University of Western Australia Bluetooth Security Notes: Evision Control
University of Western Australia Bluetooth Security Notes: Evision Control
REVISION CONTROL
• Paul Day, 04/08/04, Initial draft
• Paul Day, 25/08/04, Final revision
• Paul Day, 26/08/04, included generic intro to BT and more Windows examples
1- INTENDED AUDIENCE
• Any user of Bluetooth
2- INTRODUCTION
This document is intended to:
• Introduce Bluetooth and its capabilities
• Highlight security drawbacks and vulnerabilities in devices and computers with
Bluetooth enabled
• Outline measures that can be taken to minimize your vulnerability from the use
of Bluetooth
These security mechanisms, and a number of issues they currently possess, are
discussed below.
A number of computer operating systems share a folder or drive out via Bluetooth by
default, for read-only access or read/write access. eg, MacOSX automatically shares
out the “Shared” folder for reading and allows people to write files to the “Drop Box”
folder by default.
Some users are unwittingly using the shared folders for storage of personal or sensitive
data, allowing an attacker to easily gain access to the files.
Many mobile phone manufacturer’s have decided that Bluetooth authentication is not
necessary in OBEX to aid easy exchange of business cards from phone to phone.
Unfortunately, this also allows an attacker to easily gain access to other files and
personal information stored on the phone, such as:
• entire phonebook
• calendar
• real-time clock
• business card
• properties1
1
“Serious flaws in Bluetooth security lead to disclosure of personal data “, Adam Laurie of A.L. Digital
Ltd. , http://www.thebunker.net/release-bluestumbler.htm
2
Bluetooth security notes
While most devices are only vulnerable to this attack while in “visible” mode, there
are techniques to allow an attacker to find a device that is in invisible/hidden mode.
Some devices leave all credentials after deleting a pairing which allows the deleted
paired device to still connect as normal. To the user, the device does not appear as
“trusted” in a list of devices, however the attacker may still have full access via
Bluetooth.
An attacker may quickly take the device from the owner, pair the attacking device,
delete the pairing so it is no longer visible to the owner, return the device and still
have full ability to connect to the owner’s device without their knowledge.
This is commonly referred to as the backdoor attack. The attacker is then free to
continue using your device as if s/he has full access to it. Data can be retrieved from
your computer or a mobile phone can be used as a WAP or GPRS data gateway without
your knowledge.
The above two attack methods can also be used to establish a serial profile with your
device, known as the bluebug attack. This gives the attacker full access to resources
shared by the device over serial. eg, a mobile phone can be used to make phone calls
using the AT command set or a laptop computer could have your PDA’s data stolen
onto an empty PDA owned by the attacker.
There are also tools available, such as @stake’s RedFang, which allow brute-force
discovery of hidden or undiscoverable devices. “Hidden” or “undiscoverable” mode
may stop your device from broadcasting its present, however it will still respond to a
number of requests, allowing brute-force discovery of it.
Some manufacturer’s claim this would take an unreasonable amount of time (eg, 11
hours). However, a multi-threaded version of RedFang could simultaneously utilize up
to 8 USB Bluetooth devices which would reduce the 11hrs to approximately 90
minutes (based on one vendor’s range)2.
2
“War Nibbling: Bluetooth Insecurity”, Ollie Whitehouse, @stake
3
Bluetooth security notes
If you’re not actively using the Bluetooth connection on your device or computer, you
should disable the Bluetooth adapter. Not only is this more secure, it will considerably
reduce battery consumption on devices such as a phone.
