tag:blogger.com,1999:blog-3125086853899898004.post6216842087225598181..comments2023-10-14T03:42:39.660-07:00Comments on The OpenBTS Chronicles: Did Anyone Else Notice That?David A. Burgesshttp://www.blogger.com/profile/14372434100222472756noreply@blogger.comBlogger18125tag:blogger.com,1999:blog-3125086853899898004.post-78312190540797253232010-10-18T04:25:18.299-07:002010-10-18T04:25:18.299-07:00#Domo
Do you have an answer to my question?#Domo<br />Do you have an answer to my question?Peternoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-22147274499524884182010-10-18T04:06:00.840-07:002010-10-18T04:06:00.840-07:002Peter
No idea. I don't use iPhone, ever.2Peter<br />No idea. I don't use iPhone, ever.Alexander Chemerishttps://www.blogger.com/profile/11607620316457989865noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-45061229168283247882010-10-18T03:49:35.178-07:002010-10-18T03:49:35.178-07:00# Alexander
Thanks for your quick answer.
Do you k...# Alexander<br />Thanks for your quick answer.<br />Do you know what the "value 1" on iphone, fieldtest, network information, cihering is?Peternoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-80424340404870500452010-10-18T03:12:11.577-07:002010-10-18T03:12:11.577-07:002Anonymous:
I captured own conversations with Noki...2Anonymous:<br />I captured own conversations with Nokia 3310, decoded them with Wireshark and looked at what network offers.<br /><br />PS When you ask questions, it's better to name yourself.Alexander Chemerishttps://www.blogger.com/profile/11607620316457989865noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-88569632682032965322010-10-18T03:07:27.410-07:002010-10-18T03:07:27.410-07:00# Alexander.
How could you see if the network were...# Alexander.<br />How could you see if the network were A5/1?<br />Was it because it said: ciphering 1 inside: fieldtest, network information?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-22339938352638082922010-08-19T05:13:27.175-07:002010-08-19T05:13:27.175-07:00http://www.airshoes.us
http://www.frenchtn.comhttp://www.airshoes.us<br /><br />http://www.frenchtn.comAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-19880286669653608492010-06-04T10:55:11.258-07:002010-06-04T10:55:11.258-07:00That does sound horrible. ouch. :)That does sound horrible. ouch. :)Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-17144502843093862172010-05-21T06:58:25.019-07:002010-05-21T06:58:25.019-07:00I would say that the #1 security problem with your...I would say that the #1 security problem with your home mobile network is that its operators have far too cozy a relationship with your domestic intelligence services. And I'm not sure I even want to know what a "testical attack" is.David A. Burgesshttps://www.blogger.com/profile/14372434100222472756noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-27104672887977685812010-05-20T06:12:13.589-07:002010-05-20T06:12:13.589-07:00Hi all
I'm Pooyan Zamanian, graduated in IT (f...Hi all<br />I'm Pooyan Zamanian, graduated in IT (from Polytechnic of Tehran). we are working on project to examine the security of our homeland Mobile Netork.<br />I need information about specifications of attacks to GSM such as man-in-the-middle, Fake BTS, Fraud and so on. about the tools and software and also the instructions needed to do a testical attack. can you help me please? where can i find such information?<br /><br />I'll be very glad if you could help me :)<br /><br />p.zamanain@gmail.comUnknownhttps://www.blogger.com/profile/13813219072941401515noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-10586625665545535772010-05-17T02:15:16.975-07:002010-05-17T02:15:16.975-07:00Hi,
Does anyone know which GSM network have upgrat...Hi,<br />Does anyone know which GSM network have upgrated its encryption algoithm to A5/3 in the world?Terrynoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-80050049289068666262010-05-04T22:35:10.628-07:002010-05-04T22:35:10.628-07:00David,
This is from the same source:
"GSMA h...David,<br /><br />This is from the same source:<br />"GSMA has been granted permission to extend the range of countries to which A5/1 can be distributed and this affords A5/2 operators the opportunity to enhance the security of their networks by upgrading to A5/1."Alexander Chemerishttps://www.blogger.com/profile/11607620316457989865noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-88680642486563692972010-05-04T21:07:34.483-07:002010-05-04T21:07:34.483-07:00Thomas -
