Re: [tsvwg] Draft Liaison statement to 3GPP RAN3 and SA3

"Charles Eckel (eckelcu)" <eckelcu@cisco.com> Mon, 31 July 2023 20:36 UTC

Return-Path: <eckelcu@cisco.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08F6EC14CE42 for <tsvwg@ietfa.amsl.com>; Mon, 31 Jul 2023 13:36:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.603
X-Spam-Level:
X-Spam-Status: No, score=-9.603 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="lE6DsKF0"; dkim=pass (1024-bit key) header.d=cisco.com header.b="VMERn04Q"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zqq3D--QK6as for <tsvwg@ietfa.amsl.com>; Mon, 31 Jul 2023 13:36:08 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D9ECC151525 for <tsvwg@ietf.org>; Mon, 31 Jul 2023 13:36:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=55279; q=dns/txt; s=iport; t=1690835768; x=1692045368; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=UycYZBM/bdsGWU6sc4ee8Jc0pwvm+QVIwgdqRd/Qy/U=; b=lE6DsKF0hjZ+OrvwzEKdm6JCxK7KZGMgp0/B+7l9G+Hu1xyPmAfUy7w/ YFfiZug52NzU1Gu3HxpyQvoCEorUTjYjYub8rlnhxrYmwFuhcltQLdzNA cz+FdLGUKW0+VShoRCZdBD0KBx4vK8mGE2R8PJeIZpV17a1vld1zqbz/g k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:hjbjwh3875QQvWTpsmDPZFBlVkEcU/3cNwoR7N8gk71RN/3l9JX5N 0uZ7vJo3xfFXoTevupNkPGe87vhVmoJ/YubvTgcfYZNWR4IhYRenwEpDMOfT0yuBPXrdCc9W s9FUQwt5Gm1ZHBcA922fFjOuju35D8WFA/4MF94Lef4HoXPp8+2zOu1vZbUZlYAiD+0e7gnN Byttk2RrpwPnIJ4I6Atyx3E6ndJYLFQwmVlZBqfyh39/cy3upVk9kxt
IronPort-Data: A9a23:Eq0Q7audI9VXwjgbqVvKIBEuW+fnVC1eMUV32f8akzHdYApBsoF/q tZmKWDUaPqOYWHze90kPYu//E9QucPcm9MwHQNl+SowE39AgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUIYoAQgvA1c9IMsdoUg7wbVh3dUx2YLR7z6l4 LseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3ecldG0DFrrx8RYZWc QpsIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbhVq/kQPPqgH2PU0WEFvlwWJsMpN1 NBA5I65bTgoEIKTobFIO/VYO3kW0axu8bvDJz20ttaeihSeNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vZ7w616OrTpu1Ei88gIc3gIasUu2prynfSCvNOrZXrGv6QvoUBgmtp7ixINazkR cBIMhBrUA7/WkwVNAYuJc4Sv/j90xETdBUB+A7K+sLb+VP70Bdvz7fFMdfJdJqNX8o9o6qDj mvC+2K8CRYAOZnGkXyO82mnganEmiaTtJ8u+KOQx/hSnG2T6XYvFBgbBEmyhca4pGHhYocKQ 6ALwRYGoa83/U2ta9DyWRykvXKJ1iLwvfINToXWDynQlMLpDxal6nssFWUZOYZ23CMibXl7i AHVwo+B6SlH7eX9dJ6LyluDQdpe0wA8KWsPY0fopiNavoG7+unfYv8zJ+uP/Ya8itnzXDr32 T3P9XB4jLQIhslN3KK+lbwmv95OjsWYJuLWzlyINo5A0u+fTNX7D2BPwQOLhcus1K7DEjG8U IEswqByFtwmA5CXjzCqS+4QBryv7PvtGGSC0AY/Rcl7rGn0oybLkWVsDNdWeRYB3iEsJ2eBX aMvkVg5CGJ7ZSHzNvYnP+pd9ex6lPKI+SvZugD8N4oSPccZmP6v9yB1bknYxHH2jEUpiskC1 WSzL66R4YIhIf0/llKeHr5FuZdyn3xW7T2IH/jTkU/4uYdykVbIE9/pxnPUMLBghE5FyS2Im +ti2zyikk8ACLWvOHiGqOb+7zkidBAGOHw/kOQOHsarKQt9E2ZnAPjUqY7NsaQ890iJvo8kJ k2AZ3I=
IronPort-HdrOrdr: A9a23:x5p/qq5IDc/V9mV17wPXwWGBI+orL9Y04lQ7vn2ZFiY1TiXIra 6TdaoguiMc0AxhJ03I+errBEGBKUmskqKdkrNhQ4tKPTOW9FdASbsD0WKM+UyaJ8STzJ856U 4kSdkDNDSSNyk0sS+Z2njDLz9I+rDum8zY5pa9854ud3AWV0gK1XYeNu/vKDwPeOAwP+tBKH Pz3Lsim9OnQxkqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uEg9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cyjpAJb4RGIFqjgpF5d1H22xa1O UkZC1QePib3kmhPF1dZyGdnTUIngxeskMKgmXo8EcL6faJNA7STfAxy76wtnDimhEdVBYW6t MS40uJ85VQFh/OhyL7+pzBUAxrjFO9pT44nfcUlGE3a/pUVFfAxbZvj3+9Pa1wVR4S0rpXWN VGHYXZ/rJbYFmaZ3fWsi1mx8GtRG06GlODTlIZssKY3jBKlDQhpnFoifA3jzMF7tYwWpNE7+ PLPuBhk6xPVNYfaeZ4CP0aScW6B2TRSVbHMX6UI17gCKYbUki94aLf8fEw/qWnaZYIxJw9lN DIV05Zr3c7fwb0BciHzPRwg2bwqaWGLEPQI+1lluxEU+fHNcjW2AW4OSUTr/c=
X-Talos-CUID: 9a23:k13h9WyPrBAsSqEkSrmVBgUlHPg5Qn3y1kvMJkLpG29Nd7y7ZgCprfY=
X-Talos-MUID: 9a23:uUlrAAYuz9SPl+BT7QXOjmA5HsNU+ZuXWRoDwKwr5+WnKnkl
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jul 2023 20:36:07 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 36VKa4CP023686 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <tsvwg@ietf.org>; Mon, 31 Jul 2023 20:36:06 GMT
