Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RACH Replay Attack #38

Closed
cueltschey opened this issue Aug 29, 2024 · 1 comment · Fixed by #48
Closed

RACH Replay Attack #38

cueltschey opened this issue Aug 29, 2024 · 1 comment · Fixed by #48
Assignees
Labels
new attack question Further information is requested
Milestone

Comments

@cueltschey
Copy link
Contributor

Random Access Channel Request Replay Attack

Implementation (UE):

  • Capture the RACH requests of other UEs
  • Replay these requests later to confuse the RAN

Mitigation (UE and gNB):

  • add identifiers to RACH requests like timestamps or identifiers

Attack Metrics:

  • Disconnected UEs
  • Channel quality reduction
  • gNB crash / malfunction
@cueltschey cueltschey added this to the More Attacks for Oct 1st Demo milestone Aug 29, 2024
@cueltschey
Copy link
Contributor Author

A Replay Attack on the Random Access Channel (RACH) in cellular networks involves an adversary capturing legitimate RACH requests from UEs (User Equipment) and retransmitting them at a later time. This attack aims to confuse the network by reintroducing previously valid requests, potentially leading to resource allocation issues, unauthorized access, or denial of service. Since the RACH procedure is a critical part of the initial connection process in LTE and 5G networks, the replayed messages can disrupt normal operations, causing delays or failures in establishing connections. The attack exploits the lack of unique identifiers or timestamps in the RACH requests, allowing the adversary to interfere with the network by replaying captured messages without being detected.

To perform a Replay Attack on RACH in srsRAN, we can use a tool like srsUE to first capture a legitimate RACH request. This can be done by running srsUE and monitoring the RACH preambles sent during the connection process. Once a RACH request is captured, we can modify the srsUE or use a separate script to retransmit the captured RACH message at different intervals. Set up srsGNB to act as the base station and observe the handling of these replayed RACH requests. By analyzing the network's response, We can determine how vulnerable it is to replay attacks and evaluate the effectiveness of potential countermeasures, such as implementing unique identifiers or timestamp-based validation in the RACH process.

@cueltschey cueltschey removed this from the More Attacks for Oct 1st Demo milestone Aug 29, 2024
@cueltschey cueltschey self-assigned this Sep 4, 2024
@cueltschey cueltschey added the question Further information is requested label Sep 10, 2024
@cueltschey cueltschey added this to the Task 3.2 milestone Sep 10, 2024
@cueltschey cueltschey linked a pull request Sep 10, 2024 that will close this issue
@github-project-automation github-project-automation bot moved this from In Progress to Done in tester UE development Sep 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
new attack question Further information is requested
Projects
Status: Done
Development

Successfully merging a pull request may close this issue.

1 participant