lessons learned from 2g,3g,4g – what we need to fix in 5g ... · lessons learned from 2g,3g,4g...

40
Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski [email protected] @atrox_at Co-Authors: David Rupprecht, Thorsten Holz, Edgar Weippl, Christina Pöpper

Upload: others

Post on 15-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Lessons learned from 2G,3G,4G – what we need to fix in 5G

ETSI Security Week 2017 – 5G Security

Adrian Dabrowski [email protected] @atrox_at

Co-Authors: David Rupprecht, Thorsten Holz, Edgar Weippl, Christina Pöpper

Page 2: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

What are the lessons from the past?

What is the future of mobile network security

research?

Page 3: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski
Page 4: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Numerous publicaions towards individual quesions.

We need the big picture to shape

future research!

Page 5: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Numerous publicaions towards individual quesions.

We need the big picture to shape

future research!

Page 6: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Systematization Methodology How to get the big picture?

Page 7: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

7

Methodology

Attack Aims

Attack Aims

Attack Characteristi

cs

Attack Characteristi

cs

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature

DefensesDefensesDefense

Characteristics

DefenseCharacteristi

cs

AttacksAttacks FlawsFlaws CausesCauses Root Causes

Root Causes

Page 8: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

8

• Security requirements for the system

• Each attack aim challenges a security requirement

• Attack Aims:

Security Requirements and Attack Aims

Attack Aims

Attack Aims

Attack Characteristics

Attack Characteristics

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature Defenses

Defenses DefenseCharacteristics

DefenseCharacteristics

AttackAttack

FlawsFlaws

CauseCause Root

Cause

Root Cause

Denial of Service

Attacks on

Secrecy

Attacks on

Privacy

Attacks on

Integrity

Fraud Attacks

Page 9: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

9

• Attacks the act of assailing the system with a deinite attack aim.

• An attack exploits on distinct law of the system

• Impact analyses based on attack characteristics • Target

• Technology (2G/3G/4G)

• Attacker capabilities

Attacks, Attack Characteristics and Flaws

Attack Aims

Attack Aims

Attack Characteristics

Attack Characteristics

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature Defenses

Defenses DefenseCharacteristics

DefenseCharacteristics

AttackAttack

FlawsFlaws

CauseCause Root

Cause

Root Cause

SS7

Page 10: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

10

Impact and feasibility of defenses

• Defense Characteristics• Type of Defense

• Detection or Mitigation

• Realization Method• Speciication or Implementation

• Research Status• Vague Proposal or Evaluated Proposal

Defenses and Defense Characteristics

Attack Aims

Attack Aims

Attack Characteristics

Attack Characteristics

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature Defenses

Defenses DefenseCharacteristics

DefenseCharacteristics

AttackAttack

FlawsFlaws

CauseCause Root

Cause

Root Cause

Page 11: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

11

From the concrete to the abstract

• Flaws that have similar technical are grouped by a common cause

• Root causes are the underlying reason for certain cause

Causes and Root CausesAttack Aims

Attack Aims

Attack Characteristics

Attack Characteristics

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature Defenses

Defenses DefenseCharacteristics

DefenseCharacteristics

AttackAttack

FlawsFlaws

CauseCause Root

Cause

Root Cause

Page 12: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

12

Research Questions andChallenges

• Research Questions • Shortcomings of existing work

• Shortcomings of new technologies

• Challenges of a cause

Attack Aims

Attack Aims

Attack Characteristics

Attack Characteristics

Security Requirement

s

Security Requirement

s

Challenges, Research Questions

Challenges, Research Questions

Literature

Literature Defenses

Defenses DefenseCharacteristics

DefenseCharacteristics

AttackAttack

FlawsFlaws

CauseCause Root

Cause

Root Cause

Challenges and Research Questions

Flaws

Attacks

Defenses

Page 13: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Assessment

Root Cause

Cause Cause Cause

Challenges and Research Questions

Challenges and Research Questions

Challenges and Research Questions

Page 14: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

14

Scope

Page 15: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

SystematizationThe big picture!

Page 16: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski
Page 17: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski
Page 18: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

18

Root Causes

Implementation Issue

Speciication Issue

Wireless Channel

Protocol Context

Discrepancy

Page 19: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Overview

Implementation Issue

• Insecure Implementation

• Leaky Implementation

Speciication Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto

• Insecure Inter-network Protocols

• Resource Usage Asymmetry

Wireless Channel

• Wireless Channel

Protocol Context Discrepancy

• Cross-Layer Information Loss

• Routing Coniguration

• Accounting Policy Inconsistency

Page 20: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Implementation Issue

Page 21: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

21

Deinition

• Mistakes in the implementation

• Deviations from the speciication

Causes

• Insecure Implementation

• Leaky Implementation

Implementation IssueImplementation

Issue

• Insecure Implementation

• Leaky Implementation

Page 22: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Example: Baseband exploits

Others: SMS of Death, ASN.1 decoder heap, Crypto State Machine

Attack Aim: Integrity, Secrecy

Insecure ImplementationImplementation

Issue

• Insecure Implementation

• Leaky Implementation

22

Page 23: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Intermediate defenses

