Mobitex Network Security



Similar documents
Mobitex Network Security

Mobitex security issues

Chapter 9. IP Secure

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

January 2002

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Securing IP Networks with Implementation of IPv6

Computer Networks CS321

Topics in Network Security

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Demystifying Wireless for Real-World Measurement Applications

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Overview of Computer Networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Communication Networks. MAP-TELE 2011/12 José Ruela

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

The Wireless Network Road Trip

Protocols. Packets. What's in an IP packet

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Ethernet. Ethernet. Network Devices

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Chapter 6 CDMA/802.11i

First Semester Examinations 2011/12 INTERNET PRINCIPLES

PART OF THE PICTURE: The TCP/IP Communications Architecture

Kick starting science...

Computer Networks. Secure Systems

CSE 3461 / 5461: Computer Networking & Internet Technologies

Chapter 2 - The TCP/IP and OSI Networking Models

Link Layer and Network Layer Security for Wireless Networks

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Protocol Security Where?

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Networking Test 4 Study Guide

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Data Communications and Networking Overview

Layered protocol (service) architecture

Solution of Exercise Sheet 5

DATA COMMUNICATION AND NETWORKS

11/22/

CSCI 362 Computer and Network Security

: Instructor

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

How To Design A Layered Network In A Computer Network

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks

Chapter 8 Network Security

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Wireless LAN Pen-Testing. Part I

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

CS5008: Internet Computing

AlarmNet Network Overview

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Wireless Network Policy

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Configure WorkGroup Bridge on the WAP131 Access Point

Chapter 8 Security Pt 2

6LoWPAN Technical Overview

Introduction to Network Security Lab 1 - Wireshark

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Ajay Gummalla-July 2001

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CSE 127: Computer Security. Network Security. Kirill Levchenko

Lab VI Capturing and monitoring the network traffic

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Network Technologies

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Introduction Chapter 1. Uses of Computer Networks

Configuring connection settings

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

communication over wireless link handling mobile user who changes point of attachment to network

ELEC3030 Computer Networks

WAN Data Link Protocols

Packet Data Testing with R&S CMU200

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Security vulnerabilities in the Internet and possible solutions

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

EXPLORER. TFT Filter CONFIGURATION

Industrial Communication. Securing Industrial Wireless

Observer Analyzer Provides In-Depth Management

Wireless Networks. Welcome to Wireless

Nokia E61i Configuring connection settings

Comparison of SNMP. Versions 1, 2 and 3

Certified Wireless Security Professional (CWSP) Course Overview

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Networks: IP and TCP. Internet Protocol

Software Defined Networking (SDN) - Open Flow

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Wireless LAN Security: Securing Your Access Point

Broadcasting your attack: Security testing DAB radio in cars

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Transcription:

Mobitex Network Security olleb of the Toolcrypt Group olle@toolcrypt.org

Mobitex Background Network structure Security features

Mobitex background History of the Mobitex protocol Overview of network operators Overview of network users

History of the Mobitex protocol Originated at Televerket in early 1980s Developed by Ericsson (Eritel) First operational network in 1986 Packet-switched, national infrastructure Mobitex Technology AB http://www.mobitex.com/

Overview of network operators 30+ networks worldwide today 20 public commercial networks Velocita Wireless (AT&T, Cingular, RAM) Rogers Wireless (Cantel) Mobitex Association Operators, developers and manufacturers http://www.mobitex.org/

Overview of network users Public Safety Field service support Transport / Logistics Card Payments (POS) New growth areas Positioning / Resource Management Metering / Remote control Alarm systems

Mobitex network structure Mobitex network topography The Mobitex protocol suite

Mobitex network topography Backbone network connects NCC and one or more main exchanges (MHX) Area exchanges (MOX) connected to MHX Fixed terminals and mobile radio base stations (BAS) connected to MOX Mobile terminals can be restricted to an area or be allowed roaming (with tariff) Infrastructure linked by HDLC or X.25

The Mobitex protocol suite Roughly corresponds to OSI layers 1-4 Hey, so does TCP/IP! Everything revolves around MPAK packets with 24-bit src/dst MAN addresses That's just like IP packets, I know this! Poor adoption of layer 4 standards Most applications roll their own

The Mobitex protocol suite Layer 1 Radio layer 896-901Mhz Up / 935-940Mhz Down 900Mhz band in Americas and Korea 400Mhz band in Europe, Australia and Asia 800Mhz band in China Numbered 12.5khz bandwidth channels 8kbaud GMSK modulation Bit-scrambling to reduce same-bit strings Radio frame header with base ID and flags

