Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils



Similar documents
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

LTE X2 Handover Messaging

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

Architecture Overview NCHU CSE LTE - 1

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Towards Software Defined Cellular Networks

4G Mobile Networks At Risk

LTE Attach and Default Bearer Setup Messaging

Long Term Evolution - LTE. A short overview

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

Diameter in the Evolved Packet Core

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

The LTE Network Architecture

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

LTE - Can SDN paradigm be applied?

LTE Overview October 6, 2011

Protocol Signaling Procedures in LTE

LTE Performance and Analysis using Atoll Simulation

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Nokia Siemens Networks Flexi Network Server

Mobile network evolution A tutorial presentation

Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack

Mobility Management for All-IP Core Network

Nokia Siemens Networks Flexi Network Gateway. Brochure

LTE Security How Good Is It?

Introduction to Evolved Packet Core

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Wireless & Mobile. Working Group

SS7 & LTE Stack Attack

Accelerating 4G Network Performance

Demo 1. Network Path and Quality Validation in the Evolved Packet Core

Kamakshi Sridhar, PhD Distinguished Member of Technical Staff Director Wireless CTO organization

Overview of the Evolved packet core network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Chapter 2 Network Architecture and Protocols

Delivery of Voice and Text Messages over LTE

Signaling is growing 50% faster than data traffic

Nationwide Interoperability Framework

Securing Next Generation Mobile Networks

LTE CDMA Interworking

Femtocells: A Poisonous Needle in the Operator s Hay Stack

LTE Control Plane on Intel Architecture

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

Mobile IPv6 deployment opportunities in next generation 3GPP networks. I. Guardini E. Demaria M. La Monaca

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

ehrpd Mike Keeley Market Segment Director

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Handover Management Optimization for LTE Terrestrial Network with Satellite Backhaul

SAE and Evolved Packet Core

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

Security in the Evolved Packet System

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IPV6 IN MOBILE NETWORKS

Virtualization techniques for redesigning mobile backhaul networks: challenges and issues. Fabrice Guillemin Orange Labs, IMT/IMT/OLN/CNC/NCA

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

Get the best performance from your LTE Network with MOBIPASS

Performance validation for the mobile core

Security Engineering Part III Network Security. Security Protocols (II): IPsec

ATCN 2014: SDN - Mobility and SDN: Mobility Management and Mobile Networks

Migration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009

EVERYTHING YOU EVER WANTED TO KNOW ABOUT LTE

Securing IP Networks with Implementation of IPv6

Supporting mobility in the RAN cloud

Security Gate & Gi Firewall

ETSI TS V8.0.0 ( ) Technical Specification

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

MASTER THESIS. Luca Valtulina

Security in cellular-radio access networks

IP Security. Ola Flygt Växjö University, Sweden

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

Mobility and cellular networks

3GPP TS V9.0.0 ( )

End to End Delay Performance Evaluation for VoIP in the LTE Network

Delivering Network Performance and Capacity. The most important thing we build is trust

Integrating Lawful Intercept into the Next Generation 4G LTE Network

Secured VPN Models for LTE Backhaul Networks

Technology Business Unit. White Paper. SDN in Wireless Cellular Networks: Gearing Up to Meet the Growing Bandwidth Demand

LTE protocol tests for IO(D)T and R&D using the R&S CMW500

Security Analysis of LTE Access Network

Transcription:

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1

Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012 2

Intro to 4G (LTE) Networks 11/09/2012 3

Mobile Networks A Brief History Lesson 1G 1980s Analogue technology (AMPS, TACS) 2G 1990s Move to digital (GSM,GPRS,EDGE) 3G 2000s Improved data services (UMTS, HSPA) 4G 2010s High bandwidth data (LTE Advanced) 11/09/2012 4

Mobile Networks Historic Vulnerabilities Older networks have been the subject of practical and theoretical attacks Examples include: Ability to man in the middle No perfect forward secrecy No encryption on the back-end LTE Advanced addresses previous attacks 11/09/2012 5

Mobile Networks Current Status of 4G Lots of 4G networks running or planned (eg Scandinavia, US) UK Trials have run in Cornwall, London etc Spectrum auction is important EE services launches soon! 11/09/2012 6

Mobile Networks Why is 4G Important? Digital Britain strategy Fixed line broadband expensive in remote locations Provides high speed mobile data services High level of scalability on the backend 11/09/2012 7

