Тёмный

37C3 - All cops are broadcasting 

media.ccc.de
Подписаться 208 тыс.
Просмотров 153 тыс.
50% 1

media.ccc.de/v/37c3-11761-all...
TETRA unlocked after decades in the shadows
This talk will present details of the TETRA:BURST vulnerablities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure relying on secret cryptographic algorithms which we reverse-engineered and published in August 2023. Adding to our initial disclosure, this talk will present new details on our deanonymization attack and provide additional insights into background and new developments.
In August 2023, we published the TETRA:BURST vulnerablities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure. Authentication and encryption within TETRA are handled by proprietary cryptographic cipher-suites, which had remained secret for over two decades through restrictive NDAs until our reverse-engineering and publication.
TETRA:BURST consists of five vulnerabilities, two of which are critical, including the backdoored TEA1 cipher (crackable in minutes on commodity hardware by a passive adversary), a keystream recovery attack (which works regardless of the cipher employed), and a deanonymization attack with counter-intelligence implications.
In this talk, we will discuss and demonstrate the TETRA:BURST vulnerabilities themselves and will - for the first time - disclose the details of the TA61 identity anonymization primitive and our Meet-in-the-Middle deanonymization attack against it. In addition, we will provide more background on how the TEA1 backdoor proliferated throughout Europe and provide attendees with an update on new developments since our initial disclosure, the future of TETRA, and the vast amount of TETRA hardening work that still needs to be done in critical infrastructure.
Jos Wetzels
Carlo Meijer
Wouter Bokslag
events.ccc.de/congress/2023/h...
#37c3 #Security

Опубликовано:

 

3 янв 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 107   
@markosluga5797
@markosluga5797 5 месяцев назад
For anyone interested in the Slovenian Tetra case look up the guy, his name is Dejan Ornig. He discovered tons of unencrypted comms between 2012 and 2014, disclosed it multiple times to the police and the intelligence agency and they both ignored him. He only went public in 2015 as he felt it was a matter of national security and then got charged and sent to 3 months in jail + 11 months suspended sentence for "unlawful intrusion into private communication between individuals" and "forging of official documents" because they apparently found a fake police badge when they searched his home - which was imho planted because Slovenian cops are generally accepted as not being trustworthy.
@tizwah
@tizwah 5 месяцев назад
Wow that story sounds like something straight out of Hollywood...
@TheBrick2
@TheBrick2 5 месяцев назад
brilliant. Guy tries to help ends up in jail
@RT-qd8yl
@RT-qd8yl 5 месяцев назад
@@tizwah Sounds like a typical government to me
@Jeremy-kq5bs
@Jeremy-kq5bs 5 месяцев назад
He should have realized, these guys in the intelligence community already knew all about it, they created it. They really didn't want it exposed.
@LabiaLicker
@LabiaLicker 5 месяцев назад
EU is getting increasingly more dystopian
@NicholasAndre1
@NicholasAndre1 5 месяцев назад
“Firmware updates are available…depending upon your vendor.” Security in a nutshell This is what happens when your spec was designed by a bunch of long departed contractors and everybody left in your company works in sales and marketing.
@zxcaaq
@zxcaaq 5 месяцев назад
Have a friend working at the NSA the encryption used in these is can be easily cracked for the purpose of intelligence agencies to get into them.
@TheHilariousGoldenChariot
@TheHilariousGoldenChariot 5 месяцев назад
@@namefull_slavefirmware would not likely be different per vendor at that point you are making completely different products.
@Kabodanki
@Kabodanki 5 месяцев назад
I have a friend working at the NSA and he said your friend is wrong and that he must return these rj45 cables he's stealing
@genewitch
@genewitch 4 месяца назад
i wonder if it is a dig at motorola because they love EOL-ing radios
@kekistanimememan170
@kekistanimememan170 4 месяца назад
@@zxcaaqyour friend just disclosed a method. Str8 to jail.
@hagen-p
@hagen-p 5 месяцев назад
Please be very careful, guys. Usually the messenger is punished. It's so much easier and more convenient than to punish the people who really neglect their duties. It's nice to see someone sticking to their integrity and uphold their values. Hope for mankind. Many thanks for your good work!
@RT-qd8yl
@RT-qd8yl 5 месяцев назад
Yeah these guys will probably get Euro-Clinton'd soon 🙁
@Mtaalas
@Mtaalas 5 месяцев назад
We know exactly how many open source standard encryption methods work (NO obfuscation) and they still cannot be readily hacked... and if there's bug in implementation, it's FIXES very fast exactly because it's open source. Obfuscation is not in any way helping security, ever! And once it's cracked, there's difficulty of getting any firmware updates and one might have to completely change out their hardware for another vendor if vendor doesn't react within days or preemptively by continuously trying to crack their own firmware and then improve it before vulnerabilities come known... And no business wants to do that. They're in it for the money so they put as little resources into that as possible and instead market an sell their product as much as possible.
