Top Banner
Security in GPRS Cryptology Presentation Pehme Taavi Rey Charles Technolac, February 2008
31

Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Mar 25, 2018

Download

Documents

ledieu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security in GPRS

Cryptology Presentation

Pehme Taavi Rey Charles

Technolac, February 2008

Page 2: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

What you will hear ...

Architecture of GPRS systems

User authentication

Ciphering

Inter working with other GPRS networks

Inter working with packet data network

Basic security threats for GPRS

Solutions for security threats

Page 3: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS - security issues

1. Security aspect related to the mobile phone and the SIM card. 2. Security mechanics between the MS and the SGSN

Page 4: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

3. The PLMNs between SGSN and GGSN. subscriber information - HLR

4. Security between different operators. 5. Security between GGSN and the external connected networks, like Internet.

GPRS - security issues

Page 5: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS system

Page 6: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS system

MS - Mobile StationClasses A, B, C

BSS – Base Station System Base Transceiver Station(BTS)- send and receive information Base Station Controller (BSC)- controls a group of BTS

HLR – Home Location Register - subscription information

VLR – Visitor Location Register - MSs that are currently located in the SGSN routing area

Page 7: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS system

SGSN – Serving GPRS Support Node -

Ciphering and authentication, registration Session management Mobility management

Logical link management towards the MS

Statistics collection

Page 8: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS system

GGSN - Gateway GPRS Support Node

Communication setup towards external network. Functionality for associating the subscribers to the right SGSN.Output of billing data.

BG – Border Gateway - SGSN and GGSN can be located in different PLMNs - connection via BG - Roaming

Page 9: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

GPRS system

EIR – Equipment Identity RegisterList of stolen phones

AuC – Authentication Center - information for identifying authorized users - may be a physical part of HLR

LIN - Lawful Interception Node - collect information about some pre-defined subscriber or subscribers (location)

GPRS backbone networks - IP-based networks. intra-operator- connect to single operator’s GSMinter-operator - connects GPRS operators, international GPRS roaming.

Page 10: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

User authentication

Ki - Individual Subscriber Authentication Key 128 bits stored on SIM and HLR

Algorithm used - A3

Authentication tripletRAND: random number between 0 and 2128-1

SRES: signed response which is result of the A3 algorithm used for subscriber authentication

Kc: Ciphering key which computed using the A8 algorithm and it is used by the GPRS Encryption Algorithm (GEA)

Page 11: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

User authentication

Page 12: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

User authentication

Page 13: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Ciphering

Communication on cyphered from SGSN to MS

Ciphering method is GPRS Encryption Algorithm (GEA)

Ciphering key - Kc 64 bits

When using GSM and GPRS - two different keys

Key is set by the authentication procedure (calculated from RAND) and can be reset as operator wishes it

LLC - Logical Link Control - protocol to maintain communication channel between a MS station and the GPRS core network.

Page 14: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Ciphering

Page 15: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Ciphering

NPUT - the sequence number of the LLC packet, its initial value is selected by the network

DIRECTION - MS -> network network -> MS

Page 16: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Secure inter working between GPRS networks

Page 17: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Inter working between GPRS networks

This is what supports roaming

Connects two inter-operator GGSN

The link - internet(1) or dedicated link(2) - QoS

All data and signaling via BG

Page 18: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Inter working with IP Networks

Support IPv4 and IPv6 protocolsAcces to Internet or IntranetFrom external - seen as simple routersCommunication between GGSN and IP nw operator

Firewall is configured by the GPRS operatorDNS managed by the GPRS or IP nw operatorGGSN may allocate dynamic addresses by itself or use an DHCP operated by IP nw operator

Page 19: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Inter working with IP networks Transparent access to Internet

MS receives an IP address from operators address space

This address can be static or dynamic

MS does NOT send any authentication information for activating IP context

GGSN does not participate in authorization or encryption

SO - authentication and encryption are left for an additional protocol like IPSec

Page 20: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Inter working with IP networks Non-transparent access to Internet

MS receives an address, either static or dynamic from the address space of ISP

MS transmits an authentication request at IP context activation

GGSN requests user authentication from the same server as the IP address was acquired

GPRS and ISP can connect over every network

Unsecure nw (Internet) - dedicated link or a special secured tunnel - (IPSec)

Page 21: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security threats - Availability (DoS)

Border Gateway (BG) bandwidth saturation - Connect to a roaming context (GRX) and generate traffic to block roaming

DNS Flood - Generate traffic on DNS servers to deny subscribers to locate the GGSN to connect external nw

Flood the connection between SGSN and GGSN to deny the access to external network

Removing the GPRS tunnel between SGSN and GGSN by creating IP context delete message (need special information)

Page 22: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security threats - Availability (DoS) 2

Bad Routing Information - Injecting info into GRX operators’ route tables - causes losing routes for roaming partners and denying access to roaming partners

DNS Cache Poisoning - Forging DNS queries as users would not be able to find a GGSN to access ext. nw.

Flooding an MS – Flooding the traffic of a IP address of aparticular MS, so that the MS will most likely be unable to use the GPRS network at all

Page 23: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security threats - Authent. & Author.

Spoofed Create IP Context Request - somebody with an access to the GRX can create their own bogus SGSN and create a GTP tunnel to the GGSN pretending to be a subscriber

Spoofed Update PDP Context Request - Using acompromised SGSN to hijack the subscriber data connection with update request

"Overbilling Attacks" - Hijacking an IP, starting a malicious download, exiting the session -> The subscriber gets billed

Page 24: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security threats - internal network

The attacker who has disguise as a member of the network can attack while undetected till the damage is done

Can remove the tunnel between SGSN and GGSN

Can learn some information

Once disguised, execute "Over billing" attacks on innocent users.

Page 25: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solutions - firewall

We protect the operators network from any outside accessNo unwanted data for MS'sNo attacks against MS's

Page 26: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solutions - firewall (2)

We shouldn't trust another MS who is connected to the same GGSN!

Page 27: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solutions - firewall - APN

MS belongs to a certain APN (Access Point Names)

By default the one of the provider

Cell phones have: WAP APN and WEB APN

But still - other devices like SGSN are not protected

Page 28: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solutions - firewall

Use a design where all the network interfaces are separated

Page 29: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solutions - VPN

End-to-end VPN - provides best security for the customer but denies the LEA to gather the information

Only between GGSN and Corporate Internet - better for LEA but needs extra security for MS -> GGSN

Page 30: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

Security solution - IPSec

Intranet protocol - offers encryption and authentication

Ensure secure communication over insecure networks

2 operations modes :

Transport mode - Only the data is encrypted

Tunnel mode - Entire IP Packet is encrypted

Page 31: Security in GPRS - univ-smb.fr · PDF fileSecurity in GPRS Cryptology ... communication channel between a MS station and the GPRS core network. Ciphering. ... use the GPRS network

References

GPRS security Ksenia Orman

Geir Stian Bjan and Erling Kaasin. Security in GPRS,Master thesis, 2001http://student.grm.hia.no/master/ikt01/ikt6400/ekaasin/

GPRS Security Threats and SolutionRecommendationsAlan Bavosa