Requirement Name:
No de-registration during the authentication
Requirement Reference:
Requirement Description:
"It should be noted that the UE initiated re-registration opens up a potential denial-of-service attack. That is, an attacker could try to register an already registered IMPU and respond with an incorrect authentication response in order to make the HN de-register the IMPU. For this reason a subscriber, when registered, shall not be de-registered if it fails an authentication."
as specified in
clause 6.1.1 of TS 33.203.
Threat References
O.3.2 Threats related to de-registration during the authentication
Test case:
Test Name:
TC_ NO_DE-REGISTRATION_AUTH_FAIL
Purpose:
Verify the S-CSCF shall not de-register the registered UE when it fails an authentication during re-registration.
Procedure and execution steps:
Pre-Conditions:
-
S-CSCF under test is connected in simulated/real network environment including P-CSCF and HSS.
-
The UE supporting IMS AKA has already been registered into the IMS network.
-
The tester shall have access to the Mw interface between the P-CSCF and S-CSCF.
-
The tester shall have access to the Cx interface between the HSS and S-CSCF.
Execution Steps
-
During a new IMS AKA procedure, the UE initiates the re-registration scenario, the tester sends a SM7 register message including the IMPI, and an incorrect authentication response.
-
The S-CSCF under test retrieves the active XRES for that user and uses this to check the received authentication response
Expected Results:
The S-CSCF sends a 4xx Auth_Failure towards the UE indicating that authentication has failed.
The S-CSCF does not initiate de-registration procedure within the Registration expiration interval defined in
TS 24.229, i.e. send either Cx-Put (Public User Identity, Private User Identity, clear S-CSCF name) or Cx-Put (Public User Identity, Private User Identity, keep S-CSCF name) to the HSS. Or, the IMPU status in the HSS is registered within the Registration expiration interval defined in
TS 24.229.
Expected format of evidence:
Provide evidence of the check of the product documentation in plain text.
Save the logs and the communication flow in a .pcap file.
Requirement Name:
Unprotected register message
Requirement Reference:
Requirement Description:
"If the UE has an already active pair of security associations, then it shall use this to protect the REGISTER message. If the S-CSCF is notified by the P-CSCF that the REGISTER message from the UE was integrity-protected it may decide not to authenticate the user by means of the AKA protocol. However, the UE may send unprotected REGISTER messages at any time. In this case, the S-CSCF shall authenticate the user by means of the AKA protocol."
as specified in
clause 7.4.0 of TS 33.203.
Threat References:
O.3.3.1 Unprotected register message
Test case:
Test Name:
TC_UNPROTECTED_REGISTER_MESSAGE
Purpose:
Verify whether the S-CSCF authenticates the user by means of the AKA protocol, if the UE sends unprotected REGISTER messages, regardless whether the UE is already registered or not.
Procedure and execution steps:
Pre-Conditions:
-
S-CSCF network product are connected in simulated/real network environment.
-
The list of ordered integrity and encryption algorithms are configured on the P-CSCF under test.
-
The UE and the P-CSCF are simulated.
-
The UE supports a list of ordered integrity and encryption algorithms.
-
The tester has access to the Gm interface between the UE and P-CSCF.
-
The tester has access to the Mw interface between the P-CSCF and S-CSCF.
-
The UE has an already active pair of security associations.
Execution Steps
This test is performed in the Authenticated re-registration procedure, the UE has an already active pair of security associations.
-
The UE sends unprotected REGISTER messages (SM1) to the P-CSCF.
-
The P-CSCF sends unprotected REGISTER messages (SM2) to the S-CSCF under test.
-
The S-CSCF under test receives the SM2 from the P-CSCF.
-
The tester examines whether the S-CSCF under test sends SM4: Auth_Challenge to the P-CSCF to authenticate the user by means of the AKA protocol.
Expected Results:
The S-CSCF under test authenticates the user by means of the AKA protocol after.
Expected format of evidence:
Provide evidence of the check of the product documentation in plain text. Save the logs and the communication flow in a .pcap file.
Requirement Name:
Synchronization failure handling
Requirement Reference:
Requirement Description:
"The HSS checks the AUTS as in
clause 6.3.5 of TS 33.102. After potentially updating the SQN, the HSS sends new AVs to the S-CSCF in CM4.
CM4:
Cx-AV-Req-Resp(IMPI, n,RAND1||AUTN1||XRES1||CK1||IK1,….,RANDn||AUTNn||XRESn||CKn||IKn)
When the S-CSCF receives the new batch of authentication vectors from the HSS it deletes the old ones for that user in the S-CSCF.
The rest of the messages i.e. SM10-SM18 including the Cx messages are exactly the same as SM4-SM12 and the corresponding Cx messages in
clause 6.1.1. "
as specified in
clause 6.1.3 of TS 33.203.
Threat References:
O.3.3.2 No resynchronization
Test Case:
Test Name:
Purpose:
Verify that in synchronization failure scenario, a new authentication will be triggered by the S-CSCF.
Pre-Conditions:
-
Test environment with UE, P-CSCF and HSS. The UE, P-CSCF and HSS may be simulated.
-
S-CSCF network product is connected in emulated/real network environment.
Execution Steps
-
The UE sends an SM7 to the S-CSCF under test with REGISTER(Failure = Synchronization Failure, AUTS, IMPI).
-
The S-CSCF under test sends a CM3 message to the HSS with Cx-AV-Req(IMPI, RAND,AUTS, m).
-
The HSS sends a CM4 message to the S-CSCF under test with Cx-AV-Req-Resp(IMPI, n, RAND1||AUTN1||XRES1||CK1||IK1,….,RANDn||AUTNn||XRESn||CKn||IKn).
Expected Results:
After receiving CM4 from the HSS, the S-CSCF initiates a new authentication towards the UE, and sends the RANDi and AUTNi to the UE, where RANDi and AUTNi belong to one of the authentication vectors received in CM4 message.
Expected format of evidence:
Save the logs and the communication flow in a .pcap file.