Top Banner
1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001
45

1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

Jan 02, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

1

cdma2000 Packet DataSecurity Assessment

Christopher CarrollVerizon Wireless

April 11, 2001

Page 2: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

2

Security Issues• MN-AAAh Secret not defined

–Cryptographically strong MN-AAAh key defined

• Mobile IP Key Distribution not defined–MN-HA key and MN-FA key key

agreement defined• Radio Access Layer security not

supported–Access Terminal (AT) key defined

Page 3: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

3

Agenda• Entity vs. Message Authentication• Mobile IP Security

– Message authentication codes• AAA Recommendations

– MN-AAA Key Bootstrapping– MIP key distribution– Radio Access Layer Security

Page 4: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

4

Why Packet Data Security?

- 802.11 Flaws published!- “The Security of data transmitted on a wireless

data service was a critical adoption issue. It appears that many felt that wireless data could be more vulnerable to interception than if transmitted over a wired connection.”

Verizon Wireless Data Service Qualitative Research Report (In Focus Marketing, September 2000)

Page 5: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

5

TR-45 Challenge-Response Entity Authentication

Cell SiteCell SiteSubscriber TelephoneSubscriber Telephone

32-bit Challenge (Question)32-bit Challenge (Question)

18-bit Response (Answer)18-bit Response (Answer)SSD-ASSD-A11 SSD-ASSD-A11

Page 6: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

6

TR-45 Entity Authentication

CAVECAVEHashHash

FunctionFunction

SSD-ASSD-A

ESNESN

Dialed DigitsDialed Digits18-bit Response18-bit Response

Random ChallengeRandom Challenge

MINMIN

Page 7: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

7

Radius Entity Authentication

MD5MD5HashHash

FunctionFunction

MN-AAAh keyMN-AAAh key

NAINAI

Registration RequestRegistration Request128-bit Response128-bit Response

Random ChallengeRandom Challenge

MN-HA Auth. Ext.MN-HA Auth. Ext.

Page 8: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

8

Pseudo-random Number Generator

MD5MD5

MN-AAAh KeyMN-AAAh Key11

MN-AAAh KeyMN-AAAh Key22

MN-AAAh KeyMN-AAAh Key33

MN-AAAh KeyMN-AAAh Keynn

010110100 . . . .010110100 . . . .

001010001 . . . .001010001 . . . .

110010110 . . . .110010110 . . . .

101011000 . . . .101011000 . . . .

Page 9: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

9

Radius Authentication

Secret ResponseSecret Response

LibraryLibrary

BookBook

Page/ wordPage/ word

MD5MD5

MN-AAAh KeyMN-AAAh Key

ChallengeChallenge

Page 10: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

10

Mobile IP Message Authentication

HashHashFunctionFunction

(MD5)(MD5)

““Send packets Send packets To IP address:To IP address:123.197.8.17”123.197.8.17”

128-bit MAC128-bit MAC

Secret KeySecret Key

Page 11: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

11

Entity vs. Message

AuthenticationEntity:• Verify identity of an

entity• Prove shared secret• Vulnerable to Replay

attack• CHAP, MN-AAA

Authentication Ext.

Message:• Prevent manipulation

of message• Prove message sent

from entity• Vulnerable to Replay

attack• MIP Authenticator

Page 12: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

12

Preventing Replay Attack(between MN and HA)

HashHashFunctionFunction(Keyed(KeyedMD5)MD5)

Registration RequestRegistration RequestMessageMessage

128-bit MAC128-bit MACMN-HA KeyMN-HA Key

FreshnessFreshness(Randomness (Randomness and/or nonce)and/or nonce)

Identification FieldIdentification Field

Page 13: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

13

Challenge Extension

• Allows FA/PDSN or AAA server to authenticate the MN

• 32-bit (at least) Random Challenge issued by FA/PDSN in Agent Advertisement.

• MN includes Challenge before MN-AAA authentication Ext.

