SMG10 report to SMG#30 Tdoc SMG P

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 22 Simple Mail Transfer Protocol (SMTP)
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Balloting/Handling Negative Votes September 11, 2006 ASTM Training Session Bob Morgan Brynn Iwanowski.
NANPA Oversight Working Group Status Report to the NANC November 27, 2001 Chair Pat Caldwell.
RECORD KEEPING Cooperative Development of Operational
World Class Standards TC SCP TEC Status Report to TC SCP Plenary #49 Paul JOLIVET, Chairman, LG Electronics Sebastian HANS, Vice chairman, Oracle SCP(11)0177.
World Class Standards TC SCP TEC Status Report to TC SCP Plenary #55 Paul JOLIVET, Chairman, LG Electronics Sebastian HANS, Vice chairman, Oracle SCP(12)
World Class Standards TC SCP TEC Status Report to TC SCP Plenary #54 Paul JOLIVET, Chairman, LG Electronics Sebastian HANS, Vice chairman, Oracle SCP(12)
ETSI TC SCP WG TEST Status Report to TC SCP Plenary #49
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
XP New Perspectives on Microsoft Office Word 2003 Tutorial 2 1 Microsoft Office Word 2003 Tutorial 2 – Editing and Formatting a Document.
State of New Jersey Department of Health and Senior Services Patient Safety Reporting System Module 2 – New Event Entry.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULTIPLICATION EQUATIONS 1. SOLVE FOR X 3. WHAT EVER YOU DO TO ONE SIDE YOU HAVE TO DO TO THE OTHER 2. DIVIDE BY THE NUMBER IN FRONT OF THE VARIABLE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Plan My Care Brokerage Training Working in partnership with Improvement and Efficiency South East.
ZMQS ZMQS
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
Richmond House, Liverpool (1) 26 th January 2004.
Human Capital Investment Programme Disability Activation Project (DACT) WELCOME Support Workshop Thursday 7 th February
Page 1 of 30 To the Create Assignment Request Online Training Course An assignment request is created by an assignor to initiate the electronic assignment.
Campaign Overview Mailers Mailing Lists
MySQL Access Privilege System
© 3GPP 2009 Mobile World Congress, Barcelona, 19 th February 2009© 3GPP GPP The Training Course / Module 9 1 All you always wanted to know about.
1 Authentication Applications Ola Flygt Växjö University, Sweden
VOORBLAD.
15. Oktober Oktober Oktober 2012.
1 Development and Transfer of Technologies under the UNFCCC The Marrakech Accords & Beyond Wanna Tanunchaiwatana Manager, Technology Climate Change Secretariat.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
© 2012 National Heart Foundation of Australia. Slide 2.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Doc.: IEEE tvws Submission September 2009 Stanislav Filin et al, NICTSlide 1 Comments to WS coexistence draft PAR Notice: This document.
GEtServices Services Training For Suppliers Requests/Proposals.
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
3GPP SA3 Lawful Intercept
Januar MDMDFSSMDMDFSSS
REGISTRATION OF STUDENTS Master Settings STUDENT INFORMATION PRABANDHAK DEFINE FEE STRUCTURE FEE COLLECTION Attendance Management REPORTS Architecture.
Week 1.
© Ericsson Interception Management Systems, 2000 CELLNET Drop Administering IMS Database Module Objectives To add a network elements to the database.
1 Unit 1 Kinematics Chapter 1 Day
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
17/11/99S3 and MExE1 S3 review of MExE release 99 security Tim Wright, Vodafone UK 3GPP SA3, ETSI SMG10
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
Fig 14-2 Fig 14-3 Fig 14-4 Table 14-2 Fig 14-5.
By Rasmussen College. 1. What majors or programs do you offer? 2. What is the average length of your programs? 3. What percentage of your students graduate?
The Plan Member Secure Site Key features that will help you manage your benefits plan.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Windfall Web Throughout this slide show there will be hyperlinks (highlighted in blue). Follow the hyperlinks to navigate to the specified Topic or Figure.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
12-CRS-0106 REVISED 8 FEB 2013 PRESENTS Payment Functionality.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Security in SDR & cognitive radio
Presentation transcript:

SMG10 report to SMG#30 Tdoc SMG P-99-741 Michael Walker Chairman ETSI SMG10

SMG10 meetings since SMG#29 SMG10 plenary #2/99, joint with 3GPP SA3, 3-5 August, Sophia Antipolis SMG10 ad hoc meeting - to prepare CRs for agreement by correspondence, 26 October, The Hague