• Filtering SMS for SMS attacks

Detection of vulnerabilities:

Defenses

Test Cases

Test Cases

Reverse Engineering

CMP r0, r1

ADDGE r2, r2, r3

ADDLT r2, r2, r4

Automated detecion Manual detecion

23

Implementation Issue

• Insecure Implementation

• Leaky Implementation

Page 24: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Detection of vulnerabilities

• Existing testing frameworks focus on one particular type of law and do not exhaust all laws

• Manual detection for memory bugs

• Automated testing of baseband is not recommend

• Reliable detection of vulnerabilities is needed

• Decoding function of messages and protocol state machine

• Research Scope: mobile phone vs. mobile network

Challenges

24

Implementation Issue

• Insecure Implementation

• Leaky Implementation

Page 25: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Implementation of countermeasures

• Classical system security • Memory safe languages

• ASLR (Address Space Layout Randomization)

• CFI (Control Flow Integrity)

• Hard to realize • Closed basebands

• Real-time capability

Challenges

25

Implementation Issue

• Insecure Implementation

• Leaky Implementation

Page 26: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Speciication Issue

Page 27: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Deinition

• Security implications in speciication

• Protocols and state machines

Causes

• Unsecured pre-authentication traic

• Non-existing mutual authentication

• Weak Cryptography

• Insecure Inter-network protocols

• Resource Usage asymmetry

Speciication IssueSpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

27

Page 28: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Example: Downgrade Attacks and IMSI Request Attack

The phone cannot verify the authenticity of the network before authentication and key agreement run

Unsecured Pre-authentication TraicSpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

28

Page 29: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Detection

• Mapping and probing

• Behavioral analysis

• Baseband irewall

Mitigations:

• Proposal for specialized protocol changes for certain attacks

• ephemeral Identiiers (e.g., P-IMSI)

• PKI

• TESLA

Unsecured Pre-authentication TraicSpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

30

Page 30: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

How to secure the pre-authentication traic?

• Shortcoming: speciic protocol changes

• No sustainable solution for all attacks vectors (some messages are needed)

• We are keeping inding new excessive functionality that actually should be authenticated

• Shouldn’t we look for a generic solution?

• Encrypt also the broadcast traic?

ChallengesSpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

31

Page 31: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

How to secure the pre-authentication traic?

• Concrete Challenge:General solution to secure pre-authentication traic:

• What exactly should be secured:• Protect pre-authentication traic towards the phone!

• Optional pre-authentication traic towards the network?

• Suggestion: PKI and TELSA

• Certain constraints

• Limited bandwidth (specs such as NB LTE?) => And on which

layers?

• Resource constrained devices

• Focus on availability

ChallengesSpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

32

Page 32: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Cause:

● An „cheap“ operation on one side triggers an expensive operation on the other.

● e.g., HLR updates, resource allocation

Mostly used for DoS Attacks, resource exhaustion

Challenges:

● Prove of commitment protocols

– e.g., prove of work such as Merkle puzzles, ...

Ressource Usage AsymmetrySpeciication

Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto• Insecure Inter-

network Protocols

• Resource Usage Asymmetry

33

Page 33: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Protocol Context Discrepancy

Page 34: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Deinition

• Telcos impose (legacy) billing methods on IP data that was never meant for that purpose

• Translation between IP data identity, the radio layer identity and service billing identity.

Causes

• Cross-Layer Information Loss

• Routing Coniguration

• Accounting Policy Inconsistency

Protocol Context DiscrepancyProtocol Context

Discrepancy

• Cross-Layer Information Loss

• Routing Coniguration

• Accounting Policy Inconsistency

41

Page 35: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Example: IMS based SMS spooing

• Several options

• IMS proves identity based on SIM with AKA protocol

• Transport layer security (ipsec) provides no protection against data manipulation on the client

• E.g., spooing SIP headers• Changing caller-ids

• Additional problems: RTP-streams do not pass IMS

Cross-Layer Information LossProtocol Mobile

Network Context Discrepancy

• Cross-Layer Information Loss

• Routing Coniguration

• Accounting Policy Inconsistency

42

Page 36: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

ConclusionThe big picture!

Page 37: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Conclusion

Implementation Issue

• Insecure Implementation

• Leaky Implementation

Speciication Issue

• Unsecured Pre-authentication Traic

• Non-Existing Mutual Authentication

• Weak Crypto

• Insecure Inter-network Protocols

• Resource Usage Asymmetry

Wireless Channel

• Wireless Channel

Protocol Context Discrepancy

• Cross-Layer Information Loss

• Routing Coniguration

• Accounting Policy Inconsistency

Page 38: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Thank You! Questions?

Page 39: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

Adrian Dabrowski [email protected]

@atrox_at

David Rupprecht [email protected]

46

Contacts

Page 40: Lessons learned from 2G,3G,4G – what we need to fix in 5G ... · Lessons learned from 2G,3G,4G – what we need to fix in 5G ETSI Security Week 2017 – 5G Security Adrian Dabrowski

47