BugTraq
Re: Insecure IKE Implementations Clarification Dec 12 2003 05:45PM
Thor Lancelot Simon (tls rek tjls com) (1 replies)
Re: Insecure IKE Implementations Clarification Dec 12 2003 09:45PM
Florian Weimer (fw deneb enyo de) (1 replies)
Re: Insecure IKE Implementations Clarification Dec 12 2003 09:54PM
Thor Lancelot Simon (tls rek tjls com) (1 replies)
On Fri, Dec 12, 2003 at 10:45:37PM +0100, Florian Weimer wrote:
>
> There's also a PSIRT statement regarding this issue, and it's at best
> embarrassing for Cisco engineering folks:
>
> <http://www.cisco.com/warp/public/707/cisco-sn-20030422-ike.html>

Whoever wrote that statement seems to have the fundamental XAUTH
vulnerability and the recently-much-discussed possibility of brute-forcing
Phase 1 preshared keys using Aggressive Mode pretty seriously mixed up.

> I know several people work on XAUTH MITM attacks; I guess it will fall
> in a couple of weeks. (Just sniffing the user password is easy, the
> group password is typically public anyway; the remaining challenge
> consists of putting together several tools to transparently fake a Cisco
> VPN concentrator).

For what it's worth, the possibility of this general type of attack was
repeatedly discussed in the IPsec working group and is a major reason
why XAUTH was abandoned. The particular password-stealing attack that I
describe as been widely discussed among IKE implementors for at least two
years; other implementors probably independently noticed it at least as
early as I did, which was three years ago.

What's pretty disturbing is that there is wide understanding of this
issue among actual protocol implementors, but that Cisco field personnel
continue to quite plainly tell customers that it does not exist at all,
even when the risk to those customers is huge. Indeed, I'd say that
including support for this mode in their VPN client, at this point, is
pretty irresponsible -- recommending it is just plain awful.

--
Thor Lancelot Simon tls (at) rek.tjls (dot) com [email concealed]
But as he knew no bad language, he had called him all the names of common
objects that he could think of, and had screamed: "You lamp! You towel! You
plate!" and so on. --Sigmund Freud

[ reply ]
Re: Insecure IKE Implementations Clarification Dec 12 2003 10:00PM
Florian Weimer (fw deneb enyo de) (1 replies)
Re: Insecure IKE Implementations Clarification Dec 12 2003 10:11PM
Thor Lancelot Simon (tls rek tjls com) (2 replies)
Re: Insecure IKE Implementations Clarification Dec 13 2003 10:00PM
itojun itojun org (Jun-ichiro itojun Hagino)
Re: Insecure IKE Implementations Clarification Dec 12 2003 10:25PM
Florian Weimer (fw deneb enyo de) (1 replies)
SSH vs. IKE trust models (was Re: Insecure IKE Implementations Clarification) Dec 12 2003 10:32PM
Thor Lancelot Simon (tls rek tjls com) (1 replies)
Re: SSH vs. IKE trust models (was Re: Insecure IKE Implementations Clarification) Dec 13 2003 11:33AM
Florian Weimer (fw deneb enyo de) (1 replies)
Re: SSH vs. IKE trust models (was Re: Insecure IKE Implementations Clarification) Dec 14 2003 12:42AM
Jimi Thompson (jimit myrealbox com)


 

Privacy Statement
Copyright 2010, SecurityFocus