4.2.2.2.1 NF discovery authorization based on expected NF profile |
Home → NRF → 20.0.0 |
| 33518-h00 → 33518-i00 → 33518-j00 →  33518-k00 | |
| Test Name | TC_DISC_AUTHORIZATION_ALLOWED_PARAMETER | |
| Threat Reference | TR 33.926 [6], clause H.2.2.1, No Authorization of NF discovery based on Authorization Parameters |
|
| Requirement Name | NF discovery authorization for specific scopes |
|
| Requirement Reference | TS 33.501 [3], clause 13.3.1.3, TS 23.502 [4], clause 4.17.4, and TS 29.510 [5], clause 6.2.3.2.3.1. |
|
| Requirement Description | NRF is expected to be able to ensure that NF Discovery and registration requests are authorized as specified in TS 33.501 [3], clause 5.9.2.1. The NRF checks that the values of the authorization parameters in the NF (Service) Profile of an NF Service Producer allows an NF Service Consumer to discover the NF Service Producer. In the response message, the NRF only returns information of those NF Service Producer instances that the NF Service Consumer is authorized to discover, as specified in the TS 33.501 [3], clause 13.3.1.3. The NRF authorizes the Nnrf_NFDiscovery_Request. Based on the profile of the expected NF/NF service and the type of the NF service consumer, the NRF determines whether the NF service consumer is allowed to discover the expected NF instance(s). If the expected NF instance(s) or NF service instance(s) are deployed in a certain network slice, NRF authorizes the discovery request according to the discovery configuration of the Network Slice, e.g. the expected NF instance(s) are only discoverable by the NF in the same network slice as specified in TS 23.502 [4], clause 4.17.4. Based on operator's policies, a discovery request not including the requester's information necessary to validate the authorization parameters in NF Profiles can be rejected or accepted but with only returning in the discovery response NF Instances whose authorization parameters allow any NF Service Consumer to access their services. The authorization parameters in NF Profile are those used by NRF to determine whether a given NF Instance / NF Service Instance can be discovered by an NF Service Consumer in order to consume its offered services (e.g. "allowedNfTypes", "allowedNfDomains", etc.), as specified in TS 29.510 [5], clause 6.2.3.2.3.1, Note 12. If included, the requester-snssais IE is expected to contain the list of S-NSSAI of the requester NF. The NRF is expected to use this to return only those NF profiles of NF Instances allowing to be discovered from the slice(s) identified by this IE, according to the "allowedNssais" list in the NF Profile and NF Service as specified in TS 29.510 [5], clause 6.2.3.2.3.1. |
|
| Test Purpose | Ensure that the NRF being tested does not authorize a discovery request from an NF service consumer instance that lacks the correct authorization provided in the request, based on the parameters prefixed with "allowed" (e.g., allowedNfTypes, allowedNfDomains, allowedNssais...) provided by the NF service producer profile. |
|
| Pre-Conditions |
|
|
| Execution Steps | For all Test Case specific parameters defined in the table 4.2.2.2.1-1, the tester shall repeat the following execution steps. Table 4.2.2.2.1-1 Test Case Specific Parameter Sets ----------------------------------------------------------------------------------------------------------------------------- Test Case parameter NF1 parameter NF2 allowedList (NF1) requester-type (NF2) ----------- -------------------------- -------------------------- --------------------- ------------------------------------- A NfType NF1 NfType NF2 allowedNfTypes requester-nf-type B PLMN NF1 PLMN NF2 allowedPlmns requester-plmn-list C FQDN NF1 FQDN NF2 allowedNfDomains requester-nf-instance-fqdn D SNPN NF1 SNPN NF2 allowedSnpns requester-snpn-list E S-NSSAI NF1 S-NSSAI NF2 allowedNssais requester-snssais F S-NSSAI NF1 and PLMN NF1 S-NSSAI NF2 and PLMN NF2 allowedPlmns requester-plmn-specific-snssai-list -----------------------------------------------------------------------------------------------------------------------------
|
|
| Expected Results | If the NRF under test is configured to reject unauthorized requests, the NRF responds with a "403 Forbidden" status code, as specified in clause 5.3.2.2.2 of TS 29.510 [5]. If the NRF under test is configured to accept unauthorised requests, but only returns NF instances whose authorisation is accepted in the discovery response, the discovery response will not contain any information about the NF1. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of packet trace (pcap-file). |
|
| PDFs | 76a84f5e9adedde43d6d046b4f0339d7 | |
4.2.2.2.1 |
Home → NRF → 18.0.0 |
| 33518-h00 →  33518-i00 → 33518-j00 → 33518-k00 | |
| Test Name | TC_DISC_AUTHORIZATION_SLICE_NRF |
|
| Threat Reference | TR 33.926 [6], clause H.2.2.1, No slice specific authorization for NF discovery |
|
| Requirement Name | NF discovery authorization for specific slice |
|
| Requirement Reference | ||
| Requirement Description | NRF is expected to be able to ensure that NF Discovery and registration requests are authorized as specified in TS 33.501 [3], clause 5.9.2.1. The NRF checks that the values of the authorization parameters in the NF (Service) Profile of an NF Service Producer allows an NF Service Consumer to discover the NF Service Producer. In the response message, the NRF only returns information of those NF Service Producer instances that the NF Service Consumer is authorized to discover, as specified in the TS 33.501 [3], clause 13.3.1.3. The NRF authorizes the Nnrf_NFDiscovery_Request. Based on the profile of the expected NF/NF service and the type of the NF service consumer, the NRF determines whether the NF service consumer is allowed to discover the expected NF instance(s). If the expected NF instance(s) or NF service instance(s) are deployed in a certain network slice, NRF authorizes the discovery request according to the discovery configuration of the Network