Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

نویسندگان

  • Jethro Beekman
  • Christopher Thompson
چکیده

T-Mobile has a service called “Wi-Fi Calling”, which lets users make and receive calls even when without cellular service. This service is pre-installed on millions of TMobile Android smartphones. We analyze the security aspects of this service from a network perspective, and demonstrate a man-in-the-middle attack caused by a lack of TLS certificate validation, allowing an attacker to eavesdrop and even modify calls and text messages placed using the Wi-Fi Calling feature. We have worked with T-Mobile to fix this issue, and, as of 18 March 2013, they report that all affected customers have received an update fixing this vulnerability. I. EXPERIMENTAL SETUP In order to analyze T-Mobile’s Wi-Fi calling system, we used the setup shown in Figure 1. A Wi-Fi calling enabled phone P is configured to use access point AP. AP does not have any wired connections and just acts as a wireless network switch. Another machine M connected to the same network is configured as a DHCP server and NAT router. This allows us record and control all Internet traffic to and from P. We captured several Wi-Fi calling sessions. During our experiments, all traffic on both network interfaces was captured using libpcap. Any TLS connections were intercepted by sslsniff [1] running on M. sslsniff hijacks a TLS connection request, connects to the remote endpoint itself and generates a certificate based on what it receives from that endpoint. The certificate is signed with any certificate we specify and subsequently sent back to the client. We modified sslsniff to output the master-secret and client-random parameters of all established connections so that the TLS traffic in our packet traces could be decrypted. This allowed us to see how TLS-encrypted messages relate chronologically to other packets. II. NETWORK ANALYSIS When first enabling Wi-Fi, the DNS conversation in Appendix A takes place, requesting a chain of information about wifi.msg.pc.t-mobile.com. Then, a TLS connection is established to the host and port returned by DNS. These are sba.sipgeo.t-mobile.com and 5061, which is the port number assigned by IANA for SIP-TLS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android

Next generation IP telephony such as the IP Multimedia Subsystem (IMS) framework has been used to create Internet calling services which let cellular users make and receive calls even when without cellular reception. In this paper, we look at the security aspects of Internet calling services and other systems that use the 3GPP Authentication and Key Agreement (AKA) protocol for authentication, ...

متن کامل

Session – Packet Inspector Mobile Agent to Prevent Encrypted Cookies and Http Post Hijacking in Manet

A statistics states that public Wi-Fi hotspots are set to grow from 1.3 million in 2011 to 5.8 million by 2015. Due to increase in public free Wi-Fi access, users count increases rapidly letting them to expose in vulnerable intrusion attacks. Accessing the social network and other confidential sites such as banking in public Wi-Fi, exposes the credential to the intruder. Man-in-the-middle attac...

متن کامل

Pnm-27: The Effect of Wi-Fi Waves on Adolescent Fertility

Background Due to the advancement of technology and communication, mobile and Wi-Fi have become as an integral part of human life, particularly young population. Thus, a review of EM wave’s effects on the reproductive health has become one of the critical matters of researches in medical field. The accession of using Wi-Fi around the world now has made it possible that about 450 million family ...

متن کامل

Wi-Fi Calling and the Support of IMS Services over Carrier Wi-Fi Networks

Carrier Wi-Fi deployments are helping mobile operators take advantage of already deployed evolved packet core (EPC)-based services for supporting trusted Wi-Fi access networks. Approaches include reusing P-GW -based accounting, policy enforcement, and regulatory services for supporting Wi-Fi users. With Wi-Fi calling, similar EPC-based services can be used to support IMS-based rich media servic...

متن کامل

An Indoor Positioning System Based on Wi-Fi for Energy Management in Smart Buildings

To offer indoor services to occupants in the context of smart buildings, it is necessary to consider information concerning to the identity and location of the occupants. This paper proposes an indoor positioning system (IPS) based on Wi-Fi fingerprint and K-nearest neighbors (KNN) method. The positioning of a mobile device (MD) using Wi-Fi technology involves online and offline phases. In this...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013