Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

35
Mobile Device Protocol Sunil Vallamkonda 11/19/2012

Transcript of Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Page 1: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Mobile Device Protocol

Sunil Vallamkonda11/19/2012

Page 2: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Previous topics

• Security: AAA RADIUS, IPSec etc.• Virtualization• Cloud Technologies

Contact: [email protected]

Page 3: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Discussion

• Introduction• Concepts• Trends• Q&A

Do not cover:• Protocol Specifications• Vendor details• Certificates

Page 4: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Background

• Has existed by vendors: MS update, Sicap• Client-Server based technology.• Application protocol.• Brings features as:

o Updates: remote configuration/provision, backup.oMonitor: license, troubleshoot and diagnose.o Accounting: logging and reportingo Tracking: GPS and bread crumb mapping.

Page 5: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

History

Page 6: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Approaches

• Vendor specific: Smart Message text, NOK-ERIC OTA, etc.

• OMA groups: CD, inter-op, DM, etc. • Models: SaaS, On-site, mixed.• BYOD: Hybrid employee/corporate mix.

Page 7: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Vendors

• APPLE: APNS• Android: Google: C2DM• Air-watch: ActiveSync• Black berry: Push

Availability:- Specs- APIs- Implementation- Reference deployments

Page 8: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Vendors (contd)

Page 9: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Competition

Page 10: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

BYOD

• From recent AT&T survey: “40% of small business employees use smartphones for work and two-thirds use tablets…:

• BYOD survey: (source: Ponemon Institute): 51% of Organizations lose data through mobile devices.

Page 11: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

IPCU

Page 12: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Challenges

• Centrally Manage• Security: BYOD identity, access rights, privileges, etc.• Scalability: Apps, Devices, Users.• Complexity: Policies• Vendor Variances: iOS, Android, ActiveSync,

Windows Phone, Black berry etc.• Enterprises: requirements and use case life cycles.• Roles, multi-tenants.• Compliances !

Page 13: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Process

Page 14: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Packet

Page 15: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Check-in

Page 16: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Pkt Trace

Page 17: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Trace (contd)

Page 18: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Push Notification

• Device needs to have match three items in order for a push notification to trigger an MDM response, viz;

• The Device Token (without which the notification will never reach the device), and

• the Push Magic token (without which the MDM client will just discard the notification).

• Finally, the “Subject Name / User ID” field in the push notification certificate used to sign the notification must match the “Topic” field in the MDM profile.

Page 19: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Schema

Page 20: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Device-MDM

Page 21: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Notif (contd)

Page 22: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Command sequence

Page 23: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Commands

First, Device must make persistent connection to APNS Server. Then for every MDM server command:

Page 24: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

plist

Page 25: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

iOS MDM commands

Page 26: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

plist

Page 27: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

plist response

Page 28: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Device Lock

Page 29: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

iOS security model

Page 30: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

iOS Keybag

Page 31: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Example: File key wrapping (iOS)

Page 32: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Sample: Evil Maid attack

Page 33: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

Specs

• For PUSH: Apple: gateway.push.apple.com port 2195

• Devices: TCP port 5223• MDM port: defined by MDM profile

Page 34: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

MDM limitations

• User can terminate MDM relationship.• Multi-user model not supported.• Jailbreak cannot be detected.• Location service not available.• App features very minimal.• Security: command auth optional, accepts any cert with

trusted root, etc.• Malware install attacks: push webclip, etc., DoS Attacks.• Delays and bugs and etc.• MDM profile issues…

Page 35: Mobile Device Protocol Sunil Vallamkonda 11/19/2012.

References

• http://www.openmobilealliance.org/• http://developer.apple.com/• http://zdnet.com• http://www.interpidusgroup.com/• http://developers.google.com/• http://enterpriseios.com• http://ey.com• http://samsung.com• http://google.com• http://microsoft.com• http://shmoocon.org/