Technical Details 11/09/2012 8

Conceptual View 3G NodeB Core Network RNC User Base Station Back-End Internet 11/09/2012 9

Network Overview 3G NB HSS AuC UE NB RNC SGSN GGSN Internet Core Network 11/09/2012 10

Conceptual View 4G EPC enodeb User Base Station Back-End Internet 11/09/2012 11

Network Overview 4G enb MME HSS UE enb SGw PGw PCRF Internet EPC 11/09/2012 12

The Components User Equipment (UE) What the customer uses to connect Mainly dongles and hubs at present Smartphones and tablets will follow (already lots in US) 11/09/2012 13

The Components evolved Node B (enb) The bridge between wired and wireless networks Forwards signalling traffic to the MME Passes data traffic to the PDN/Serving Gateway 11/09/2012 14

The Components Evolved Packet Core (EPC) The back-end core network Manages access to data services Uses IP for all communications Divided into several components 11/09/2012 15

The Components Mobile Management Entity (MME) Termination point for UE Signalling Handles authentication events Key component in back-end communications 11/09/2012 16

The Components Home Subscriber Service (HSS) Contains a user s subscription data (profile) Typically includes the Authentication Centre (AuC) Where key material is stored 11/09/2012 17

The Components PDN and Serving Gateways (PGw and SGw) Handles data traffic from UE Can be consolidated into a single device Responsible for traffic routing within the back-end Implements important filtering controls 11/09/2012 18

The Components Policy Charging and Rules Function (PCRF) Does what it says on the tin Integrated into the network core Allows operator to perform bandwidth shaping 11/09/2012 19

The Components Home enb (HeNB) The FemtoCell of LTE An enodeb within your home Talks to the MME and PDN/Serving Gateway Expected to arrive much later in 4G rollout 11/09/2012 20

Network Overview Control and User Planes 11/09/2012 21

The Protocols Radio Protocols (RRC, PDCP, RLC) These all terminate at the enodeb RRC is only used on the control plane Wireless user and control data is encrypted (some exceptions) Signalling data can also be encrypted end-to-end RRC PDCP RLC 11/09/2012 22

The Protocols Internet Protocol (IP) Used by all back-end comms All user data uses it Supports both IPv4 and IPv6 Important to get routing and filtering correct Common UDP and TCP services in use IP 11/09/2012 23

The Protocols The Protocols - SCTP Another protocol on top of IP Robust session handling Bi-directional sessions Sequence numbers very important SCTP IP 11/09/2012 24

The Protocols The Protocols GTP-U Runs on top of UDP and IP One of two variants of GTP used in LTE This transports user IP data Pair of sessions are used identified by Tunnel-ID GTP-U UDP IP 11/09/2012 25

The Protocols The Protocols GTP-C Runs on top of UDP and IP The other variant of GTP used in LTE Used for back-end data Should not be used by the MME in pure 4G GTP-C UDP IP 11/09/2012 26

The Protocols S1AP Runs on top of SCTP and IP An ASN.1 protocol Transports UE signalling UE sessions distinguished by a pair of IDs S1AP SCTP IP 11/09/2012 27

The Protocols X2AP Very similar to S1AP Used between enodebs for signalling and handovers Runs over of SCTP and IP and is also an ASN.1 protocol X2AP SCTP IP 11/09/2012 28

Potential Attacks 11/09/2012 29

Targets for Testing What Attacks are Possible Wireless attacks and the baseband Attacking the EPC from UE Attacking other UE Plugging into the Back-end Physical attacks (HeNB) 11/09/2012 30

Targets for Testing Wireless Attacks and the Baseband A DIY kit for attacking wireless protocols is now closer (USRP based) Best chance is using commercial kit to get a head-start Not the easiest thing to attack 11/09/2012 31

Targets for Testing Attacking the EPC from UE Everything in the back-end is IP You pay someone to give you IP access to the environment Easiest place to start 11/09/2012 32

Targets for Testing Attacking other UE Other wirelessly connected devices are close May be less protection if seen as a local network The gateway may enforce segregation between UE 11/09/2012 33

Targets for Testing Wired network attacks enodebs will be in public locations They need visibility of components in the EPC Very easy to communicate with an IP network Everything is potentially in scope 11/09/2012 34