Slice, e.g. the expected NF instance(s) are only discoverable by the NF in the same network slice as specified in TS 23.502 [4], clause 4.17.4. Based on operator's policies, a discovery request not including the requester's information necessary to validate the authorization parameters in NF Profiles can be rejected or accepted but with only returning in the discovery response NF Instances whose authorization parameters allow any NF Service Consumer to access their services. The authorization parameters in NF Profile are those used by NRF to determine whether a given NF Instance / NF Service Instance can be discovered by an NF Service Consumer in order to consume its offered services (e.g. "allowedNfTypes", "allowedNfDomains", etc.), as specified in TS 29.510 [5], clause 6.2.3.2.3.1, Note 12. If included, the requester-snssais IE is expected to contain the list of S-NSSAI of the requester NF. The NRF is expected to use this to return only those NF profiles of NF Instances allowing to be discovered from the slice(s) identified by this IE, according to the "allowedNssais" list in the NF Profile and NF Service as specified in TS 29.510 [5], clause 6.2.3.2.3.1. |
|
| Test Purpose | Verify that the NRF under test does not authorize slice specific discovery request for the NF instance which is not part of the requested slice, according to the slice specific discovery configuration of the requested NF instance. |
|
| Pre-Conditions |
|
|
| Execution Steps | For all Test Case specific parameters defined in the table 4.2.2.2.1-1, the tester shall repeat the following execution steps. Table 4.2.2.2.1-1 Test Case Specific Parameter Sets ----------------------------------------------------------------------------------------------------------------------------- Test Case parameter NF1 parameter NF2 allowedList (NF1) requester-type (NF2) ----------- -------------------------- -------------------------- --------------------- ------------------------------------- A NfType NF1 NfType NF2 allowedNfTypes requester-nf-type B PLMN NF1 PLMN NF2 allowedPlmns requester-plmn-list C FQDN NF1 FQDN NF2 allowedNfDomains requester-nf-instance-fqdn D SNPN NF1 SNPN NF2 allowedSnpns requester-snpn-list E S-NSSAI NF1 S-NSSAI NF2 allowedNssais requester-snssais F S-NSSAI NF1 and PLMN NF1 S-NSSAI NF2 and PLMN NF2 allowedPlmns requester-plmn-specific-snssai-list -----------------------------------------------------------------------------------------------------------------------------
|
|
| Expected Results | The NRF under test returns a response with "403 Forbidden" status code, as specified in clause 5.3.2.2.2 of TS 29.510 [5]. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of screenshot/screen-capture. |
|
| PDFs | 4b23defbaf58dee41cf835a86d78de8c | |
4.2.2.3.1 |
Home → NRF → 20.0.0 |
| 33518-h00 → 33518-i00 → 33518-j00 →  33518-k00 | |
| Test Name | TC_CLIENT_CREDENTIALS_ASSERTION_VALIDATION_NRF | |
| Threat Reference | TR 33.926 [4], clause 6.3.4.1, Incorrect validation of client credentials assertion
If the verification of the CCA fails at the receiving entity (e.g. NRF or NF service producer), a "403 Forbidden" response is returned with the cause attribute set to "CCA_VERIFICATION_FAILURE", as stated in TS 29.500 [21], clause 6.7.5. |
|
| Requirement Name | Correct handling of client credentials assertion validation failure |
|
| Requirement Reference | TS 33.501 [10], clause 13.3.8.3: TS 29.500 [21], clause 6.7.5 |
|
| Requirement Description | The verification of the Client credentials assertion is performed by the receiving node, i.e., NRF or NF Service Producer in the following way:
It verifies that the NF instance ID in the client credentials assertion matches the NF instance ID in the public key certificate used for signing the assertion. |
|
| Test Purpose | Verify that the NF under test correctly handles client credentials assertion validation failure. This test case specifically verifies that the NRF under test verifies that the iat value is valid. |
|
| Pre-Conditions |
|
|
| Execution Steps |
|
|
| Expected Results | The NRF under test rejects the consumer NF's service request with a 403 Forbidden HTTP status code and sends back an error message according to the description TS 29.500 [21], clause 6.7.5. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of log messages or a packet trace. A packet trace should at least contain the messages sent between the NRF and the NF service consumer. |
|
| PDFs | ac49867329c2dc10fe1a52228943c48a | |
4.2.2.4.1 |
Home → NRF → 20.0.0 |
| 33518-h00 → 33518-i00 → 33518-j00 →  33518-k00 | |
| Test Name | TC_ACCESS_TOKEN_REQUEST_VERIFICATION_NRF | |
| Threat Reference | TR 33.926 [6], clause H.2.2.Y, Elevation of privilege via failure to verify access token request |
|
| Requirement Name | Access token request verification |
|
| Requirement Reference | TS 33.501 [3], clause 13.4.1.1.2 |
|
| Requirement Description | According to TS 33.501 [3], clause 13.4.1.1.2, the NRF verifies the input parameters in the access token request as follows:
If the access token request fails, the NRF shall return an appropriate error status code (e.g., "400 Bad Request", "401 Unauthorized", "403 Forbidden") |
|
| Test Purpose | Verify that the NRF under test correctly handles access token request verification. |
|
| Pre-Conditions |
|
|
| Execution Steps | Test Cases A~B are tests on failure handling by the NRF under test when the access token request failed verification Test Case A: invalid client
Test Case B: unauthorized request
|
|
| Expected Results | For test cases A~B on verification failure of the access token request parameters, the NRF under test rejects the NF service consumer's service request. |
|
| Expected Format of Evidence | Evidence suitable for the interface, e.g., evidence can be presented in the form of log messages or a packet trace. A packet trace should at least contain the messages sent between the NRF and the NF service consumer. |
|
| PDFs | 251d666109cd067f30ac159ada6d9f2e | |