Introduction GSM security problems The False BTS Security beyond the Um interface
GSM Security Problems
Harald Welte
- smocom.org
hmw-consulting.de sysmocom.de
July 2013, TSC TIB, Taipei/TAIWAN
1 / 77 Harald Welte GSM Security Problems
GSM Security Problems Harald Welte osmocom.org hmw-consulting.de - - PowerPoint PPT Presentation
Introduction GSM security problems The False BTS Security beyond the Um interface GSM Security Problems Harald Welte osmocom.org hmw-consulting.de sysmocom.de July 2013, TSC TIB, Taipei/TAIWAN 1 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface
1 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
2 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
3 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
4 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
5 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
6 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
7 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
8 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
9 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
10 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
11 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Security if you are an Operator Security if you are a Subscriber Security if you are a Government The GSM network – Overview
12 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
13 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
14 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
15 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
16 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
17 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
Operator Home Location Register Base station Cell phone Random nonce and session key Random nonce encrypted with sess- ion key Communi- cation A5/1- This talk discusses a technique for extrac- ting session keys Operator and phone share a master key to de- rive session keys Hash function Random nonce Master key Session key
18 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
19 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
20 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
21 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
22 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
23 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
24 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
25 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
26 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
27 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
28 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
29 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
30 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
31 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
32 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
33 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
34 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
35 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
36 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
37 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The Baseband GSM Security – Design Flaws + Oversights Intentional Weaknesses GSM security research
38 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
39 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
40 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
41 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
42 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
43 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
The Datong series of DX products are
primarily designed to provide Law Enforcement and the Military with a comprehensive toolkit of functionality in the increasing battle against mobile communications technology. The DX series is primarily intended for
area
!"#$%&'()*+'%',-%)#.-/'+*0"&.
target mobile originated calls and 1213!
estate from injury, harm or damage where mobile communications equipment have been known to be used to remotely trigger incendiary devices.
Hardware
44 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
45 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
WHAT IS IT AND HOW DOES IT WORK?
IntelliJAM is comprised of a control unit and a mini base
signal to compel handsets within its range to lock on to it. This stronger signal forces users within the controlled coverage area to register onto the IntelliJAM network while appearing to still be on the commercial network. Based on the IntelliJAM settings, wireless phone users in the controlled coverage area will either be approved and redirected to the commercial network for normal service, or they will be denied and will be unable to place or receive calls or text messages.
Facility coverage within the mobile network
46 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
47 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
48 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
Mobile Station Network +- -+ CHANNEL REQUEST RR connection
(MO) IMMEDIATE ASSIGNMENT <-------------------------------------- +- -+ +- -+ LOCATION UPDATING REQUEST
+- -+ +- -+ AUTHENTICATION REQUEST <--------------------------------------- Authentication AUTHENTICATION RESPONSE
+- -+ +- -+ CIPHER MODE COMMAND <--------------------------------------- Ciphering mode setting CIPHER MODE COMPLETE
+- -+ +- -+ LOCATION UPDATING ACCEPT <--------------------------------------- TMSI REALLOCATION COMPLETE
+- -+ +- -+ CHANNEL RELEASE RR connection <--------------------------------------- release +- -+
49 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
50 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
51 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
52 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
53 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
54 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
55 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
56 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface Basics Examples Behavior Man-in-the-Middle
BTSGeo enables unique capabilities and supersedes the accuracy and speed provided by Artemis. Proprietary and sensitive signal processing techniques empower the user with unsurpassed geolocation capabilities.
57 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
58 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
59 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
60 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
61 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
62 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
63 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
64 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
65 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
66 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
67 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
68 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
69 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
70 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
71 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
72 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
73 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
74 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
75 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
76 / 77 Harald Welte GSM Security Problems
Introduction GSM security problems The False BTS Security beyond the Um interface The GSM network – RAN backhaul SIM card security Osmocom SIMtrace
77 / 77 Harald Welte GSM Security Problems