4.2.7.1 Protection on SGd Diameter Interface between SMSF and the Diameter application node |
Home → SMSF → 19.1.0 |
| 33529-j00 →  33529-j10 | |
| Test Name | TC_Protect_Diameter_SGd | |
| Threat Reference | TR 33.926 [4], clause Y.2.4.1, SMSF control data and user data protection on SGd Diameter Interface |
|
| Requirement Name | Protection data and information on SGd |
|
| Requirement Reference | TS 33.501 [3], clause 9.5, TS 33.210 [10], clause 6.2, TS 33.310 [11], clause 6.1.3a. |
|
| Requirement Description | TS 33.501 [3] mentions that protection of Diameter interface shall be supported according to NDS/IP as specified in TS 33.210 [10], unless security is provided by other means e.g. physical security. For authentication between SMSF and Diameter application node over diameter interface, mutual authentication based on client and server certificates is performed, if using TLS. Certificate based authentication follows the profiles given in TS 33.210 [10] clause 6.2, and TS 33.310 [11] clause 6.1.3a, with the restriction that it shall be compliant with the profile given by Diameter Base Protocol as defined in RFC 6733 [12], except the cipher suites. A SEG may be used to terminate the NDS/IP IPsec tunnels. |
|
| Test Purpose | To verify the mechanisms implemented to protect data and information in transfer to and from the SMSF's Diameter protocol-based SGd interface.
|
|
| Pre-Conditions | Network product documentation containing information about supported NDS/IP protocols is provided by the vendor. A Diameter application node peer implementing the security protocol configured by the vendor shall be available. SMSF documentation, stating which security protocols for protection of data in transit are implemented and which profiles in TS 33.310 [11] and TS 33.210 [10] are applicable, is provided by the vendor. The tester shall base the tests on the profile defined by 3GPP in Clause 6.2 of TS 33.310 [11]. For TLS/DTLS, the tester shall base the tests on the profile defined by 3GPP in Clause 6.1.3a of TS 33.310 [11] and Clause 6.2 of TS 33.210 [10], with the restriction that it shall be compliant with the profile given by Diameter Base Protocol as defined in RFC 6733 [12], except the cipher suites. For IKE and IPsec, the tester shall base the tests on the profile defined by 3GPP in TS 33.210 [10]. Procedure and execution steps, expected results, expected format of evidence: These are the same as for the test case in TS 33.117 [2], clause 4.2.3.2.4, excluding execution step 4, and the profiles as mentioned in requirement description shall be followed in pre-conditions. |
|
| Execution Steps | ||
| Expected Results | ||
| Expected Format of Evidence | ||
| PDFs | 87718d559299ae545544dc06b2d517a2 | |
4.2.7.2 Protection of Diameter Session on SGd Interface |
Home → SMSF → 19.1.0 |
| 33529-j00 →  33529-j10 | |
| Test Name | TC_DIAMETER_SGd_SESSION | |
| Threat Reference | TR 33.926 [4], clause Y.2.2.2, Diameter session information disclosure |
|
| Requirement Name | Diameter session on SGd interface |
|
| Requirement Reference | TS 29.338 [8], clause 4.5; RFC 6733 [12], clause 8.8 |
|
| Requirement Description | SMSF supports implicit termination of SGd Diameter application sessions. The client (server) includes in its requests (responses) the Auth-Session-State AVP set to the value NO_STATE_MAINTAINED (1), as described in IETF RFC 6733 [12]. The server sets the Auth-Session-State AVP value to NO_STATE_MAINTAINED (1), irrespective of what value the client sets. Neither the Authorization-Lifetime AVP nor the Session-Timeout AVP be present in requests or responses [8]. To protect Diameter sessions, SMSF supports the following requirements:
|
|
| Test Purpose | Verify that the above Diameter session and session ID related requirements have been met. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Auth-Session-State AVP is set to the value NO_STATE_MAINTAINED (1). b. Neither the Authorization-Lifetime AVP nor the Session-Timeout AVP is present in requests. c. The tester generates session ID as per the documentation and uses it as session ID AVP in the message.
a. Auth-Session-State AVP is set to the value STATE_MAINTAINED (0). b. Authorization-Lifetime AVP and Session-Timeout AVP are present in request. c. The tester generates session ID as per the documentation and uses it as session ID AVP in the message.
a. Auth-Session-State AVP is set to the value NO_STATE_MAINTAINED (1). b. Neither the Authorization-Lifetime AVP nor the Session-Timeout AVP is present in response. c. The session IDs in two request messages are different and unique.
