[radext] Re: [saag] Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.

John Mattsson <john.mattsson@ericsson.com> Fri, 17 May 2024 05:19 UTC

Return-Path: <john.mattsson@ericsson.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6BD8C14F6FD; Thu, 16 May 2024 22:19:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.578
X-Spam-Level:
X-Spam-Status: No, score=-2.578 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GdmqwVQ61s9q; Thu, 16 May 2024 22:18:57 -0700 (PDT)
Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on2069.outbound.protection.outlook.com [40.107.104.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18214C14F6AB; Thu, 16 May 2024 22:18:56 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XyPZDKc2Wd7Kzp/6yJL+rFl9FqWYQXqo7oAbz8mLflivyrye4Hk0C9qQazCcFYC5GB+MloLNoiUSVTNX0y9izj/Xe/3QXyEzGyVpm5N1IRsXNcd1Uc73aBoGw5M50yFTyCzRD8mwXWKP1gg3IgGyBCjaXYhz1JgvrLTIFF/UsOZCoxYLgImYgPCfrrQhRb9fIh6IkPr+6eO/t/In9iCiSkUD3e48ZpPal5J/ZCkurgKiRs7NfBhDHeIkykv5b2wsSWiB/3lAn7yNCdUw6r2eBooLc0idKSfeheNes4EP9jhaNviXWXq/+WQefGz7/0YjoKPo++iiSapWUKQlVl40fQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dkTgVNcUszhO3Kq5sdmP/yR93h+abmCzSbhhxcZyb+A=; b=Za8WL0XoCHSMA0q1fk2J0DsTTh+ZhcjSWXzvRM2+knCBYT536aW4VD44Xu5jnr2HMe548BECrftEkYdR5dvMQqpCAXxgkTSB+u/BEuroCA2+bFJ2SmHF3B2eWlNQ38L7E0vpR37hpY+VEQ4nJSe5f4LEHvSMSgbSRbEH+tLbK+/hwGYXXGQihO5/ZLLhMCopBCYPYfoo51YmeNNGlK3vopDWnkBN6/MfyOD3cs99Uv9irP6CBAoxXR85fprCSiX7Jy3IBqR2BeEq3k17PDl6RLaB9QxU6U7qfepKTLcV07dEqgxnxwghqQ1JSIq5yaVs3oYxI1fA75sCX/ggnMVfAQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dkTgVNcUszhO3Kq5sdmP/yR93h+abmCzSbhhxcZyb+A=; b=CtfAGZYm225OcrKGIDkn3QZW1gdXW5jp4lbRD5//fxulmfmM4d5pGrE3NIvfYZsk0MQG5Hfbis3p4LHznHmcCjOzz3mw8W/d6d5f3z43xWz9Prz6va81UKqD9UIxvsRWzj/RjYKCOknaQLE4jytI3OOZqBr7KH82LJQHCu0j/chSUY0J/iZTxbkLQpBaJplXtSU8eaIQcDOfVIH56KQ/cus5McWuhi+IQJD/PFIj12BUt5vbQrvLRy16L0UAfYL2WGyK4Tc7j7IAPhCLOjYfn9FTjgWZiQqC73yNJWhRwr2OcYti+fgBO65zBSCjO3VOoa5nTgkXgJMqIHLcgaX4/g==
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com (2603:10a6:150:114::10) by VI1PR07MB9459.eurprd07.prod.outlook.com (2603:10a6:800:1cc::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7587.28; Fri, 17 May 2024 05:18:54 +0000
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8]) by GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8%3]) with mapi id 15.20.7587.028; Fri, 17 May 2024 05:18:53 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: Alan DeKok <aland@deployingradius.com>, "saag@ietf.org" <saag@ietf.org>, "radext@ietf.org" <radext@ietf.org>
Thread-Topic: [saag] Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
Thread-Index: AQHap9CJ2+VE/+s42UWixkuQ5cwkhLGa2GJt
Date: Fri, 17 May 2024 05:18:53 +0000
Message-ID: <GVXPR07MB967845D3EE17F6167BBDC1FA89EE2@GVXPR07MB9678.eurprd07.prod.outlook.com>
References: <F204515C-E1AB-439D-8A54-A3FE835FD7B2@deployingradius.com>
In-Reply-To: <F204515C-E1AB-439D-8A54-A3FE835FD7B2@deployingradius.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GVXPR07MB9678:EE_|VI1PR07MB9459:EE_
x-ms-office365-filtering-correlation-id: ebd957ef-39ac-47b8-6d4c-08dc7630d852
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|366007|376005|1800799015|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVXPR07MB9678.eurprd07.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(376005)(1800799015)(38070700009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GVXPR07MB967845D3EE17F6167BBDC1FA89EE2GVXPR07MB9678eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GVXPR07MB9678.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ebd957ef-39ac-47b8-6d4c-08dc7630d852
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 May 2024 05:18:53.9398 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QGIp1KZfxAGSkid+S53PC+FIoMnN4aa0mAaZsIM/copD9uKRuJRG39liGarmAczPWdqoZr9INeHJMySNBaOukPBmuyWP08vyCs8Bubsiz2M=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB9459
Message-ID-Hash: 64ZP6PEQ433G7ELYJID5AF7MAXNSTU6W
X-Message-ID-Hash: 64ZP6PEQ433G7ELYJID5AF7MAXNSTU6W
X-MailFrom: john.mattsson@ericsson.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-radext.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [radext] Re: [saag] Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/Zcuud3GyG221DXnPcvJ2TugwGu0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Owner: <mailto:radext-owner@ietf.org>
List-Post: <mailto:radext@ietf.org>
List-Subscribe: <mailto:radext-join@ietf.org>
List-Unsubscribe: <mailto:radext-leave@ietf.org>

