42
1 <Change information classification in footer> © Nokia 2016 Bell Labs Bell Labs Interconnection Security - SS7 and Diameter Silke Holtmanns Nokia Bell Labs 14 th November 2017

Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

  • Upload
    others

  • View
    15

  • Download
    4

Embed Size (px)

Citation preview

Page 1: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

1 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Interconnection Security -

SS7 and Diameter

Silke Holtmanns

Nokia Bell Labs

14th November 2017

Page 2: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

2 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Industrial Research

Page 3: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

3

Bell Labs

Bell Lab research for signallingNokia Bell LabsResearch for technology and communication since 1925

Page 4: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

4

Bell Labs

• Theoretical studies go into attack and countermeasure design

• Validation and awareness of our research byGSMA standards input and publication

• Customer feedback and test results allowus to fine-tune and optimize ourcountermeasures

• Research input will fit product needs and operators requests

• Operator needs can be discovered ”live” for new research challenges and disruptive newsolutions

Nokia Bell Labs – Future Attacks and MitigationResearch that solves real problems together with our customers

LabProblem study /Threats/Attack

Design AttackTesting

Countermeasures

Validation and Awareness

CustomerFeedbackProduct Improvements

Bell Labs Research Lifecycle

Page 5: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

5

Bell Labs

Routing and Signalling Security Research in Nokia Bell Labs

Telecommunicationprotocol security

Telco protocols meet HackersTwo worlds move towards each other

5G Security Requests

Awareness and education on diameter security (own company, customers, legislators)

Catching what hasnot been caught

Finding and mitigating signaling vulnerabilities

Silke Holtmanns, Yoan Miche, Ian Oliver

Attacks evolve, so must we

Page 6: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

6 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Signalling System No 7 SS7 Security

Page 7: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

7

Bell Labs

What is roaming?

We are here, somewhere

MEO, Vodafone, NOS

Meeting Attendees

Telefonica, DT, Vodafone, MTS,..

My home mobile network operator

Colleagues & Family

Elisa, TeliaSonera, DNA

Page 8: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

8

Bell Labs

Roaming Network – Interconnection NetworkNot the Internet – but equally important

Page 9: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

9

Bell Labs

We are all connected to the Interconnection Network

Page 10: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

10

Bell Labs

History of Interconnection NetworkTo understand the problem

▪ Established more than 35 years ago between a few state owned

operators

▪ Build on trust (closed private network)

▪ No inbuilt security (in particular, no source authentication)

▪ SS7 protocol was constantly extended for new services and

features

▪ New service providers connect all the time e.g. IPX roaming

hubs, Application to user SMS, etc

▪ Now moving towards LTE / Diameter based protocols (4G/5G)

Page 11: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

11

Bell Labs

<Change information classification in footer> © Nokia 2016

Closed & Private Network?

Page 12: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

12

Bell Labs

How the attackers get in?

Convincing

Hacking

Having Power

Bribing an EmployeeRenting a Service

Become an Operator

Page 13: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

13

Bell Labs

Existing Attacks for the ”old” SS7

• Location Tracking

• Eavesdropping

• Fraud

• Denial of Service user & network

• Credential theft

• Data session hijacking

• Unblocking stolen phone

• SMS interception

• One time password theft and account

takeover for banks, Telegram, Facebook,

Whatsapp, g-mail (bitcoin)

If no protection is deployed

Page 14: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

14

Bell Labs

Current Status of IPX Security

• Most commonly used protocol for interconnection is stillSS7-MAP (message application part)

• Often intermediate nodes involved

• Often without any form of transport security

-> No IPSec, no TLS / DTLS, no MAPSec

• No source authentication, no integrity, no confidentiality

Page 15: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

15 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Diameter Security

Page 16: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

16

Bell Labs

All will be better with LTE and Diameter……

Page 17: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

17

Bell Labs

All will be better different with

LTE and Diameter……

Page 18: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

18 © Nokia Solutions and Networks 2014

Attacks are reality

Why should they stop? Because we have LTE??

