN service |
Home → UDM → 20.0.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10 33514-i20 33514-i30 33514-j00 33514-j10 →  33514-k00 | |
| Test Name | TC_UP_SECURITY_ENFORCEMENT_CONFIGURATION_FOR_5G_LAN | |
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "To reduce incremental complexity added by security, all PDU sessions associated with a specific 5G LAN group should have the same UP security policy. When generating the policy enforcement information, and to avoid the redundant double protection, the SMF may consider information by a DN-AAA about DN protection mechanisms already applied." as specified in TS 33.501 [2], clause K.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security policy is set to the same for all the 5G LAN UEs. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the 5G LAN service. The security policy of the 5G LAN service is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security policies received in step 2 and step 4 are the same. |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | f63f2f70195f9619c940ec354b195526 | |
4.2.8.1 UP security policy configuration for 5G LAN service |
Home → UDM → 18.2.0 |
| 33514-h00 → 33514-h10 → 33514-i00 → 33514-i10  33514-i20 33514-i30 33514-j00 33514-j10 → 33514-k00 | |
| Test Name | ||
| Threat Reference | TR 33.926 [4].
|
|
| Requirement Name | UP security enforcement configuration |
|
| Requirement Reference | ||
| Requirement Description | "To reduce incremental complexity added by security, all PDU sessions associated with a specific 5G LAN group should have the same UP security policy. When generating the policy enforcement information, and to avoid the redundant double protection, the SMF may consider information by a DN-AAA about DN protection mechanisms already applied." as specified in TS 33.501 [2], clause K.3. "The SMF determines at PDU session establishment a User Plane Security Enforcement information for the user plane of a PDU session based on:
as specified in TS 23.501 [5], clause 5.10.3. |
|
| Test Purpose | Verify that UP security policy is set to the same for all the 5G LAN UEs. |
|
| Pre-Conditions | Test environment with SMF. The SMF may be simulated. A dedicated DNN/S-NSSAI combination is defined to identify the 5G LAN service. The security policy of the 5G LAN service is configured in the UDM. |
|
| Execution Steps |
|
|
| Expected Results | The confidentiality and integrity protection requirements of the UP security policy1 and UP security policy2 are the same. |
|
| Expected Format of Evidence | Save the logs and the communication flow in a .pcap file. |
|
| PDFs | 733e1931f01c54e3a5fbbfa0deb63c61 | |