Milcom2018 Slides Final
Milcom2018 Slides Final
The first mobile networks were not designed with a strong security focus (no support for
encryption in 1G!!!)
Stronger
“Old” encryption Strong encryption PKI for IMSI
encryption
No BS Mutual protection
Mutual
authentication authentication More secure (?)
authentication
Extract
Cell Search
System Decode PBCH Power on
Configuration Procedure
• System configuration
– Decode Master Information Block (MIB) from PBCH
– Decode System Information Blocks (SIBs) from PDSCH © Portions Copyright 2018 Bloomberg L.P.
LTE NAS ATTACH PROCEDURE
Connection setup
(authentication, set-up of
encryption, tunnel set-up,
etc)
Encrypted traffic
Spoiler alert – This also potentially applies to 5G. No viable solution proposed in the specifications yet.
(more on this later)
All LTE active radio experiments MUST be performed inside a faraday cage!!!
● Base station configuration broadcasted in the clear in MIB and SIB messages.
● srsLTE + AirScope
─ Dump everything on pcap
● Very useful information that could be leveraged by and adversary
─ Optimal tx power for a rogue base station
─ High priority frequencies to force priority cell reselection
─ Tracking Area of the legitimate cell (use a different one in your rogue eNodeB to force TAU update
messages)
─ Mapping of signaling channels
─ Paging channel mapping and paging configuration
● Broadcast message scanning tools available in both srsLTE
and openLTE
RACH config
User traffic
config
LTE/LTE-A Jamming, Spoofing and Sniffing: Threat Assessment and Mitigation. Marc Lichtman, Roger Piqueras Jover, Mina Labib,
Raghunandan Rao, Vuk Marojevic, Jeffrey H. Reed. IEEE Communications Magazine. Special issue on Critical Communications and Public
Safety Networks. April 2016.
Unauthenticated
messages
Extract IMSI
from these
messages
● Implementation
─ USRP B210 + Ubuntu 14.10 + gnuradio 3.7.2
─ LTE base station – OpenLTE’s LTE_fdd_eNodeB (slightly modified)
• Added feature to record IMSI from Attach Request messages
─ Send attach reject after IMSI collection
Real eNodeB
REJECT
These are not the droids you are looking for… And you are not Rogue eNodeB
allowed to connect anymore to this network.
Jover, Roger Piqueras. "LTE security, protocol exploits and location tracking experimentation with low-cost © Portions Copyright 2018 Bloomberg L.P.
software radio." arXiv preprint arXiv:1607.05171 (2016).
SOFT DOWNGRADE TO GSM
● Use similar techniques to “instruct” the phone to downgrade to GSM
─ Only GSM services allowed OR LTE and 3G not allowed
REJECT
You will remove these restraints and leave this cell with the Rogue eNodeB
door open… and use only GSM from now on.
© Portions Copyright 2018 Bloomberg L.P.
DEVICE TEMPORARY LOCK AND SOFT DOWNGRADE
● Some results
─ The blocking of the device/SIM is only temporary
─ Device won’t connect until rebooted
─ SIM won’t connect until reboot
─ SIM/device bricked until timer T3245 expires (24 to 48 hours!)
─ Downgrade device to GSM and get it to connect to a rogue BS
Shaik, Altaf, et al. "Practical attacks against privacy and availability in 4G/LTE mobile communication systems." © Portions Copyright 2018 Bloomberg L.P.
arXiv preprint arXiv:1510.07563 (2015).
CONNECTION HIJACKING IN LTE
● LTE layer 2 encryption and integrity protection
─ Packets with known structure
─ AES Counter Mode (AES-CTR)
─ 16 bit checksum in the IP-UDP DNS request packets
● Protocol exploit
─ Track user (RNTI)
─ Identify DNS requests
─ MitM DNS requests (some “radio” challenges)
─ Apply mask to flip bits on destination IP address
─ Forward DNS requests to malicious DNS server
Rupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Pöpper. "Breaking LTE on Layer Two.“ To be © Portions Copyright 2018 Bloomberg L.P.
presented at IEEE Security and Privacy 2019.
