Title: Using GSMUMTS for Single SignOn
1Using GSM/UMTS forSingle Sign-On
28th October 2003 SympoTIC 2003 Andreas
Pashalidis and Chris J. Mitchell
2Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
3Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
4Why do we need SSO ?
- Current Situation
- Network users interact with multiple service
providers.
5Why do we need SSO ?
- Problems
- Usability, security, privacy
6What is SSO ?
- A mechanism that allows users to authenticate
themselves to multiple service providers, using
only one identity.
7SSO How ?
- Establish trust relationships, common security
infrastructure (e.g. PKI), sign contractual
agreements
8SSO some examples
- Kerberos
- TTP Kerberos server
- 1) Authenticates user (password), issues
ticket. - 2) User shows ticket to service provider.
- Microsoft Passport
- TTP www.passport.com
- 1) Authenticates user (password), installs
encrypted cookie. - 2) Service Provider reads the cookie.
- Liberty Alliance
- TTP Identity Provider
- 1) Authenticates user, issues assertion (XML).
- 2) Assertion is shown to service provider.
9Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
10Review of GSM Security
11Review of GSM Security
12Review of GSM Security
13Review of GSM Security
14Review of GSM Security
15Review of GSM Security
16Review of GSM Security
17Review of GSM Security
18Review of GSM Security
19Review of GSM Security
If the visited network can decrypt, then the SIM
is authentic (IMSI matches Ki)
Encrypted under Kc
20Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
21Architecture - before
22Architecture after (1)
23Architecture after (2)
24Architecture
25Architecture
Service providers form trust relationships with
the home network.
26Architecture
Singe Sign-On using SIM (IMSI) !
27SSO Protocol
28SSO Protocol
29SSO Protocol
30SSO Protocol
31SSO Protocol
32SSO Protocol
33SSO Protocol
34SSO Protocol
35SSO Protocol
36Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
37Replay Attack
Attacker could capture this message and replay it
later in order to impersonate the user identified
by the IMSI.
38Replay Attack
At the time of replay another RAND will be
selected by the service provider and the protocol
will fail.
fresh !
X
old !
39Reflection Attack
The service provider SP A is malicious. It
wants to impersonate the user to SP B.
40Reflection Attack
41Reflection Attack
42Reflection Attack
43Reflection Attack
44Reflection Attack
45Reflection Attack
46Reflection Attack
X
47Other Attacks
- SIM theft / cloning
- SIM PIN is optional!
- Need two-factor user authentication.
- Home network server is SPoF
- Vulnerable to DoS attack.
- It is assumed that it is well-protected.
- Attacks on the SP-home network link
- Link must be integrity-protected and encrypted.
- SSL/TLS, VPN, IPSec, etc
48Agenda
- Introduction to SSO.
- Review of GSM security.
- How to SSO using GSM.
- Some Attacks.
- Conclusions.
49Advantages
- no user interaction is required.
- protocol can be repeated many times.
- simple single logoff.
- no sensitive information is sent.
- no major computational overheads.
- no changes in deployed GSM infrastructure.
- fraud management extends to SSO.
- can easily be extended to enable LBS.
50Disadvantages
- works only for GSM subscribers.
- global identifier (IMSI).
- might incur costs for service providers.
51Extension for UMTS
52Thanks!Questions?