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=eckelcu@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,245,1684800000"; d="scan'208,217";a="4933029"
Received: from mail-co1nam11lp2173.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.173]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jul 2023 20:36:03 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eN6C56RTQYksbOeOCWQD7ZhdamxIA/nqEdwhhEnx6QBVzEbRxb5QV0h/imdCdoqrYX1MS4n6dkQJ24s8SRtDvtaNHwS2zLYJKBw8uwTkATGicdM56Qgd4Eg7rxZjT6iRSW0MWdUUR5EemWCbFjPwrcBRNX2n+O947WUTIDhhQyZccoV9KX7LrE9TnfZl5ktZZDS84cV0fAzr5LFjudJ3UpWkJrjGZi49UC0qxmfz6za2drSQfwKIG9OOEYNwdWzyTYAPRtqTTAOb1NfBn2v295akcuf2k+bUX7Li/tTMBEDIakMBEKTccCaJ/KoEIRSkRlEZ+zfE7dMuzppsJjZ4kw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UycYZBM/bdsGWU6sc4ee8Jc0pwvm+QVIwgdqRd/Qy/U=; b=TYwDL+ltp5zuDehpQHD+uaDAT/zG41yPV9I3tcqt+qbOfq75HP8FAKQ6npf/K9omkeiwrA2LsVBrSfqlrif44H0Hyf9bYdzOsaF08+WpDZCMwk2BGSSPJ+nX8z23gPL6LjfRofU/XFD9N79P+/G2NHl9mH5abz1hE+UBOPQMPfrTe5MU4D7nlrpf1+7wTdCAGoulTvmpMCVF9hw3sLhHCu8DUl8SS+gW5R+XSAkkgKVsUDJ5JEoPBciXnL/PNHzVqQhBJdyOj4caJve4hTZLG0rGEu4FCfptuAHBtNHbGJzO7F4DJS8/4wgv8iAexrFZXR+urefG7EeES2GA3ByOGw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UycYZBM/bdsGWU6sc4ee8Jc0pwvm+QVIwgdqRd/Qy/U=; b=VMERn04QIGIU6FSaGVm+gBCKymcUm1ofoilQPB2GV1Ixc3obGFSpMwilZPntI8d2gvN1s/KdNitrhlsX8OQQslX9G+cdt6bkCy/JqN2q3ffR47DqKwBvpQLJcpfMuCFLQRet3JyMx1sws3O7rCToT2QxHW9/c4ExgGDeoi8B3EM=
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com (2603:10b6:a03:2af::17) by DM6PR11MB4609.namprd11.prod.outlook.com (2603:10b6:5:28f::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6631.43; Mon, 31 Jul 2023 20:35:59 +0000
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::e05f:95ba:a50d:da96]) by SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::e05f:95ba:a50d:da96%6]) with mapi id 15.20.6631.043; Mon, 31 Jul 2023 20:35:59 +0000
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>
CC: tsvwg IETF list <tsvwg@ietf.org>, Peter Schmitt <Peter.Schmitt@huawei.com>
Thread-Topic: [tsvwg] Draft Liaison statement to 3GPP RAN3 and SA3
Thread-Index: AQHZwWv2cIOd3XaiFUmKvB+FP1gU36/UWlUA
Date: Mon, 31 Jul 2023 20:35:59 +0000
Message-ID: <529146EA-4411-45C7-9C88-A88A2CA40B77@cisco.com>
References: <DU0PR07MB897090B712BC51017B2EEA739506A@DU0PR07MB8970.eurprd07.prod.outlook.com>
In-Reply-To: <DU0PR07MB897090B712BC51017B2EEA739506A@DU0PR07MB8970.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3731.600.7)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5053:EE_|DM6PR11MB4609:EE_
x-ms-office365-filtering-correlation-id: 94cd91be-5318-422b-cf5d-08db9205bfcc
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5053.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(346002)(396003)(376002)(39860400002)(366004)(136003)(451199021)(38100700002)(86362001)(66476007)(8676002)(8936002)(64756008)(5660300002)(316002)(4326008)(66446008)(41300700001)(54906003)(122000001)(76116006)(33656002)(66556008)(66946007)(38070700005)(478600001)(166002)(4001150100001)(2906002)(71200400001)(36756003)(966005)(6512007)(6486002)(6506007)(83380400001)(186003)(53546011)(2616005)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_529146EA441145C79C88A88A2CA40B77ciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5053.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 94cd91be-5318-422b-cf5d-08db9205bfcc
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Jul 2023 20:35:59.2876 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Z7Bt+Ff49QxHJsAQsvCusEOdVZIjRXmrOEAASLBzEH/9ljpU/NCPdbGBbpVgWWTRXMaY5gkDGLXejBVCSSCxYA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4609
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/M3Lj7TATt6MybHR1Al-2Q9Q8IGs>
Subject: Re: [tsvwg] Draft Liaison statement to 3GPP RAN3 and SA3
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Jul 2023 20:36:14 -0000

Hi Magnus,

On Jul 28, 2023, at 8:57 AM, Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org> wrote:

TSVWG,

Below is my proposed draft Liaison statement please provide comments and suggestions for improvements.

Cheers

Magnus






Title: DTLS for SCTP next steps and request for input
Response to:    Reply LS on SCTP-AUTH and DTLS (S3-233355)

Source:                     IETF Transport Area Working Group (TSVWG)
To:                            3GPP SA WG3, and 3GPP RAN WG3
To Contacts:             Lionel Morand <lionel.morand@orange.com<mailto:lionel.morand@orange.com>>
                                 3GPPLiaison@etsi.org<mailto:3GPPLiaison@etsi.org>

Please replace Lionel with Peter (Peter Schmitt <Peter.Schmitt@huawei.com>). Peter is the new CT chair, and as such, has taken on the role of 3GPP liaison manager to IETF.

Once TSVWG has agreed on the content of the LS, please send the resulting version to Peter and myself and we can make sure it is posted to the appropriate 3GPP groups. If we have this before Friday it can be posted as an on time contribution for the upcoming SA3 and RAN3 meetings in August.

Cheers,
Charles

CC:                           Charles Eckel eckelcu@cisco.com<mailto:eckelcu@cisco.com>
                                 TSVWG tsvwg@ietf.org<mailto:tsvwg@ietf.org>

Send any reply LS to: statements@ietf.org<mailto:statements@ietf.org>
Purpose:                      For action
Deadline:         2023-09-11 Action Needed

1. Description

IETF’s Transport Working Group (TSVWG) thanks 3GPP SA3 for “Reply LS on SCTP-AUTH and DTLS” [1]. This LS is a follow up to inform 3GPP SA3 and RAN3 that TSVWG continues its work on a DTLS based security solution for SCTP that should be suitable to the needs of 3GPP for the N2, Xn, F1, and E1 interfaces. TSVWG would like to inform 3GPP how input from 3GPP and its participants can help ensure that the time plan is met.

In the development work of a replacement as reported in the previous liaison statement (Titled: Updated LS to 3GPP regarding SCTP-AUTH and DTLS) [2] the work had run into some security issues. In the continued work to address these security issues there are now two different proposals that TSVWG is attempting to choose between. The first is to continue with the previous solution with DTLS on top of SCTP [3] and relying on an updated version of SCTP-AUTH [4] to ensure the DTLS records are in order per message and no records can be injected into protected message. The second solution is to create an encryption chunk [5] that encapsulates all the payload of SCTP packets, where each SCTP packet’s content can be protected by DTLS [6] ensuring confidentiality, source authenticity, and integrity.

