520 likes | 634 Vues
This presentation discusses the implementation of Single Sign-On (SSO) using GSM/UMTS technologies. It covers the current landscape of SSO needs, the benefits and challenges of using GSM security infrastructure, and outlines several attacks that can target this system. Key topics include the functioning of SSO, trust relationships between service providers and home networks, and common attack vectors such as replay and reflection attacks. The session aims to provide a comprehensive understanding of SSO with GSM, addressing usability, security, and privacy considerations.
E N D
Using GSM/UMTS forSingle Sign-On 28th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Why do we need SSO ? Current Situation: Network users interact with multiple service providers.
Why do we need SSO ? Problems: Usability, security, privacy…
What is SSO ? A mechanism that allows users to authenticate themselves to multiple service providers, using only one identity.
SSO – How ? Establish trust relationships, common security infrastructure (e.g. PKI), sign contractual agreements…
SSO – some examples • Kerberos • TTP = Kerberos server • 1) Authenticates user (password), issues “ticket”. • 2) User shows ticket to service provider. • Microsoft Passport • TTP = www.passport.com • 1) Authenticates user (password), installs encrypted cookie. • 2) Service Provider reads the cookie. • Liberty Alliance • TTP = “Identity Provider” • 1) Authenticates user, issues “assertion” (XML). • 2) Assertion is shown to service provider.
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Review of GSM Security If the visited network can decrypt, then the SIM is authentic (IMSI matches Ki) Encrypted under Kc
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Architecture Service providers form trust relationships with the home network.
Architecture Singe Sign-On using SIM (IMSI) !
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Replay Attack Attacker could capture this message and replay it later in order to impersonate the user identified by the IMSI.
Replay Attack At the time of replay another RAND will be selected by the service provider and the protocol will fail. fresh ! X old !
Reflection Attack The service provider SP “A” is malicious. It wants to impersonate the user to SP “B”.
Other Attacks • SIM theft / cloning • SIM PIN is optional! • Need two-factor user authentication. • Home network server is SPoF • Vulnerable to DoS attack. • It is assumed that it is well-protected. • Attacks on the SP-home network link • Link must be integrity-protected and encrypted. • SSL/TLS, VPN, IPSec, etc…
Agenda • Introduction to SSO. • Review of GSM security. • How to SSO using GSM. • Some Attacks. • Conclusions.
Advantages • no user interaction is required. • protocol can be repeated many times. • simple single logoff. • no sensitive information is sent. • no major computational overheads. • no changes in deployed GSM infrastructure. • fraud management extends to SSO. • can easily be extended to enable LBS.
Disadvantages • works only for GSM subscribers. • global identifier (IMSI). • might incur costs for service providers.