imp4gt
play

IMP4GT IMPersonation Attacks in 4G NeTworks David Rupprecht , - PowerPoint PPT Presentation

IMP4GT IMPersonation Attacks in 4G NeTworks David Rupprecht , Katharina Kohls, Thorsten Holz, and Christina Ppper 25.02.2020 NDSS Symposium, San Diego, USA Motivation: Internet Passes 2 LTE Security Aims Mutual Authentication Traffic


  1. IMP4GT IMPersonation Attacks in 4G NeTworks David Rupprecht , Katharina Kohls, Thorsten Holz, and Christina Pöpper 25.02.2020 NDSS Symposium, San Diego, USA

  2. Motivation: Internet Passes 2

  3. LTE Security Aims Mutual Authentication Traffic Confidentiality Identity & Location Confidentiality 3

  4. Security Features Authentication and Key Agreement Connection 4

  5. Missing Integrity Protection Control User Plane Plane Encryption stream cipher Integrity Protection 5

  6. Malleable Encryption Stream Cipher 1 0 1 0 $10 0 1 0 1 $100 1 1 1 1 Decryption Encryption 6

  7. Already Known: Redirection Can it be worse? Yes, with IMP4GT /ˈɪmpækt/ Rupprecht, D., Kohls, K., Holz, T., & Pöpper, C. “ Breaking LTE on Layer 7 Two ”. In 2019 IEEE Symposium on Security and Privacy (SP)

  8. Impersonation in 4G Networks (IMP4GT) Uplink Breaks mutual authentication Downlink in both directions. Impersonation of a network Impersonation of a user towards towards the user on the user-plane the network on the user-plane 8

  9. The Basic Principle Encryption Oracle Malleable Encryption Decryption Oracle Impersonation Reflection 9

  10. Reflection: ICMP Ping IP / ICMP (ping) / Data IP / ICMP (ping) / Data 10

  11. Uplink Encryption Oracle Keystream Target Network Generation Server UE Relay Already Open. IP / UDP / Payload IP / UDP / Payload IP / PING Request / Payload IP / PING Reply / Payload IP (target_ip) / TCP / new Payload IP (target_ip) / TCP / new Payload Encrypted on the Radio Layer 11

  12. Uplink Enc + Downlink Dec = Full Impersonation Keystream Decryption Target Network Generation Server Server UE Relay Uplink Encryption Downlink Decryption Uplink Encryption Downlink Decryption 12

  13. Experiments • Commercial network and phone • Uplink impersonation • Visit a website only accessible by a victim: pass.telekom.de • Upload a 10KB file to a server • Downlink impersonation • TCP connection towards the phone • No interaction of the user • connectivitycheck.android.com • Checks if you have an Internet connection 13

  14. Consequences Providers Law Enforcement User • Over Billing • Lawful Interception • Privacy • Authorization • Lawful Disclosure • Firewall / NAT Process • IoT 14

  15. Conclusion: We need Integrity Protection! David Rupprecht Ruhr University Bochum david.rupprecht@rub.de https://imp4gt-attacks.net • Fully specified and deployed • Optional integrity protection • Unlikely… • Limited support in early implementations We emphasize the need for mandatory integrity protection. 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend