IPsec and Internet Key Exchange (IKE)
In version 1 of IKE (IKEv1), four authentication methods are available for Phase 1, in which initial authenticated keying material is established: Two public key encryption based methods, one signature based method, and a PSK (Pre-Shared Key) based method.
Pre-Shared Key authentication
Weaknesses of PSK authentication
Who is affected?
Proof-of-Concept
Responsible Disclosure
Credits
On August 14th 2018, Graham Bartlett (Cisco) email us that he presented the weakness of PSK in IKEv2 in several public presentations and in his book.
On August 15th 2018, we were informed by Tamir Zegman that John Pliam described the attack on his web page in 1999.
FAQs
- Do you have a name, logo, any merchandising for the attack?
No. - Have I been attacked?
We mentioned above that such an attack would require an active man-in-the-middle attack. In the logs this could look like a failed connection attempt or a session timed out. But this is a rather weak indication and no evidence for an attack. - What should I do?
If you do not have the option to switch to authentication with digital signatures, choose a Pre-Shared Key that resists dictionary attacks. If you want to achieve e.g. 128 bits of security, configure a PSK with at least 19 random ASCII characters. And do not use something that can be found in public databases. - Am I safe if I use PSKs with IKEv2?
No, interestingly the standard also mentions that IKEv2 does not prevent against off-line dictionary attacks. - Where can I learn more?
You can read the paper. [alternative link to the paper] - What else does the paper contain?
The paper contains a lot more details than this blogpost. It explains all authentication methods of IKEv1 and it gives message flow diagrams of the protocol. There, we describe a variant of the attack that uses the Bleichenbacher oracles to forge signatures to target IKEv2.
Related links
- Hacking Tools For Pc
- Hacking Tools And Software
- Pentest Tools Windows
- Hack Tools For Windows
- Hack Apps
- Hacking Tools Free Download
- Hack Website Online Tool
- Hacking Tools Kit
- Pentest Tools Tcp Port Scanner
- Easy Hack Tools
- Pentest Tools Bluekeep
- Game Hacking
- Hacker Tools Linux
- Hacker Tools Software
- Hacking Tools Name
- Github Hacking Tools
- Hacking Tools For Windows 7
- Hack Tools For Windows
- Pentest Tools Port Scanner
- Hackers Toolbox
- Underground Hacker Sites
- Pentest Automation Tools
- Hacking Tools And Software
- Pentest Tools Alternative
- Hacking Tools And Software
- What Are Hacking Tools
- Pentest Automation Tools
- Pentest Tools For Ubuntu
- Hacking Tools For Kali Linux
- Pentest Tools Online
- Pentest Tools Review
- Hackers Toolbox
- Hacking Tools For Beginners
- Hacker Security Tools
- Usb Pentest Tools
- New Hacker Tools
- Github Hacking Tools
- Hacking Tools For Windows
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Windows
- Hack Tools For Mac
- Hacking Tools Online
- Pentest Tools Alternative
- Hacker Tools Apk Download
- Pentest Tools Windows
- Hacking Tools Software
- Hacker Hardware Tools
- Hacker Tools 2019
- Pentest Tools Alternative
- Blackhat Hacker Tools
- Hacking Tools 2019
- Hack And Tools
- Hacker Tools Github
- Pentest Tools Find Subdomains
- Hacking Tools Download
- Pentest Tools Online
- Hacking Tools Hardware
- Hacking Tools 2019
- Tools For Hacker
- Hacking Tools Kit
- Pentest Tools Bluekeep
- Hacking App
- Hacker Tools Free Download
- Growth Hacker Tools
- Hack Tools Pc
- Hacking Tools For Windows Free Download
- Hack Apps
- Hacking Tools For Games
- Pentest Tools Review
- Pentest Tools
- Hack Tools
- Hacker Tools Software
- Hack Tools Pc
- Tools 4 Hack
- Hack Website Online Tool
- Hacking Tools Hardware
- Hacking Tools For Windows
- Pentest Tools Alternative
- Hacker Tools 2020
- Hacker Security Tools
- Hacker Tools 2019
- Hacks And Tools
- Top Pentest Tools
- Hacking Tools 2020
- Hacking Apps
- Hack Website Online Tool
- What Is Hacking Tools
- Hacking Tools Hardware
- Kik Hack Tools
- Pentest Tools Framework
- Hacking Tools For Pc
- Hacker Tools For Mac
- Hacker Tools For Pc
- Tools Used For Hacking
- Physical Pentest Tools
- Tools For Hacker
- Hacking Tools For Beginners
- Pentest Tools Bluekeep
- Tools For Hacker
- Install Pentest Tools Ubuntu
- Hack Tools Pc
- Hacker Hardware Tools
- Hacker Tools Github
- Tools For Hacker
- What Is Hacking Tools
- Hacker Tools Github
- Free Pentest Tools For Windows
- Pentest Tools Windows
- Hacker Tools Free
- Hacking Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows Free Download
- Hacking Tools Online
- Hacker
- Hack Tools Download
- Hacking Tools For Mac
- Hack Tools 2019
- Bluetooth Hacking Tools Kali
- Pentest Tools For Windows
- Hacker Tool Kit
- Hacker Tools For Mac
- Hacker Security Tools
- Pentest Tools Apk
- Hacking Tools Hardware
- Ethical Hacker Tools
- Pentest Tools Port Scanner
- Black Hat Hacker Tools
- Nsa Hacker Tools
- Hacker Tools 2019
- Pentest Tools Free
- Hack Tools Mac
- Hack App
- Game Hacking
- How To Make Hacking Tools
- Pentest Tools Windows
- Hacker Search Tools
- Hacker Tools Hardware
- Tools 4 Hack
- Hacker Tool Kit
- Hacker Tools For Pc
- Usb Pentest Tools
- Pentest Tools Find Subdomains
- Pentest Tools Download
- Hackrf Tools
- Pentest Tools For Windows
- Hak5 Tools
- Pentest Tools Online
- Hack Tools Mac
- Pentest Tools Website
- Hack And Tools
- Pentest Tools Download
- Hack Tools Github
- Pentest Tools List
- Install Pentest Tools Ubuntu
- Hacking Tools For Windows 7
- Game Hacking
- Github Hacking Tools
- Hacker Tools Software
- Hack And Tools
- Hacker Tools Online
- Hack Tools Mac
- Hacking Tools 2020
- Pentest Tools For Mac
Sem comentários:
Enviar um comentário