LTE and IMSI catcher myths

33
LTE and IMSI catcher myths Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, ValAeri Niemi, JeanPierre Seifert Blackhat EU, Amsterdam, Netherlands 13 November 2015

Transcript of LTE and IMSI catcher myths

Page 1: LTE and IMSI catcher myths

LTE  and  IMSI  catcher  myths  

 Ravishankar  Borgaonkar,  Altaf  Shaik,  N.  Asokan,  ValAeri  Niemi,  Jean-­‐Pierre  Seifert    Blackhat  EU,  Amsterdam,  Netherlands    13  November  2015  

     

Page 2: LTE and IMSI catcher myths

Outline  

•  Fake  base  staMons  in  GSM/3G  

•  LTE/4G  Security  

•  Types  of  vulnerabiliMes  in  pracMce        

•  Building  LTE/4G  base  staMon  

•  AAacking  methods/demos  

•  Impact  &  Analysis      

2

Page 3: LTE and IMSI catcher myths

Mo+va+on  

•  Baseband  story  

•  PlaTorm  for  pracMcal  security  research  in  LTE/4G  

•  AAacking  cost  VS  security  measures  (defined  in  15  years  back)    

   

3

Page 4: LTE and IMSI catcher myths

Fake  base-­‐sta+ons..1  

•  Used  for:  IMSI/IMEI/locaMon  tracking,  call  &  data  intercepMon  

 •  Exploit  weaknesses  in  GSM  &  3G  networks  

(parMally)  

•  Knows  as  IMSI  Catchers  

•  Difficult  to  detect  on  normal  phones  (Darshak,  Cryptophone  or  Snoopsnitch)  

4

Page 5: LTE and IMSI catcher myths

Fake  base-­‐sta+ons..2  

5

Page 6: LTE and IMSI catcher myths

Why  in  GSM  &  3G  

•  GSM  -­‐  lack  of  mutual  authenMcaMon  between  base  staMon  and  mobiles  

 •  3G  –  no  integrity  protecMon  like  in  LTE,  

downgrade  aAacks    •  GSM/3G  –  power  is  to  base  staMon,  decides  

when  and  how  to  authenMcate/encrypt  

•  IMSI/IMEI  can  be  requested  any  Mme  

6

Page 7: LTE and IMSI catcher myths

LTE/4G  networks  

•  Widely  deployed,  1.37  billion  users  at  the  end  of  2015  

 •  Support  for  VoLTE      •  High  speed  data  connecMon  and  quality  of  service    •  More  secure  than  previous  generaMons  

•  Best  effort  to  avoid  previous  mistakes  

7

Page 8: LTE and IMSI catcher myths

LTE  Architecture  

8

E-UTRAN

eNodeB UE

Cell

S1

Tracking Area

MME AS

Internet  

NAS

AS  :  Access  Stratum      UE:  User  Equipment    NAS  :  Non-­‐Access  Stratum        S1  :  Interface  E-­‐UTRAN:    Evolved  Universal  Terrestrial  Access  Network  MME  :  Mobility  Management  EnMty  

Page 9: LTE and IMSI catcher myths

Enhanced  security  in  LTE  

 •  Mutual  authenMcaMon  between  base  staMon  &  mobiles  

•  Mandatory  integrity  protecMon  for  signaling  messages      •  Extended  AKA  &  key  hierarchy    •  Security  algorithms      •  Other  features  (not  relevant  for  this  talk)      

9

Page 10: LTE and IMSI catcher myths

Paging  in  LTE  

10

Page 11: LTE and IMSI catcher myths

Paging  in  LTE  

11

Paging Request Type 2"

{404220522xxxxxx : A000FFFF }"

IMSI = 404220522xxxxxx"

TMSI = A000FFFF" eNodeB"

Page 12: LTE and IMSI catcher myths

LTE  Smart  Paging  

12

Cell  1  Cell  5   Cell  4  

 Cell  3  

Cell  2  

Tracking  Area  

Page 13: LTE and IMSI catcher myths

Enhanced  security  w.r.t  fake  base  sta+on  

 •  Mutual  authenMcaMon  between  base  staMon  &  mobiles  

•  Mandatory  integrity  protecMon  for  signaling  messages      •  IMEI  is  not  given  in  non-­‐integrity  messages  

•  Complexity  in  building  LTE  fake  base  staMon*  

•  But  in  pracMce:  ü implementaMons  flaws,  specificaMon/protocol  deficiencies?  