• Leverage randomness to generate MN-HA and MN-FA keys

Page 14: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

14

Preventing Replay Attack(between MN and FA/PDSN)

HashHashFunctionFunction(Keyed(KeyedMD5)MD5)

Registration RequestRegistration RequestMessageMessage

128-bit MAC128-bit MAC(may be reduced(may be reducedIn length)In length)

MN-FA KeyMN-FA Key

FreshnessFreshness(Randomness (Randomness and/or nonce)and/or nonce)

Identification FieldIdentification Field

Challenge Ext.Challenge Ext.32-bit Randomness32-bit Randomness

Page 15: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

15

AAA Authentication Extension

MN HAFA

PDSN

Registration RequestNAI

Extension

Mobile-HomeAuthentication

Extension

MN-FAChallengeExtension

MN-AAAAuthentication

Extension

AAAh

Mobile-Home Authenticator

MN-AAA Authenticator

Page 16: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

16

Mobile IPv4 using Radius AAA

AAAH

MN

AAAL

HAFA

Agent AdvertisementChallenge Extension

VerifyMN-AAAAuthenticator(CHAP)

Registration RequestNAI Extension

Mobile-Home Authentication Ext.Challenge Extension

MN-AAA Authentication Extension

Registration RequestNAI

Challenge ExtensionMN-AAA Authentication Extension

(CHAP Response)

Registration RequestNAI Extension

Mobile-Home Authentication Ext.Foreign-Home Authentication Ext. (optional)

Access Accept

VerifyMobile-Home and/orForeign-HomeAuthenticator

MN-AAA Auth. Ext. (CHAP Response)Challenge Extension

Page 17: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

17

Password Cracking Attack

Secret ResponseSecret Response

LibraryLibrary

BookBook

Page/ wordPage/ word

MD5MD5

UNIXUNIXPasswordPassword

ChallengeChallenge

Size of Library (Secret Space) significantly reduced Size of Library (Secret Space) significantly reduced by user-selected Books (secrets).by user-selected Books (secrets).

Page 18: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

18

1xEV Password Cracking

MN FA

Agent AdvertisementChallenge Extension

Registration RequestMN-AAA AuthenticatorMN-HA Authenticator

Intercepts Challenge, Authenticator, andOther Registration info.Password Cracking Attack:1) Dictionary2) Brute Force Exhaustive Search

Hacker

Page 19: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

19

MN-AAAh Key

• Shared secret between MN and AAAh must be cryptographically strong.

• MN-AAAh key field must be 128-bits long.

• MN-AAAh key must be at least 90-bits long.

• MN-AAAh key shall not be shared with the HA or any FA.

Page 20: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

20

Internet Password Cracking

FA HA

Registration ResponseMN-HA Authenticator

Registration RequestMN-HA Authenticator

Intercepts Challenge, Authenticator, andOther Registration info.Password Cracking Attack:1) Dictionary2) Brute Force Exhaustive Search

IP PacketSniffer

Page 21: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

21

MN-HA Key

• Shared secret between MN and HA must be cryptographically strong.

• MN-HA key field must be 128-bits long.

• MN-HA key must be at least 90-bits long.

• MN-HA key may be derived from the MN-AAAh key using a one-way function.

• MN-HA must protect the Registration Request message.

Page 22: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

22

MN-FA Key• Currently optional in 1xEV.• Use MN-FA key to establish Radio Access Layer

SAs.• Shared secret between MN and FA must be

cryptographically strong.• MN-FA key field must be 128-bits long.• MN-FA key must be at least 90-bits long.• MN-FA key may be derived from the MN-AAAh

key using a one-way function.• MN-FA key can be used to generate Access

Terminal (AT) key.

Page 23: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

23

Mobile IPv4 Security

• Message Authentication Only– Provided by Security Associations (SA)

• Mobile-Home Authentication Extension– Mobile-Home Secret Key

• Mobile-Foreign Authentication Extension– Mobile-Foreign Secret Key

• Foreign-Home Authentication Extension– Foreign-Home Secret Key

• Only Manual Key Distribution mandatory• Optional – DH, RSA, Secret key distribution• No Encryption / Privacy• IS-835 supplemented with IPsec (no end-to-end

privacy)

Page 24: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

24

MIP Bootstrapping Problem

• IS-835 AAA doesn’t have defined scalable MN-AAAh / MN-HA key distribution process!

• Initial key distribution (Bootstrap) common problem for any security system.

• 3GPP2/TR-45 can’t let history repeat – CAVE A-key distribution problem.

