Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Communications

Newer Diameter Telephony Protocol Just As Vulnerable As SS7 (bleepingcomputer.com) 31

An anonymous reader writes: Security researchers say the Diameter protocol used with today's 4G (LTE) telephony and data transfer standard is vulnerable to the same types of vulnerabilities as the older SS7 standard used with older telephony standards such as 3G, 2G, and earlier. The vulnerabilities are happening because 4G operators are misconfiguring the Diameter protocol (a SS7 replacement) and using it in the same way as SS7.

The incorrect use of Diameter leads to the presence of several vulnerabilities in 4G networks that resemble the ones found in older networks that use SS7, and which Diameter was supposed to prevent. Researchers say that the Diameter misconfigurations they've spotted inside 4G networks are in many cases unique per each network but they usually repeat themselves to have them organized in five classes of attacks: (1) subscriber information disclosure, (2) network information disclosure, (3) subscriber traffic interception, (4) fraud, and (5) denial of service. Researchers warn that not fixing these vulnerabilities "could lead to sudden failure of ATMs, payment terminals, utility meters, car alarms, and video surveillance." This is because these types of devices often use 4G SIM card modules to connect to their servers when located in a remote area where classic Internet connections are not possible. Old SS7 attacks such as tracking users' location and intercepting SMS and phone calls are also possible via Diameter as well.

This discussion has been archived. No new comments can be posted.

Newer Diameter Telephony Protocol Just As Vulnerable As SS7

Comments Filter:
  • by Anonymous Coward

    Why don't they just use a tried and true protocol like HTTPS instead of rolling their own protocol?

    • by WaffleMonster ( 969671 ) on Monday July 02, 2018 @08:16PM (#56883328)

      Why don't they just use a tried and true protocol like HTTPS instead of rolling their own protocol?

      This is in fact what Diameter does for security it uses TLS just like HTTPS.

    • by buchanmilne ( 258619 ) on Monday July 02, 2018 @10:36PM (#56883836) Homepage

      The summary says:
      "The incorrect use of Diameter leads to the presence of several vulnerabilities in 4G networks"

      That's like saying:
      "The incorrect use of HTTP (such as not requiring HTTPS, or permittting weak ciphers, or not protecting sensitive APIs from the internet with a firewall) leads to the presence of several vulnerabilities in corporate networks".

      In other words, it's not that the protocol itself is vulnerable, but that misconfiguration and poorly architected deployments can result in installations that are vulnerable.

      Just like HTTP(S).

      • by kenh ( 9056 )

        Exactly. I love it when the summary refutes the /. headline, it lets me know the editors at /. are hard at work...

    • by kenh ( 9056 )

      Uh, because routing and billing for phone calls is just a wee-bit different than serving up webpages...

      Do you have any earthly idea what SS7 or Diameter actually do or did you just see the word "protocol" and say to yourself, "a protocol is a protocol, they are all interchangeable, so why not use HTTP?"

      Computers somehow did useful work before Tim Berners-Lee "invented" HTTP [wikipedia.org] and Linus Torvalds got frustrated with the software available to fully utilize his then-new 80386-based desktop computer and "invented

  • Keep that telco collecting real time.
    • If we have to choose between letting the NSA spy on us, as well as China and Russia and Organized Crime, or locking the door and not letting anyone spy on us, I think our National Security is better served by choosing Nobody spies.
  • Just let me know when I can have fun with my old blue box again, and that whistle I keep in the junk drawer.
    • by kenh ( 9056 )

      Uh, you understand the difference between in-band call routing and out-of-band call routing, right? SS7 is an out-of-band call routing system, sending tones over the voice network is an example of in-band signaling.

      • Uh, you understand the difference between in-band call routing and out-of-band call routing, right?

        Yes, sweetheart, I understand the difference. That's why what I said is a joke. Or, in the common vernacular: whoosh.

  • by adfraggs ( 4718383 ) on Monday July 02, 2018 @08:47PM (#56883410)
    Diameter is just a protocol i.e. it's a guideline, there is no enforcement. Network operators are typically going to do whatever they need to do in order to just get stuff working. Apart from straight out abusing the protocol by making up their own session rules they can also simply neglect to make basic security considerations. In this ultra-competitive world where everyone is scrambling to build their next gen networks many will happily forgo extra testing or security design in order to just get something running so that customers can start paying for the service. That's not to mention even having the expertise in the first instance to be able to make those security considerations. Diameter is complicated and hard. If a provider gets it working and customers can use the service and be billed for that usage then that's often the end of the story.
  • by Anonymous Coward on Monday July 02, 2018 @09:07PM (#56883482)

    Diameter replaces SS7? In what universe? SS7 is a control signalling protocol used for setting up calls. Diameter is a AAA (Authentication, Authorization & Accounting) protocol that's just a supercharged Radius (Diameter = twice the Radius, get it? ha ha). No doubt you can royally screw up the AAA setup and leak like a sieve, but it's got nothing to do with SS7.

  • by williamyf ( 227051 ) on Monday July 02, 2018 @10:59PM (#56883954)

    This is what happens when the guys who were in chrage of the MSCs and SS7 STPs of yore are put in charge of the Newflanged Diameter Servers and Routers of 4G and 5G

    Do not get me wrong, those guys are very smart and briliant guys. But just as the Slashdot crowd would have a hell of a day trying to configure the 67 E1s of an STM-1 in order to Set up a set of SS& links, an Old School Telco switch guy would have hell undertsnading the nuances of security on Diameter...

    Me, I had a feet in each camp for 5 years (1999-2004), but now I am looking from above in my (OpenStack) cloud...

    • by Nethead ( 1563 )

      The vulnerabilities are happening because 4G operators are misconfiguring the Diameter protocol (a SS7 replacement) and using it in the same way as SS7.

      Reminds me of IPv6.

  • Editor! We need help with this patient, stat!!!

  • I was trying to figure out how making the cable wider would affect security in any way? Nobody actually physically taps wires anymore.

Avoid strange women and temporary variables.

Working...