@zapmouse5988
@zapmouse5988 5 месяцев назад
Ha! Good one on the title.
@TimNeumann
@TimNeumann 5 месяцев назад
Amazing research on this very critical application! I wonder why no one has looked into this before, even though it is so commonly used?!
@lll-xo6nk
@lll-xo6nk 5 месяцев назад
Es wird davon ausgegangen, dass klar ist, dass es strafbar ist und im Notfall muss alles zugänglich sein, sonst hilft niemand, weil es keiner mitbekommen kann...zudem sollte der einfache Zugang den damit Arbeitenden bekannt sein - es gibt ja auch oft Verfahren, in denen Verschlüsselungen oder Passwörter für Mailfächer herausgegeben werden sollen, weil eben Quellen zu schützen sind und Infos dann nur bestimmten Personen zur Verfügung stehen dürfen und Namen erstmal gar nicht.
@thewhitefalcon8539
@thewhitefalcon8539 5 месяцев назад
They keep it secret so you can't research it
@greekstraycats
@greekstraycats 5 месяцев назад
@@lll-xo6nk Die Russen haben doch - ich glaube seit Jahren diverse Hacks. Erst funktionierten die nur offline also mit vorher aufgezeichnetem Material, der hat da dann irgend ne brute-force drauf los gelassen. Aber später ging das dann auch live. Halt plugins für diverse SDR-Software. Konnte das leider nie testen. Hab hier in der Südeuropäischen Einöde keinerlei TETRA
@mikkelens
@mikkelens 5 месяцев назад
probably people have, but it is probably 1) very hard to get anywhere with, 2) counter to ideas of security through obstruction, and 3) counter to the interests of nation states edit: it is mentioned by the speaker that a researcher in Slovenia got jail-time for going to the media with this issue (34:19)
@hagen-p
@hagen-p 5 месяцев назад
It's like with open source - theoretically some people can check all this. But this costs effort and money.
@albaragone2632
@albaragone2632 4 месяца назад
Thank you very much for your research!... I waited 10 years for this report!... Thank you, thank you! Kind regards. Mrs. Ragone ❤
@GabrielPettier
@GabrielPettier 5 месяцев назад
pause at 54:00 «BM: we were just given those algorithms. And the algorithms were designed with some assistance from some government authorities, let me put it that way.» Well, that's reassuring, no government authority ever had the incentive to weaken security for encryption algorithms, some of them specifically designed for exports 😌. Incredible work!
@luxincognita
@luxincognita 5 месяцев назад
Whats more, I bet no one (either inside or outside ETSI) knows which level of "assistance", actors involved etc...
@cdrbvgewvplxsghjuytunurqwfgxvc
@cdrbvgewvplxsghjuytunurqwfgxvc 4 месяца назад
Good old security by obscurity. It’s mindboggling how countries can buy ”trust us” security equipment.
@user-ec3rm9wr1n
@user-ec3rm9wr1n 4 месяца назад
Open source 🐱😁....
@ah-64apache84
@ah-64apache84 5 месяцев назад
nice power move, using a 1998 laptop for your exploit :D
@gandalf1783
@gandalf1783 5 месяцев назад
I just watched the TETRA video yesterday and now I even get a continuation, how great is that!
@humanbeing2730
@humanbeing2730 5 месяцев назад
which one?
@davidbwa
@davidbwa 5 месяцев назад
Interesting. I didn't plan to watch the whole video because this isn't my field in any sense but I found it very interesting so ended up watching all.
@rikvermeer1325
@rikvermeer1325 5 месяцев назад
Wow, super interesting!! The demos looked amazing and it makes me curious to see the de-anonymisation of public services.
@myname-mz3lo
@myname-mz3lo 5 месяцев назад
the security guard at this cinference must have been sweating haha /looking at his radio constantly
@buildaboiworkshop
@buildaboiworkshop 4 месяца назад
Nah, security guard is looking down his nose as he curses everyone around him as lesser nerds. The average citizen not only doesn't care about this; they don't want to know this stuff even exists. Most people on this earth can only handle living in complete ignorance
@LiEnby
@LiEnby 5 месяцев назад
Oh no its security through obscurity
@user-ec3rm9wr1n
@user-ec3rm9wr1n 4 месяца назад
Life 🧬
@5mxg
@5mxg 5 месяцев назад
ETSI seems to be a hub for Crap-to-graphy by design solutions
@TheBrick2
@TheBrick2 5 месяцев назад
Its useful for state actors to know about a weakness, make you think if this is why it is not being closed.