• WWW download, manufacturer pre-load/EDI, smart cards, OTASP, Manual.

Page 25: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

25

Multi-layer Encryption

BANK

AES 128-bit Stream Cipher

SSL 128-bit IDEA Encryption

IPsec 112-bit Triple DES Encryption

ATFA

PDSNMN

1xEV DOBS

HAPDSN

Page 26: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

26

DIAMETER MN-FA Key Distribution

AAAh

MN

AAAL

HAFA

(MN-FA key) AAAh-MN Encrypted

Generate MN-FA keyEncrypt with AAAh-FA keyEncrypt with AAAh-MN key

(MN-FA key) AAAh-FA Encrypted(MN-FA key) AAAh-MN Encrypted

(MN-FA key) AAAh-FA Encrypted(MN-FA key) AAAh-MN Encrypted

Page 27: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

27

Diameter MIP Key Distribution Problems

• MIP key is transmitted over-the-air– vulnerable to cryptanalysis

• Additional key management (AAAh-FA secret)

• Inefficient - AAAh encrypts MIP key twice• Redundant – AAA to PDSN interface will be

protected• Slow – MN must register before MN-FA key

delivered.

Page 28: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

28

AAAh

Diameter Problem #1 (Rogue FA)(IETF-AAA Registration Keys for Mobile IP)

PDSNMN

MN Encryption Pad == MD5 (MN-AAAh secret, MN Home IP, MN-AAAh secret)

PDSN recovers MN Encryption Pad using the following technique:

MN Encryption Pad == MN-FA key XOR (MN-FA key XOR MN Encryption Pad

Assuming that MN Home IP Address remains constant

PDSN can recover MN-FA key used with other FAs.

Page 29: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

29

Diameter Problem #2 (Fixed Mask)

PDSNMN

MN Encryption Pad == MD5 (MN-AAAh secret, MN Home IP, MN-AAAh secret)PDSN sends MN-FA key XOR MN Encryption Pad

Attacker combines MN-FA Update #1 with #2:Delta MN-FA key == ((MN-FA key #1 XOR MN Encryption Pad) XOR (MN-FA key #2XOR MN Encryption Pad))

Assuming that MN Home IP Address remains constant

Password protects Mask - Possible cryptanalysis of MN-FA Authentication

Page 30: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

30

AAA Registration Keys for Mobile IP Enhancement

MN-HA key == MD5 (MN-AAAh key, NAI, HA IP address, Randomness)

MN-FA key == MD5 (MN-AAAh key, NAI, FA IP address, Randomness)

Assuming that MIP Keys are derived from root MN-AAAh key

Deliver Randomness in Unsolicited MN-FA or MN-HAKey From AAA Subtype (instead of encrypted key)Delivery keys to FA or HA in MIP Key Attribute.

Lifetime

AAA SPI

FA or HA SPI

MN-FA or MN-HA key Randomness

Page 31: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

31

Proposed1xEV MIP Cryptographic Key

Hierarchy MN-AAAh Key

MN-FA Key MN-HA Key

128-bits 128-bits

128-bits

Root Secret key

• Bootstrap MN-AAAh key• MN-HA key = MD5 (MN-AAAh key || MN NAI || HA IP address || Challenge)• MN-HA key = MD5 (MN-AAAh key || MN NAI || FA IP address || Challenge)

FA-HA Key

Page 32: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

32

Simple, Efficient, and SecureMIP Key Agreement

• MN-HA or MN-FA key are not exposed to the Air Interface

• Over-the-Air cryptanalysis precluded• Based on GSM, TR-45, 3GPP, and 3GPP2

key agreement techniques – proven key distribution method.

• No additional Air Interface Overhead• MIP key generation within MN and AAAh

independently• Vendor Specific MIP Key Attribute enables

network delivery to HA or FA

Page 33: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

33

MN-FA Key Agreement

AAAh

MN

AAAL

HAFA

MN-FA key generated basedon Challenge and MN-AAAh key.

Generate MN-FA keyBased on Challenge and MN-AAAh key.Include in MIP Key Attribute

Access Accept(MN-FA key) MIP Key Attribute

Access Accept(MN-FA key) MIP Key Attribute

Challenge Extension

Page 34: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

34

MN-HA Key Agreement

AAAh

MN HA

MN-HA key generated basedon Challenge and MN-AAAh key.

