lte and imsi catcher myths

33
LTE and IMSI catcher myths Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, ValAeri Niemi, JeanPierre Seifert Blackhat EU, Amsterdam, Netherlands 13 November 2015

Upload: hoangngoc

Post on 03-Jan-2017

256 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: LTE and IMSI catcher myths

LTE  and  IMSI  catcher  myths  

 Ravishankar  Borgaonkar,  Altaf  Shaik,  N.  Asokan,  ValAeri  Niemi,  Jean-­‐Pierre  Seifert    Blackhat  EU,  Amsterdam,  Netherlands    13  November  2015  

     

Page 2: LTE and IMSI catcher myths

Outline  

•  Fake  base  staMons  in  GSM/3G  

•  LTE/4G  Security  

•  Types  of  vulnerabiliMes  in  pracMce        

•  Building  LTE/4G  base  staMon  

•  AAacking  methods/demos  

•  Impact  &  Analysis      

2

Page 3: LTE and IMSI catcher myths

Mo+va+on  

•  Baseband  story  

•  PlaTorm  for  pracMcal  security  research  in  LTE/4G  

•  AAacking  cost  VS  security  measures  (defined  in  15  years  back)    

   

3

Page 4: LTE and IMSI catcher myths

Fake  base-­‐sta+ons..1  

•  Used  for:  IMSI/IMEI/locaMon  tracking,  call  &  data  intercepMon  

 •  Exploit  weaknesses  in  GSM  &  3G  networks  

(parMally)  

•  Knows  as  IMSI  Catchers  

•  Difficult  to  detect  on  normal  phones  (Darshak,  Cryptophone  or  Snoopsnitch)  

4

Page 5: LTE and IMSI catcher myths

Fake  base-­‐sta+ons..2  

5

Page 6: LTE and IMSI catcher myths

Why  in  GSM  &  3G  

•  GSM  -­‐  lack  of  mutual  authenMcaMon  between  base  staMon  and  mobiles  

 •  3G  –  no  integrity  protecMon  like  in  LTE,  

downgrade  aAacks    •  GSM/3G  –  power  is  to  base  staMon,  decides  

when  and  how  to  authenMcate/encrypt  

•  IMSI/IMEI  can  be  requested  any  Mme  

6

Page 7: LTE and IMSI catcher myths

LTE/4G  networks  

•  Widely  deployed,  1.37  billion  users  at  the  end  of  2015  

 •  Support  for  VoLTE      •  High  speed  data  connecMon  and  quality  of  service    •  More  secure  than  previous  generaMons  

•  Best  effort  to  avoid  previous  mistakes  

7

Page 8: LTE and IMSI catcher myths

LTE  Architecture  

8

E-UTRAN

eNodeB UE

Cell

S1

Tracking Area

MME AS

Internet  

NAS

AS  :  Access  Stratum      UE:  User  Equipment    NAS  :  Non-­‐Access  Stratum        S1  :  Interface  E-­‐UTRAN:    Evolved  Universal  Terrestrial  Access  Network  MME  :  Mobility  Management  EnMty  

Page 9: LTE and IMSI catcher myths

Enhanced  security  in  LTE  

 •  Mutual  authenMcaMon  between  base  staMon  &  mobiles  

•  Mandatory  integrity  protecMon  for  signaling  messages      •  Extended  AKA  &  key  hierarchy    •  Security  algorithms      •  Other  features  (not  relevant  for  this  talk)      

9

Page 10: LTE and IMSI catcher myths

Paging  in  LTE  

10

Page 11: LTE and IMSI catcher myths

Paging  in  LTE  

11

Paging Request Type 2"

{404220522xxxxxx : A000FFFF }"

IMSI = 404220522xxxxxx"

TMSI = A000FFFF" eNodeB"

Page 12: LTE and IMSI catcher myths

LTE  Smart  Paging  

12

Cell  1  Cell  5   Cell  4  

 Cell  3  

Cell  2  

Tracking  Area  

Page 13: LTE and IMSI catcher myths

Enhanced  security  w.r.t  fake  base  sta+on  

 •  Mutual  authenMcaMon  between  base  staMon  &  mobiles  

•  Mandatory  integrity  protecMon  for  signaling  messages      •  IMEI  is  not  given  in  non-­‐integrity  messages  

•  Complexity  in  building  LTE  fake  base  staMon*  

•  But  in  pracMce:  ü implementaMons  flaws,  specificaMon/protocol  deficiencies?  

