[liberationtech] How secure is Bluetooth?
Jacob Appelbaum
jacob at appelbaum.net
Sun Jan 29 22:23:07 PST 2012
On 01/29/2012 04:09 PM, Brian Conley wrote:
> See my first email please.
>
> Are there any documented cases of monitoring the audio transmitted between
> a Bluetooth headset and phone.
I guess you're looking for some personal stories or big news stories?
>
> I am quite aware that Bluetooth is not safe for a variety of reasons.
>
Please note that your users will likely be targeted by cops with FinFisher:
http://speciali.espresso.repubblica.it/pdf/spyfiles/it-intrusion.pdf
> When preparing advice for non technical people with very real security
> problems that are known, its important to provide the best advice about
> what is not known in their situation. I've been unable to find any
> information on the viability of intercepting audio transmissions, even the
> 2007 article doesn't appear to suggest for certain that they could
> reconstruct the audio file, merely that the potential might be there.
>
Audio is a weird way to frame it. You have devices that communicate with
Bluetooth (TM) use common cryptography and protocols. The crypto is
busted: http://en.wikipedia.org/wiki/E0_(cipher)
This is a pretty funny read:
http://en.wikipedia.org/wiki/Bluetooth#Security
Overall, I think it's important to note that even if a device wasn't
used in a discoverable mode, a sniffer can at least passively track and
try to exploit devices nearby after seeing them transmit. This is likely
similiar to Bluejacking:
http://en.wikipedia.org/wiki/Bluejacking
Here's a project that uses a car as an audio bug:
http://trifinite.org/trifinite_stuff_carwhisperer.html
> I'm only asking if anyone has heard of documented cases of listening in to
> Bluetooth audio. So far it only seems to happen if there is a prior exploit
> in place and that doesn't even appear to be definitive.
R&S sells a solution to sniff traffic between two devices:
http://www2.rohde-schwarz.com/file_13603/Bluetooth_Sniffer_v2.4.pdf
"In an active Piconet, where at least two Bluetooth® devices
(one master, one or more slaves) interact with each other, the
USB dongle is air sniffing the communication between those. This
analysis is required to check interoperability of Bluetooth®
devices from different vendors and to troubleshoot problems by
detailed protocol decoding"
Those guys also sell IMSI-catchers if you're in the market...
This "Decrypting Encrypted Bluetooth data with FTS4BT" is also a good read:
http://www.fte.com/docs/encryption%20and%20decryption%20in%20fts4bt.pdf
Basically, the FTS4BT just needs the pin to decrypt the data and that's
where h1kari's work comes in:
http://openciphers.sourceforge.net/oc/
http://openciphers.sourceforge.net/oc/btpincrack.php
Bluetooth Pin Cracking Core says:
"The bluetooth pin cracking core implements the basic bluetooth pin
cracking attack by generating possible PINs and running then through
SAFER+ to verify if they are correct or not. This uses the pipelined
implementation of SAFER+ and loops the output of the pipeline back into
itsself 7 times to perform all of the E21/E22/E1 functions. The max
clock speed we've been able to run it at on an E-12 is 75MHz which
results in ~10 million PINs per second compared to roughly 40k on a
modern CPU."
the openciphers project supports the protocol analyser files produced by
these devices:
http://www.lecroy.com/protocolanalyzer/?capid=103&mid=511
This does HCI and air interface sniffing in sync:
http://www.connectblue.com/products/sniffer-protocol-analyzers/bluetooth-sniffer-protocol-analyzer/
Note the features of that one:
"Extracts Audio into WAV files: Supports A2DP, HSP & HF Profiles with
playback for rapid quality check or performing a more detailed analysis"
And if all of that doesn't convince you that someone can sniff Bluetooth
- I encourage you to read this student's web page:
http://nap.cse.bgu.ac.il/home/index.php/Bluetooth_Sniffing
This seems to be the best buy for your money:
http://compare.ebay.com/like/150735473216?var=lv<yp=AllFixedPriceItemTypes&var=sbar
$799.99 for the LeCroy Merlin CATC Mobile Bluetooth Protocol Analyzer
seems like a deal. Even cheaper than the USRP!
If you're looking for other devices for BT sniffing, I also found this:
http://www.palowireless.com/bluearticles/bluetoothanalyzercompare1.asp
And finally - the Ellisys equipment:
http://www.ellisys.com/products/bex400/revolution.php
"The new Ellisys All-Channel sniffer robustly records any packet, at any
time, from any neighboring piconet, with zero-configuration and without
being intrusive."
http://www.ellisys.com/products/bex400/ has the best quote:
"Determine PIN codes automatically and decrypt the data on the fly"
Two nice photos of the device and software:
http://www.ellisys.com/archive/images/bex400.png
http://www.ellisys.com/archive/images/bex400_soft.png
All the best,
Jacob
More information about the liberationtech
mailing list