1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J....

52
1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell

Transcript of 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J....

Page 1: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

1

Using GSM/UMTS forSingle Sign-On

28th October 2003SympoTIC 2003

Andreas Pashalidis and Chris J. Mitchell

Page 2: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

2

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 3: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

3

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 4: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

4

Why do we need SSO ?Current Situation:

Network users interact with multiple service providers.

Page 5: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

5

Why do we need SSO ?Problems:

Usability, security, privacy…

Page 6: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

6

What is SSO ?

A mechanism that allows users to authenticate themselves to

multiple service providers, using only one identity.

Page 7: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

7

SSO – How ?Establish trust relationships, common security

infrastructure (e.g. PKI), sign contractual agreements…

Page 8: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

8

SSO – some examples Kerberos

TTP = Kerberos server 1) Authenticates user (password), issues “ticket”. 2) User shows ticket to service provider.

Microsoft Passport TTP = www.passport.com 1) Authenticates user (password), installs encrypted cookie. 2) Service Provider reads the cookie.

Liberty Alliance TTP = “Identity Provider” 1) Authenticates user, issues “assertion” (XML). 2) Assertion is shown to service provider.

Page 9: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

9

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 10: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

10

Review of GSM Security

Page 11: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

11

Review of GSM Security

Page 12: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

12

Review of GSM Security

Page 13: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

13

Review of GSM Security

Page 14: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

14

Review of GSM Security

Page 15: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

15

Review of GSM Security

Page 16: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

16

Review of GSM Security

Page 17: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

17

Review of GSM Security

Page 18: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

18

Review of GSM Security

Page 19: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

19

Review of GSM Security

Encrypted under Kc

If the visited network can decrypt, then the SIM is authentic (IMSI matches Ki)

Page 20: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

20

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 21: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

21

Architecture - before

Page 22: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

22

Architecture – after (1)

Page 23: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

23

Architecture – after (2)

Page 24: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

24

Architecture

Page 25: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

25

Architecture

Service providers form trust relationships with the home

network.

Page 26: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

26

Architecture

Singe Sign-On using SIM (IMSI) !

Page 27: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

27

SSO Protocol

Page 28: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

28

SSO Protocol

Page 29: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

29

SSO Protocol

Page 30: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

30

SSO Protocol

Page 31: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

31

SSO Protocol

Page 32: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

32

SSO Protocol

Page 33: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

33

SSO Protocol

Page 34: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

34

SSO Protocol

Page 35: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

35

SSO Protocol

Page 36: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

36

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 37: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

37

Replay Attack

Attacker could capture this

message and replay it later in

order to impersonate the user identified

by the IMSI.

Page 38: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

38

Replay Attack

At the time of replay another

RAND will be selected by the service provider and the protocol

will fail.

fresh !

old ! X

Page 39: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

39

Reflection Attack

The service provider SP “A” is malicious.

It wants to impersonate the user to SP “B”.

Page 40: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

40

Reflection Attack

Page 41: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

41

Reflection Attack

Page 42: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

42

Reflection Attack

Page 43: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

43

Reflection Attack

Page 44: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

44

Reflection Attack

Page 45: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

45

Reflection Attack

Page 46: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

46

Reflection Attack

X

Page 47: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

47

Other AttacksSIM theft / cloning SIM PIN is optional! Need two-factor user authentication.

Home network server is SPoF Vulnerable to DoS attack. It is assumed that it is well-protected.

Attacks on the SP-home network link Link must be integrity-protected and encrypted. SSL/TLS, VPN, IPSec, etc…

Page 48: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

48

Agenda

Introduction to SSO. Review of GSM security. How to SSO using GSM. Some Attacks. Conclusions.

Page 49: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

49

Advantages

Page 50: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

50

Disadvantages

Page 51: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

51

Extension for UMTS

Page 52: 1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.

52

Thanks!Questions?