These two solutions appear to both to fulfill the security and functional requirements to address 3GPP’s needs as understood by TSVWG. The interpretation of the requirements is the following:

  *   Support message size of larger than 500 kb, which appear to be the approximate theoretical maximum size of Xn (3GPP TS 48.423) messages. Although we note that the original liaison statement from RAN3 [7] refers to SCTP’s unlimited message size.
  *   Enable long lived SCTP association with lifetimes of many weeks.
  *   Periodic mutual re-authentication of the peers.
  *   Periodic rekeying with forward secrecy and enable Diffie-Hellman Exchanges forcing an attacker to perform dynamic key-exfiltration after each rekeying.
  *   Security solution should not be vulnerable to SCTP association availability attacks based on injecting or prevention of delivery of a small number of packets by an on- or off-path attacker.
  *   Rekeying or re-authentication may not interrupt the SCTP using applications message delivery for any extended time, such as multiple RTTs to drain all transport messages to perform the rekeying.


We also have noted the wording in the reply liaison statement [1], “Since the problem is related to the use of DTLS with SCTP, SA3’s understanding is that the solution should be based on DTLS, and the solution should not rely on unsupported DTLS features”.

The two proposed solution has different properties when it comes to robustness (i), requirements on the DTLS implementation (ii), implementation effort in the SCTP stack (iii). These differences are summarized in this presentation (Slides [8], Recording [9]) to the TSVWG meeting at IETF’s 117th Meeting. As many of the differences are related to implementation and requirements on DTLS implementation it would really help if either of the 3GPP WG’s or at least its participants would provide input to the TSVWG work on which of the solutions that it would be preferable to pursue by TSVWG.

TSVWG’s meeting at IETF 117 was unable to make a choice at this time on which solution to pursue due to lack of sufficient breath of input and time for participants to prepare and discuss the differences. To address this and make progress as quickly as possible an online interim meeting of TSVWG has been scheduled on the 19th of September 2023 at 16:00-18:00 CEST where this can be discussed in more depth. TSVWG would like to invite interested parties to participate in this interim meeting which is open to anyone. No registration will be required, however an IETF datatracker account (https://datatracker.ietf.org/accounts/create/) will be needed to join the session. The session details and a join link will be available from this page: https://datatracker.ietf.org/meeting/upcoming

In the discussion at IETF 117 TSVWG meeting, it was requested that 3GPP clarified which SCTP message sizes that a solution is required to support. In other words, are the theoretical maximum message size mentioned above relevant to be supported, or would it be sufficient that a smaller message size is supported? In general, it would be good to have SA3 and RAN3 confirm that the interpretation of the requirements are relevant.

TSVWG plans to make a consensus decision on its mailing list after the interim meeting. If a rough consensus is achieved on which solution to pursue, TSVWG should be able to finish its work within a year. Meaning that approved for publication by IESG specifications could be available by the end of 2024, with published RFC within one to two months. However, for this time plan to hold it is necessary that sufficient level of review is achieved. Thus, interested parties needs to be involved in the remaining process in TSVWG.

2. Actions

For both SA3 and RAN3:


  *   TSVWG would like to invite interested to participate in the TSVWG Interim meeting on the 19th of September 2023 at 16:00-18:00 CEST.



  *   TSVWG would like to request that any input on the choice of solution is provided in an LS by 2023-09-11.



  *   TSVWG would like to request confirmation if the interpretation TSVWG has made on requirements are relevant to 3GPP.


3. Upcoming Meetings

2023-09-17: Online interim meeting of TSVWG 16:00-18:00 CEST. Details for this meeting will be linked from this page when available: https://datatracker.ietf.org/meeting/upcoming

2023-11-03 to 2023-11-10: IETF’s 118th Meeting in Prague.



4. References

[1]       3GPP Liaison, “Reply LS on SCTP-AUTH and DTLS”, 3GPP doc nr: S3-233355
[2]       https://datatracker.ietf.org/liaison/1806/
[3]       https://datatracker.ietf.org/doc/draft-ietf-tsvwg-dtls-over-sctp-bis/
[4]       https://datatracker.ietf.org/doc/draft-tuexen-tsvwg-rfc4895-bis/
[5]       https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-crypto-chunk/
[6]       https://datatracker.ietf.org/doc/draft-westerlund-tsvwg-sctp-crypto-dtls/
[7]       https://datatracker.ietf.org/liaison/1723/
[8]       https://datatracker.ietf.org/meeting/117/materials/slides-117-tsvwg-71-dtls-in-sctp-00
[9]       https://youtu.be/HcjKkhYn08Q?t=2484