SlideShare a Scribd company logo
Assaulting IPX Diameter roaming network
Alexandre De Oliveira
15/03/2016
Whoami
• Telecom security curious
• Red Team at POST Luxembourg
• Previously P1 Security
• SS7map projet during 31C3 with Laurent Ghigonis
• Worldwide SS7 attacks with Pierre-Olivier Vauboin
Page 2
Why diameter security ?
• SS7 security was a disaster
• And about Diameter ?
Page 3
Diameter
• Used for signalisation in LTE Networks
• Worldwide deployment
− Roaming available
• IPX: IP exchange – Diameter Roaming network
Page 4
Diameter architecture possibilities
• Mesh vs Routed networks
• Real networks are mixed
Page 5
•Hard to maintain
•Filtering is complexe
•Impossible for huge networks
•Segmentation by default
•Easier to maintain
•Filtering is centralized (DEA/DRA)
•Cost of DEA/DRA
•Routing is « Open » by default
Diameter in telecom world
• IP based, over SCTP/3868
• Authentication, Authorization, and Accounting protocol and
more
• Base defined by RFC 6733 & Telecom AVPs defined by 3GPP
• Diameter AVP allows infinity of possiblities
Page 6
Interfaces / Applications / AVPs
• Infinity of Diameter applications & AVPs to be defined
• S6a/S6d for HSS/MME/SGSN roaming
• S9 for inter PCRF roaming Page 7
Gathering information on IPX
• Operator giving to much info in IR.21 :
− 106 MME
− 70 HSS
− 18 DSC -> Ericsson DEA/DRA
− 70 DEA
− 8 M2M HSS
− 146 IPX DNS
− Etc…
• Send automatic routed (IMSI) messages : AIR !
− Get HSS host & naming pattern !
• Send any diameter messages to a random host destination to
the network
• Request the IPX DNS !
Page 8
Tracking via Diameter S6a
Page 9
Insert subscriber Data Request - IDR
Page 10
Info Location Req
IMSI targeted
Request– IDR – S6a
IDR is sent from HSS to MME/SGSN
Insert subscriber Data Answer - IDA
Page 11
Alsoget current state ATTACHED / DETACHED / …
TrackingArea
Cell-ID
Using governmental tracking
Page 12
SLh – RIR Routing Info Request
Page 13
IPX
HPLMN
HSS Victim
Prerequisites:
MSISDN or IMSI
GMLC GT
Information Gathered:
MME Host
SGSN Host
MSC GT
MSISDN
illegitimate
DiameterRIR
MME
Attacker as fake GMLC
DRA
DEA
SLg – PLR Provide Location Request
Page 14
IPX
HPLMN
HSS Victim
Prerequisites:
MSISDN or IMSI
Information Gathered:
ECGI (Cell-ID)
Serving Node
Age of Location
Subscriber State
Positionning Data
illegitimate
DiameterPLR
MME
Attacker as fake GMLC
DRA
DEA
Tracking in IMS – Sh UDR
Page 15
IPX
HPLMN
HSS Victim
Prerequisites:
MSISDN or IMSI
Information Gathered:
CSLocationInformation
PSLocationInformation
CurrentLocation
illegitimate
DiameterUDR
AS
DEA
DRA
Attacker as fake AS
S6c – Diameter SRR (SRISM)
• Introduced released 11 – MME / SMS-IWMSC / SMS-GMSC
• SS7 as already SRISM in SMS call-flow
• Protections implemented in SS7 with SMS-FW and Home
Routing in SS7/SIGTRAN
• Same protections for Diameter SRR (SRISM) ?
Page 16
S6a - Denial of Service
• S6a RSR – Reset Request
− Sending RSR to MMEs after a HSS reboot/outage
− MME is sending back information about requested subscribers
− Signalisation DoS of the entire network by overloading HSS
• S6a CLR – Cancel Location Request
− Need to know IMSI & MME-Host
− Instant DoS - Remove the subscriber from the MME
• S6a ULR – Update Location Request
− Need to know IMSI & HSS-Host
− Instant DoS – Subscriber relocation on fake MME
• S6a PUR
− Need to know IMSI & MME/SGSN Host
− Instant DoS – Subscriber MME reference removed from HSS
Page 17
Routing on the diameter network
• Hop-by-HopId: Unique between two routing peers (DEA/DRA),
allows matching between request and response
• End-to-End Id: Unique on the complete packet path. Used to
detect duplicates.
• Request routed on Destination Host & Realm OR IMSI (AIR)
• Response routed back with HopbyHop & DEA/DRA interface
Page 18
MME
Operator1
DEA
Operator1
DRA
IPX
HSS
Operator2
HopbyHop
EndtoEnd
0x12345678
0xabcdef12 0xabcdef12
0xabcd5678 0x1234abcd 0x87654321
0xabcdef12 0xabcdef12
HopbyHop
EndtoEnd
0x12345678
0xabcdef12 0xabcdef12
0xabcd5678 0x1234abcd 0x87654321
0xabcdef12 0xabcdef12
DEA
Operator2
= = =
= = =
!= != !=
!=!=!=
Diameter as spoofing friendly protocol
Page 19
Attacker
Spoofed MNO1
Targeted MNO2
IPX
Spoofing
Origin-Host:MNO1
Realm:MNO1
1. Attacker send Diameter IDR spoofing MNO1
2. IPX provider doesn’t check for spoofing
3. Message responded by MME MNO2
4. Automaticroute back of reponse on HopbyHop-Id
5. Spoofed packet returns to the attacker with
subscriber locationdata
HSS
MME
HSS
MME
IDR Location Req
Basic mistakes on MNO DEA
• Auth-Application-Id as « Relay » will route packets
• No filtering, just route and forward.
Page 20
Relay
Avoiding the unwanted
• In CER negociation be explicit in the Application-ID
• Avoid messages from any other application to be accepted
Page 21
S6a only
Avoiding the unwanted
• Check CER/CEA on each network elements / interface
• CER/CEA sent must have a specified Application-Id
− No Relay or Proxy
• Not specified in CER/CEA Application-Id received should be
dropped
• Reduce possible attack surface
• Avoid a lot of attacks possible with routing abuses
− e.g. DEA configured as Relay
− HSS misconfiguration
Page 22
Detecting attacks on your network
• How to do it ?
• Do I have equipment to do monitoring it in my network ?
− YES
• Security monitoring ?
− YES, just need to explore possiblities !
• Should I go for new equipment ?
− Use what you have in your network !!!
• Operators have plenty of solutions but they don’t know it
Page 23
How to quick and easy
• Using pcap trace, easy for IPX
• Simple wireshark / tshark rules
• Ok it’s not real time, but gives good visibility !
Page 24
InternalSpoofing: tshark -r input_file.pcap -Y '(diameter.Origin-Host matches
".epc.mncXXX.mccXXX.3gppnetwork.org$") && diameter.flags.request== 1 &&
ip.src != YOUR_DEA_IP_RANGE/24' -w spoofing_attacks.pcap
Non S6a: tshark -r input_file.pcap -Y '!(diameter.applicationId == 16777251) &&
diameter&& !(diameter.cmd.code == 280)' -w non_S6a_packets.pcap
Developping a Diameter IDS
• Started to develop it at POST Luxembourg / using Splunk
for easy & quick stats and research
• Still in beta, but monitoring actively IPX interconnextion
• Will be published on github.com soon… 
• Already detecting interesting behaviors such as
− IDR location attacks
− IDR bruteforce on IMSIs
− Non S6a messages received…
• But also helping to report network misconfigurations !
Page 25
IDR location request + IMSI bruteforce
Page 26
IMSI Origin-Host Dest-Host MessageType : IDR
Green: IDR Request
Orange:UNKNOWN USER
Yellow: VALID USER
90 % of IDR traffic with UNKNOWN_USER responses
SS7 vs Diameter security
Page 27
Recap
Page 28
Interface Diameter message Target Attack type
S6a ULR HSS Sub DoS
S6a CLR MME Sub DoS
S6a PUR HSS Sub DoS
S6a RSR MME Network DoS
S6a IDR MME Fraud(Profile Injection)
S6a IDR MME Tracking
SLh RIR HSS Tracking/ Info gath
SLg PLR MME Tracking
Sh UDR HSS Tracking
S6c SRR HSS Info gathering
S9 (S9/Rx) CCR / RAR PCRF Fraud?
S6m SIR HSS Info gathering ?
Don’t forget IR.21, IPX DNS, AIR, Route Record for info gathering
Recommendations
• Do NOT set DEA as relay, be explicit in declared applications
• Set explicit Application-Id on CER for all equipments
• Do NOT connect everything to DEA, prefer direct connectivity
− HSS / MME with GMLC
− PCEF, OCS, OFCS with PCRF
• Filter for IDR with location request targetting your subscribers
• Filter for spoofing of internal Host/Realm on DEA
• Drop any diameter messages that should not come from
international
• There are remediations for spoofing, IPX providers will need to do
their job
• Monitoring is the way 
Page 29
Thanks
• POST Luxembourg
− Core Mobile teams & CSE Security team
• Pierre-Olivier Vauboin
• Laurent Ghigonis
• TROOPERS Organizers for such great event 
Page 30
Questions ?
Page 31
Thank you
alexandre.deoliveira@post.lu
Page 32

More Related Content

What's hot

Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
Alejandro Corletti Estrada
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
Karel Berkovec
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
Cisco Canada
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
Vikas Shokeen
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
ntel
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
Vikas Shokeen
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
Vikas Shokeen
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
Reza Farahani
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
Luca Matteo Ruberto
 
Restcomm Geolocation API and GMLC Restconn 2017
Restcomm Geolocation API and GMLC Restconn 2017Restcomm Geolocation API and GMLC Restconn 2017
Restcomm Geolocation API and GMLC Restconn 2017
Eng. Fernando Mendioroz, MSc.
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
tharinduwije
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
Sarp Köksal
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
PositiveTechnologies
 
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
3G4G
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
Karel Berkovec
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
Naveen Jakhar, I.T.S
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
Matiullah Jamil
 
Wcdma callflow
Wcdma callflowWcdma callflow
Wcdma callflow
nayanangshu
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Bruno Teixeira
 
Ims call flow
Ims call flowIms call flow
Ims call flowMorg
 

What's hot (20)

Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or...
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained volte ims network architecture tutorial - Explained
volte ims network architecture tutorial - Explained
 
MPLS & BASIC LDP
MPLS & BASIC LDPMPLS & BASIC LDP
MPLS & BASIC LDP
 
Sigtran Workshop
Sigtran WorkshopSigtran Workshop
Sigtran Workshop
 
Restcomm Geolocation API and GMLC Restconn 2017
Restcomm Geolocation API and GMLC Restconn 2017Restcomm Geolocation API and GMLC Restconn 2017
Restcomm Geolocation API and GMLC Restconn 2017
 
Lte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkxLte ue initial attach & detach from networkx
Lte ue initial attach & detach from networkx
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)Advanced: Control and User Plane Separation of EPC nodes (CUPS)
Advanced: Control and User Plane Separation of EPC nodes (CUPS)
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
 
Introduction to SIM and USIM
Introduction to SIM and USIMIntroduction to SIM and USIM
Introduction to SIM and USIM
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Wcdma callflow
Wcdma callflowWcdma callflow
Wcdma callflow
 
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124  | Las Vegas 2017
Cisco Live! :: Introduction to Segment Routing :: BRKRST-2124 | Las Vegas 2017
 
Ims call flow
Ims call flowIms call flow
Ims call flow
 

Viewers also liked

What is IPX?
What is IPX?What is IPX?
What is IPX?
whatisipx
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
P1Security
 
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
Dialogic Inc.
 
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
Jeff Hunter
 
BICS Company Presentation (PDF) (1)
BICS Company Presentation (PDF) (1)BICS Company Presentation (PDF) (1)
BICS Company Presentation (PDF) (1)Daniel Kurgan
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
Siddharth Rao
 
Ireland SMS Presentation Jan08
Ireland SMS Presentation Jan08Ireland SMS Presentation Jan08
Ireland SMS Presentation Jan08
cepman
 
Ipx
IpxIpx
Ipx explained
Ipx   explainedIpx   explained
Ipx explained
AaronTAYLOR05
 
11 module configuring novell ipx
11  module configuring novell ipx11  module configuring novell ipx
11 module configuring novell ipx
Asif
 