   

13

*  hAps://insidersurveillance.com/rayzone-­‐piranha-­‐lte-­‐imsi-­‐catcher/      

Page 14: LTE and IMSI catcher myths

Specifica+on  Vulnerabili+es  

14

Page 15: LTE and IMSI catcher myths

LTE  RRC  protocol*  :  specifica+on  vulnerability  

   •  Broadcast  informaMon  

ü  UE  idenMMes    ü  Network  informaMon  (SIB)  messages  ü  Neither  authenMcated  nor  encrypted      

•  UE  measurement  reports  ü  Necessary  for  smooth  handovers  ü  UE  sends  “Measurement  Report”  messages  ü  Requests  not  authenMcated:  reports  are  not  encrypted        

   *3GPP  TS  36.331  :    E-­‐UTRA;  RRC  protocol  Fig.  source:    hAp://lteuniversity.com/        

RRC  protocol  –  setup  &  manage  over-­‐the-­‐air  connec+vity!  

15

Page 16: LTE and IMSI catcher myths

LTE  RRC  protocol*  :  specifica+on  vulnerability  

   •  Broadcast  informaMon  •  UE  IdenMMes  –  IMSI,  TMSI  •  Network  informaMon  messages  (SIB)  •  Neither  authenMcated  nor  encrypted  

*3GPP  TS  36.331  :    E-­‐UTRA;  RRC  protocol  SIB  :  System  InformaMon  Blocks  

RRC  protocol  –  setup  &  manage  over-­‐the-­‐air  connec+vity!  

16

         eNodeB  

Page 17: LTE and IMSI catcher myths

EMM  protocol*  :  specifica+on  vulnerability  

 •  Tracking  Area  Update(TAU)  procedure  

ü  UE  sends  “TAU  Request”  to  noMfy  TA  ü  During  TAU,  MME  &  UE  agree  on  network  mode  ü  “TAU  Reject”  used  to  reject  some  services  services  (e.g.,  LTE  services)  to  UE  ü  However,  reject  messages  are  not  integrity  protected  

 •  LTE  AAach  procedure  

ü  UE  sends  its  network  capabiliMes  ü  Unlike  security  algorithms,  no  protecMon    ü  Network  capabiliMes  are  not  protected  against  bidding  down  aAacks      

   

EMM  protocol  -­‐  Controlling  UE  mobility  in  LTE  network!  

17

Page 18: LTE and IMSI catcher myths

Vulnerabili+es  in  baseband  chipset  

18

Page 19: LTE and IMSI catcher myths

IMEI  leak  :  implementa+on  vulnerability  

   

•  IMEI  is  leaked  by  popular  phones  

•  Triggered  by  a  special  message  

•  Fixed  now  but  sMll  your  device  leak  ;)  

•  IMEI  request  not  authenMcated  correctly  

   

   

TAU  reject  –  special  cause  number!  

19

Page 20: LTE and IMSI catcher myths

LTE  RRC*  :  implementa+on  vulnerability  

   

•  When  Radio  Link  Failure  happens  

•  Informs  base  staMon  of  RLF  

•  UE  sends  “RLF  report”  message  

•  Privacy  sensiMve  informaMon  in  RLF  report  

•  Request  not  authenMcated:  reports  are  not  encrypted    

   

   Fig.  source:    hAp://lteuniversity.com/        

RLF  reports  –  network  troubleshoo+ng!  

20

Page 21: LTE and IMSI catcher myths

LTE  RRC*  :  implementa+on  vulnerability  

   

•  For  handover  

•  Privacy  sensiMve  informaMon  in  the  report  

•  Request  not  authenMcated    

•  reports  are  not  encrypted    

   

   

Measurement  reports  –  GPS  co-­‐ordinates!  

21

Page 22: LTE and IMSI catcher myths

Network  Configura+on  Issues  

22

Page 23: LTE and IMSI catcher myths

Configura+on  issues  

Deployments  all  over  the  world!  

