[32978] in bugtraq
Re: multiple payload handling flaws in isakmpd, again
daemon@ATHENA.MIT.EDU (Thomas Walpuski)
Thu Jan 1 15:47:03 2004
Date: Thu, 1 Jan 2004 21:20:18 +0100
From: Thomas Walpuski <thomas@thinknerd.de>
To: bugtraq@securityfocus.com
Message-ID: <20040101202018.GA11670@thinknerd.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20031231223858.GA30644@thinknerd.de>
There is one important thing I forgot to mention. In isakmpd deleting an
IPsec SA also means deleting the appropriate IPsec policy in almost any
case. Take a look at pf_key_v2_delete_spi() in pf_key_v2.c. It calls
pf_key_v2_disable_sa(), the policy eraser ;-), if the SA was not
acquired through the kernel:
if (!(sa->flags & SA_FLAG_REPLACED)
&& !(sa->flags & SA_FLAG_ONDEMAND))
pf_key_v2_disable_sa (sa, incoming);
Now imagine an IPsec tunnel between two security gateways running
isakmpd. Both gateways are attacked, IPsec SAs and policies get removed,
...
Thomas Walpuski