FS.21 v2.0 PDF
FS.21 v2.0 PDF
Copyright Notice
Copyright © 2017 GSM Association
Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept
any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.
The information contained in this document may be subject to change without prior notice.
Antitrust Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.
V2.0 Page 1 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Table of Contents
1 Introduction 4
1.1 Overview 4
1.2 Scope 4
1.3 Abbreviations 4
1.4 References 6
1.4.1 GSMA Permanent Reference Documents 6
1.4.2 Other References 7
2 Risk Assessment 8
2.1 Basis of Assessment 8
2.1.1 Likelihood 8
2.1.2 Impact 8
2.2 Location Tracking 9
2.2.1 Attack Description 9
2.2.2 Risk Assessment 9
2.2.3 Evidence of Occurrence 10
2.3 Call and Text Message Interception 11
2.3.1 Attack Description 11
2.3.2 Risk Assessment 11
2.3.3 Evidence of Occurrence 12
2.4 Fraud 13
2.4.1 Attack Description 13
2.4.2 Risk Assessment 14
2.4.3 Evidence of Occurrence 14
3 Response and Controls Implementation 15
3.1 Passive Monitoring 15
3.2 Active Testing / Auditing 15
3.3 Implement SMS Home Routing 16
3.4 Filtering on STPs and End Nodes 16
3.5 Implement SS7 Firewall 16
3.6 Implement Diameter Firewall 17
3.7 Implement Advanced Analytics 18
3.8 Consider other Interconnect Signalling Protocol Vulnerabilities 18
3.9 Co-existence of existing networks and SDN/NFV 18
4 Business Case 19
5 RFI/RFP Recommendations 19
6 Use of IP network layer information in Signalling Firewalls 21
6.1 Introduction 21
6.2 Deployment Model 22
6.2.1 Integrated or Separated 22
6.2.2 IP Traffic Routing Options 22
6.3 Combining Information from Different Layers 23
6.3.1 Usage of IP layer Information 24
V2.0 Page 2 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
V2.0 Page 3 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
1 Introduction
1.1 Overview
Mobile network operators (MNOs) have historically treated all signalling messages received
from outside the network as trusted and necessary. As access to and use of the signalling
networks has evolved, interconnect signalling protocols such as Signalling System number 7
(SS7), Diameter, and the GPRS Tunnelling Protocol (GTP) have been discovered to be
vulnerable to exploitation, potentially enabling attackers to perform eavesdropping, service
denial, location tracking and fraud. The GSMA has produced recommendations for mobile
operators to mitigate these risks and prevent attacks by monitoring and filtering signalling
traffic, leading to greater protection for their customers and businesses. This document
provides a risk-based introduction to the topic in a non-technical manner.
1.2 Scope
This document highlights key risks associated with interconnect security vulnerabilities, and
outlines suggested MNO responses to these risks. This document does not describe
technical vulnerabilities, potential attacks or controls in detail. Instead, it highlights the
technical reference documents available from GSMA on interconnect signalling security, and
how they can be used to support an operator response.
Finally this document describes the use of IP network layer information in signalling firewalls
to provide adequate protection against sophisticated signalling attack scenarios like starting
with an IP network layer attack on the interconnection followed by sending Location Update
requests in SS7 Mobile Application Part (MAP) or Diameter to a certain port.
