<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>P1 Labs &#187; Philippe Langlois</title>
	<atom:link href="http://labs.p1sec.com/author/phil/feed/" rel="self" type="application/rss+xml" />
	<link>http://labs.p1sec.com</link>
	<description>P1 Security Labs</description>
	<lastBuildDate>Wed, 31 Dec 2014 00:24:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>SS7map risk rating calculation</title>
		<link>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/</link>
		<comments>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/#comments</comments>
		<pubDate>Thu, 11 Sep 2014 10:16:14 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Projects]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=592</guid>
		<description><![CDATA[Details about SS7map risk rating calculation are coming soon after our presentation at 31C3 ! You can subscribe here to be notified: http://eepurl.com/baeFU5...]]></description>
				<content:encoded><![CDATA[<h1></h1>
<p>Details about SS7map risk rating calculation are coming soon after our presentation at 31C3 !</p>
<p>You can subscribe here to be notified: <a title="here" href="http://eepurl.com/baeFU5" target="_blank">http://eepurl.com/baeFU5</a></p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2014/09/11/ss7map-risk-index-calculation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Diameter vs SS7 from a security perspective</title>
		<link>http://labs.p1sec.com/2013/07/28/346/</link>
		<comments>http://labs.p1sec.com/2013/07/28/346/#comments</comments>
		<pubDate>Sun, 28 Jul 2013 22:34:42 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Diameter]]></category>
		<category><![CDATA[pcap]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[wireshark]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=346</guid>
		<description><![CDATA[On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side: From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still ...]]></description>
				<content:encoded><![CDATA[<p>On a dedicated forum to Diameter, one person asked about the main difference between SS7 and Diameter. While some expert answered on the telecom and protocol aspect, we answered on the security side:</p>
<div style="width: 266px" class="wp-caption alignleft"><img class=" " alt="" src="http://wiki.jss7.googlecode.com/git/images/MobicentsjSS7Layers.jpg" width="256" height="192" /><p class="wp-caption-text">Source: Mobicents</p></div>
<p>From a security standpoint SS7 (and SIGTRAN, its transport over IP) is a legacy protocol (but still the most used protocol for roaming), with protocol stacks which are sometime not very robust, even fragile, and have been released with only reliability to load in mind, not with reliability in front of malformed traffic. Hence the quite high number of crashes we witness in telecom and mobile core networks.</p>
<p>The reason for this is also the former lack of deep testing tools (fuzzers, scanners, etc..): for example, most of the fuzzers target at best M3UA (one of the encapsulation layer of SS7 over IP which is part of SIGTRAN) and do not cross neither its state machine nor the encoding. Fuzzing is mostly affecting the decoding of these message (ASN1), not the applications (MAP, INAP, CAP, &#8230;).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="width: 247px" class="wp-caption alignright"><img alt="" src="http://www.diametriq.com/wp-content/uploads/2013/04/Diameter-Edge-Appliance.jpg" width="237" height="189" /><p class="wp-caption-text">Source: Diametriq</p></div>
<p>Diameter is much more inspired by IETF / Internet philosophy and practices. IP protocols being more exposed to attacks, the protocols are a little bit more security-minded in term of resilience in front of hostile activities. Using Diameter also means that more attacker will know how to attack these protocols, hence more threat pressure.<br />
Diameter is an evolution of Radius (hint: Diameter = Radius * 2).<br />
Some very questionable protocol design decision involve for example the removal of Radius shared secret. Another questionable design decision is to consider that Diameter must either be transported with TLS _or_ with IPsec. This is very damageable as the Diameter protocol has no way to verify that IPsec is really used underneath. Therefore, some deployment are done in Diameter mode &#8220;as&#8221; IPsec but without IPsec being deployed, therefore without spoofing or interception protection.</p>
<p>Another factor is the &#8220;reach&#8221; of signaling messages. Deep reach vs. Shallow reach.<br />
For example, SS7 has deep reach, can go from deep into Roaming network and deep toward Home network. For Diameter, it depends on the application being used (CCA, &#8230;).</p>
<p>Lastly, SS7 is being used for roaming and interworking of thousands of operators in the world whereas Diameter is being used only for maybe 10 to 20 operators for LTE roaming. SS7 and Diameter are both just &#8220;tubes&#8221; for transporting messages. Their respective strength is overrated, specifically with the myth or belief that SS7 and IPX network being closed, secure networks. They are not, they are as secure as the least secure operator having access to these. We will see the real impact and usage of Diameter as a worldwide transport mechanism in the future, but already one can see that it&#8217;s not a magic bullet regarding security from the audits we&#8217;ve done.</p>
<p>Some things P1 Security does with SS7, SIGTRAN and Diameter is:<br />
* Scanning with PTA<br />
* Fuzzing with PTF<br />
* Intrusion/Misuse detection with PTM<br />
and professional services, audits.</p>