The Mobitex protocol suite Layer 2 ROSI (RadiO Signalling Interface) 20 bit interleaving of coded octets (12,8) shortened hamming code 144 bit data block with 16 bit CRC Link header with frametype and length Slotted ALOHA access mechanism with automatic repeat requesting (ARQ) Network parameters broadcasted

The Mobitex protocol suite Layer 3 The MPAK (Mobitex PAcKet) Maximum 512 byte data payload length Common components (header) Sender and addressee MAN (not swapped in reply) Traffic state flags mailbox and delivery status Subscription flags POSACK, SENDLIST, etc. Packet class and type designation PSUBCOM / DTESERV packet classes Optional address list appended

The Mobitex protocol suite Layer 3 The MPAK (Mobitex PAcKet) PSUBCOM (Packet-switched SUBscriber COMmunication) TEXT - ASCII / ISO-646 text formatted for printer/display DATA - application data, optional encoding STATUS - single byte status code (user defined meaning) HPDATA - Higher Protocol Data, one-byte protocol ID EXTPAK - used to exchange packets with external nets DTESERV (Data TErminal SERVice communication) BORN, (IN)ACTIVE, DIE, LIVE, ROAM(ORD), GROUPLIST, INFO(REQ), TIME, AREALIST, ESNREQ, LOGINREQ, etc.

The Mobitex protocol suite Layer 4 MTP/1 (Mobitex Transport Protocol) Not limited to MPAK length In-order delivery guaranteed Error signaling and PDU identification Reliable delivery of PDUs (optional) Basically an UDP / TCP protocol analogue using HPDATA MPAKs as transport Introduced in 1991, not used very often...

The Mobitex protocol suite Wired Layer 2 alternatives MASC (Mobitex ASynchronous Communication) Mainly used over V.24 or X.21bis to connect a Mobitex terminal to a computer application MDOT (Mobitex Data Over TCP/IP) Internet application gateways enable Ipv4 connected hosts to send/receive MPAKs X.25 Standard profile for connecting fixed terminals to area exchanges (MOX)

Security features Privacy protection Subscriber identification Denial of service Network snooping Live Demo!

Mobitex Privacy protection ROSI (Layer 2) uses bit-scrambling to improve effectiveness of modulation Some may confuse this with privacy Scrambling generator trivial to reverse rec.radio.scanner on 14 Mar 1997 MsgId: <332A0580@geocities.com> From: arron5@geocities.com Subject: Fun mobitex stuff

Mobitex Privacy protection Mobitex protocol specification contains no provisions for privacy or integrity at all TEXT messages inherently clear text Lots of applications use HPDATA and don't bother with security or privacy Very much like IPv4 in that security must be implemented in the application layer

Mobitex Subscriber identification Subscriber identified by 24 bit MAN Issued to each subscriber by operator MAN is like an IPv4 address Tied to a subscription, not a network location Location of each MAN stored in network Compare IPv4 routing tables 3 different subscriber types

Mobitex Subscriber identification Terminal subscription (Fixed or Mobile) Mobile terminal identified by 4-byte ESN Personal subscription Transferable between terminals Identified by 8-char password Host group subscription Login to fixed terminals only More than one active login at a time

Mobitex Subscriber identification Terminal subscription identified by ESN ESN calculated from terminal S/N ESN only req. to activate and roam Sniff to spoof terminal at later time Spoof logged in personal subscriptions Real terminal may need to deactivate Kill real terminal and hijack session Spoof DIE message to deactivate real terminal ESNREQ / ESNINFO can be sent at any time

Mobitex Subscriber identification All subscription data sent in the clear BORN ACTIVE ROAM ESNINFO LOGINREQ

Mobitex denial of service Wide-band jamming transmitters Available off-the-shelf and as DIY kits Rogue base station Implement wireless base using e.g. USRP Selective DOS targeting specific terminal Spoof DIE DTESERV packets with dst MAN

Network snooping - prerequisites Radio that receives the correct frequency 8kbit GMSK - need FM discriminator tap http://discriminator.nl/ Google is your friend... Software Commercial software ($$$) PDW (http://www.gsm-antennes.nl/pdw/) Mine, as I'll show you next... http://www.toolcrypt.org/index.html?mobitex

Demo of network snooping

Conclusions Mobitex wireless networks insecure Compare IPv4 over unencrypted WiFi No confidentiality, serious problems with integrity and availability under attack Application developers and system owners need to address these issues Security needs to be built into apps Authentication, message integrity, encryption

Q & A Questions? Experiences? Comments? Requests?