Targets for Testing Physical Attacks (enb) Plugging into management interfaces is most likely attack, except A Home enodeb is a different story Hopefully we have learned from the Vodafone Femto-Cell Attack 11/09/2012 35

What you can Test 11/09/2012 36

Tests to Run As a Wirelessly Connected User Visibility of the back-end from UE Visibility of other UEs Testing controls enforced by Gateway Spoofed source addresses GTP Encapsulation (Control and User) 11/09/2012 37

Tests to Run From the Back-End Ability to attack MME (signalling) Robustness of stacks (eg SCTP) Fuzzing Sequence number generation Testing management interfaces Web consoles SSH Proprietary protocols 11/09/2012 38

Tests to Run Challenges Spoofing UE authentication is difficult Messing with radio layers is hard ASN.1 protocols are a pain Injecting into SCTP is tough Easy to break back-end communications 11/09/2012 39

Tests to Run S1AP Protocol By default no authentication to the service Contains enodeb data and UE Signalling UE Signalling can make use of encryption and integrity checking If no UE encryption is used attacks against connected handsets become possible 11/09/2012 40

Tests to Run S1AP and Signalling S1AP NAS NAS UE enb MME 11/09/2012 41

Tests to Run S1AP and Signalling Spoofed UE Spoofed enb MME UE enb 11/09/2012 42

Tests to Run S1AP and Signalling S1 Setup S1 Setup Response enb Attach Request Authentication Request Authentication Response Security Mode MME 11/09/2012 43

Tests to Run GTP Protocol Gateway can handle multiple encapsulations It uses UDP so easy to have fun with The gateway needs to enforce a number of controls that stop attacks 11/09/2012 44

Tests to Run GTP and User Data GTP IP IP IP UE enb SGw Internet 11/09/2012 45

Tests to Run GTP and User Data IP UE GTP UDP IP enodeb GTP UDP IP 11/09/2012 46

Tests to Run GTP and User Data GTP IP GTP IP GTP IP GTP UE enb SGw Internet 11/09/2012 47

Tests to Run GTP and User Data Destination IP Address (IP) Source IP Address (IP) Invalid IP Protocols (IP) GTP Tunnel ID (GTP) Source IP Address (GTP) UE enb SGw PGw 11/09/2012 48

Tests to Run Old Skool Everything you already know can be applied to testing the back-end Its an IP network and has routers and switches There are management services running 11/09/2012 49

Defences 11/09/2012 50

Defences The Multi-Layered Approach Get the IP network design right Protect the IP traffic in transit Enforce controls in the Gateway Ensure UE and HeNBs are secure Monitoring and Response Testing 11/09/2012 51

Defences Unified/Consolidated Gateway The Gateway enforces some very important controls: Anti-spoofing Encapsulation protection Device to device Routing Billing and charging of users 11/09/2012 52

Defences IP Routing Architecture design and routing in the core is complex Getting it right is critical to security We have seen issues with this This must be tested before an environment is deployed 11/09/2012 53

Defences IPSec If correctly implemented will provide Confidentiality and Integrity protection Can also provide authentication between components Keeping the keys secure is not trivial and not tested 11/09/2012 54

Defences Architecture Consideration MME HSS enodeb EPC Switch Internet Gateway Internet Serving Gateway EPC PDN Gateway 11/09/2012 55

Conclusions 11/09/2012 56

Conclusion 1 There are 3 key protective controls that should be tested within LTE environments Policies and rules in the Unified/Consolidated Gateway The implementation of IPSec between all backend components A back-end IP network with well-designed routing and filtering 11/09/2012 57

Conclusion 2 Despite fears from the use of IP in 4G, LTE will improve security if implemented correctly The 3 key controls must be correctly implemented Testing must be completed for validation Continued scrutiny is required Legacy systems may be the weakest link 11/09/2012 58

Conclusion 3 Protecting key material used for IPSec is not trivial The security model for IPSec needs careful consideration Operational security processes are also important Home enodeb security is a challenge 11/09/2012 59

Conclusion 4 More air interface testing is needed Will need co-operation from vendors/operators Open testing tools will need significant development effort Still lower hanging fruit if support for legacy wireless standards remain 11/09/2012 60

Questions @mwrinfosecurity @mwrlabs 11/09/2012 61