<p>A few links about Diameter security at P1:<br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2Fconsulting%2Flte-and-diameter-audit%2F&amp;urlhash=bMte&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/consulting/lte-and-diameter-audit/</a><br />
<a href="http://www.linkedin.com/redirect?url=http%3A%2F%2Fwww%2Ep1sec%2Ecom%2Fcorp%2F2013%2F05%2F01%2Fp1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network%2F&amp;urlhash=jA91&amp;_t=tracking_disc" target="_blank">http://www.p1sec.com/corp/2013/05/01/p1-security-newsletter-the-6-best-ways-to-secure-your-telecom-network/</a></p>
<p>Regarding the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a>, we have seen so far fewer vulnerabilities on Diameter than on SS7:</p>
<p>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_DIAMETER+&amp;commit=Search">Diameter vulnerabilities</a>: 10<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_MAP&amp;commit=Search">MAP vulnerabilities</a>: 46<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_INAP&amp;commit=Search">INAP vulnerabilities</a>: 4<br />
<a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_TCAP&amp;commit=Search">TCAP vulnerabilities</a>: 4<br />
<span style="font-size: 13px; line-height: 19px;"><a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SCCP&amp;commit=Search">SCCP vulnerabilities</a>: 18<br />
</span>Total <a href="https://saas.p1sec.com/vulns?search%5Border%5D=&amp;search%5Bfull_search_like%5D=PROTO_SS7+&amp;commit=Search">SS7 vulnerabilities</a>: 90 (69 including overlaps vulnerabilities touching more than one SS7 protocol)</p>
<p>But this is also an exposure bias: we have seen much more mature/production deployment of SS7 than in Diameter so it&#8217;s only natural that the old protocol&#8217;s vulnerabilities are more known than the ones of recent protocols.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/28/346/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Rising risk and importance of the vendor backdoors</title>
		<link>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/</link>
		<comments>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/#comments</comments>
		<pubDate>Sat, 13 Jul 2013 18:30:55 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[backdoors]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[telecom]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=226</guid>
		<description><![CDATA[Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the recent network storage equipment backdoors (HP Keeps Installing Secret Backdoors in Enterprise Storage), the Huawei network element bac...]]></description>
				<content:encoded><![CDATA[<p>Backdoors are not only a problem regarding the original insertion made by the vendor, but also about the subsequent usage of these backdoors once discovered. In the <a href="http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_storage_vuln/">recent network storage equipment backdoors</a> (<a href="http://slashdot.org/topic/datacenter/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">HP Keeps Installing Secret Backdoors in Enterprise Storage</a>), the <a href="http://gigaom.com/2012/10/08/why-nobody-really-wants-to-get-to-the-bottom-of-china-zte-and-huawei/">Huawei network element backdoors</a> or the usual <a href="https://saas.p1sec.com/vulns/285">network equipment or DSL-router backdoors</a>, these are now clearly a real and strong threat to enterprises.</p>
<p>One interesting fact in the recent &#8220;<a href="https://www.allianz-fuer-cybersicherheit.de/ACS/DE/_downloads/Partnerbeitraege/Partnerbeitrag_1und1_Telekom_Vodafone_Gefaehrdungsmatrix_2.pdf;jsessionid=467760209AE0AD8EEC10ED930219061B.2_cid369?__blob=publicationFile">Consolidated risk matrix</a>&#8221; referenced by german BSI and produced by Deutsche Telekom, Vodafone and 1&amp;1 Internet is that &#8220;Telecommunication and Network equipment backdoors&#8221; are one of the top rated vulnerabilities (4th top risk):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2.png"><img class="alignnone size-large wp-image-235" alt="DT_new_Table_en2" src="http://labs.p1sec.com/wp-content/uploads/2013/07/DT_new_Table_en2-1024x573.png" width="960" height="537" /></a></p>
<address>(Table extracted from the 1&amp;1, Deutsche Telekom and Vodafone study, in german, and translated by Google Translate)</address>
<p>The nature of these backdoors is already troubling.  The people you trust your data and business with are the one who betray you by having secret access to your systems, even if you secure these to the maximum known best practices.</p>
<p>What&#8217;s worse with critical network element is that these backdoors can be activated from a great numbers of entry vectors, and can exfiltrate data by an even bigger set of vectors:</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png"><img class="alignnone size-full wp-image-239" alt="P1 Vector for backdoors 3" src="http://labs.p1sec.com/wp-content/uploads/2013/07/P1-Vector-for-backdoors-3.png" width="741" height="428" /></a></p>
<p>The great difference in countries preparedness at the telecom and mobile level shows extreme discrepancies in the awareness and maturity regarding the telecom and mobile security.</p>
<p>The National Information Security Agencies have had mixed results in their attempts to regulate security or help the operator improve their security due to the resistive posture taken by some operators, vendors and industry association and many cover-up of internal and external compromise of telecom critical infrastructure.</p>
