Michael Haberler Internet Foundation Austria

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

RadSec – A better RADIUS protocol
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
WPKI available technology diagram and the business model
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
Cryptography and Network Security
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Pre-Shared Key TLS with GBA support Thesis presentation ESPOO, Finland.
Myagmar, Gupta UIUC G Security Principles Build on GSM security Correct problems with GSM security Add new security features Source: 3GPP.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
G53SEC 1 Mobile Security GSM, UTMS, Wi-Fi and some Bluetooth.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Mobile and Wireless Communication Security By Jason Gratto.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless and Security CSCI 5857: Encoding and Encryption.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Security in GSM/GPRS and UMTS
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
GSM Network Structure Lance Westberg.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
© NOKIADEFAULT.PPT / / AO page: 1 USIM requirements and structure NOKIA Mobile Phones TSGT3#3(99)082.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
Chapter 4 Application Level Security in Cellular Networks.
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
Wireless Network Security and Interworking
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
SIM application
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Workshop roaming services: eduroam / govroam
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
Wireless Network PMIT- By-
GSM SECURITY AND ENCRYPTION
Module Overview Installing and Configuring a Network Policy Server
3G Security Principles Build on GSM security
TDR authentication requirements
Presentation transcript:

Michael Haberler Internet Foundation Austria 2G/3G Authentication with SIM cards: usage & roaming basics for the Internet challenged Michael Haberler Internet Foundation Austria

outline a SIM card mini-tutorial UMTS authentication and key agreement features, protocol flow, usage, production, addressing UMTS authentication and key agreement principles and protocol flow the universal integrated circuit card (UICC) USIM app how 2G, 3G roaming works „over the air“ (OTA) loading of UICC apps example: X.509 certificate download (U)SIM‘s and Internet access authentication how SIMs and RADIUS roaming works (U)SIM‘s and SIP authentication what the SIP server does How the parameter logistics works a bonus business model thrown in summary

what‘s a 2G SIM card crypto smart card as per ISO 7816 access protected by a PIN code(s) („card holder verification“) fixed storage of subscriber identity – IMSI (international mobile subscriber identity) – „GSM MAC address“ E.164 number to IMSI mapping at the operator only safe storage for shared secret - accessible only through CHAP operation not broken as of today except for most stupid CHAP algorithm known CHAP algorithm in hardware operator chooses algorithm tree structured filesystem stream, record, cyclic record files can be readonly, read/write or none at all (for the key) some permission hierarchy

how are SIM cards produced unprogrammed chips are „personalized“ and „closed“ (parameters written & sealed) mass product - $5-$7 apiece at 1000+ GEMplus, Giesecke & Devrient .... everybody can have SIM‘s made – even Mom&Pop ISP not everybody may roam with other cellular operators use the GSM algorithm „A3/A8“ – you wouldnt want it anyway must be member of GSM association for that having your own algorithm in a chip mask is a circa $50K+ affair for testing & development unprogrammed castrated chips used (XOR algorithm for CHAP...)

how are (U)SIM cards accessed 2G, 3G use builtin reader in the mobile handset for Internet use: maybe builtin in PDA, PC (e.g.DELL) external USB token – 20$ apiece re-use a mobile SIM card via Bluetooth SIG SIM Access Profile (only if roaming against 2G/3G operator) read 3G „(U)SIM Security Reuse by Peripheral Decices on local interfaces“ – contains some threat analysis

SIM usage in 2G authentication access request – present IMSI Authentication Center 2G GSM handset present challenge („RAND“) send RESP (challenge response) keys shared secret

IMSI structure MCC/MNC uniquely designates an operator and his authentication center when roaming, MCC/MNC tells the visiting network where to route the authentication request this is done via SS7 MAP (mobile application part)

what is „OTA“ (over the air) loading? SIM cards are writable by mobile equipment if authenticated to network if instructed by operator „over the air“ if file/directory is writable example: ISIM X.509 certificate „bootstrap“ AKA authenticated: let user visit PKI portal download certificates through HTTP/Digest mechanism certificates are stored in record structured files, as ar CA certifcates „The Air“ can also be an IP connection download of executable applets possible SIM Toolkit, USAT (USIM Application toolkit) bytecode instructions sent encrypted by 3DES, stored on card regularly used in 2G networks today – for functionality upgrades & parameter download