   

13

*  hAps://insidersurveillance.com/rayzone-­‐piranha-­‐lte-­‐imsi-­‐catcher/      

Page 14: LTE and IMSI catcher myths

Specifica+on  Vulnerabili+es  

14

Page 15: LTE and IMSI catcher myths

LTE  RRC  protocol*  :  specifica+on  vulnerability  

   •  Broadcast  informaMon  

ü  UE  idenMMes    ü  Network  informaMon  (SIB)  messages  ü  Neither  authenMcated  nor  encrypted      

•  UE  measurement  reports  ü  Necessary  for  smooth  handovers  ü  UE  sends  “Measurement  Report”  messages  ü  Requests  not  authenMcated:  reports  are  not  encrypted        

   *3GPP  TS  36.331  :    E-­‐UTRA;  RRC  protocol  Fig.  source:    hAp://lteuniversity.com/        

RRC  protocol  –  setup  &  manage  over-­‐the-­‐air  connec+vity!  

15

Page 16: LTE and IMSI catcher myths

LTE  RRC  protocol*  :  specifica+on  vulnerability  

   •  Broadcast  informaMon  •  UE  IdenMMes  –  IMSI,  TMSI  •  Network  informaMon  messages  (SIB)  •  Neither  authenMcated  nor  encrypted  

*3GPP  TS  36.331  :    E-­‐UTRA;  RRC  protocol  SIB  :  System  InformaMon  Blocks  

RRC  protocol  –  setup  &  manage  over-­‐the-­‐air  connec+vity!  

16

         eNodeB  

Page 17: LTE and IMSI catcher myths

EMM  protocol*  :  specifica+on  vulnerability  

 •  Tracking  Area  Update(TAU)  procedure  

ü  UE  sends  “TAU  Request”  to  noMfy  TA  ü  During  TAU,  MME  &  UE  agree  on  network  mode  ü  “TAU  Reject”  used  to  reject  some  services  services  (e.g.,  LTE  services)  to  UE  ü  However,  reject  messages  are  not  integrity  protected  

 •  LTE  AAach  procedure  

ü  UE  sends  its  network  capabiliMes  ü  Unlike  security  algorithms,  no  protecMon    ü  Network  capabiliMes  are  not  protected  against  bidding  down  aAacks      

   

EMM  protocol  -­‐  Controlling  UE  mobility  in  LTE  network!  

17

Page 18: LTE and IMSI catcher myths

Vulnerabili+es  in  baseband  chipset  

18

Page 19: LTE and IMSI catcher myths

IMEI  leak  :  implementa+on  vulnerability  

   

•  IMEI  is  leaked  by  popular  phones  

•  Triggered  by  a  special  message  

•  Fixed  now  but  sMll  your  device  leak  ;)  

•  IMEI  request  not  authenMcated  correctly  

   

   

TAU  reject  –  special  cause  number!  

19

Page 20: LTE and IMSI catcher myths

LTE  RRC*  :  implementa+on  vulnerability  

   

•  When  Radio  Link  Failure  happens  

•  Informs  base  staMon  of  RLF  

•  UE  sends  “RLF  report”  message  

•  Privacy  sensiMve  informaMon  in  RLF  report  

•  Request  not  authenMcated:  reports  are  not  encrypted    

   

   Fig.  source:    hAp://lteuniversity.com/        

RLF  reports  –  network  troubleshoo+ng!  

20

Page 21: LTE and IMSI catcher myths

LTE  RRC*  :  implementa+on  vulnerability  

   

•  For  handover  

•  Privacy  sensiMve  informaMon  in  the  report  

•  Request  not  authenMcated    

•  reports  are  not  encrypted    

   

   

Measurement  reports  –  GPS  co-­‐ordinates!  

21

Page 22: LTE and IMSI catcher myths

Network  Configura+on  Issues  

22

Page 23: LTE and IMSI catcher myths

Configura+on  issues  

Deployments  all  over  the  world!  

•  Smart  Paging  ü  Directed  onto  a  small  cell  rather  than  a  tracking  area  ü  Allows  aAacker  to  locate  LTE  subscriber  in  a  cell    

•  GUTI  persistence  ü  GUTI  change  –  handover/aAach/reallocaMon  procedure  ü  MNOs  tend  not  to  change  GUTI  sufficiently  frequently  

 •  MME  issues  

23

Page 24: LTE and IMSI catcher myths

Building  4G  fake  base  sta+on  and  aZack  demos    

Ethical  Considera+on  

24

Page 25: LTE and IMSI catcher myths

Experiment  Set-­‐up  

•  Hardware  –  USRP,  LTE  dongle,  LTE  phones  

 •  Sooware  -­‐  OpenLTE  &  srsLTE    •  ImplementaMon  –  passive,  semi-­‐

passive,  acMve  

 

 Set-­‐up  cost  -­‐  liZle  over  1000  Euro!  

25

Thanks  to  OpenLTE  and  srsLTE  folks!  

Page 26: LTE and IMSI catcher myths

Loca+on  Leak  AZacks  

 Exploit  specifica+on/implementa+on  flaws  in  RRC  protocol!      •  Passive  :  link  locaMons  over  Mme  

ü  Sniff  IMSI/GUTIs  at  a  locaMon  (e.g.,  Airport/home/office)  ü  Track  subscriber  movements  (same  GUTI    for  several  days)  

   

26

Demo  

Page 27: LTE and IMSI catcher myths

Semi-­‐Passive  :  determine  tracking  area  &  cell  ID  

•  VoLTE  calls:  Mapping  GUTIs  to  phone  number  ü  10  silent  calls  to  vicMm’s  number    ü  High  priority  à  paging  to  enMre  tracking  area(TA)  ü  Passive  sniffer  in  a  TA    

•  Social  idenMMes:  Mapping  GUTIs  to  Social  Network  IDs  ü  E.g.,  10  Facebook  messages,  whatsapp/viber    ü  Low  priority  à  Smart  paging  to  a  last  seen  cell  ü  Passive  sniffer  in  a  cell    

Demo  

27

Page 28: LTE and IMSI catcher myths

Ac+ve  :  leak  fine-­‐grained  loca+on  

Precise  loca+on  using  trilatera+on  or  GPS  !      

 •  Measurement/RLF  report  

ü  Two  rogue  eNodeBs  for  RLF  ü  eNodeB1  triggers  RL  failure:  disconnects  mobile  

ü  eNodeB2  then  requests  RLF  report  from  mobile  

     

     

28

Demo  

Page 29: LTE and IMSI catcher myths

DoS  AZacks  

Exploi+ng  specifica+on  vulnerability  in  EMM  protocol!    •  Downgrade  to  non-­‐LTE  network  services  (GSM/3G)  

•  Deny  all  services  (GSM/3G/LTE)  

•  Deny  selected  services  (block  incoming  calls)  

•  Persistent  DoS  

•  Requires  reboot/SIM  re-­‐inserMon  

 

29

Demo  

Page 30: LTE and IMSI catcher myths

Summary        •  New  vulnerabiliMes  in  LTE  standards/chipsets  

•  Social  applicaMons  used  for  silent  tracking    •  LocaMng  4G  devices  using  trialternaMon  ,  GPS  co-­‐ordinates!    •  DoS  aAacks  are  persistent  &  silent  to  users      

•  ConfiguraMon  issues  in  deployed  LTE  networks            

30

Page 31: LTE and IMSI catcher myths

Solu+on!  Use  any  old  Nokia  phone  without  baZery  and  SIM  card!        

31

Page 32: LTE and IMSI catcher myths

Impact    Specifica+on  vulnerabili+es  affect  every  LTE-­‐enabled  device!    •  ImplementaMon  issues  are  (almost)  fixed  by  baseband  chip  

manufacturers  J    

•  3GPP/GSMA  working  on  fixes  

•  However  no  updates  from  handset  manufacturers  yet  L    •  No  response  yet  from  MediaTek  &  Samsung  L    •  Mobile  network  operators  (Germany)  fixing  their  network  

configuraMon  issues;  others  may  affected  as  well  L    

32

Page 33: LTE and IMSI catcher myths

Thanks    

Ques+ons?