Hi Alan,

5G completely replaced DIAMETER with signaling over HTTP/2. DIAMETER is only used in legacy systems that has not yet been updated. Early 5G can be deployed as Non-standalone (NSA) or standalone (SA). NSA means a 4G core with 5G radio while SA means both 5G core and 5G radio. NSA has a lot of severe limitations. Many networks are already SA and the rest are working on rolling out SA.

I don’t think there are any interest in updating DIAMETER, DIAMETER should be replaced with mutually authenticated HTTP/2. 6G will likely introduce HTTP/3.

I would assume that all problems with DIAMETER also exists for RADIUS.

I agree that all traffic should be encrypted without exceptions, even inside enterprise networks. As NIST requires in SP 800-207, this entails actions such as authenticating all connections and encrypting all traffic.

I think the future solution for almost everything is QUIC. A problem that I have encountered is that people think that they need to spend time on PKI to start using or even testing QUIC. I typically tell them that QUIC with a self-signed server cert not checked by the client is already that a big security improvement over TCP/UDP and that they can start testing QUIC like that and deploy a PKI later. Maybe IETF should provide some migration guidance on how to migrate to QUIC. The risk is of course that people use opportunistic QUIC instead of the end-goal of properly authenticated QUIC.

Cheers,
John

From: Alan DeKok <aland@deployingradius.com>
Date: Thursday, 16 May 2024 at 22:35
To: saag@ietf.org <saag@ietf.org>, radext@ietf.org <radext@ietf.org>
Subject: [saag] Cyber Official Speaks Out, Reveals Mobile Network Attacks in U.S.
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.404media.co%2Fcyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s%2F&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cd09227825d6e49c77e8908dc75e77baa%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638514885067017366%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=vb7Rt%2Fi3MNTYpKX3CKEt1ASoqnuDpa51oYoHA7yqw%2Bw%3D&reserved=0<https://www.404media.co/cyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s/>

 After providing specific details related to the attacks, the official wrote in a public filing with the FCC that he thinks the examples “are just the tip of the proverbial iceberg of SS7 and Diameter based location and monitoring exploits that have been used successfully against targeted people in the USA.” The official is Kevin Briggs, who is CISA’s senior advisor for telecommunications, program lead, according to a CISA report posted online.

  Archive version: https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Farchive.ph%2Ft9oco&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cd09227825d6e49c77e8908dc75e77baa%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638514885067025502%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=w5s8e9GENKm3ku4yWHVhMQK1mLNSOsc5OCx%2Fwfz9wd8%3D&reserved=0<https://archive.ph/t9oco>

  Full report:

https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fsites%2Fdefault%2Ffiles%2F2023-03%2FCISA_Resilient_Power_Best_Practices_for_Critical_Facilities_and_Sites_508c.pdf%3Fref%3D404media.co&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cd09227825d6e49c77e8908dc75e77baa%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638514885067030700%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=DiqF25KHgTh%2B0TXYRafcXd9R5SjP4XcSLmiTy1nD0P4%3D&reserved=0<https://www.cisa.gov/sites/default/files/2023-03/CISA_Resilient_Power_Best_Practices_for_Critical_Facilities_and_Sites_508c.pdf?ref=404media.co>

  Substantial amounts of Diameter traffic is sent over the Internet in the clear, which doesn't help with privacy issues.

  The good news is that the report doesn't mention RADIUS, despite it being a common practice to send RADIUS/UDP traffic over the Internet in the clear.  It's not clear if they're aware that RADIUS exists, but perhaps that's good news, hmm?

  This report reinforces my comments in Brisbane at the last SAAG meeting: all of these protocols must move to TLS.  Unencrypted traffic must be forbidden.

  The RADEXT WG is publishing a document which deprecates this practice, along with many other insecure practices:  https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-radext-deprecating-radius%2F&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7Cd09227825d6e49c77e8908dc75e77baa%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638514885067034920%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=3%2F%2FnG3lb7cKSXkq0PBbX5wO75kWpJAdv%2FFSddCpZssw%3D&reserved=0<https://datatracker.ietf.org/doc/draft-ietf-radext-deprecating-radius/>

  Unfortunately the DIME WG has concluded, so there is no clear avenue for updating Diameter to forbid this kind of behavior.

  Alan DeKok.

_______________________________________________
saag mailing list -- saag@ietf.org
To unsubscribe send an email to saag-leave@ietf.org