1.3 Abbreviations
Term Description
API Application Programming Interface
AVP Attribute Value Pair
CAMEL Customized Applications for Mobile networks Enhanced Logic
CC Command Code
CRM Customer Relationship Management
DEA Diameter Edge Agent
DoS Denial of Service
EPC Evolved Packet Core
FASG Fraud and Security Group
FMS Fraud Management System
GPRS General Packet Radio Service
GT Global Title
GTP GPRS Tunnelling Protocol
V2.0 Page 4 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Term Description
HLR Home Location Register
ICMP Internet Control Message Protocol
IMSI International Mobile Subscriber Identity
IPFIX IP Flow Information Export
IPX Internet Protocol Exchange
LTE Long Term Evolution
MAP Mobile Application Part
MNO Mobile Network Operator
MSC Mobile Switching Centre
MSISDN Mobile Station International Subscriber Directory Number
MTAN Mobile Transaction Authentication Number
MTP Message Transfer Part
NFV Network Functions Virtualization
OPC Originating Point Code
OS Operating System
OSI Open Systems Interconnection
PRD Permanent Reference Document
RFI/RFP Request for Information / Proposal
SS7 Signalling System Number 7
SCCP Signalling Connection Control Part
SCTP Stream Control Transmission Protocol
SDN Software-Defined Networks
SIGTRAN Signalling Transport
SIP Session Initiation Protocol
SMS Short Message Service
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol
SS7 Signalling System 7
STP Signal Transfer Point
TCP Transmission Control Protocol
TCAP Transaction Capabilities Application Part
UDP User Datagram Protocol
VLR Visited Location Register
XML Extensible Markup Language
V2.0 Page 5 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
1.4 References
V2.0 Page 6 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
V2.0 Page 7 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
2 Risk Assessment
This section summarises the following attack types considered to represent the highest
threats to MNOs and their customers;
Location Tracking
Call and Text Message Interception
Fraud
MNOs are encouraged to at least mitigate these threats, which will position them well to
evolve their mitigation strategy to cover a broader range of threats over time.
Detailed descriptions of potential attacks against SS7 MAP, Diameter and GTP are
contained in GSMA PRDs FS.07 [1], FS.19 [4] and FS.20 [5] respectively. Note that there
may be several different ways of carrying out an attack, and an attacker can adjust his attack
method depending on how a network responds to initial attack attempts. Also those
documents contain further threats e.g. DoS and cryptographic key material theft.
The content of this section is focussed on SS7 MAP, as that is the protocol subject to most
research and analysis at present. To a large extent the same risks via SS7 MAP apply in a
similar way to Diameter as described in [4], and thus not repeated here. Descriptions of the
Diameter-based attacks scenarios and their taxonomy can be found in [4]. The full list of
Diameter Command Codes (CCs) and Attribute Value Pairs (AVPs) that could be used to
perform Diameter-based attacks can be found in Appendix A of [4]. Several approaches may
be possible, using variations or subsets of the CCs and the AVPs specified there.
In addition, the risks should also be considered in the context of other protocols (e.g. GTP
(see [5]), RADIUS and Session Initiation Protocol (SIP)).
2.1.1 Likelihood
Defined as the probability of occurrence within one year with a material frequency, likelihood
is defined as low, medium or high as follows. MNOs may wish to make a more precise
individual assessment based on local factors.
Rating Description
Low Risk is unlikely to materialize, or will materialize with low frequency
Medium Risk is likely to materialize at some point or will materialize with a moderate frequency
High Risk is highly likely to materialize at some point or will materialize with a high frequency
2.1.2 Impact
Impact could manifest itself in a number of ways (legal/regulatory, reputational, financial,
operational and strategic), therefore the impact in each area is classified separately as low,
V2.0 Page 8 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
medium or high. MNOs may wish to make a more precise individual assessment based on
local factors.
Finding a targeted victim’s location may be the end goal of an attacker, or it may be the first
step of another attack type (e.g. call interception).
The full list of MAP messages that could be used to perform SS7-based attacks can be
found in Appendix A of [2]. Several different attack approaches may be possible, using
variations or subsets of the messages specified there. The taxonomy of the attacks can be
found in [1].
2.2.2.1 Likelihood
High – this risk is highly likely to materialize at some point or will materialize with a very high
frequency. This assessment is based on the following:
Many MNOs have detected messages used for location tracking through their
monitoring programmes.
There are third party location tracking services advertised and discovered on the
DarkWeb as well as the public Internet. These services use SS7 network access to
provide global location tracking services without the knowledge of the MNOs that
provide service to the targeted subscribers.
Only the subscriber Mobile Station International Subscriber Directory Number
(MSISDN) is needed to retrieve the subscriber’s International Mobile Subscriber
Identity (IMSI), serving Mobile Switching Centre (MSC)/ Visited Location Register
(VLR), and the Home Location Register (HLR) addresses.
The risk of location tracking is expected to remain high or increase in future due to:
V2.0 Page 9 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
2.2.2.2 Impact
Type Rating Notes
Legal/regulatory Medium Breach of customer data privacy laws. Potential for disciplinary
action by regulator and/or legal action by victim.
Reputation High Potential for national or international damage to brand and
reputation. Mainstream media coverage likely, especially if
victims have a public profile.
Financial Low No direct financial impact. Potential for indirect financial impact
as a result of legal/regulatory action.
Operational Low Potential increased load on network nodes if receiving high
volumes of illegitimate messaging.
Strategic Low Damage to reputation may hinder progress towards strategic
objectives.
See also:
https://wikileaks.org/hackingteam/emails/emailid/20790
https://www.adaptivemobile.com/blog/tracking-the-trackers
Vodafone Summary of SS7 Cat1 misuse (RIFS Doc 17_ 012)
Improvements to Deutsche Telekom reporting approach (RIFS Doc 17_008)
Orange SS7 Vulnerability Audit Results (RIFS Doc 9_15)
V2.0 Page 10 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Figure 1 – Screenshot from Dark Web highlighting location tracking service activity
Call interception for eavesdropping: This involves the retrieval of network and
subscriber information for targeting, and the manipulation of MAP messages, as well
as subscriber profiles on the VLR. This is a classic man-in-the-middle attack for
eavesdropping of voice calls and SMS.
SMS hijacking: This attack may be used by hackers when they are hacking
subscriber banking or credit card accounts and need to reset the targeted
subscriber’s account passwords. The two-factor authentication methods used by
these institutions when resetting passwords allow hackers to intercept the SMS,
without any knowledge by the victim.
Call hijacking: Calls may be rerouted to the attacker’s network for the purposes of
artificial inflation of traffic (traffic pumping) and inter-carrier fraud. Interactive voice-
response (IVR) recordings may be used to trick the caller into remaining on the line
as long as possible.
The full list of MAP messages that could be used to perform SS7-based attacks can be
found in Appendix A of [2]. Several different attack approaches may be possible, using
variations or subsets of the messages specified there. The taxonomy of the attacks can be
found in [1].
2.3.2.1 Likelihood
High – this risk is highly likely to materialize for a MNO or will materialize with a very high
frequency. The overall likelihood of call and text message interception attacks taking place
on a network is high, especially as an attack may be carried out from anywhere in the world.
The proportion of customers affected is likely to depend on the attack type, as follows:
V2.0 Page 11 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
2.3.2.2 Impact
Type Rating Notes
Legal/regulatory High Breach of privacy could result in regulatory fines as well as
penalties and assessments from lawsuits.
Reputation High Potential for national or international damage to brand and
reputation. Mainstream media coverage likely, especially if
victims have a public profile.
Financial Low No direct impact unless this is artificial inflation of traffic (traffic
pumping), in which case inter-carrier fraud may result in lost
revenues paid out to fraudulent carriers.
Operational Low No impact on the operation of the network given the target is an
individual, and thus the signalling traffic is low. However, attacks
may disrupt the business and result in resources being pulled
from normal work to respond.
Strategic Medium Damage to reputation and loss of public trust in ability of MNO to
provide privacy for calls and SMS may hinder progress towards
strategic objectives.
“For $20M, These Israeli Hackers Will Spy On Any Phone On The Planet”
http://www.forbes.com/sites/thomasbrewster/2016/05/31/ability-unlimited-spy-system-
ulin-ss7/#5e8633057595
Bulgarian company - Global Innovator in Wiretapping
https://bivol.bg/en/bulgarian-company-global-innovator-in-wiretapping.html
V2.0 Page 12 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
2.4 Fraud
Besides these attacks, SMS fraud is also possible, as described in [7] and [8]
SMS faking/spoofing
SMS phishing/spam.
The full list of MAP messages that could be used to perform SS7-based attacks can be
found in Appendix A of [2]. Several different attack approaches may be possible, using
variations or subsets of the messages specified there. The taxonomy of the attacks can be
found in in [1].
V2.0 Page 13 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
2.4.2.1 Likelihood
Medium: Although not yet reported within GSMA by MNOs, this risk is likely to materialize,
given the financial incentives for attackers and the continuous evolution of methods to
commit fraud. As some operators deploy SMS home routing, the likelihood of a successful
attack decreases.
Identification of SS7 exploitation as the root cause of the fraud and reporting of this within
the industry could be delayed if the targeted MNO is not familiar with interconnect security
risks, performing SS7 monitoring or active in industry bodies such as GSMA FASG.
SMS fraud is common, and most MNOs are already actively managing the associated risks.
This topic is documented separately (see [7] and [8]).
2.4.2.2 Impact
Type Rating Notes
Legal/regulatory Low Potential for legal action against MNO by victims of fraud.
Reputation Medium Damage to perceived integrity of mobile services and to billing
as a result of unauthorised changes and charges on targeted
customer accounts.
Potential for national or international reputational impact.
Mainstream media coverage likely, especially if victims have a
public profile.
Financial High High. Potentially significant loss of service revenue. Potential
financial loss due to settlement with roaming and interconnect
partners. Potential abuses and losses on mobile money
services. Potential for indirect financial impact as a result of
legal/regulatory action via affected customers.
Operational Low Potential increased load on network nodes if receiving high
volumes of illegitimate messaging. Fraudulent attacks may
disrupt the business and result in resources being pulled from
normal work to respond.
Strategic Medium Reputational damage may hinder progress towards strategic
objectives.
SMS-based fraud (faking, spoofing, spam, phishing) is commonly reported within FASG.
V2.0 Page 14 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
The SS7 international signalling carrier used by a MNO may be able to perform monitoring of
international interconnects on behalf of the MNO (for a charge, but it requires no capital
investment by the MNO). This approach wouldn’t cover national interconnect, which would
still need to be performed by the MNO. Note that some MNOs may prefer to perform all
interconnect monitoring (national and international) in-house, so that alerting and alarming
can be linked directly to the network operations centre and be fully managed internally.
Caution should be taken to ensure that testing does not negatively impact the production
network, and the use of laboratory test environments is recommended to evaluate e.g. new
configurations. FS.19 [4] contains network penetration testing and auditing
recommendations for Diameter than can be applied generally to any interconnect protocol.
V2.0 Page 15 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Although SMS home routing impedes the distribution of the IMSI via SS7 and Diameter, it
doesn’t protect the network against vulnerabilities where the attacker has found alternative
means for access to the IMSI. See GSMA PRD FS.11 [2] section 3.7 for further details about
how SMS home routing can be bypassed in certain scenarios to exploit SS7 vulnerabilities,
and see FS.19 [4] section 3.3.7.2 and section 5.5.1 for attacks via Diameter made easier if
home routing is not effective. Hence the operator may wish to consider using a SS7 firewall
and/or Diameter firewall solution to protect the network, based on the assumption that the
attackers have access to the IMSI.
Each network may be different and may allow the receipt of certain messages to support
specific services. Some investigation of why certain non-standard SS7 messaging (incoming
or outgoing) should remain with all or a subset of roaming /interconnect partners may be
necessary, and a white list should be established to continue permitting receipt of those
messages to avoid disruption to the related services.
V2.0 Page 16 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Different deployment options for SS7 firewall functions are possible. The following factors
should be considered by an MNO in consultation with its suppliers when deciding which
option to use:
A MNO’s signalling carrier may be able to provide a firewall function for the operator.
It is preferable to have flexible programming capabilities for SS7 firewall rules and the
capability to screen messages across the multiple layers of the SS7 stack. This will offer
MNOs the ability to protect their networks against discovered SS7 vulnerabilities. FS.11 [2]
contains recommended SS7 firewall rules. FS.11 also contains recommended SS7 firewall
data logging formats, to facilitate integration of the signalling firewall with other technical
elements for analytics and reporting, and for sharing information between MNOs.
A MNO may also wish to consider deploying an SMS firewall. See SG.22 [6] for SMS firewall
best practices and policies.
Non-3GPP vendor specific AVPs: Verify if non-3GPP vendor specific AVPs are
allowed between networks
Nesting level of grouped AVPs: Control of maximum nesting level of grouped
AVPs over interconnection interfaces
Encoding risks of AVPs: For example, checks to determine if an AVP has been
defined as UTF8 String, OctetString, DiameterIdentity and/or if an address format
V2.0 Page 17 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
It is preferable to have flexible programming capabilities for Diameter firewall rules and
capabilities to screen vendor specific AVPs, cross-check AVPs transferred at multiple
nesting levels of Grouped AVPs and perform profiling checks based on correlating
messages. This will offer MNOs the ability to protect their networks against newly-discovered
Diameter vulnerabilities. GSMA PRD FS.19 [4] contains recommended Diameter firewall
rules. FS.19 also contains recommended Diameter firewall data logging formats, to facilitate
integration of the signalling firewall with other technical elements for analytics and reporting,
and for sharing information between MNOs.
Defending against some attacks may require the use of analytics, such as analysing
UpdateLocation messages to ensure they are coming from a legitimate source. However,
analytics is not necessary to assess the message type and other parameters used to
determine if these messages should be allowed into the network.
V2.0 Page 18 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
There will most likely be a micro-service for security in an NFV environment that will provide
much of the functionality needed to protect the network core, but agnostic from the access
technology. This is an important consideration as it provides extended protection, but
because of the vulnerabilities we have seen to date, security will have to exist in both the
virtual network function and as a micro-service.
4 Business Case
Points that could be developed and included in a business case for investment in
interconnect signalling controls are provided below:
The primary factor in a business case is protection of the MNO brand and reputation
by providing customer data privacy.
Telecommunications interconnect signalling management should adhere to best
practices that are considered normal in IT (e.g. traffic filtering, minimum access
control at all layers).
Protection against the risk of fraud conducted by exploiting SS7 vulnerabilities can
drive the business case. In addition to fraud risks to traditional mobile services, fraud
risks to mobile money services that use SMS or USSD should be highlighted.
The evidence available from passive and active testing can justify further
investigation, filtering, and investment.
The risks of denial of service (DoS) attacks and network outages due to SS7-based
attacks should be included, but is strongly dependent on the actual geopolitical
climate and varies between operators.
SS7 vulnerabilities undermine any two-factor authentication that use SMS or USSD
as trusted communication channels. As described in section 2.3, SMS is often used
by banks and other traditional and online service providers for sending one-time
passwords or other identifiers used for resetting of account passwords. MNOs risk
losing this business if they cannot provide security for these messages.
SMS home routing can enable revenue generation, so may be used as a revenue
item within a business case.
Implementing SS7 messaging filtering can provide direct financial benefits to the
home network by preventing optimal routing fraud (reported by Orange in [11]), also
supporting the business case.
5 RFI/RFP Recommendations
If conducting a Request for Information (RFI) or Request for Proposal (RFP) for an SS7
firewall function, a Diameter firewall, a combined SS7 and Diameter firewall, or a GTP
firewall, operators need to ensure they are asking for solutions that will best meet their
needs today and in the future. The following factors should be considered:
What attacks will the solution detect and what risks will it help to mitigate?
What latency does the solution introduce in processing of signalling traffic?
This will be important as operators adopt 5G where latency requirements will be even
more stringent
Does the solution include a strategy for supporting NFV?
How will the discovery of new attacks (and respective new filtering rules) be handled?
V2.0 Page 19 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
How will the solution respond and continue to ensure protection and normal operation
for the mobile network if it becomes subject to attack?
What assurances regarding the reliability of the solution can be provided?
How can the solution be scaled to match increasing network traffic without any loss in
performance or protection?
How easy is it to configure the solution to meet the local environment/needs of the
operator and to maintain a set of rules as threats evolve?
What features does the solution offer for handling rule violations e.g. warning, reject,
silently drop, feed to external systems?
How does the solution support the preferred deployment model or the operator, or of
a corporate operator group?
For SS7, how does the solution help the network to mitigate the attacks described in
PRD FS.07 [1]?
Focus should be placed on defending against specific attacks, regardless of how they
are performed, rather than focusing on specific signalling message(s).
For SS7, which of the recommendations in FS.11 [2] and IR.82 [3] that are relevant
and/or possible to implement in a particular mobile network, can be implemented via
the solution?
For Diameter, how does the solution help the network to mitigate the attacks
described in PRD FS.19 [4]?
Focus should be placed on defending against specific attacks, regardless of how they
are performed, rather than focusing on specific signalling message(s).
For Diameter, which of the recommendations in FS.19 [4] and IR.88 [10] that are
relevant and/or possible to implement in a particular mobile network, can be
implemented via the solution?
What protocols are supporting by the monitoring solutions (e.g. SS7. CAMEL, SIP,
Diameter, RADIUS, GTP)?
Can the monitoring solution be integrated with the network operations centre? What
features (e.g. alarming, notification, map views) and interfaces are supported?
What features does the monitoring solution provide to support analysis and sharing
(e.g. full protocol decode, export to .csv and/or .pcap files)?
What features and/or workflows does the analytics solution provide to discover,
interpret, illustrate and/or predict (e.g. via machine learning) patterns in signalling
data? Can it be integrated with big data implementation, and what other systems can
it interface with?
If the solution includes data mining and machine learning capabilities, what
algorithms does it use (e.g. Naïve Bayes Classifier Algorithm, K-Means Clustering
Algorithm, Linear Regression etc.)?
What knowledge and experience does the solution vendor have in implementing
signalling solutions?
What capabilities does the SS7 firewall solution have to filter different layer messages
within the SS7 protocol stack (e.g. Message Transfer Part (MTP), SIGTRAN,
Signalling Connection Control Part (SCCP), MAP)? Do these capabilities include
support of point code, subsystem numbers, global title, MSISDN, IMSI, and VLR
number?
V2.0 Page 20 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
What cross-layer capabilities with the IP network does the Diameter firewall solution
have to filter different layer identities like cross-checking the IP source address and
the value of the Origin-Host?
What performance history does the solution have in other mobile networks?
What services are included as part of the solution? Do these services include
updating of SS7 and/or Diameter firewall rules?
What is the roadmap for future development of the solution?
6.1 Introduction
This section describes considerations for the implementation of a signalling firewall as part of
the IP network layer. Mobile network operators will need to consider the different deployment
models that exist, and the different sets of functions that may be supported on such a
firewall. MNOs also need to consider the type of information that can be provided by the
network and the IP firewall’s transport protection mechanisms to a signalling-specific
application firewall (in this context for the signalling protocols Diameter and/or SS7).
igure 3 provides an overview of typical attack vectors that apply to layers 3, 4 and 7 of the
F
Open System Interconnection (OSI) model and illustrates how protection can be provided by
IP firewall functions on layer 3 and layer 4, and by signalling-specific application firewall
functions on layer 7 for SS7 and Diameter.
These guidelines highlight the IP firewall functions that are of potential value to the
protection schemes in the signalling-specific application firewall. For example, IP firewall
functions may be valuable in signalling attack scenarios such as port scanning at the IP
interconnection, followed by sending Location Update requests to a certain port.
These guidelines outline advantages and disadvantages of the different options that MNOs
will need to consider. In addition, signalling application firewall implementation
considerations are described in a vendor-agnostic manner.
Section 6.2 describes possible deployment models. Section 6.3 describes how IP layer
information can be used and combined with application layer information to increase the
protection level provided by a signalling-specific application firewall.
V2.0 Page 21 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Signaling
Application
DEA/STP DEA/STP
Firewall
National Home Network National Home Network
MME HSS MME HSS
STP STP
V2.0 Page 22 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Advantages:
Disadvantages:
Advantages:
This proxy server deployment option maximizes the protection capability and flexibility
that can be provided by the signalling-specific application firewall, because in proxy
mode it may actively intervene in the TCP/SCTP transactions to protect against
signalling attack vectors that are best mitigated with interceptions of the TCP/SCTP
transactions. It will also ease the implementation of additional security functions that
may be available on a signalling-specific application firewall in existing networks (e.g.
topology hiding, anticipated future features to enhance Diameter end-to-end security).
Disadvantages:
Anomalies and attack vectors have been identified where hackers may use IP layer attacks
as a prerequisite for a subsequent attack against the signalling application layer. For
example, an attack may begin with an IP attack on the interconnect interface to discover
V2.0 Page 23 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
signalling nodes. Later, the information collected may be used to send Location Update
requests in SS7 MAP or Diameter or to send GTP messages to a certain port. DoS attacks
like “SYN Flood Attack” and “Internet Control Message Protocol (ICMP) Flooding” are the
most common type of attacks. The generalised four phase attack process (reconnaissance,
scanning, exploitation, post exploitation) can apply to IP layers 3 and 4 and to signalling on
layer 7 (application layer).
At present, there is no relationship between the events occurring on the IP network layer and
the protection functions performed by the signalling-specific application firewall. However,
there is potential value in using lower layer information (e.g. IP addresses and port numbers,
suspicious or malicious IP firewall event logs/records) to enhance the protection capabilities,
value and effectiveness of the signalling-specific application firewall. This is described in the
sections below.
DoS attacks: Using IP layer information, the MNO could implement rate limiting based
on source IP address and a combination of Destination-Realm, Destination-Host,
Origin-Realm and Origin-Host.
Range screening: The attacker may send a large range of messages e.g. to find
network nodes.
Attacker Evasion Technique: The MNO could counteract spoofing attempts using on
source IP Address, Origin Realm and knowledge of the link where incoming
messages are received.
Reconnaissance Attacks: The MNO could detect a Destination-Host, Destination
Realm and/or Application-ID sweep by an attacker.
V2.0 Page 24 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Analytics for
TCP Attacks, SYN Attacks, DNS
Layer 4 IP Firewall combined
poisoning and SQL injection
intelligence
The modules (i.e. analytics functions, IP firewall and signalling-specific application firewall)
could be co-located in a single node or could be separate. Some IP firewall features may be
part of the native operating system (OS) used by a signalling-specific application firewall
(which can also lead to IP firewall function performance benefits). In that case it is assumed
that the IP firewall and the signalling-specific application firewall modules are co-located.
Loopbacks are shown to indicate the need to update the blocking rules in the firewall
instances at the different signalling layers. Further loopbacks and interfaces between the
modules may also be implemented. Where to place the intelligence and in what direction the
data import and data export works, are deployment options and would depend on each
MNO’s network.
able 6 provides a list of suspicious events coming from the IP layer that provide input for
T
the actions at the signalling layer.
V2.0 Page 25 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
MNOs should note that a blacklisting approach may too rigid and could cause problems
when there is a temporary problem in a partner network or a provisioning error. Hence a
scoring mechanism may be more appropriate to generate alerts for inspection. Using a
blacklist may be appropriate when manipulated and harmful contents are detected.
From a management perspective, the actions in the different modules (IP firewall, signalling-
specific application firewall, analytics) should be combined for visibility, reporting and
correlation, etc. Correlation between IP firewall events and signalling-specific firewall
functions at the application layer can help to:
Detect suspicious GTs, Realms, DEAs based on the information provided by the IP
firewall, here the timing is needed to be able to correlate GTs and IPs etc.
Define cross-layer screening rules (see section 6.3.1)
Define blacklists.
V2.0 Page 26 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
For IP firewall event reporting, the IP firewall provides information via an API to the logically
separated signalling-specific application firewall. Export functions like IPFIX, SNMP or syslog
may be used to stream relevant IP layer 3 and IP layer 4 events and host profile information
to the signalling-specific application firewall.
To update filtering rules, one or more analytics modules generates and submits updates to
the signalling-specific application firewall via an API like Simple Object Access Protocol
(SOAP) using Extensible Markup Language (XML).
Advantages:
This implementation model simplifies the operations and the management of IP layer
firewall functions because the IP firewall functions don’t need to be duplicated in the
OS native functions within the signalling- specific application firewall.
This functional separation between the IP firewall and the signalling-specific
application firewall simplifies the implementation, administration and development of
these individual firewalls, due to the different knowledge and expertise needed for
management of each firewall type.
This functional separation enables a combined implementation of separately selected
firewall implementation products from specialised vendors. Note that the model does
not preclude a grouping of software functions (e.g. on the same physical hardware, or
as containers within the same NFV cluster/silo).
Disadvantages:
This implementation model requires technical integration of the APIs between the IP
firewall and the signalling-specific application firewall.
Potential extra operational effort and costs of two products from different vendors.
V2.0 Page 27 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
Advantages:
Disadvantages:
Timing: There may be a long delay (days, months) between when attackers collect
IP layer information and when they use it to perform signalling attacks. Correlating
this apparently unrelated attack activity to improve protection will be difficult.
Naming: Another combination challenge will be the usage of different network entity
names and identities at the different layers like:
Which IP address belongs to which GT and SS7 originating point code (OPC)?
How should the solution deal with new identities that have not been seen before
(pointing to a possible falsified signalling source)?
V2.0 Page 28 of 29
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.21 - Interconnect Signalling Security Recommendations
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at prd@gsma.com
V2.0 Page 29 of 29