<p>The liability of operators and vendors is huge with regard to this matter, most notably with VIP eavesdropping consequences and with the potential for general public class actions where law permits.</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/07/13/rising-risk-and-importance-of-the-vendor-backdoors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Huawei reverse engineering: legacy and new network elements surprises</title>
		<link>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/</link>
		<comments>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/#comments</comments>
		<pubDate>Thu, 23 May 2013 09:44:58 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Huawei Core]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reverse engineering]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[huawei]]></category>
		<category><![CDATA[ppc]]></category>
		<category><![CDATA[reverse]]></category>
		<category><![CDATA[telecom]]></category>
		<category><![CDATA[vkb]]></category>
		<category><![CDATA[vulndev]]></category>
		<category><![CDATA[vulnres]]></category>
		<category><![CDATA[vxworks]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=170</guid>
		<description><![CDATA[Sometime, reverse engineering for bug hunting reveals some fun stuff. So of course, when you&#8217;re dealing with Core Network elements such as Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!): We ca...]]></description>
				<content:encoded><![CDATA[<p>Sometime, reverse engineering for bug hunting reveals some fun stuff.</p>
<p>So of course, when you&#8217;re dealing with Core Network elements such as <a href="http://www.huawei.com/en/products/core-network/singlecore/fixed-softswitch/index.htm">Huawei MSC, MSC Proxy and SoftSwitch MSoftX 3000</a>, you don&#8217;t expect to find these Chinese ASCII arts of an octopus being killed by an angel (!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png"><img class="alignnone size-full wp-image-173" alt="Screen Shot 2013-05-23 at 11.33.39 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.39-AM1.png" width="576" height="454" /></a></p>
<p>We can see that internally, this is called &#8220;Cool Beauty System 1.0.3&#8243; build (?) 35808001, by HuaWei R&amp;D CN (Research and Development Core Network).</p>
<p>We see also that this design dates back from when Huawei was spelled internally HuaWei, that is probably from the 1980s even if the build time of this firmware image (VxWorks Tornado based) is from 2010.</p>
<p>&nbsp;</p>
<p>and even less usual but more interesting to find the PCB schematics in ASCII art (!!):</p>
<p><a href="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png"><img class="alignnone size-full wp-image-172" alt="Screen Shot 2013-05-23 at 11.33.57 AM" src="http://labs.p1sec.com/wp-content/uploads/2013/05/Screen-Shot-2013-05-23-at-11.33.57-AM.png" width="556" height="486" /></a></p>
<p>That reveals it&#8217;s running (well&#8230; we saw that earlier) on PowerPC RISC processor MPC750 by Freescale Semiconductor, Inc. Here is the datasheet <a href="http://labs.p1sec.com/wp-content/uploads/2013/05/MPC750.pdf">MPC750 RISC Processor by Freescale</a>. Please note the JTAG interface on page 15.</p>
<p>By googling the other components, you will find the pinout of the JTAG interfaces of each chip as well as the UART and the way to to In-Circuit debugging (and dumping) of the bootrom.</p>
<p>Thanks to Huawei engineers for this moments of fun and education. Is it best practice to teach reverse engineers what your hardware architecture looks like?</p>
<p>Oh&#8230; and thanks for the 4 new vulnerabilities added in the <a href="http://www.p1sec.com/corp/products/vulnerability-knowledge-base-vkb/">VKB</a> based on this reverse engineering and bug hunting session.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2013/05/23/huawei-reverse-engineering-legacy-and-new-show-surprises/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Link reference in the telco world for security auditors</title>
		<link>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/</link>
		<comments>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/#comments</comments>
		<pubDate>Thu, 24 May 2012 13:22:20 +0000</pubDate>
		<dc:creator><![CDATA[Philippe Langlois]]></dc:creator>
				<category><![CDATA[Network & Protocols]]></category>
		<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://labs.p1sec.com/?p=180</guid>
		<description><![CDATA[These are important links to know when you&#8217;re going to enter the telecom world for security assessment. &#160; Ericsson data http://en.wikipedia.org/wiki/PLEX_(programming_language) http://en.wikipedia.org/wiki/AXE_telephone_exchange &#160; Billing http://en.wikipedia.org/wiki/Billing_Mediatio...]]></description>
				<content:encoded><![CDATA[<p>These are important links to know when you&#8217;re going to enter the telecom world for security assessment.</p>
<p>&nbsp;</p>
<p>Ericsson data</p>
<p><a href="http://en.wikipedia.org/wiki/PLEX_(programming_language)">http://en.wikipedia.org/wiki/PLEX_(programming_language)</a></p>
<p><a href="http://en.wikipedia.org/wiki/AXE_telephone_exchange">http://en.wikipedia.org/wiki/AXE_telephone_exchange</a></p>
<p>&nbsp;</p>
<p>Billing</p>
<p><a href="http://en.wikipedia.org/wiki/Billing_Mediation_Platform">http://en.wikipedia.org/wiki/Billing_Mediation_Platform</a></p>
<p><a href="http://en.wikipedia.org/wiki/Online_charging_system">http://en.wikipedia.org/wiki/Online_charging_system</a></p>
<p>&nbsp;</p>
<p><span style="font-size: 14px; line-height: 1.5em;"> </span></p>
]]></content:encoded>
			<wfw:commentRss>http://labs.p1sec.com/2012/05/24/link-reference-in-the-telco-world-for-security-auditors/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
