slide1
Download
Skip this Video
Download Presentation
Vulnerability Analysis of Mobile and Wireless Protocols

Loading in 2 Seconds...

play fullscreen
1 / 33

Vulnerability Analysis of Mobile and Wireless Protocols - PowerPoint PPT Presentation


  • 93 Views
  • Uploaded on

Vulnerability Analysis of Mobile and Wireless Protocols. Outline. Vulnerability Analysis Method Message Spoofing Mobile IPv4 WiMAX EAP EAP-FAST Future work. Vulnerability Analysis Method. Study the protocol specifications Find Unprotected messages

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Vulnerability Analysis of Mobile and Wireless Protocols' - zelda-pierce


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
outline
Outline
  • Vulnerability Analysis Method
  • Message Spoofing
  • Mobile IPv4
  • WiMAX
  • EAP
    • EAP-FAST
  • Future work
vulnerability analysis method
Vulnerability Analysis Method
  • Study the protocol specifications
  • Find Unprotected messages
  • Concentrate on the unprotected messages to find security vulnerabilities
  • If practical, simulation of the vulnerabilities
  • Proposal of solution(s)
message spoofing
Message spoofing
  • Can be achieved using debug ports left open by hardware vendors
  • Standard – IEEE 1149.1 – Joint Test Action Group (JTAG)
  • Intel and Fujitsu WiMAX implementations leave their debug ports open
  • Motorola JTAG ports are closed in production boxes
mipv4 phases
MIPv4 – Phases
  • Agent Discovery
  • Registration
  • Data Exchange
vulnerability analysis
Vulnerability Analysis
  • No new vulnerabilities found
wimax
WiMAX
  • Studied the IEEE 802.16 (2004) spec
  • Focused on Network Entry and Initialization before SS authorization step
vulnerabilities found
Vulnerabilities found
  • 0-Authorization vulnerability
    • Using SBC-REQ and SBC-RSP messages
  • Ranging synchronization vulnerability
    • Using RNG-REQ and RNG-RSP messages
  • UCD vulnerability
0 authorization vulnerability
0-Authorization vulnerability
  • Authorization Policy Support is one of the many capabilities
  • Authorization and key exchange steps will be skipped if the Auth Policy Support bits are set to 0
  • Vulnerability also exists if ‘bitwise and’ of auth bits of SBC-REQ and SBC-RSP is 0
0 authorization vulnerability1
0-Authorization vulnerability

SBC-REQ / SBC-RSP message format

Authorization Policy Support bits

0 authorization vulnerability2
0-Authorization vulnerability
  • Motorola implementations allow 0-authorization only for debugging purposes and E911 with limited access
  • Spoofed SBC-REQ with 0-authorization
    • Network will most likely reject it
  • Spoofed SBC-RSP with 0-authorization
    • MS will not permit it for not being able to trust the service provider
ranging sync vulnerability
Ranging Sync vulnerability
  • Ranging adjusts SS's timing offset such that it appears to be co-located with BS
  • RNG-REQ message is sent by the SS with power level and timing offset corrections
  • If the status in spoofed RSG-RSP is continue,
    • SS keeps on trying until successful
  • Aborts and re-ranges after a fixed number of tries
ranging sync vulnerability1
Ranging Sync vulnerability
  • If the status in spoofed RNG-RSP is either Abort or Re-range
    • Starts the network entry process again from the beginning
  • Correct timing is essential for this attack to work
    • Spoofed messages should be sent before the legitimate RNG-RSP reaches SS
ucd vulnerability
UCD vulnerability
  • After channel synchronization, SS waits for UCD msg from BS to retrieve a set of transmission parameters for uplink chanel
  • A spoofed UCD message with unsuitable channel parameters will make the SS start over from the first step of downlink channel scanning
wimax analysis
WiMAX Analysis
  • Found 3 potential vulnerabilities
  • But, they are hard to instigate as they require:
    • Considerable hardware to spoof the messages
    • Correct timing
slide23
EAP
  • Used in the PPP, 802.11, 802.16, VPN, PANA, and in some functions in 3G networks
  • Support currently about 40 different EAP methods
  • Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, PEAP, LEAP and EAP-TTLS
eap and associated layers
EAP and associated layers

Authentication method layer

EAP-TLS

PEAP

EAP-SIM

EAP-AKA

EAP-FAST

Extensible Authentication Protocol (EAP)

EAP Layer

EAP Over LAN (EAPOL)

Data Link Layer

PPP

802.3

Ethernet

802.5

Token Ring

802.11

WLAN

802.11

Serial Link

eap message exchange framework
EAP Message Exchange Framework

Server

(EAP-Request Identity)

(EAP-Response Identity)

EAP-Response Identity

Method specific EAP Request

Repeat until success or fail

Method specific EAP Response

EAP-Success

Peer

AP

eap fast flexible authentication via secure tunneling
EAP-FAST (Flexible Authentication via Secure Tunneling)
  • Most Comprehensive and secure WLAN method
  • Use of a protected access credential (PAC)
  • Three phase
    • Phase 0 : PAC provisioning
    • Phase 1 : Establish TLS tunnel.
    • Phase 2 : Authentication
slide27
Phase 0

EAP Request/Identity

EAP Response/Identity ([email protected])

EAP-FAST [TLS Client Hello[Client_Random,PAC-Opaque]]

PAC Provisioning

EAP-FAST Start [A-ID]

EAP-FAST [TLS Server Hello[Server_Random]]

Phase 1

TLS change Cipher Spec

TLS Finished

TLS change Cipher Spec

TLS Finished

Authentication with a inner Authentication method

Optional PAC Refresh

Phase 2

EAP Success

Establish Secure Channel

Establish Secure Channel

Establish connection

(for example, TCP)

Peer

AP

Inner method Server

EAP-FAST server

TLS Tunnel established

TLS Tunnel torn down

EAP-FAST choreography overview

explaination for unprotected message
Explaination for unprotected message

Initial Request-response Messages

  • Sent in cleartext
  • Just contain realm information
  • Used to route the authentication requests to the right eap server
explaination for unprotected message 2
Explaination for unprotected message(2)

Clear text success /failure packet

  • The success/failure decisions within the tunnel indicate the final decision of the EAP-FAST authentication conversation.
  • To abide by [RFC3748], the server must send a clear text EAP Success or EAP Failure packet to terminate the EAP conversation.
explaination for unprotected message 3
Explaination for unprotected message(3)
  • What will happen if a clear text indication is spoofed?

It dosen’t matter because the clear text indication is only used to terminate the authentication conversation, not for other use.

  • What will happen if the final cleartext success/failure packet in an EAP-FAST is lost?

It is up to the basic EAP policy. In the event that neither a success nor a failure packet is received, the peer SHOULD termiate the conversation to avoid lengthy timeout in case of the lost packet was an EAP failure.[RFC3748, 4.2]

eap fast analysis
EAP-FAST Analysis
  • No vulnerability was found wihin EAP-FAST!
future work
Future work
  • Study internal attacks
    • Till now the focus was on external attacks
  • Resource Depletion attacks
ad