Project

General

Profile

« Previous | Next » 

Revision cbe90581

Added by osmith about 4 years ago

spec: end to end enc

View differences:

docs/imsi-pseudo-spec.adoc
359 359
well.
360 360

  
361 361
== Recommendations for Real-World Implementations
362

  
362 363
=== BCCH SI3: ATT = 0
364

  
363 365
When changing from one pseudonymous IMSI to the next, it is important that the
364 366
ME does not detach from the network. Otherwise it would be trivial for an
365 367
attacker to correlate the detach with the attach of the same ME with the next
......
372 374
// FIXME: verify how it set with operators in germany (OS#4404)
373 375

  
374 376
=== End to End Encryption of SMS
377

  
378
When deploying the IMSI pseudonymization, the operator should make sure that
379
the next pseudonymous IMSI SMS (<<sms-structure>>) cannot be read or modified
380
by third parties. Otherwise, the next pseudonymous IMSI is leaked, and if the
381
pseudonymous IMSI in the SMS was changed, the SIM would be locked out of the
382
network.
383

  
384
The safest way to protect the next pseudonymous IMSI SMS is a layer of end to
385
end encryption from the HLR to the SIM. It was considered for this
386
specification, but found to be out of scope.
387

  
375 388
[[warn-no-imsi-change]]
376 389
=== Warning the User if the IMSI Does Not Change
377 390
=== User-configurable Minimum Duration Between IMSI Changes

Also available in: Unified diff

Add picture from clipboard (Maximum size: 48.8 MB)