+ All Categories
Home > Documents > Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf ·...

Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf ·...

Date post: 22-Sep-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
31
What are femtocells? Femtocell Security in Theory Femtocell security in Practice Radboud University Nijmegen Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny Wichers Schreur Institute for Computing and Information Sciences – Digital Security Radboud University Nijmegen 20 October 2013 Fabian van den Broek 20 October 2013 Femtocell Security 1 / 20
Transcript
Page 1: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Femtocell Security in Theory and PracticeNordSec 2013

Fabian van den Broek

& Ronny Wichers Schreur

Institute for Computing and Information Sciences – Digital SecurityRadboud University Nijmegen

20 October 2013

Fabian van den Broek 20 October 2013 Femtocell Security 1 / 20

Page 2: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Femtocells

• “Small” cell tower• Small range• Low powered• Cheap• Installed by user• Remote controlled by provider

Fabian van den Broek 20 October 2013 Femtocell Security 2 / 20

Page 3: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Other cells

• Macro cell• Micro cell• Nano cell• Femto cell

Fabian van den Broek 20 October 2013 Femtocell Security 3 / 20

Page 4: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

The Telco network

Fabian van den Broek 20 October 2013 Femtocell Security 4 / 20

Page 5: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Authentication Keys

HNB Internet

RNC

HNB-GW

SGSN

HSS

Core NetworkRAN

SeGW

HMS

Fabian van den Broek 20 October 2013 Femtocell Security 5 / 20

Page 6: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Crypto Keys in GSM

HNB Internet

RNC

HNB-GW

SGSN

HSS

Core NetworkRAN

SeGW

HMS

Fabian van den Broek 20 October 2013 Femtocell Security 6 / 20

Page 7: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Crypto Keys in UMTS

HNB Internet

RNC

HNB-GW

SGSN

HSS

Core NetworkRAN

SeGW

HMS

Fabian van den Broek 20 October 2013 Femtocell Security 7 / 20

Page 8: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Crypto Keys in Femtocells (Ideally)

HNB Internet

RNC

HNB-GW

SGSN

HSS

Core NetworkRAN

SeGW

HMS

Fabian van den Broek 20 October 2013 Femtocell Security 8 / 20

Page 9: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Crypto Keys in Femtocells

HNB Internet

RNC

HNB-GW

SGSN

HSS

Core NetworkRAN

SeGW

HMS

Fabian van den Broek 20 October 2013 Femtocell Security 9 / 20

Page 10: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Femtocell Security

Fabian van den Broek 20 October 2013 Femtocell Security 10 / 20

Page 11: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 12: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 13: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 14: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 15: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 16: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 17: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 18: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Which security goals are threatened by acompromised femtocell?

Security goal Femto w/o session keys Femto with session keys

User data confidentiality & integrity

Network authentication

Subscriber identity authentication

Subscriber identity confidentiality

Signaling confidentiality & integrity

Subscriber location privacy and untraceability

Availability

Fabian van den Broek 20 October 2013 Femtocell Security 11 / 20

Page 19: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Earlier Femtocell Hacks

Vendor TypeSagemcom Vodafone SureSignal 1

Samsung Verizon SCS-24UC42

& SCS-2U01& Sprint Airave

Ubiquisys SFR Home 3G3

1The Hackers Choice2Fasel and Jakubowski – Trustwave3Borgaonkar, Redon and Seifert – TU Berlin

Fabian van den Broek 20 October 2013 Femtocell Security 12 / 20

Page 20: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Our Attack

Fabian van den Broek 20 October 2013 Femtocell Security 13 / 20

Page 21: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Our Attack

Secured against the previous attacks:• no SSH running,• different code published under GPL,• holding power button did not trigger unsafe updates.