UMTS authentication and key agreement (AKA) substantially improved over 2G SIM protection against replay, MITM attacks sports also network-to-user authentication more complex algorithm compatibility functions 2G network/3G card, 3G network/2G card

3G AKA authentication flow access request – present IMSI Authentication Center 3G UMTS handset challenge RAND || AUTN token send RESP (challenge response) keys shared secret, Sequence numbers result: Cipher key Integrity key

what‘s the universal integrated circuit card (UICC) about generic support mechanism for multiple applications on one card 2G,3G authentication become „applications“ selected as needed USIM application implements AKA 2G SIM app implements 2G CHAP additional apps possible (ISIM, PKI certificate storage etc) ISIM is pretty close to SIP client needs!! mobile equipment chooses application

using (U)SIMs for Internet access authentication embed flow in EAP and tunnel in RADIUS between 802.1x „supplicant“ in client and RADIUS EAP backend using EAP-SIM or EAP-AKA RADIUS server MAY gateway to SS7 MAP and „roam“ WiFi network looks like a GSM roaming partner example: WiFi roaming through www.togewanet.com OR RADIUS server access an ISP-style database for keys ISP is the SIM card issuer!

using (U)SIM for SIP authentication speak HTTP/AKA (RFC3310) between SIP UA and proxy proxy translates into EAP-AKA-in-RADIUS RFC specified only for AKA (3G auth) no mapping of EAP-SIM onto HTTP/SIM for 2G auth bad – almost all networks today use 2G auth – which breaks SIP authentication through GSM/UMTS operators we need to address this and spec HTTP/SIM

how 2G roaming works mobile equipment presents IMSI visited network looks at MCC,MNC part of IMSI if no roaming agreement, drop him otherwise send access request thru SS7 MAP to home network the home network verifies IMSI and sends a „triplet“: (challenge, expected response, cipher key) authentication vector visited network presents challenge, reads response if (response == expected response), service user the triplet is essentially an access ticket note no replay detection – these fellows seem to trust each other

how 3G roaming works not much different from 3G, just more parameters needed for AKA „triplets“ become „quintets“

how the 2G/3G user ids (IMSI‘s) are mapped to RADIUS authentication: take mobile country code, mobile network code use them to create a realm Example IMSI = 232011234567890 means mcc=232 (Austria) mnc=01 (Mobilkom) resulting realm mnc01.mcc232.owlan.org resulting RADIUS user 232011234567890@mnc01.mcc232.owlan.org routing to Radius servers decided by „subdomain“ convention established by Nokia Nokia owns owlan.org domain pro-bono from thereon this is vanilla RADIUS roaming but its just fine if we call it mnc01.mcc232.visionNG.org if that sounds better, realms just gotta be unique

how does 2G/3G address logistics work if you are a service provider and have E.164 ranges, get a MNC from your MCC administrator (FCC, regulator...) the E.164 range might also be, for example, from visionNG (+87810 ff) MCC = 901 this doesnt mean you‘re part of 2G/3G roaming yet – contracts & regulatory prerequisites needed but the addressing is all set to go!!

a bonus business model thrown in: combine a SIP-based iTSP with a Mobile Virtual Network Operator (MVNO) an MVNO has authentication, billing, customers, numbers, but the radio network is outsourced from somewhere else issue (U)SIM cards which work both in a 2/3G handset AND as WiFi/SIP auth tokens – note the same card authenticates both uses! leave choice to user how to connect – Internet or cellular – using the same E.164 number

Summary 2G/3G has a strong/very strong authentication architecture it is almost copy & paste for iTSP use at WiFi access, WiFi roaming acces, SIP and other levels (TBD!) it can serve to solve the X.509 certificate distribution problem operator model (2G/3G home network, ISP home network) has no impact on Internet-side terminals numbering & addressing resources are compatible and available (maybe not obviously so) the Internet could become the biggest (U)SIM authenticated mobile network ever to roam with 2G/3G land