TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Vulnerabilities in TETRA radio networks

214 pointsby porsupahover 1 year ago

11 comments

neilvover 1 year ago
&gt; <i>Two of the vulnerabilities are deemed critical. One of them appears to be an intentional backdoor</i> [...] Reading the contents of a firmware upgrade is not trivial though, as it is heavily encrypted and relies on a Trusted Execution Environment (TEE), embedded in the core processor of the radio.*<p>I don&#x27;t know whether the backdoor allegation is correct, but unfortunately we should treat opaque ostensible security with skepticism.<p>By their nature, such things often can be used for our protection at the same time they are secretly used against us.
评论 #38588792 未加载
评论 #38584844 未加载
wyckover 1 year ago
The newsworthy item here is that this is an intentional backdoor. The wikipedia pages list the specific uses per country and department. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Terrestrial_Trunked_Radio#Usage" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Terrestrial_Trunked_Radio#Usag...</a>
评论 #38584636 未加载
LocalHover 1 year ago
Sounds like they took the &quot;roll your own and don&#x27;t tell anyone how it works&quot; approach. Security by obscurity is never security. History has shown that the open encryption standards are the most secure.
评论 #38584570 未加载
评论 #38584864 未加载
评论 #38584464 未加载
评论 #38584406 未加载
评论 #38584657 未加载
评论 #38584382 未加载
marcus0x62over 1 year ago
The interview that is linked[0] in the footnotes of the article with the person from ETSI is absolutely wild... Some excerpts:<p>&gt; kz (interviewer): How did it go about meeting those requirements, because that&#x27;s the one they&#x27;re saying has a backdoor in it. Was that the condition for export?<p>&gt; BM (ETSI): Backdoor can mean a couple of things I think. Something like you&#x27;d stop the random number generator being random, for instance. [But] what I think was revealed [by the researchers] was that TEA1 has reduced key-entropy. So is that a backdoor? I don&#x27;t know. I&#x27;m not sure it&#x27;s what I would describe as a backdoor, nor would the TETRA community I think.<p>...<p>&gt; KZ: People ... believe they&#x27;re getting an 80-bit key and they&#x27;re not.<p>&gt; BM: Well it is an 80-bit long key. [But] if it had 80 bits of entropy, it wouldn&#x27;t be exportable.<p>...<p>&gt; kz: You&#x27;re saying 25 years ago 32 bit would have been secure?<p>&gt; BM: I think so. I can only assume. Because the people who designed this algorithm didn&#x27;t confer with what was then EP-TETRA [ETSI Project-TETRA is the name of the working group that oversaw the development of the TETRA standard]. We were just given those algorithms. And the algorithms were designed with some assistance from some government authorities, let me put it that way.<p>...<p>&gt; bm: That&#x27;s what we now know yeah - that it did have a reduced key length.<p>&gt; KZ: What do you mean we now know? SAGE created this algorithm but the Project-TETRA people did not know it had a reduced key?<p>&gt; BM: That&#x27;s correct. Not before it was delivered. Once the software had been delivered to them under the confidential understanding, that&#x27;s the time at which they [would have known].<p>...<p>You&#x27;ve really got to wonder who at ETSI gave the thumbs up on doing this interview.<p>0 - <a href="https:&#x2F;&#x2F;www.zetter-zeroday.com&#x2F;p&#x2F;interview-with-the-etsi-standards" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.zetter-zeroday.com&#x2F;p&#x2F;interview-with-the-etsi-sta...</a>
评论 #38585349 未加载
评论 #38584645 未加载
k8svetover 1 year ago
What exactly were TETRA radios used for? I assume they were government&#x2F;infra related, but then I don&#x27;t understand why they&#x27;d need to backdoor the keying
评论 #38584612 未加载
评论 #38584528 未加载
评论 #38584790 未加载
评论 #38585844 未加载
YinSprayover 1 year ago
Some time ago there was a github repo online that has all teaX and hurdle algorithms code, and also ta61 identity encryption algorithm mentioned by Midnightblue. <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20230213001503&#x2F;https:&#x2F;&#x2F;github.com&#x2F;frits-greuter&#x2F;ampx&#x2F;blame&#x2F;5ee95317a2c05a751e64a909b630f51d6d08b643&#x2F;projects&#x2F;tetra&#x2F;source&#x2F;ai&#x2F;mm&#x2F;security&#x2F;algorithm_tea1.cpp" rel="nofollow noreferrer">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20230213001503&#x2F;https:&#x2F;&#x2F;github.co...</a><p><a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20230213001335&#x2F;https:&#x2F;&#x2F;github.com&#x2F;frits-greuter&#x2F;ampx&#x2F;archive&#x2F;refs&#x2F;heads&#x2F;master.zip" rel="nofollow noreferrer">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20230213001335&#x2F;https:&#x2F;&#x2F;github.co...</a>
notfedover 1 year ago
In 2023 you&#x27;re telling me that some <i>emergency vehicles</i> are happily rocking encryption protocols with 80-bit, wait actually, 32-bit keys? These are all cases of systemic procrastination. We&#x27;re talking about emergency vehicles here though, so: neglect.<p>Nobody is surprised these protocols have been broken, it should not be a surprise, and having some kind of panic reaction should be considered either a charade or a case of abysmal management.
ajsnigrutinover 1 year ago
I heard about this some time ago... the timeline shows the sources should be available from august this year, but nothing yet on github ( <a href="https:&#x2F;&#x2F;github.com&#x2F;MidnightBlueLabs&#x2F;TETRA_burst">https:&#x2F;&#x2F;github.com&#x2F;MidnightBlueLabs&#x2F;TETRA_burst</a> )
Roark66over 1 year ago
The fact many armies use this (including my own country&#x27;s) is mind boggling. Didn&#x27;t they request the technical details of the encryption and the source code and have it vetted properly before awarding the tender for these devices? &#x2F;sarcasm
freeopinionover 1 year ago
&gt; The vulnerabilities were discovered during the course of 2020, and were reported to the NCSC in the Netherlands in December of that year. It was decided to hold off public disclosure until July 2023, to give emergency services and equipment suppliers the ability to patch the equipment.<p>Interesting discussion about responsible disclosure. It seems a strange belief that you can tell all the radio operators about the vulnerability without also telling exploiters. Aren&#x27;t they often one and the same? What&#x27;s a reasonable approach here?
评论 #38584597 未加载
评论 #38584536 未加载
评论 #38584461 未加载
denysvitaliover 1 year ago
TL;DR: The only newsworthy vulnerability is the breaking TEA1 - which is anyways the least secure of them all and only intended for commercial use (that is, no emergency services).<p><a href="https:&#x2F;&#x2F;www.tetraburst.com&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.tetraburst.com&#x2F;</a>
评论 #38584411 未加载
评论 #38584470 未加载
评论 #38589496 未加载
评论 #38585282 未加载
评论 #38584462 未加载
评论 #38584447 未加载