Navigating Complexity - The Quest for True IPX
Navigating Complexity - The Quest for True IPXNavigating Complexity - The Quest for True IPX
Navigating Complexity - The Quest for True IPXJann Yip
 
20150618 lte world summit
20150618 lte world summit20150618 lte world summit
20150618 lte world summitTelia Carrier
 
IPX Solution
IPX SolutionIPX Solution
IPX Solution
GENBANDcorporate
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
P1Security
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
assinha
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
Justin MA (馬嘉昌)
 

Viewers also liked (18)

What is IPX?
What is IPX?What is IPX?
What is IPX?
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
 
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
APT IMR Workshop, Session 8 (Evolution to 4g and impacts on IMR_2011-06-14)
 
BICS Company Presentation (PDF) (1)
BICS Company Presentation (PDF) (1)BICS Company Presentation (PDF) (1)
BICS Company Presentation (PDF) (1)
 
The known unknowns of SS7 and beyond
The known unknowns of SS7 and beyondThe known unknowns of SS7 and beyond
The known unknowns of SS7 and beyond
 
Ireland SMS Presentation Jan08
Ireland SMS Presentation Jan08Ireland SMS Presentation Jan08
Ireland SMS Presentation Jan08
 
Ipx
IpxIpx
Ipx
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Ipx explained
Ipx   explainedIpx   explained
Ipx explained
 
11 module configuring novell ipx
11  module configuring novell ipx11  module configuring novell ipx
11 module configuring novell ipx
 
10 overview ver 1
10 overview ver 110 overview ver 1
10 overview ver 1
 
Navigating Complexity - The Quest for True IPX
Navigating Complexity - The Quest for True IPXNavigating Complexity - The Quest for True IPX
Navigating Complexity - The Quest for True IPX
 
20150618 lte world summit
20150618 lte world summit20150618 lte world summit
20150618 lte world summit
 
IPX Solution
IPX SolutionIPX Solution
IPX Solution
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 

Similar to Assaulting diameter IPX network

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
DefCamp
 
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfD1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
AliAlwesabi
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
EC-Council
 
MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
Bangladesh Network Operators Group
 
Angler talk
Angler talkAngler talk
Angler talk
Artsiom Holub
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
PROIDEA
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
Swiss IPv6 Council
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
APNIC
 
IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?
Steve Simlo
 
Computaris SS7 Firewall
Computaris SS7 FirewallComputaris SS7 Firewall
Computaris SS7 Firewall
Computaris
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
APNIC
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
hibaehed
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
APNIC
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
D017131318
D017131318D017131318
D017131318
IOSR Journals
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Wardner Maia
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтра
Positive Hack Days
 

Similar to Assaulting diameter IPX network (20)

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
 
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfD1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
Angler talk
Angler talkAngler talk
Angler talk
 
PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?Is IPv6 Security Still an Afterthought?
Is IPv6 Security Still an Afterthought?
 
IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?IPv6 and IP Multicast… better together?
IPv6 and IP Multicast… better together?
 
Computaris SS7 Firewall
Computaris SS7 FirewallComputaris SS7 Firewall
Computaris SS7 Firewall
 
Tech f42
Tech f42Tech f42
Tech f42
 
LKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure ConnectionsLKNOG 2: Robust and Secure Connections
LKNOG 2: Robust and Secure Connections
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
D017131318
D017131318D017131318
D017131318
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Небезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтраНебезопасность сотовых сетей вчера, сегодня, завтра
Небезопасность сотовых сетей вчера, сегодня, завтра
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Assaulting diameter IPX network

