[18951] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "ISAKMP" flaws?

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Tue Nov 15 15:11:44 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Cc: cryptography@metzdowd.com
In-Reply-To: Your message of "Tue, 15 Nov 2005 09:46:16 PST."
             <p0623095bbf9fcc37f2d1@[10.20.30.249]> 
Date: Tue, 15 Nov 2005 14:29:21 -0500

In message <p0623095bbf9fcc37f2d1@[10.20.30.249]>, Paul Hoffman writes:
>At 10:14 AM -0500 11/15/05, Perry E. Metzger wrote:
>>Some articles have been appearing in various web sites about flaws in
>>IPSec key negotiation protocols, such as this one:
>>
>>http://news.com.com/VPN+flaw+threatens+Internet+traffic/2100-1002_3-5951916.h
>tml
>>
>>I haven't been following the IPSec mailing lists of late -- can anyone
>>who knows details explain what the issue is?
>
>The advisory itself is at 
><http://www.uniras.gov.uk/niscc/docs/br-20051114-01013.html?lang=en>. 
>Note that the abstract is "Multiple Vulnerability Issues in 
>Implementation of ISAKMP Protocol", with emphasis on "Implementation 
>of". It appears that this is *not* a problem with ISAKMP or IKE, but 
>instead only a problem with some implementations. A summary would be 
>"when some IKEv1 implementations are sent certain malformed messages, 
>they stop, reboot, or possibly do other bad things".
>
>Given that they started this research with sending malformed SNMP 
>packets to SNMP-aware systems (with similar results), it is safe to 
>extrapolate the results to implementations of nearly any protocol to 
>varying extents. It is likely that this applies to IKEv2 as well, but 
>using differently-malformed packets. It is also likely that it 
>applies to some SSL/TLS implementations, of course using very 
>different malformed packets.
>

I mostly agree with you, with one caveat: the complexity of a spec can 
lead to buggier implementations.  Sure, even relatively simple 
protocols can be implemented poorly, but complex ones have more places 
to go wrong.  (It's instructive, I might add, to read RFC 1025, 
especially the part about "dirty blows".)

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post