Generate MN-HA keyBased on Challenge and MN-AAAh key.Include in MIP Key Attribute

Access Accept(MN-HA key) MIP Key Attribute

Directed Agent AdvertisementChallenge Extension

(MN-HA key) MIP Key Attribute

Page 35: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

35

“Directed” Agent Advertisement• Preference to assign Reserved bit in Agent

Advertisement as “MN-HA Update” bit.• IETF approval could take years.• Alternative – use MN Home IP address as the

Agent Advertisement Destination Address (or globally defined IP address).

• Agent Advertisement currently uses “all systems on this link” or “limited broadcast” as destination address.

• MN-HA key only updated when MN directed by HA.

Page 36: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

36

MN-AAAh Key

FTCAuthKey

MN-HA Key

128-bits 128-bits

128-bits

Packet DataRoot

Secret key

MN-FA Key

A-key / NIAHash

1xRTTOTASP or

AAA Update

ManufacturerPreload

AT key

RTCEncKey

FTCEncKey

RTCAuthKey

1xEV DOAccess Layer

EncryptionAnd

Integrity keys

MIP Layer keys

WWWDownload

1xEV Cryptographic Key Hierarchy

Page 37: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

37

1xEV DO MIM Attack

MN PDSN

D-H Key Exchange

MIM UATI

Registration Request (NAI)

Session Hijack - Packet Injection

MIM Device

UATI

FALSEPDSN

FALSEMN

D-H Key Exchange

MIM UATI UATI

Packet Injection and/or Information Extraction

Page 38: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

38

Access Terminal (AT) Key

• Protects the MN-HA or MN-FA key from disclosure to Rogue AT.

• Enables Access Layer Privacy and Message Authentication.

• Shared secret between AT and RAN must be cryptographically strong.

• AT key field must be 128-bits long.

• AT key = MD5 (MN-HA key || UATI).

• AT key = MD5 (MN-FA key || UATI).

Page 39: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

39

AT Key Generation

MN PDSN

Relay ModeMobile Station

AT

AT Key

UATIUATI

Laptop PC

MN-FA Key

MN-FA Key

Foreign Agent

UATI

AT Key

AT Key

AT Key

Page 40: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

40

GSM SIM vs. cdma2000 MN

UIM HLR/ACMS

A5 Encryption Key

Smart Card (computer)Authentication Algorithm

Key Generation

Air Interface

BS

A5 Encryption Key

Authentication AlgorithmKey Generation

MNRadiusAAA

MS/AT

AT Key

Laptop computerAuthentication Algorithm

Key Generation

Air Interface

1xEV DOBS

AT Key

Authentication AlgorithmKey Generation

AT Key

AT Key

A5 Key

A5 Key

Page 41: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

41

MN

BlueToothAT

1xEV DO UATI

802.11AT

1xEV DOAT

802.11 Radio Access Layer ID

Bluetooth RadioAccess Layer ID

AT Key AT Key AT Key

AT Key Transfer

Page 42: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

42

Preventing MIM in 1xEV DO

MN PDSN

D-H Key Exchange

MIM UATI

Registration Request (NAI)

Session Hijack - Packet InjectionImproper MAC

MIM Device

UATI

FALSEPDSN

FALSEMN

D-H Key Exchange

MIM UATI UATI

Packet Injection and/or Information Extraction

Improper MAC

Packet MACFails check –

discarded

Packet MACFails check –

discarded

Page 43: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

43

MN HA

RANRadiusAAA

RadiusAAAh

IP Layer Radius Authentication Secret

Access Layer RadiusAuthenticationSecret

AT PDSN

RadiusAAAL

RAN

Redundant AAA Servers

Page 44: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

44

Simple IP

• Define MN-AAAh secret as a cryptographically strong secret (e.g., MN-AAAh key).

• MN-AAAh key must be at least 90-bits long.

• RFC 1750 guidelines.

Page 45: 1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.

45

1xEV Security Solutions• MN-AAAh Secret defined

–Cryptographically strong MN-AAAh key defined

• Mobile IP Key Distribution defined

–MN-HA key and MN-FA key key agreement defined

• Radio Access Layer security supported

–Access Terminal (AT) key defined