@dinoscheidt
@dinoscheidt 5 месяцев назад
31:53 nostalgia kicking in 🎶😻
@tillorrly1128
@tillorrly1128 5 месяцев назад
You know you're in trouble when hackers go to a Vintage Computer Festival to prove their point.
@SonofHardrada
@SonofHardrada 5 месяцев назад
Excellent work!
@rhinoskin7550
@rhinoskin7550 5 месяцев назад
I'm ignorant to this subject, HS drop out.. Idk why YT suggested this but it's cool.. Where do you start with this stuff?
@ChiGirl43
@ChiGirl43 4 месяца назад
Hey don’t sell yourself short! A high school graduate has no more true knowledge than YOU, they don’t teach true knowledge in school, that comes from going within, and of course from not being too afraid of the real truth, or scared of the consequences for finding it, ,and not being too lazy to put it all together 💯
@szpl
@szpl 5 месяцев назад
Nice talk! 57:00 afaik GDPR explicitly requires you to patch your systems, do active measures for protecting personal data, and it is clear that you have to do extra effort to protect sensitive personal data (eg data about medical condition, sexual orientation, ...)
@robmorgan1214
@robmorgan1214 5 месяцев назад
Well at least "normal" ppl finally know how the taliban rolled up the ANA so easily.
@user-ec3rm9wr1n
@user-ec3rm9wr1n 4 месяца назад
Hahaha 😂😂😂😂
@danirizary6926
@danirizary6926 5 месяцев назад
2 minutes in... I'm pretty sure this isn't about the Tetragonopterus fish
@igorgiuseppe1862
@igorgiuseppe1862 5 месяцев назад
"we now have ipv4" he is not wrong lol
@1h1oh34
@1h1oh34 4 месяца назад
Little late to the party here…been trying to follow for some time, it’s hard some times…..but thanx so much for this information
@SvenTeresniak
@SvenTeresniak 5 месяцев назад
this is some serious hacking. good talk! thanks!
@hhhpestock951
@hhhpestock951 4 месяца назад
These dudes are gonna be rockstars.
@BossModeGod
@BossModeGod 4 месяца назад
Wym
@steffenlindemann1227
@steffenlindemann1227 5 месяцев назад
I doubt that TETRA is actually used for time critical applications like breaking a train. But I understand that a train can be stopped if a certain message is dispatch, like "person on the rail" etc.
@adamkwalczyk
@adamkwalczyk 5 месяцев назад
TETRA should utilize bilateral handshake of the device and a silicon-dipped authentication cartridge replaced give or take quarterly. A foreign institution would take care the old ones return intact which would result in continuing the cooperation with the client. Systems of trust are stronger than cryptography.
@TinkerTech
@TinkerTech 4 месяца назад
l need to read about the research as repeatedly hearing "uh" and "umm" during a talk drives me insane. Very interested in your findings though.
@derohneusername
@derohneusername 5 месяцев назад
Let the games begin
@timnewsham1
@timnewsham1 4 месяца назад
"more details in our CCCamp talk" @12:38. Is this talk available anywhere? Are there any other details available on the technical details of the arm -> dsp -> extract secrets work?
@auzzierocks
@auzzierocks 5 месяцев назад
I'm from Australia, we use P25 for emergency services and public services, I don't know where tetra is utilised. Only police are encrypted though
@userPrehistoricman
@userPrehistoricman 5 месяцев назад
Looks like TEA1 and TEA (tiny encryption algorithm) have something in common!
@-abigail
@-abigail 5 месяцев назад
i think i'm in love
@renakunisaki
@renakunisaki 5 месяцев назад
So when they say backdoor, they mean the security is weak on purpose? Or just "so weak it functions as a backdoor"?
@neur303
@neur303 5 месяцев назад
Yes, they mean the system was purposefully broken by design
@SeanPoulter
@SeanPoulter 5 месяцев назад
Like DES
@RT-qd8yl
@RT-qd8yl 5 месяцев назад
Yes, it's on purpose. Many times it's done so a country's intelligence services can access data on their citizens
@georgesos
@georgesos 5 месяцев назад
I am not even going to ask about Greece ,after the surveillance scandal where the prime minister was listening in on his ministers,head of army,political opponents and businessmen....
@shelltoe_soul
@shelltoe_soul 5 месяцев назад
Seems more like “due diligence" rather than a scandal. If you have a security apparatus that can gain this sorta info, who can really blame politicians for using all the toys in their paramility toolbox?
@tissuepaper9962
@tissuepaper9962 4 месяца назад
@@shelltoe_soul Literally everyone can blame them. If you need to spy on your subordinates and citizens to maintain your power, you are unequivocally a tyrant.
