Dennis Felsch 1, Martin Grothe 1, Jörg Schwenk 1, Adam Czubak 2, Marcin Szymanek 2
1: Ruhr University Bochum, Germany 2: University of Opole, Poland
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE
27TH USENIX SECURITY SYMPOSIUM 08/16/2018
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE Dennis - - PowerPoint PPT Presentation
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE Dennis Felsch 1 , Martin Grothe 1 , Jrg Schwenk 1 , Adam Czubak 2 , Marcin Szymanek 2 1 : Ruhr University Bochum, Germany 2 : University of Opole, Poland 27 TH USENIX SECURITY SYMPOSIUM
Dennis Felsch 1, Martin Grothe 1, Jörg Schwenk 1, Adam Czubak 2, Marcin Szymanek 2
1: Ruhr University Bochum, Germany 2: University of Opole, Poland
27TH USENIX SECURITY SYMPOSIUM 08/16/2018
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 2
4G/LTE
Icons from KDE Oxygen theme licensed under GNU LGPLv3, http://www.kde.org/
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 3 THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018
Internet Transport Network Access
TCP/UDP IP TCP/UDP IP IPsec IPsec
Application
integrity authenticity confidentitiality
Data Data
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 4
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 5 THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 5
Internet Transport Network Access
UDP IP UDP IP
Application
IKEv1 IKEv1
Negotiation Authentication Key Agreement Key Confirmation 2 msg 2 msg 2 msg
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 6
m1 m2 m1= {proposals} m3= gx, anc. data m2 = selected proposal m4= gy , anc. data m3 m4
m6 = Enc(MACR | data)
m5 m6
m5 = Enc(MACI | data)
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 7
Negotiation Authentication Key Agreement Key Confirmation 2 msg 2 msg 2 msg
m1 m2 m3 m4 m5 m6
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 8
m1= {proposals} m3= gx, anc. data m2 = selected proposal m4= gy , anc. data
m6 = Enc(MACR | data)
m5 = Enc(MACI | data)
m3= gx, Encpk(nI) m4= gy, Encpk(nR)
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 9
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 10
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 11
m
m'
valid / invalid m'' valid / invalid …
m1 m2 m4= EncpkB(nRA), … m3 m6 m5
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 12
Decrypt nRA Derive Keys Keep A waiting Attacker impersonates Responder B !
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 13
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 14
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 15
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 16
m1 m2 m3 m4 m1= proposal with PKE m2 = proposal with PKE
m3 m2 m3 with valid padding wait 1 second m3 with invalid padding m2 = proposal with PKE
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 17
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 18
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 19
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 20
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 21
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 22
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 23
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 24
THE DANGERS OF KEY REUSE: PRACTICAL ATTACKS ON IPSEC IKE | DENNIS FELSCH 27TH USENIX SECURITY SYMPOSIUM | 08/16/2018 25