[32978] in bugtraq

home help back first fref pref prev next nref lref last post

Re: multiple payload handling flaws in isakmpd, again

daemon@ATHENA.MIT.EDU (Thomas Walpuski)
Thu Jan 1 15:47:03 2004

Date: Thu, 1 Jan 2004 21:20:18 +0100
From: Thomas Walpuski <thomas@thinknerd.de>
To: bugtraq@securityfocus.com
Message-ID: <20040101202018.GA11670@thinknerd.de>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20031231223858.GA30644@thinknerd.de>

There is one important thing I forgot to mention. In isakmpd deleting an
IPsec SA also means deleting the appropriate IPsec policy in almost any
case. Take a look at pf_key_v2_delete_spi() in pf_key_v2.c. It calls
pf_key_v2_disable_sa(), the policy eraser ;-), if the SA was not
acquired through the kernel:

  if (!(sa->flags & SA_FLAG_REPLACED)
      && !(sa->flags & SA_FLAG_ONDEMAND))
    pf_key_v2_disable_sa (sa, incoming);

Now imagine an IPsec tunnel between two security gateways running
isakmpd. Both gateways are attacked, IPsec SAs and policies get removed,
...

Thomas Walpuski

home help back first fref pref prev next nref lref last post