@anthonythompkins9467
@anthonythompkins9467 4 месяца назад
This video has definitely grabbed my attention i dont knowany thing about this sector but want to learn any freelance work i could do to help develope the skills .this is so dope😮😮😮😮
@suki4410
@suki4410 5 месяцев назад
12345 ist mein Passwort. Pssst, nicht weitersagen.
@_zproxy
@_zproxy 5 месяцев назад
so basically rot13
@edwardmorris8141
@edwardmorris8141 4 месяца назад
Thank you for posting this!
@erinsquirkychannel501
@erinsquirkychannel501 4 месяца назад
Is this for police scanner radios or something else?
@Nono-hk3is
@Nono-hk3is 5 месяцев назад
Do P25 next
@kirakirsch8991
@kirakirsch8991 5 месяцев назад
why don't they just use a standard algorithm like aes-gcm or chacha20-poly1305
@Kyuubi840
@Kyuubi840 5 месяцев назад
1:02:05 answers that. Because they don't want to export algorithms that are too good. They want to have backdoors/vulnerabilities that they can exploit if needed.
@almc8445
@almc8445 5 месяцев назад
Besides what @Kyuubi said: - A lot of run of the mill algorithms are quite compute intensive, which means more expensive components, and higher power draw (Lower battery life, bigger heatsinks, more weight, etc.) - So developing their algorithm might allow them to make more competitive products - Some customers might have restrictions on the encryption methods they can use, whether self imposed or by a higher authority, and might not be allowed to use public algorithms - So if they want to sell to these markets, they need a system with a proprietary algorithm - Most customers don't care about whether the algorithm is proprietary or open, they want to throw money at a problem and get something that meets their needs. As security professionals/enthusiasts we know an open solution is more secure, but their customers are not security experts - So they blindly trust what they're told by vendors Remember, the priority for a business is more profit, not more security. Whether that's the customer, or vendor, or the engineers, security is a means to an end, and it will always be treated that way.
@enginerdy
@enginerdy 5 месяцев назад
AES wasn’t proposed until 1999 or so, it wasn’t available in 1995, and cheap silicon to run it was several more years away.
@Sixta16
@Sixta16 5 месяцев назад
@@almc8445 Any decent modern microcontroller nowadays can be equipped with a fast HW based crypto core with almost none power consumption impact. It may have been different in the past (20 years ago), but it cannot be taken as an excuse today.
@harrythompson6977
@harrythompson6977 5 месяцев назад
software is only ever as good as the limiting hardware you run it on.
@lll-xo6nk
@lll-xo6nk 5 месяцев назад
Ist mit dem Begriff "Radio" Funk-Netz gemeint, oder welcher Standart oder welche Bandbreite?
@th3r4bbi7
@th3r4bbi7 5 месяцев назад
Es geht um den den TETRA Funkstandard
@christianh2581
@christianh2581 5 месяцев назад
Das Wort "Radio" kann in Englisch auch die Bedeutung "Funkgerät" haben. Also z.b. bei 10:32 steht auf der Präsentation 'Pick the right radio', damit ist gemeint das sie erstmal einfach überlegt haben welches Funkgerät sie kaufen, um dann die Algorithmen darin zu studieren
@jahleajahlou8588
@jahleajahlou8588 4 месяца назад
Is this how Pegasus works too ? Is this how the data is haystacked by the spooks ?
@nimpsta
@nimpsta 5 месяцев назад
a repost ?
@lll-xo6nk
@lll-xo6nk 5 месяцев назад
08 2023
@ShannonCarpenter-dr1tt
@ShannonCarpenter-dr1tt 5 месяцев назад
Greetings. I am Victoria . Aka Source Creator. You are severely outdated technology
@jannikheidemann3805
@jannikheidemann3805 4 месяца назад
I am indeed. How did you know?
@michac3796
@michac3796 5 месяцев назад
Ääääh Äääähhhmmmm..... Dude...
@Stikku
@Stikku 5 месяцев назад
i don't think this guy understands how radio works.
@fabiusIII
@fabiusIII 5 месяцев назад
Bona fide is latin, please don't bastardize Latin with English pronunciation
@ABCDEFG-mj3np
@ABCDEFG-mj3np 5 месяцев назад
lol
Далее
37C3 -  Security Nightmares
1:07:50
Просмотров 105 тыс.
Incredible Wheel Restoration Process 🚙
01:00
Просмотров 1,3 млн
37C3 -  Hirne hacken: Hackback Edition
1:01:40
Просмотров 128 тыс.
TLS Handshake Deep Dive and decryption with Wireshark
1:05:40
36C3 -  Das nützlich-unbedenklich Spektrum
1:03:40
Просмотров 276 тыс.
Incredible Wheel Restoration Process 🚙
01:00
Просмотров 1,3 млн