|
|
| Expected Results |
|
|
| Expected Format of Evidence | A confirmation that the tester has confirmed that:
Test result (Passed or not) |
|
| PDFs | 69d697c88f6ed76acdeef65e0f7bd007 | |
4.2.7.3 Protecting availability and integrity on Diameter-based SGd interface |
Home → SMSF → 19.1.0 |
| 33529-j00 →  33529-j10 | |
| Test Name | TC_Diameter_SGd_FILTERING | |
| Threat Reference | TR 33.926 [4], clause Y.2.2.1, Diameter filtering |
|
| Requirement Name | Diameter filtering on the SGd interface |
|
| Requirement Reference | TS 29.338 [8], clause 6.3.2.2 |
|
| Requirement Description | TS 29.338 [8] defines the following commands and their command codes for the SGd application: MO-Forward-Short-Message-Request (OFR) - 83.8645, MO-Forward-Short-Message-Answer (OFA) - 83.8645, MT-Forward-Short-Message-Request (TFR) - 83.8646, MT-Forward-Short-Message-Answer (TFA) - 83.8646, Alert-Service-Centre-Request (ALR) - 83.8648 and Alert-Service-Centre-Answer (ALA) - 83.8648. It also mentions that the Application ID field for OFR, OFA, TFR, TFA commands allocated by IANA is 16.77313 and that for ALR, ALA commands is 16.77312.\ \ SMSF provides a mechanism, or rely on the other network function, to filter incoming Diameter messages on the SGd interface based on the Application IDs and command codes. In particular, SMSF that supports filtering provides a mechanism:
|
|
| Test Purpose | To verify that the Network Product provides filtering for incoming Diameter messages on the SGd interface. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Accept messages that meet the filtering rules supported by the vendor on the SGd interface. b. Discard all other messages on the SGd interface. c. For each rule above the accounting is also enabled.
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product. b. Using the accounting, the tester verifies that the messages are not discarded because response messages are sent back by the network product.
a. Using the network analyser, the tester verifies that the messages are discarded by the network product. b. Using the accounting, the tester verifies that the messages are discarded and that no response is sent back by the network product. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | b5749a271ecdfce6fedf630ca0cc3aa6 | |
4.2.7.4 Protecting from unknown peers on Diameter-based SGd interface |
Home → SMSF → 19.1.0 |
| 33529-j00 →  33529-j10 | |
| Test Name | TC_DIAMETER_SGd_PEERDISCOVERY | |
| Threat Reference | TR 33.926 [4], Annex Y.2.2.1, Diameter filtering |
|
| Requirement Name | Disabling peer discovery on the SGd interface |
|
| Requirement Reference | RFC 6733 [12], clause 5.2; |
|
| Requirement Description | Capability Exchange Request (CER) and Capability Exchange Answer (CEA) are Diameter messages used on SGd interface to discover diameter nodes and know their capability. If peer discovery is enabled, an attacker can connect to the SMSF and learn about its capabilities by sending CER messages. Network products with the SGd interface should be configured to accept only known peers. To protect SMSF from attacks by unknown peers (attackers), it supports the following requirements:
|
|
| Test Purpose | To verify that the SMSF ignores requests from any unauthorized nodes that tries to discover its capabilities. |
|
| Pre-Conditions |
|
|
| Execution Steps |
a. Using the network analyser, the tester verifies that the message is correctly received by the network product. b. The tester verifies that the network product responds with a CEA.
a. Using the network analyser, the tester verifies that the message is discarded by the network product. b. The tester verifies that the network product does not respond with a CEA. |
|
| Expected Results | The network product responds with a CEA for CERs received from the peers listed in its peer table and ignores CERs from all others. |
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | a834c97a8a75d3cf25429bd18a6c553e | |
4.2.7.5 Protecting availability and integrity on Map-based SS7 interface |
Home → SMSF → 19.1.0 |
| 33529-j00 →  33529-j10 | |
| Test Name | TC_Map_SS7_FILTERING | |
| Threat Reference | TR 33.926 [4], clause Y.2.3.1, Map filtering |
|
| Requirement Name | Map filtering on the SS7 interface |
|
| Requirement Reference | ||
| Requirement Description | TS 33.204 [13], clause 4.1 mentions "TCAPsec does not validate the TCAP user payload content. Message screening functions for particular message types may be needed on top of TCAPsec." TS 29.002 [9] defines the Short Message Service (SMS) management services in clause 12.\ \ Hence, message filtering mechanism shall be used on Map-based SS7 interface of SMSF to filter and allow only SMS management services related messages which are applicable for SMSF, for example, MAP-MT-FORWARD-SHORT-MESSAGE service, MAP-MO-FORWARD-SHORT-MESSAGE service, and MAP-ALERT-SERVICE-CENTRE service. In particular, SMSF that supports filtering provides a mechanism:
|
|
| Test Purpose | To verify that the Network Product provides filtering for incoming Map messages on the SS7 interface. |
|
| Pre-Conditions |
a. Accept messages that meet the filtering rules supported by the vendor on the SS7 interface. b. Discard all other messages on the SS7 interface.
|
|
| Execution Steps |
a. Using the network analyser, the tester verifies that the messages are correctly received by the network product.
a. Using the network analyser, the tester verifies that the messages are discarded by the network product. |
|
| Expected Results |
|
|
| Expected Format of Evidence | A testing report provided by the testing agency which will consist of the following information:
Test result (Passed or not) |
|
| PDFs | 31be0b566c189157c539cd9b48818b6d | |