• Intelligence communities see mobile

networks as “all-you-can-eat-data-

buffet” and a way for VIP tracking and

eavesdropping

• Dark Service companies use

Interconnection to make money (fraud,

SMS interception, location tracking

offerings)

• Military uses mobile network data for

target localization

Page 19: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

19 © Nokia Solutions and Networks 2014

Service companies move with time and technology

Page 20: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

20

Bell Labs

Two LTE Networks ConnectConnection via IPX provider

Page 21: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

21

Bell Labs

<Change information classification in footer> © Nokia 2016

A bit more realistic….IPX “tiny” example

Page 22: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

22

Bell Labs

• Location Tracking (NATO CyCon Conference, 2015)

• Downgrading attacks (Troopers TelcoSec 2016)

• Denial of Service & Fraud (Blackhat, 2016)

• SMS and one time password interception (IEEE ICC 2017)

• Subscriber Profile Modification (Network and System Security 2017)

To come

• Data interception for GPRS, LTE (potentially December 2017)

Known Diameter Attacks

Page 23: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

23

Bell Labs

Network Attack - DoS

Network Setup for DoS Testing – Video

Page 24: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

24

Bell Labs

Get the IMSI using SRR

• Send Routing Info for SM

Request (SRR)

• Sent by SMSC to the HSS

• Retrieves subscriber’s

IMSI and identity of the

serving MME

• Routing a short

message to the

recipient

Page 25: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

25

Bell Labs

Denial of Service using CLR

Cancel Location Request (CLR)

Sent by HSS to the MME to detach

the UE

• MME change (location change)

• Subscription Withdrawal

Page 26: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

26

Bell Labs

<Change information classification in footer> © Nokia 2016

IDR usage for Location Tracking

Page 27: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

27

Bell Labs

One Time Password Interception using SMS LTE Diameter based

Page 28: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

28

Bell Labs

<Change information classification in footer> © Nokia 2016

Services that use SMS password recovery

Page 29: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

29

Bell Labs

Diameter Security – Old tricks come again (implementation specific)Diameter message manipulation - Attribute Value Pair (AVP) doubling.

Operator Network A

DEAHSS AttackerDiameterOrig = MME.operator.comDest = HSS.operatora.comHop-by-hop ID 1

DiameterOrig = MME.operator.comDest = HSS.operatora.comHop-by-hop ID 3

AVP: Value1 Value2AVP: Value1 Value2

Fast decision based on value 1ignoring value 2

Thorough decision, iterating all values, taking value 2

Diameter messages can be manipulated to contain multiple AVPs of the same kind (same AVP id) even though the specification clearly says it's illegal to do so.

Page 30: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

30 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

IoT & Interconnection

Page 31: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

31 © Nokia Solutions and Networks 2014

Who are IoT B2B customers?

99.9

Large Enterprises

• Financial

• Healthcare

• Automotive

• Retail

Public Sector

• Public Safety

• Defense

• Government

Broadband

• Smart

Cities/Smart

Government

Transportation

• Railways

• Highways

• Logistics

• Aviation/Airports

• Maritime

Energy

• Utilities

• Electricity

• Oil, Gas & Mining

• Utility Broadband

Page 32: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

32 © Nokia Solutions and Networks 2014

Roaming IoT devices

There might be many roaming IoT devices

GSMA Member Confidential

• Even meters, buiding sensors etc mayroam (coverage reasons). In particularfor global operators.

• Normal roaming e.g. cars, logistics etc

• Broker SIMs (e.g. Apple iSIM)

• Ease of production

• New business models e.g. globalcompany wanting to have a ”harmonized” infrastructure and being supplied by one connectivitysupplier

• Large amounts of same device typesbehaving in the consistent samemanner

NO Direct Access !