EXPLORING UPLINK PROTOCOL SECURITY
● Now researchers can analyze exploits in the eNodeB and the mobile core network
● Can be UE initiated and does not require ACK from network (!!!)
NAS Detach Request can be sent with TMSI and even just the IMEI
Even NAS security context is active, MME will process a NAS Detach
Request with a MAC that fails integrity check or cannot be verified
● Run RRC handshake and spoof Detach Request message with victim’s identity
● Might not work in a real network if inter-layer integrity checks are well implemented
Raza, Muhammad Taqi, Fatima Muhammad Anwar, and Songwu Lu. "Exposing LTE Security Weaknesses at © Portions Copyright 2018 Bloomberg L.P.
Protocol Inter-Layer, and Inter-Radio Interactions." In International Conference on Security and Privacy in
Communication Systems, pp. 312-338. Springer, Cham, 2017.
LTE LOCATION LEAKS
Cell ID = 50
Rupprecht, David, Katharina Kohls, Thorsten Holz, and Christina Pöpper. "Breaking LTE on Layer Two.“ To be © Portions Copyright 2018 Bloomberg L.P.
presented at IEEE Security and Privacy 2019.
OTHER POTENTIAL LTE LOCATION LEAKS
● Paging messages sent in the clear
─ Known location tracking techniques based on sniffing paging messages
─ Silent text message to target IMSI/TMSI/MSISDN
─ If a paging is sniffed, the UE is in the same Tracking Area as the sniffer
─ If connection establishment is sniffed, the UE is in the same cell as the sniffer
Khan, Haibat, Benjamin Dowling, and Keith M. Martin. "Identity Confidentiality in 5G Mobile Telephony © Portions Copyright 2018 Bloomberg L.P.
Systems."
OTHER POTENTIAL LTE LOCATION LEAKS
50
OTHER POTENTIAL LTE LOCATION LEAKS
● Simple location inference
─ Eavesdrop MAC RAR messages
─ Time Advance distance from eNodeB
─ Very low resolution unless one captures MAC RARs from multiple base stations
TX2
TX1 Delay t1
TX1
RACH
Frame <j> Frame <j+1>
User 1
TX2 Delay t2
Time advance 1
● Challenges
─ What happens if private key of home operator is “lost” or needs to be rotated?
• New SIM?
• New public key burned in SIM?
• “Outside of the scope of the 3GPP specifications”
● Challenges
─ “If the home network has not provisioned the public key in USIM, the SUPI protection in initial registration
procedure is not provided. In this case, the null-scheme shall be used by the ME.”
• Null cipher still supported
─ “In case of an unauthenticated emergency call, privacy protection for SUPI is not required.”
• Can a rogue base station fool a UE to initiate such an emergency call?
Huang Lin (360 Radio Security Research Institute). “5G Security Enhancement“. Hack in the Box 2018.. © Portions Copyright 2018 Bloomberg L.P.
“OUT OF SCOPE”
This works for most wireless security specifications:
● “If the UE receives a NAS security mode command selecting NULL integrity and ciphering
algorithms, the UE shall accept this as long as the IMS Emergency session progresses.”
● “If the authentication failure is detected in the AMF then the UE is not aware of the failure in the
AMF, but still needs to be prepared, according to the conditions specified in TS 24.301, to accept a
NAS SMC from the AMF requesting the use of the NULL ciphering and integrity algorithms.”
● “If the AMF cannot identify the subscriber, or cannot obtain authentication vector (when SUPI is
provided), the AMF shall send NAS SMC with NULL algorithms to the UE regardless of the
supported algorithms announced previously by the UE.”
● …
Are we there yet? The long path to securing 5G mobile communication networks“
https://www.linkedin.com/pulse/we-yet-long-path-securing-5g-mobile-communication-piqueras-jover