WPA

Wrong Password Attempts

Security
Introduced in Rel-5
A security counter that tracks the number of consecutive incorrect password entries during authentication procedures. It is a fundamental mechanism to prevent brute-force attacks and unauthorized access attempts in 3GPP networks, triggering protective actions when a threshold is exceeded.

Description

Wrong Password Attempts (WPA) is a security counter defined within 3GPP specifications, primarily for the IP Multimedia Subsystem (IMS) and related services. It functions as a stateful variable maintained by the network, typically within a Home Subscriber Server (HSS) or an Application Server, to monitor authentication failures for a specific user identity, such as a Private User Identity (IMPI). The counter increments each time an authentication request (e.g., during IMS registration or service invocation) fails due to an incorrect password or shared secret in the response. This mechanism is integral to the Authentication and Key Agreement (AKA) framework, providing a first line of defense against systematic guessing attacks.

The operational logic involves a pre-configured maximum threshold. When the WPA counter reaches this limit, the network enforces a security policy, which usually involves locking the user's authentication capability. This lockout prevents further authentication attempts for a defined period or until an administrative reset is performed, effectively thwarting automated scripts from endlessly trying password combinations. The counter is typically reset to zero upon a successful authentication, ensuring legitimate users regain access after correcting their input. Its management is specified in protocols between the Serving-Call Session Control Function (S-CSCF) and the HSS, such as the Cx interface using Diameter commands.

Architecturally, WPA is a component of the broader subscriber data management and security policy enforcement. It works in conjunction with other security mechanisms like the Authentication Vector generation in the HSS and the integrity protection of signaling. By providing a simple yet effective rate-limiting function, WPA complements cryptographic security by adding an operational barrier. Its implementation is crucial for meeting regulatory and commercial requirements for secure access, forming a basic but essential part of the layered security model in 3GPP networks to protect both network resources and user data from credential-based attacks.

Purpose & Motivation

The WPA counter was introduced to address the vulnerability of password-based authentication systems to brute-force and dictionary attacks. Prior to its standardization, networks could be susceptible to attackers repeatedly trying common passwords without immediate consequence, potentially leading to unauthorized access. The primary problem it solves is the automated, high-speed guessing of user credentials, which is a significant threat given that user-chosen passwords are often weak.

Its creation was motivated by the need for a standardized, network-enforced security policy that goes beyond cryptographic strength. While the AKA protocol provides robust mutual authentication, it assumes the shared secret is not easily guessable. WPA adds a non-cryptographic layer of protection for scenarios where the secret might be compromised through guessing. It provides a clear, implementable mechanism for operators to deter and detect such attacks, fulfilling requirements for accountable security management.

Historically, as 3GPP networks evolved to offer IP-based services like IMS, the threat landscape expanded beyond traditional circuit-switched fraud. The introduction of WPA in Release 5 alongside early IMS specifications provided a foundational security control for these new services. It addresses the limitation of relying solely on the complexity of the shared secret by enforcing a hard limit on trials, making attacks impractical through time delays and lockouts, thereby protecting both the network and the user's service availability.

Key Features

  • Tracks consecutive authentication failures for a user identity
  • Increments upon receipt of an incorrect password in an authentication response
  • Compares against a configurable maximum threshold value
  • Triggers a subscriber lockout or other security policy upon threshold exceedance
  • Resets to zero upon successful authentication
  • Managed as part of subscriber data in the HSS/HLR or application server

Evolution Across Releases

Rel-5 Initial

Introduced as part of the initial IMS security framework. Defined as a counter in the HSS for the IP Multimedia Private Identity (IMPI) to protect IMS registration. The initial architecture involved the Cx interface procedures, where the S-CSCF would report authentication failures, and the HSS would manage the counter and enforce lockout.

Defining Specifications

SpecificationTitle
TS 21.905 3GPP TS 21.905
TS 24.623 3GPP TS 24.623