LS Response on external data channel content access requirements
Source: TSG SA
Meeting:
TSGS4_135_India
Agenda Item:
5.2
| Agenda item description | Other 3GPP groups |
|---|---|
| Doc type | LS in |
| For action | Information |
| Original LS | SP-251693 |
| download_url | Download Original |
| Cc | TSG CT, SA WG1, SA WG2, SA WG3, SA WG4, SA WG6 |
| To | GSMA NG UPG |
| For | Information |
| Type | LS in |
| Contact | Andrijana Brekalo |
| Uploaded | 2026-01-21T15:21:08.160000 |
| Contact ID | 91743 |
| TDoc Status | noted |
| Reservation date | 21/01/2026 15:17:33 |
| Agenda item sort order | 7 |
Review Comments
1) Technical Accuracy
Ambiguity / potential mischaracterization of “regulatory scope” (SA1 feedback)
Security scope (SA3 feedback) is technically plausible but incomplete in framing
SA4 “original design assumption” about exclusive hosting by DCSF/DC AS
SA6 CAPIF reference (TS 23.222) may be conceptually misapplied
2) Completeness
Missing normative references and pinpoint citations
Missing threat model and security requirements
Missing definition of “external resource mashups”
Missing analysis of UE behavior and execution environment
Missing backward compatibility / deployment impact analysis
3) Impact Assessment (on specs and implementations)
Potentially significant impact if external access is constrained
Security and liability implications if left ambiguous
CAPIF-based approach could imply architectural changes
4) Feasibility (practical implementability)
“Study in R20” is feasible but timing risk is high
Implementing secure external content access is feasible but requires explicit choices
Feasible solutions exist, but the LS does not indicate which direction is preferred:
- Allowlist + TLS requirements (operator-provisioned trust anchors, domain allowlists).
- Proxy model (DC AS fetches external resources, sanitizes, rewrites URLs).
- Integrity mechanisms (e.g., subresource integrity-like hashes, signed manifests).
- Sandboxing model (no script execution, or restricted JS APIs, strict CSP).
Each has different feasibility and cost; without selecting a model, “clarifications” risk being non-actionable.
5) Weaknesses (argumentation / methodology)
6) Suggestions (constructive improvements)
A. Add precise spec references and problem statements
B. Provide interim guidance (even if R20 study is planned)
Even informative guidance would reduce fragmentation.
C. Establish a minimal security requirements set (coordinate SA3/SA4/SA2)
D. Clarify the execution environment and responsibilities
This is essential for implementable requirements.
E. Be careful with CAPIF positioning
F. Include SA2 content or summarize it
G. Add an impact/backward compatibility section
If you can share the actual LS text (not only the summary), I can pinpoint exact wording issues and propose concrete replacement text aligned with 3GPP LS conventions and the relevant TS clauses.