gsm debugging
play

GSM Debugging Karsten Nohl, nohl@srlabs.de Karsten Nohl, - PowerPoint PPT Presentation

GSM Debugging Karsten Nohl, nohl@srlabs.de Karsten Nohl, nohl@srlabs.de Dieter Spaar, spaar@mirider.augusta.de Dieter Spaar, spaar@mirider.augusta.de Industry responds to GSM cracking attempts by creating new challenges the GSM call has


  1. GSM Debugging Karsten Nohl, nohl@srlabs.de Karsten Nohl, nohl@srlabs.de Dieter Spaar, spaar@mirider.augusta.de Dieter Spaar, spaar@mirider.augusta.de

  2. Industry responds to GSM cracking attempts by creating new challenges “ the GSM call has to be identified and recorded from the radio interface. [] we strongly suspect the team developing the intercept approach has underestimated its practical complexity . A hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data. ” – GSMA, Aug. ‘ 09 This talk demonstrates signal processing software to decode GSM uplink and downlink signals Source: GSMA press statement

  3. Agenda  GSM communication basics  Downlink sniffing: It works!  Uplink sniffing: Getting close

  4. GSM calls are transmitted encrypted over unpredictable frequencies Down- link Phone, Ok, Beacon Uplink are you switch channel channel here? Yes, Encrypted I am You are Switch to Control Start being hopping encryp- channel called channels tion OK OK Unpredictable Traffic Voice Voice hopping channel Voice Voice Voice Voice Voice Voice

  5. GSM spectrum is divided by operators and cells GSM 900 Operator One cell Channels of brand allocation allocation one call 960 MHz Downlink Cell allocations an hopping sequences 925 MHz should be spread over the available 915 MHz spectrum for noise resistance and increased sniffing Uplink efforts 880 MHz

  6. GSM debugging tools have vastly different sepctrum coverage Frequency coverage GSM debugging tools [sniffing bandwidth] GSM 900 Channels of OsmocomBB USRP-1 USRP-2 Commercial band one call [200 kHz] [8MHz] [20MHz] FPGA board [50 MHz] Downlink Uplink Focus of this talk

  7. Agenda  GSM communication basics  Downlink sniffing: It works!  Uplink sniffing: Getting close

  8. Demo: Downlink sniffing.

  9. Open source components fit together in debugging GSM calls GnuRadio Airprobe Kraken Airprobe records data parses con- cracks A5/1 decodes from air trol data key voice Requires Requires  Software radio, ie. USRP  2TB of rainbow tables  Recommended for uplink:  CPU or ATI graphics card  SSD/RAID for fast cracking BURX board 8

  10. Agenda  GSM communication basics  Downlink sniffing: It works!  Uplink sniffing: Getting close

  11. Downstream can be recorded from large distances • Uplink is 10-30dB weaker than downlink • Handset is typically in a much less “radio visible” position Downlink recor- ding range: 5 – 35km Uplink recor- ding range: 100-300m 10

  12. Uplink sniffing is a challenging RF problem Uplink complications  Lower sending power strength than downlink Weaker signal  Phones are hidden in buildings or in street gutter with higher  The phone varies its send variability power to save on battery  Phone might move causing varying signal strength

  13. USRP+Airprobe provide the base for an open source uplink sniffer Sniffed with USRP-1 and two daughter- boards for uplink / downlink

  14. Demo: Uplink sniffing.

  15. Engineering challenges remain towards reliable uplink sniffing  Synchronization between uplink and downlink in Airprobe is not yet reliable (work in progress)  Planned enhancements: 1. Better demodulation algorithm 2. Support for hopping channels  There is plenty to do — Your chance to start contributing to the growing pool of GSM tools!

  16. Demo: Key cracking.

  17. Randomized padding would mitigate attack potential Trace of SDCCH downlink 238530 03 20 0d 06 35 11 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238581 03 42 45 13 05 1e 02 ea 81 5c 08 11 80 94 03 98 93 92 69 81 2b 2b 2b 238613 00 00 03 03 49 06 1d 9f 6d 18 10 80 00 00 00 00 00 00 00 00 00 00 00 238632 01 61 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238683 01 81 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238715 00 00 03 03 49 06 06 70 00 00 00 00 00 04 15 50 10 00 00 00 00 0a a8 238734 03 84 21 06 2e 0d 02 d5 00 63 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 238785 03 03 01 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b 2b Randomization was specified in Padding in GSM Every byte of randomized 2008 (TS44.006) and should be has traditionally padding increasing attack implemented with high priority been predictable cost by two orders of Additionally needed: randomi- (2B) magnitude! zation of system information msg. 16

  18. Open research into GSM security grows exponentially and so will the attacks $YOUR_PROJECT OsmoconBB: phone firmware HLR tracking of phone users GSM Security Project: A5/1 decrypt tool OpenBSC: Controller for base stations OpenBTS: Full base station emulation CryptoPhone et al.: End-to-end encryption on phones 2006 ‘ 07 ‘ 08 ‘ 09 ‘ 10 ‘ 11 ‘ 12

  19. Questions? GSM project supported by Airprobe, Kraken srlabs.de Karsten Nohl nohl@srlabs.de Dieter Spaar spaar@mirider.augusta.de

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend