Project

General

Profile

SIMtrace » History » Version 1

laforge, 02/19/2016 10:48 PM
initial page on SIMtrace

1 1 laforge
[[PageOutline]]
2
= Osmocom SIMtrace =
3
4
Osmocom SIMtrace is a software and hardware system for passively tracing SIM-ME communication between the SIM card and the mobile phone.
5
6
It works by utilizing the T=0 capable USART of the usb-attached AT91SAM7 microcontroller.
7
8
The USART passively receives the bytes as they are exchanged on the ISO 7816-3 / TS 11.11 interface between SIM and phone.
9
The received bytes are sent via USB to the PC, where a program called {{{simtrace}}} on the PC gathers data from the USB device,
10
parses the APDUs and forwards them via [wiki:GSMTAP] to the [wiki:wireshark] protocol analyzer.
11
12
== Features ==
13
 * Completely passive scanner
14
 * RST and ATR detection
15
 * auto-bauding with PPS / PTS support
16
 * Segmentation of APDUs
17
18
== TODO ==
19
 * Check for parity errors
20
 * Verify TCK / PCK check-bytes
21
22
== Hardware ==
23
24
There is no ready-built hardware for this yet.  They only existing implementations used an Olimex SAM7-P64 development board
25
with some of the I/O lines hooked up to the mechanical SIM card adapters from [wiki:RebelSIM_Scanner].  We are thinking of
26
doing some custom hardware, but nothing is certain yet.
27
28
=== Interconnections ===
29
30
The hardware schematics are very, very simple:
31
32
 * Connect SIM-RST with PA7
33
 * Connect SIM-I/O with PA6(TXD0) and PA1(TIOB0)
34
 * Connect SIM-CLK with PA2(SCK0) and PA4(TCLK0)
35
 * Connect SIM-GND with GND
36
37
=== Mode of operation ===
38
39
The USART of the AT91SAM7S is capable of T=0.  However, the documentation only mentions it in clock-master mode, like you
40
would run it in a smart card reader to actively talk to a smart card.  However, by using the USART input clock multiplexer,
41
you can use an externally-generated CLK like the one from the SIM card socket of the phone.
42
43
== Firmware ==
44
45
The Firmware for the AT91SAM7S device was written by reusing a lot of the code for the [http://www.openpcd.org/ OpenPCD]
46
RFID reader.  
47
48
There is a {{{simtrace}}} branch in the git://git.gnumonks.org/openpcd.git repository containing the latest firmware code.
49
50
Eventually, the OS part of OpenPCD/OpenPICC/SIMtrace will be separated.  At that point, the firmware source can become
51
part of simtrace.git
52
53
=== TODO ===
54
55
== Host PC Software ==
56
57
The {{{simtrace}}} program is part of the git://git.osmocom.org/simtrace.git repository. It will bind to the USB device
58
and send GSMTAP frames using UDP/IPv4 to localhost.
59
60
It will also print hexdumps of the frames to the console, looking like this:
61
{{{
62
APDU: (9):  a0 a4 00 00 02 6f 07 9f 0f
63
APDU: (22):  a0 c0 00 00 0f 00 00 00 09 6f 07 04 00 15 00 15 01 02 00 00 91 78
64
APDU: (9):  a0 a4 00 00 02 6f 38 9f 0f
65
APDU: (22):  a0 c0 00 00 0f 00 00 00 09 6f 38 04 00 15 00 55 01 02 00 00 91 78
66
APDU: (16):  a0 b0 00 00 09 ff 3f ff ff 00 00 3f 03 00 91 78
67
APDU: (9):  a0 a4 00 00 02 6f ad 9f 0f
68
APDU: (8):  a0 b0 00 00 01 00 91 78
69
APDU: (9):  a0 a4 00 00 02 6f 07 9f 0f
70
APDU: (16):  a0 b0 00 00 09 08 49 06 20 11 49 00 11 06 91 78
71
APDU: (9):  a0 a4 00 00 02 6f 7e 9f 0f
72
APDU: (18):  a0 b0 00 00 0b ff ff ff ff 64 f0 00 ff fe 00 03 91 78
73
APDU: (9):  a0 a4 00 00 02 6f 78 9f 0f
74
APDU: (9):  a0 b0 00 00 02 00 01 91 78
75
APDU: (9):  a0 a4 00 00 02 6f 74 9f 0f
76
APDU: (23):  a0 b0 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 78
77
APDU: (9):  a0 a4 00 00 02 6f 20 9f 0f
78
APDU: (16):  a0 b0 00 00 09 ff ff ff ff ff ff ff ff 07 91 78
79
APDU: (9):  a0 a4 00 00 02 6f 30 9f 0f
80
APDU: (22):  a0 c0 00 00 0f 00 00 00 f0 6f 30 04 00 11 00 55 01 02 00 00 91 78
81
}}}
82
83
== Wireshark integration ==
84
85
There is an experimental patch, also part of the simtrace.git package.  You will have to apply this against the latest
86
wireshark developer version.
Add picture from clipboard (Maximum size: 48.8 MB)