  • 1. Assaulting IPX Diameter roaming network Alexandre De Oliveira 15/03/2016
  • 2. Whoami • Telecom security curious • Red Team at POST Luxembourg • Previously P1 Security • SS7map projet during 31C3 with Laurent Ghigonis • Worldwide SS7 attacks with Pierre-Olivier Vauboin Page 2
  • 3. Why diameter security ? • SS7 security was a disaster • And about Diameter ? Page 3
  • 4. Diameter • Used for signalisation in LTE Networks • Worldwide deployment − Roaming available • IPX: IP exchange – Diameter Roaming network Page 4
  • 5. Diameter architecture possibilities • Mesh vs Routed networks • Real networks are mixed Page 5 •Hard to maintain •Filtering is complexe •Impossible for huge networks •Segmentation by default •Easier to maintain •Filtering is centralized (DEA/DRA) •Cost of DEA/DRA •Routing is « Open » by default
  • 6. Diameter in telecom world • IP based, over SCTP/3868 • Authentication, Authorization, and Accounting protocol and more • Base defined by RFC 6733 & Telecom AVPs defined by 3GPP • Diameter AVP allows infinity of possiblities Page 6
  • 7. Interfaces / Applications / AVPs • Infinity of Diameter applications & AVPs to be defined • S6a/S6d for HSS/MME/SGSN roaming • S9 for inter PCRF roaming Page 7
  • 8. Gathering information on IPX • Operator giving to much info in IR.21 : − 106 MME − 70 HSS − 18 DSC -> Ericsson DEA/DRA − 70 DEA − 8 M2M HSS − 146 IPX DNS − Etc… • Send automatic routed (IMSI) messages : AIR ! − Get HSS host & naming pattern ! • Send any diameter messages to a random host destination to the network • Request the IPX DNS ! Page 8
  • 10. Insert subscriber Data Request - IDR Page 10 Info Location Req IMSI targeted Request– IDR – S6a IDR is sent from HSS to MME/SGSN
  • 11. Insert subscriber Data Answer - IDA Page 11 Alsoget current state ATTACHED / DETACHED / … TrackingArea Cell-ID
  • 13. SLh – RIR Routing Info Request Page 13 IPX HPLMN HSS Victim Prerequisites: MSISDN or IMSI GMLC GT Information Gathered: MME Host SGSN Host MSC GT MSISDN illegitimate DiameterRIR MME Attacker as fake GMLC DRA DEA
  • 14. SLg – PLR Provide Location Request Page 14 IPX HPLMN HSS Victim Prerequisites: MSISDN or IMSI Information Gathered: ECGI (Cell-ID) Serving Node Age of Location Subscriber State Positionning Data illegitimate DiameterPLR MME Attacker as fake GMLC DRA DEA
  • 15. Tracking in IMS – Sh UDR Page 15 IPX HPLMN HSS Victim Prerequisites: MSISDN or IMSI Information Gathered: CSLocationInformation PSLocationInformation CurrentLocation illegitimate DiameterUDR AS DEA DRA Attacker as fake AS
  • 16. S6c – Diameter SRR (SRISM) • Introduced released 11 – MME / SMS-IWMSC / SMS-GMSC • SS7 as already SRISM in SMS call-flow • Protections implemented in SS7 with SMS-FW and Home Routing in SS7/SIGTRAN • Same protections for Diameter SRR (SRISM) ? Page 16
  • 17. S6a - Denial of Service • S6a RSR – Reset Request − Sending RSR to MMEs after a HSS reboot/outage − MME is sending back information about requested subscribers − Signalisation DoS of the entire network by overloading HSS • S6a CLR – Cancel Location Request − Need to know IMSI & MME-Host − Instant DoS - Remove the subscriber from the MME • S6a ULR – Update Location Request − Need to know IMSI & HSS-Host − Instant DoS – Subscriber relocation on fake MME • S6a PUR − Need to know IMSI & MME/SGSN Host − Instant DoS – Subscriber MME reference removed from HSS Page 17
  • 18. Routing on the diameter network • Hop-by-HopId: Unique between two routing peers (DEA/DRA), allows matching between request and response • End-to-End Id: Unique on the complete packet path. Used to detect duplicates. • Request routed on Destination Host & Realm OR IMSI (AIR) • Response routed back with HopbyHop & DEA/DRA interface Page 18 MME Operator1 DEA Operator1 DRA IPX HSS Operator2 HopbyHop EndtoEnd 0x12345678 0xabcdef12 0xabcdef12 0xabcd5678 0x1234abcd 0x87654321 0xabcdef12 0xabcdef12 HopbyHop EndtoEnd 0x12345678 0xabcdef12 0xabcdef12 0xabcd5678 0x1234abcd 0x87654321 0xabcdef12 0xabcdef12 DEA Operator2 = = = = = = != != != !=!=!=