On an Ericsson T610 mobile phone: Menu -> Connectivity -> Bluetooth -> Turn Off
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth ->
Settings -> “Turn Bluetooth Off”
On a WinXP computer: Start menu -> Control Panel -> Bluetooth Configuration ->
Accessibility -> untick “Let other Bluetooth devices to discover this computer” ->
Allow menu, choose “No devices to connect”
If you’re actively using the Bluetooth connection in your device, take the following
precautions to minimize your risk:
5.2- Ensure you have the latest Bluetooth firmware and device drivers on all
devices
Nokia and Sony Ericsson have both released newer firmwares for their phones in the
first half of 2004 to address the issue of bluesnarfing. Contact your manufacturer’s
telephone support to organise a software upgrade on your phone.
Owners of computers, notebooks and palm computers with Bluetooth hardware should
check the website of the manufacturer of their computer or Bluetooth adapter for the
latest software drivers and latest Bluetooth firmware.
Your devices only need to be in “visible” or “discoverable” mode when pairing them
with your other Bluetooth devices. Once you have paired your devices (headset to
phone, mouse to computer, Palm computer to laptop) you should disable the visibility
of your device.
Once paired, devices are still able to communicate even when not in discoverable
mode.
On an Ericsson T610 mobile phone: Menu -> Connectivity -> Bluetooth -> Options ->
Visibility -> Hide phone
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth ->
Settings -> untick “Discoverable”
On a WinXP computer: Start menu -> Control Panel -> Bluetooth Configuration ->
Accessibility -> untick “Let other Bluetooth devices to discover this computer”
4
Bluetooth security notes
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth ->
Settings -> tick “Require Authentication”
On a WinXP computer: Start menu -> Control Panel -> Bluetooth Configuration ->
General -> security -> choose “High” from drop-down menu
Turning on Bluetooth encryption means that the majority of data transmitted between
the two Bluetooth devices is encrypted with a common key. This makes it difficult for
a third party to sniff the data or use recorded data in “replay attacks”.
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth ->
Settings -> tick “Require Authentication” -> tick “Use Encryption”
On a WinXP computer: Start menu -> Control Panel -> Bluetooth Configuration ->
General -> security -> choose “High” from drop-down menu
It is best to always be asked by your device when accepting a file so that you don’t
unwittingly allow a dangerous file or Trojan to be automatically uploaded.
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth -> File
Exchange -> “When receiving items:” -> Choose “Prompt for each file” -> “When PIM
items are accepted” and “When other items are accepted:” -> Choose “Ask”
If you do not actively share files from the Bluetooth device to your other devices,
disable all sharing (read-only and read/write) of files.
On a MacOSX 10.3 computer: Apple menu -> System Preferences -> Bluetooth -> File
Exchange -> untick “Allow other devices to browse files on this computer”
On a WinXP computer: Start menu -> Control Panel -> Bluetooth Configuration ->
Information Exchange -> remove the “Shared Directory”
To ensure there are no “hidden” pairings in your device, it is best to do a factory reset
of it. Unfortunately, this may not be convenient.
Computer users may wish to delve into the registry or settings files of their operating
system to ensure that there are no extra device pairings present.
5
Bluetooth security notes
5.9- Do not pair with unknown devices or give up physical access to your device
To alleviate the chances of an attacker pairing with your device (and then potentially
hiding the pairing by “deleting” it), do not pair with an unknown device or allow
physical access to your device to any un-trusted party.
While commodity devices come with low-power transmitters and very poor antennas,
resulting in usage areas of only a few meters, there are number of other items on the
market which allow an attacker to extend the range of Bluetooth:
• High-gain directional antennas for the 2.4Ghz band can be easily made or
purchased.
• Higher-powered Bluetooth adapters can be easily purchased.
6- CONCLUSIONS
While Bluetooth does introduce a number of vulnerabilities to a user’s devices and
data, there are number of methods that will dramatically reduce your risk.
After going through the suggestions above, the user must then weigh up the
convenience of using Bluetooth vs the relatively small remaining risk.
7- BIBLIOGRAPHY
“Serious flaws in Bluetooth security lead to disclosure of personal data “, Adam Laurie
of A.L. Digital Ltd. , http://www.thebunker.net/release-bluestumbler.htm