IPX network

Meter with Country B USIM on eUICC

Operabor belong

to Operator Group

Country A

Connect as roamer

Other country A operator

Operabor belong

to Operator Group

VPN

Country B

Page 33: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

33 © Nokia Solutions and Networks 2014

Affecting also IoT devices

”Classical” Interconnection Risks

GSMA Member Confidential

• Location Tracking

• Fraud

• Credential Theft

• SMS Attacks

- Interception

- Spoofing (steering messages / reporting messages)

• GTP data attacks

- Session hijacking

- Cryptographic key theft (potentially used on air interface)

Page 34: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

© 2016 Nokia34

TS 23.6823GPP Release 14 – IoT Extensions

GSMA Member Confidential

• Trust model for new interfaces is the same as for the existing ones

– 3GPP TS 33.210 to be used for connecting to partners

• Easy interworking and access for machine service providers

• Non-MSISDN based devices

– External identifier (DNS resolvable)

• New nodes and interworking functions to allow seamless integrationinto existing networks

Page 35: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

© 2016 Nokia35

Figure 4.2-1b: 3GPP Architecture for Machine-Type Communication (Roaming)

3GPP TS 23.682 - Protocols

GSMA Member Confidential

Services Capability

Server(SCS)

Gi/SGi

Tsp

Control plane

User plane

Indirect Model

Direct Model

Hybrid Model

GGSN/P-GW

SMS-SC/GMSC/IWMSC

2

1

1

T4

S6m

Rf/Ga

Um /

Uu /

LTE-Uu

MTC UE

Application

MME

HPLMN

VPLMN

Gi/SGi

SGSN

S-GW

UE

MSC

RAN

T7

T6bi

HSS

Tsms

Application Server

(AS)1

Application Server

(AS)2

IP-SM-GW

CDF/CGF

2+

SME

MTC-IWF

MTCAAA

S6n

E

SGd

Gd

SCEFAPI

S6t

IWK-SCEF

T6aiSGs

SMS protocols

(SMS using Diameter

maybe MAP/IP fallback

Diameter

GTP

Page 36: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

36 © Nokia Solutions and Networks 2014

IoT and Interconnection - Summary

<Change information classification in footer>

• New IoT interfaces bring new risks

- Some risks similar to existing risks, but could be ”larger in scale”

- Trust model need to be carefully studied when opening up new interfaces

- Business models (i.e.coverage) may suddenly open up interfaces that were not designed for interconnection i.e. extra protection needed

• New Security Approaches for IoT Roaming

- Understanding and profiling of groups of devices

- Roaming specific aspecs for groups of IoT devices need to taken into account at network edge

- Specific IoT group filtering capabilities needed in long run

• Today:

- One subscription is roughly like another from security point of view (exception pre-paid)

Page 37: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

37 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Countermeasures

Page 38: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

38

Bell Labs

Let’s use IPSecGood idea, but….

• IPSec for diameter is standardized

• It’s all IP, lets use IPSec! Maybe not that easy…… • Not all is IP (some part of SS7 / interworking)• Who will host / create root certificates• Operators in developing countries• Interconnection service provider -> only hop-by-hop security• Nodes difficult to upgrade

• Still no protection against• Partners renting out to ”service companies”• Hacked nodes• Bribed employees• Governmental ties

Page 39: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

39

Bell Labs

Countermeasures for operators

MitigateFilter, filter, filterSignaling Firewall

SMS Home Routing

CooperateShare experiences (GSMA)IPSec with partners e.g. EU

Cooperation with legislators

PrepareFollow FS.11,FS.19,FS.07

Find weak spotsNode hardening/procedures

DetectMonitor network trafficPenetration & re-testing

Tenant monitoring

Page 40: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

40 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Summary

Page 41: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

41

Bell Labs

Summary

• Interconnection attacks are reality, but current main focus is SS7

-> attackers move also with technology

• LTE/Diameter has similar functionality-> hence similar attacks are possible there

• Security is not part of operator core business model-> impacts and risks too large to ignore

• Independent of phone, platform or device

• Will LTE face the similar Interconnection weaknesses as SS7?

-> If networks don’t take protection measures, then yes.

Page 42: Interconnection Security - SS7 and Diameter dive 2017 - Silke...SS7 protocol was constantly extended for new services and features New service providers connect all the time e.g. IPX

42 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Questions?

[email protected]