Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.823
Word version: 12.2.0
0…
5…
5
Usage Scenarios and accompanying Threats for using GBA from a UE web browser
6
Control of GBA Credentials and GBA Module in the UE
7
Potential Extension of Protocol Mechanism used on Ua Reference Point
8
Common Practices and Examples
$
Change History
5
Usage Scenarios and accompanying Threats for using GBA from a UE web browser
p. 8
5.1
Usage Scenarios
p. 8
5.1.1
Usage scenario 1
p. 8
5.2
Threats
p. 8
6
Control of GBA Credentials and GBA Module in the UE
p. 9
6.1
General
p. 9
6.2
Control Mechanism 1- Same Origin Authentication Tokens
p. 9
6.3
Control Mechanism 2 - Server Authenticated TLS
p. 9
6.4
Control Mechanism 3 - Channel Binding
p. 9
6.5
Control Mechanism 4 - Key Usage
p. 9
7
Potential Extension of Protocol Mechanism used on Ua Reference Point
p. 10
7.1
Key derivation
p. 10
7.2
Channel binding
p. 11
7.2.1
Background
p. 11
7.2.2
Option 1: Channel binding using RFC 5705
p. 11
7.2.3
Option 2: Channel binding using RFC 5929
p. 11
8
Common Practices and Examples
p. 11
8.1
Security Considerations
p. 11
8.1.1
General Scripting Security Considerations
p. 11
8.1.2
GBA key control
p. 12
8.1.3
User grants
p. 12
8.1.4
Root CAs in Browser
p. 12
8.2
Javascript GBA API description
p. 12
8.2.1
GBA API Description
p. 12
8.2.2
Example API usage
p. 13
8.3
Example sequence flows
p. 13
8.3.1
Example sequence flow with channel binding
p. 13
$
Change History
p. 18