•  Smart  Paging  ü  Directed  onto  a  small  cell  rather  than  a  tracking  area  ü  Allows  aAacker  to  locate  LTE  subscriber  in  a  cell    

•  GUTI  persistence  ü  GUTI  change  –  handover/aAach/reallocaMon  procedure  ü  MNOs  tend  not  to  change  GUTI  sufficiently  frequently  

 •  MME  issues  

23

Page 24: LTE and IMSI catcher myths

Building  4G  fake  base  sta+on  and  aZack  demos    

Ethical  Considera+on  

24

Page 25: LTE and IMSI catcher myths

Experiment  Set-­‐up  

•  Hardware  –  USRP,  LTE  dongle,  LTE  phones  

 •  Sooware  -­‐  OpenLTE  &  srsLTE    •  ImplementaMon  –  passive,  semi-­‐

passive,  acMve  

 

 Set-­‐up  cost  -­‐  liZle  over  1000  Euro!  

25

Thanks  to  OpenLTE  and  srsLTE  folks!  

Page 26: LTE and IMSI catcher myths

Loca+on  Leak  AZacks  

 Exploit  specifica+on/implementa+on  flaws  in  RRC  protocol!      •  Passive  :  link  locaMons  over  Mme  

ü  Sniff  IMSI/GUTIs  at  a  locaMon  (e.g.,  Airport/home/office)  ü  Track  subscriber  movements  (same  GUTI    for  several  days)  

   

26

Demo  

Page 27: LTE and IMSI catcher myths

Semi-­‐Passive  :  determine  tracking  area  &  cell  ID  

•  VoLTE  calls:  Mapping  GUTIs  to  phone  number  ü  10  silent  calls  to  vicMm’s  number    ü  High  priority  à  paging  to  enMre  tracking  area(TA)  ü  Passive  sniffer  in  a  TA    

•  Social  idenMMes:  Mapping  GUTIs  to  Social  Network  IDs  ü  E.g.,  10  Facebook  messages,  whatsapp/viber    ü  Low  priority  à  Smart  paging  to  a  last  seen  cell  ü  Passive  sniffer  in  a  cell    

Demo  

27

Page 28: LTE and IMSI catcher myths

Ac+ve  :  leak  fine-­‐grained  loca+on  

Precise  loca+on  using  trilatera+on  or  GPS  !      

 •  Measurement/RLF  report  

ü  Two  rogue  eNodeBs  for  RLF  ü  eNodeB1  triggers  RL  failure:  disconnects  mobile  

ü  eNodeB2  then  requests  RLF  report  from  mobile  

     

     

28

Demo  

Page 29: LTE and IMSI catcher myths

DoS  AZacks  

Exploi+ng  specifica+on  vulnerability  in  EMM  protocol!    •  Downgrade  to  non-­‐LTE  network  services  (GSM/3G)  

•  Deny  all  services  (GSM/3G/LTE)  

•  Deny  selected  services  (block  incoming  calls)  

•  Persistent  DoS  

•  Requires  reboot/SIM  re-­‐inserMon  

 

29

Demo  

Page 30: LTE and IMSI catcher myths

Summary        •  New  vulnerabiliMes  in  LTE  standards/chipsets  

•  Social  applicaMons  used  for  silent  tracking    •  LocaMng  4G  devices  using  trialternaMon  ,  GPS  co-­‐ordinates!    •  DoS  aAacks  are  persistent  &  silent  to  users      

•  ConfiguraMon  issues  in  deployed  LTE  networks            

30

Page 31: LTE and IMSI catcher myths

Solu+on!  Use  any  old  Nokia  phone  without  baZery  and  SIM  card!        

31

Page 32: LTE and IMSI catcher myths

Impact    Specifica+on  vulnerabili+es  affect  every  LTE-­‐enabled  device!    •  ImplementaMon  issues  are  (almost)  fixed  by  baseband  chip  

manufacturers  J    

•  3GPP/GSMA  working  on  fixes  

•  However  no  updates  from  handset  manufacturers  yet  L    •  No  response  yet  from  MediaTek  &  Samsung  L    •  Mobile  network  operators  (Germany)  fixing  their  network  

configuraMon  issues;  others  may  affected  as  well  L    

32

Page 33: LTE and IMSI catcher myths

Thanks    

Ques+ons?