  • 19. Diameter as spoofing friendly protocol Page 19 Attacker Spoofed MNO1 Targeted MNO2 IPX Spoofing Origin-Host:MNO1 Realm:MNO1 1. Attacker send Diameter IDR spoofing MNO1 2. IPX provider doesn’t check for spoofing 3. Message responded by MME MNO2 4. Automaticroute back of reponse on HopbyHop-Id 5. Spoofed packet returns to the attacker with subscriber locationdata HSS MME HSS MME IDR Location Req
  • 20. Basic mistakes on MNO DEA • Auth-Application-Id as « Relay » will route packets • No filtering, just route and forward. Page 20 Relay
  • 21. Avoiding the unwanted • In CER negociation be explicit in the Application-ID • Avoid messages from any other application to be accepted Page 21 S6a only
  • 22. Avoiding the unwanted • Check CER/CEA on each network elements / interface • CER/CEA sent must have a specified Application-Id − No Relay or Proxy • Not specified in CER/CEA Application-Id received should be dropped • Reduce possible attack surface • Avoid a lot of attacks possible with routing abuses − e.g. DEA configured as Relay − HSS misconfiguration Page 22
  • 23. Detecting attacks on your network • How to do it ? • Do I have equipment to do monitoring it in my network ? − YES • Security monitoring ? − YES, just need to explore possiblities ! • Should I go for new equipment ? − Use what you have in your network !!! • Operators have plenty of solutions but they don’t know it Page 23
  • 24. How to quick and easy • Using pcap trace, easy for IPX • Simple wireshark / tshark rules • Ok it’s not real time, but gives good visibility ! Page 24 InternalSpoofing: tshark -r input_file.pcap -Y '(diameter.Origin-Host matches ".epc.mncXXX.mccXXX.3gppnetwork.org$") && diameter.flags.request== 1 && ip.src != YOUR_DEA_IP_RANGE/24' -w spoofing_attacks.pcap Non S6a: tshark -r input_file.pcap -Y '!(diameter.applicationId == 16777251) && diameter&& !(diameter.cmd.code == 280)' -w non_S6a_packets.pcap
  • 25. Developping a Diameter IDS • Started to develop it at POST Luxembourg / using Splunk for easy & quick stats and research • Still in beta, but monitoring actively IPX interconnextion • Will be published on github.com soon…  • Already detecting interesting behaviors such as − IDR location attacks − IDR bruteforce on IMSIs − Non S6a messages received… • But also helping to report network misconfigurations ! Page 25
  • 26. IDR location request + IMSI bruteforce Page 26 IMSI Origin-Host Dest-Host MessageType : IDR Green: IDR Request Orange:UNKNOWN USER Yellow: VALID USER 90 % of IDR traffic with UNKNOWN_USER responses
  • 27. SS7 vs Diameter security Page 27
  • 28. Recap Page 28 Interface Diameter message Target Attack type S6a ULR HSS Sub DoS S6a CLR MME Sub DoS S6a PUR HSS Sub DoS S6a RSR MME Network DoS S6a IDR MME Fraud(Profile Injection) S6a IDR MME Tracking SLh RIR HSS Tracking/ Info gath SLg PLR MME Tracking Sh UDR HSS Tracking S6c SRR HSS Info gathering S9 (S9/Rx) CCR / RAR PCRF Fraud? S6m SIR HSS Info gathering ? Don’t forget IR.21, IPX DNS, AIR, Route Record for info gathering
  • 29. Recommendations • Do NOT set DEA as relay, be explicit in declared applications • Set explicit Application-Id on CER for all equipments • Do NOT connect everything to DEA, prefer direct connectivity − HSS / MME with GMLC − PCEF, OCS, OFCS with PCRF • Filter for IDR with location request targetting your subscribers • Filter for spoofing of internal Host/Realm on DEA • Drop any diameter messages that should not come from international • There are remediations for spoofing, IPX providers will need to do their job • Monitoring is the way  Page 29
  • 30. Thanks • POST Luxembourg − Core Mobile teams & CSE Security team • Pierre-Olivier Vauboin • Laurent Ghigonis • TROOPERS Organizers for such great event  Page 30