37C3 - BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

Discover novel Bluetooth attacks compromising device pairing and sessions, including low-cost hardware and software exploits, and learn about implementable countermeasures to mitigate these threats.

Key takeaways
  • The Bluffs attacks are a novel family of Bluetooth forward and future secrecy attacks that compromise the session establishment and pairing of Bluetooth devices.
  • The attacks can be performed using low-cost hardware and software, making them a significant concern for billions of devices.
  • The attacks involve man-in-the-middle operations, exploiting vulnerabilities in the Bluetooth pairing and session establishment protocols.
  • The research paper proposes implementation-level countermeasures and protocol-level countermeasures to mitigate the attacks.
  • The attacks are categorized into four instructions: setting SD, cross-transport key derivation, using LSC, and roll switching.
  • The attacks can be performed with one byte of entropy, making them feasible to brute-force.
  • The attacks can be used to impersonate a device, compromise the pairing and session establishment, and intercept communications.
  • The attacks can be performed using software-defined radio (SDR) stacks and open-source SDR platforms.
  • The research paper proposes a toolkit called InternalBlue, which is available on GitHub, to perform the attacks and provide a proof-of-concept implementation.
  • The attacks are not limited to a specific Bluetooth device or device category, but can affect various devices and use cases.
  • The Bluetooth standard provides some security mechanisms, but these can be bypassed or exploited by the Bluffs attacks.