Reports for approval Threat analysis on SS7 security, Tdoc SMG P-99-744

CRs for approval 02.09(and resulting CRs to 02.16, 03.03 and 11.10), Enhancement of IMEI security, Tdoc SMG P-99-742 03.20, Introduction of EDGE variant of A5, Tdoc SMG P-99-743 03.20, Clarification on triplet re-use conditions, Tdoc SMG P-99-743

Liaison statements to SMG LS to SMG (copy GSMA SG) on use of GEA2, Tdoc SMG P-99-745 LS to SMG (copy GSMA SG) on use of A5 algorithms for EDGE, Tdoc SMG P-99-556 LS to SMG (copy GSMA SG) on A5 algorithm - use of 64 bit Kc, Tdoc SMG P-99-555 LS to T1P1 (copy SMG) stating that SMG10 endorses stage 2 but that it has identified two risks, Tdoc SMG P-99-746

Special item for SMG#30 IMEI security CRs to enhance IMEI security, Tdoc SMG P-99-742 CR to 02.09 to add the line: “It shall not be possible to change the IMEI after the ME’s final production process. It shall resist tampering by any means (e.g. physical, electrical or software)” Corresponding CRs to 02.16, 03.03 and 11.10

Special item for SMG#30 SS7 security Messages can be read, altered, injected or deleted i Threats include denial of service, security triplet replay to compromise authentication and allow eavesdropping of user traffic Exacerbated by increasing number of connections (and potential to connect to/via Internet) Report contains list of threats related to “dangerous” messages Handover work to 3GPP SA3

WPA Security mechanisms 1 Chairman Henri Gilbert GPRS LS to SMG (copy GSMA SG) on use of GEA2 SMG10 recommend that GEA2 should be an option in terminal/network from R97 and should become mandatory (EDGE can be mandatory from the outset) SMG asked to consider appropriate timescales for making GEA2 mandatory Network should be able to select between GEA1 and GEA2 during migration but network should not be able to set no encryption If recommendations adopted then exact details need elaboration

WPA Security mechanisms 2 Use of full length Kc LS to SMG (copy GSMA SG) on use of 64 bit Kc SMG#27 wrote to manufacturers - only positive responses were received Manufacturers to ascertain that their equipment will work with a 64 bit Kc Cut off date May 2000

WPA Security mechanisms 3 EDGE LS to SMG (copy GSMA SG) on use of A5 algorithms for EDGE CR to 03.20 Annex C.1 on EDGE variant of A5 - for approval Algorithm should be run to provide 696 bits (instead of 228) No requirement for additional test data

WPB Security services 1 Chairman Simon Collins Clarification on triplet re-use conditions CR to 03.20 on security triplet re-use conditions CR agreed in SMG10 with comments from N2 (SMG3 WPC) Allows re-use when system failure in HLR, disallows re-use in the event that subscriber unknown or barred Changes from withdrawn CR at SMG#29 Removed requirement that re-use should not be performed in case of badly formatted requests Removed requirement that operator could specify how many times triplets could be re-used in VLR/SGSN CRs to R96 and R97 withdrawn because of retro-fit issues

WPB Security services 2 LCS LS to T1P1 (copy SMG) on LCS SMG10 endorse LCS stage 2 but have the following concerns Possibility exists to manipulate MS positioning estimate through Manipulation of differential GPS data (coming from another source than network) Software changes to the MS No changes suggested

WPB Security services 3 Follow-me LS was sent to SMG1 asking that the following is added to the specification A note to the effect that the service shall not be offered in standard GSM releases, and that in any case it must be enabled by the operator A statement that FIGS can be used where CAMEL is available Wording on password control should indicate that this is not a very secure solution

WPB Security services 4 SMS abuse SMG#29 asked SMG10 for a statement on the nature of SMS abuse Threats mass mailing - resulting in denial of service, commercial opportunism concern over liability for abusive content, damage to third party Counters control of direct and indirect access to manage SMS volumes and source

WPB Security services 5 MExE The MExE R99 has been handed over to 3GPP S3 SMG10 shall be informed about progress

WPD Lawful interception Chairman Bernie McKibben SMG10 WPD supporting 3GPP LI work

Future scope of SMG10 After transfer of 3G-related issues to 3GPP, the main areas where work is ongoing in SMG10 are: Security for location services, CTS changes Introduction of larger cipher key in GSM (if sufficient support from member companies is offered) Evaluation of features developed for 3G for applications in GSM Propose amalgamation with 3GPP SA3 - process to be discussed at next SMG 10 meeting

Future meetings 16-19 November - SMG 10 plenary, joint with 3GPP S3 (Security)