论文标题

消费者远程模拟配置协议的安全分析

Security Analysis of the Consumer Remote SIM Provisioning Protocol

论文作者

Ahmed, Abu Shohel, Peltonen, Aleksi, Sethi, Mohit, Aura, Tuomas

论文摘要

用于消费者设备的远程SIM卡配置(RSP)是GSM协会指定的协议,用于将SIM调查结果下载到移动设备中的安全元素中。该过程通常称为ESIM,预计将替换可移动的SIM卡。协议的安全性至关重要,因为该配置文件包括移动设备将对移动网络进行身份验证的凭据。在本文中,我们对消费者RSP协议进行了正式的安全性分析。我们在应用Pi微积分中对多方协议进行建模,定义正式的安全目标,并在Proverif中验证它们。分析表明,当所有预期的参与者诚实时,消费者RSP协议可以防止网络对手。但是,我们还以现实的部分折衷场景对协议进行建模,其中对手控制合法参与者或通信渠道。部分折衷方案中的安全失败揭示了协议设计中的弱点。最重要的观察结果是,RSP的安全性不必要地取决于将其封装在TLS隧道中。同样,缺乏预先建立的标识符意味着世界上任何地方的下载服务器或受损的安全元素可用于诚实参与者之间的RSP攻击。此外,缺乏可靠的方法来验证用户意图会导致严重的安全失败。根据调查结果,我们建议对RSP实施,规范的未来版本和移动运营商流程进行实际改进,以提高ESIM安全性的鲁棒性。

Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM cards. The security of the protocol is critical because the profile includes the credentials with which the mobile device will authenticate to the mobile network. In this paper, we present a formal security analysis of the consumer RSP protocol. We model the multi-party protocol in applied pi calculus, define formal security goals, and verify them in ProVerif. The analysis shows that the consumer RSP protocol protects against a network adversary when all the intended participants are honest. However, we also model the protocol in realistic partial compromise scenarios where the adversary controls a legitimate participant or communication channel. The security failures in the partial compromise scenarios reveal weaknesses in the protocol design. The most important observation is that the security of RSP depends unnecessarily on it being encapsulated in a TLS tunnel. Also, the lack of pre-established identifiers means that a compromised download server anywhere in the world or a compromised secure element can be used for attacks against RSP between honest participants. Additionally, the lack of reliable methods for verifying user intent can lead to serious security failures. Based on the findings, we recommend practical improvements to RSP implementations, future versions of the specification, and mobile operator processes to increase the robustness of eSIM security.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源