Thanks. That's useful and specific....Thomas -<br /><br />Thanks. That's useful and specific.<br /><br />So here's the next question. Was the export restriction ever lifted on A5/1, or does the GSMA still limit it to CEPT and COCOM states?David A. Burgesshttps://www.blogger.com/profile/14372434100222472756noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-15344120473831556332010-05-04T20:24:26.942-07:002010-05-04T20:24:26.942-07:00Hello David,
I think you're looking for this ...Hello David,<br /><br />I think you're looking for this piece from late 2004:<br /><br />"The successful phase out of A5/2 requires all operators to remove the algorithm from their BSS equipment and manufacturers to use A5/1in all new GSM-enabled handsets. A project team has been established to oversee and manage the withdrawal of A5/2 and GSMA's Security Group will play a key role to play in terms of communicating the implications and options available to network operators and to monitor compliance with agreed collective action.<br /><br />The requirement for network operators currently using A5/2 to upgrade their BSS equipment is significant but absolutely necessary to mitigate the emerging risks. The willingness of operators to withdraw A5/2 from their networks is critical to safeguarding the industry and, as most operators upgrade their BSS software at least once annually, it is believed that the upgrade from A5/2 to A5/1 could be incorporated in scheduled network upgrades. Failure to execute the upgrade by any operator will expose its roaming partners, and their customers, to increased levels of risk. It is therefore critical that every network undertakes the BSS upgrade by end 2006."<br /><br />Find the whole thing <a href="http://www.moonv6.org/lists/Dec2004/0298.php" rel="nofollow">here</a>, Ctrl-F for "End of Line for A5/2" <br /><br />Cheers!Thomashttp://openmat.co.nznoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-32933602597230317472010-05-02T13:14:05.035-07:002010-05-02T13:14:05.035-07:00Probably a stupid remark, but A5/3 aka Kasumi has ...Probably a stupid remark, but A5/3 aka Kasumi has received a shattering blow because cryptanalysis showed it was weak. <br /><br />However, good questionRudolf van der Berghttps://www.blogger.com/profile/17977561124307072281noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-82996558456654092252010-04-27T14:21:55.084-07:002010-04-27T14:21:55.084-07:00I've just checked and all three mobile operato...I've just checked and all three mobile operators here in Moscow, Russia (MTS, Beeline, Megafon) use A5/1.<br /><br />Now I'll have to check whether my new phones support A5/2. I have ASUS P750, Motorola Milestone and HTC Nexus One near my hands.Alexander Chemerishttps://www.blogger.com/profile/11607620316457989865noreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-6192237449820440822010-04-27T12:30:35.633-07:002010-04-27T12:30:35.633-07:00I found a number of articles where it says that in...I found a number of articles where it says that in Russia all carriers use A5/1 (this is most likely true), whereas in most European countries A5/2 is used. I personally doubt the latter, but I don't have the information.<br /><br />P.S. I recall that the iPhone's FieldTest could give me the algorithm used, I'll try it in a while.Domonoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-2120611588640675222010-04-27T04:46:20.054-07:002010-04-27T04:46:20.054-07:00Yes David, I wondered the same thing :)
And new p...Yes David, I wondered the same thing :)<br /><br />And new phones definitely refuse A5/2, I checked ... So I guess if you're in such a country that has only A5/0 and A5/2 ... well, you're using A5/0 ...<br /><br />Note that the a5/1 export restriction is no longer enforced AFAIK ... but operators might not have upgraded. I know that some operators in china have a5/2 only.Sylvain Munautnoreply@blogger.comtag:blogger.com,1999:blog-3125086853899898004.post-16679760500153320902010-04-27T00:23:23.383-07:002010-04-27T00:23:23.383-07:00Here in South Africa we follow European regulation...Here in South Africa we follow European regulations. I'm guessing that most countries which are part of the British Commonwealth (or as I like to call them - Cricket playing countries) follow the same regulations.<br /><br />A big part of Africa will also have the same standards through MTN.<br /><br />A guy from China once told me that in communist countries there isn't any encryption... I'm not sure about that.Herman Maritzhttps://www.blogger.com/profile/15101628693019476589noreply@blogger.com