Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.823
Security for Usage of GBA
with a UE Browser

V12.2.0 (Wzip)  2013/12  18 p.
Rapporteur:
Dr. Holtmanns, Silke
Nokia Networks Oy

full Table of Contents for  TR 33.823  Word version:  12.2.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
0Introduction  p. 4
1Scope  p. 5
2References  p. 5
3Definitions and abbreviations  p. 6
3.1Definitions  p. 6
3.2Abbreviations  p. 6
4Objectives for the Architecture using GBA from a UE web browser  p. 7
4.1Introduction  p. 7
4.2Objectives  p. 7
5Usage Scenarios and accompanying Threats for using GBA from a UE web browser  p. 8
5.1Usage Scenarios  p. 8
5.1.1Usage scenario 1  p. 8
5.2Threats  p. 8
6Control of GBA Credentials and GBA Module in the UE  p. 9
6.1General  p. 9
6.2Control Mechanism 1- Same Origin Authentication Tokens  p. 9
6.3Control Mechanism 2 - Server Authenticated TLS  p. 9
6.4Control Mechanism 3 - Channel Binding  p. 9
6.5Control Mechanism 4 - Key Usage  p. 9
7Potential Extension of Protocol Mechanism used on Ua Reference Point  p. 10
7.1Key derivation  p. 10
7.2Channel binding  p. 11
7.2.1Background  p. 11
7.2.2Option 1: Channel binding using RFC 5705  p. 11
7.2.3Option 2: Channel binding using RFC 5929  p. 11
8Common Practices and Examples  p. 11
8.1Security Considerations  p. 11
8.1.1General Scripting Security Considerations  p. 11
8.1.2GBA key control  p. 12
8.1.3User grants  p. 12
8.1.4Root CAs in Browser  p. 12
8.2Javascript GBA API description  p. 12
8.2.1GBA API Description  p. 12
8.2.2Example API usage  p. 13
8.3Example sequence flows  p. 13
8.3.1Example sequence flow with channel binding  p. 13
$Change History  p. 18

Up   Top