Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 17.2.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
J
Usage of USS with local policy enforcement in BSF
J.1
General
J.2
Usage scenarios
K
GBA-usage examples
K.1
Example on interoperator GBA setup
K.2
Example on interoperator GBA operation
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
L.3
Finding the GBA key Ks during or after the Ub protocol run
L.4
Bidding down attack
...
J
Usage of USS with local policy enforcement in BSF
|R7|
Word‑p. 68
J.1
General
Word‑p. 68
J.2
Usage scenarios
Word‑p. 68
J.2.1
Scenario 1: NAF does not use USSs, BSF does not have local policy for NAF
Word‑p. 69
J.2.2
Scenario 2: NAF does not use USSs, BSF does have local policy for NAF
Word‑p. 69
J.2.3
Scenario 3: NAF does use USSs, BSF does not have local policy for NAF
Word‑p. 69
J.2.4
Scenario 4: NAF does use USSs, BSF does have local policy for NAF
Word‑p. 70
K
GBA-usage examples
|R7|
Word‑p. 71
K.1
Example on interoperator GBA setup
Word‑p. 71
K.2
Example on interoperator GBA operation
Word‑p. 73
L
Information on how security threats related to known GSM vulnerabilities are addressed by the 2G GBA solution
|R7|
Word‑p. 76
L.1
Impersonation of the UE to the BSF during the run of the Ub protocol
Word‑p. 76
L.2
Impersonation of the BSF to the UE during the run of the Ub protocol
Word‑p. 76
L.3
Finding the GBA key Ks during or after the Ub protocol run
Word‑p. 77
L.4
Bidding down attack
Word‑p. 77