Fabian van den Broek 20 October 2013 Femtocell Security 14 / 20

Page 22: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Our Attack

Fabian van den Broek 20 October 2013 Femtocell Security 15 / 20

Page 23: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

What we found in the memory

• A recovery partition• A port-knocking daemon ;-)• A binary listening to the opened port

adam#!/command/execlineb -S1# download command scriptif -n {

forx -x 1 i { 1 2 3 }foreground { s6-sleep 5 }if -n { /bin/tftp -g -r femto3xx/originalsin -l /tmp/eve ${1} }

}

# add exec rightsif { s6-chmod 0755 /tmp/eve }

# execute script/tmp/eve ${1}

Fabian van den Broek 20 October 2013 Femtocell Security 16 / 20

Page 24: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

What we found in the memory

• A recovery partition

• A port-knocking daemon ;-)• A binary listening to the opened port

adam#!/command/execlineb -S1# download command scriptif -n {

forx -x 1 i { 1 2 3 }foreground { s6-sleep 5 }if -n { /bin/tftp -g -r femto3xx/originalsin -l /tmp/eve ${1} }

}

# add exec rightsif { s6-chmod 0755 /tmp/eve }

# execute script/tmp/eve ${1}

Fabian van den Broek 20 October 2013 Femtocell Security 16 / 20

Page 25: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

What we found in the memory

• A recovery partition• A port-knocking daemon ;-)

• A binary listening to the opened port

adam#!/command/execlineb -S1# download command scriptif -n {

forx -x 1 i { 1 2 3 }foreground { s6-sleep 5 }if -n { /bin/tftp -g -r femto3xx/originalsin -l /tmp/eve ${1} }

}

# add exec rightsif { s6-chmod 0755 /tmp/eve }

# execute script/tmp/eve ${1}

Fabian van den Broek 20 October 2013 Femtocell Security 16 / 20

Page 26: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

What we found in the memory

• A recovery partition• A port-knocking daemon ;-)• A binary listening to the opened port

adam#!/command/execlineb -S1# download command scriptif -n {

forx -x 1 i { 1 2 3 }foreground { s6-sleep 5 }if -n { /bin/tftp -g -r femto3xx/originalsin -l /tmp/eve ${1} }

}

# add exec rightsif { s6-chmod 0755 /tmp/eve }

# execute script/tmp/eve ${1}

Fabian van den Broek 20 October 2013 Femtocell Security 16 / 20

Page 27: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

What we found in the memory

• A recovery partition• A port-knocking daemon ;-)• A binary listening to the opened port

adam#!/command/execlineb -S1# download command scriptif -n {forx -x 1 i { 1 2 3 }foreground { s6-sleep 5 }if -n { /bin/tftp -g -r femto3xx/originalsin -l /tmp/eve ${1} }

}

# add exec rightsif { s6-chmod 0755 /tmp/eve }

# execute script/tmp/eve ${1}

Fabian van den Broek 20 October 2013 Femtocell Security 16 / 20

Page 28: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Conclusions

• Femtocells should not receive user keys.• Still femtocells introduce new weaknesses and make

existing weaknesses easier to exploit.

Fabian van den Broek 20 October 2013 Femtocell Security 17 / 20

Page 29: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Responsible disclosure

We informed Vodafone Netherlands of our findings.

Newer firmware versions already disabled the recovery mode.Our attack no longer works on this newer version.

Current femtos are shipped with the newer firmware andvulnerable femtos in the field were remotely upgraded.

Fabian van den Broek 20 October 2013 Femtocell Security 18 / 20

Page 30: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

Questions?

Fabian van den Broek 20 October 2013 Femtocell Security 19 / 20

Page 31: Femtocell Security in Theory and Practice - NordSec 2013F.vandenBroek/slides/pres-Nordsec.pdf · Femtocell Security in Theory and Practice NordSec 2013 Fabian van den Broek & Ronny

What are femtocells?Femtocell Security in Theory

Femtocell security in PracticeRadboud University Nijmegen

(Most) Relevant Specifications

• 3GPP TS 25.467 UTRAN architecture for 3G Home NodeB(HNB)

• 3GPP TS 33.320 Security of Home Node B (HNB) /Homeevolved Node B (HeNB)

Fabian van den Broek 20 October 2013 Femtocell Security 20 / 20


Recommended