IPSec/IKE Public Key Encryption Aggressive Mode vulnerability Initiator Responder ----------- ----------- HDR, SA, [ HASH(1),] KEi, Pubkey_r, Pubkey_r.

Slides:



Advertisements
Similar presentations
IKE : Internet Key Exchange
Advertisements

ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Internet Protocol Security (IP Sec)
Security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents Security requirements Public key cryptography Key agreement/transport.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Digital Signatures and Hash Functions. Digital Signatures.
CSC 474 Information Systems Security
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
ISAKMP RFC 2408 Internet Security Association & Key Management Protocol Protocol Establish, modify, and delete SAs Negotiate crypto keys Procedures Authentication.
IKEv2 extension: MOBIKE Faisal Memon Erik Weathers CS 259.
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
OPEN PROBLEMS IN PROTOCOL VERIFICATION Catherine Meadows Code 5543 Center for High Assurance Computer Systems Naval Research Laboratory Washington, DC.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
IKE message flow IKE message flow always consists of a request followed by a response. It is the responsibility of the requester to ensure reliability.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
IPSec Access control Connectionless integrity
Phase Difference = Phase Difference = 0.05.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
WLAN What is WLAN? Physical vs. Wireless LAN
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Internet Key Exchange (IKE) protocol vulnerability risks Master's thesis seminar HUT, Networking Laboratory Composed by Ari Muittari at Nokia.
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
IPSec/IKE Protocol Hacking ToorCon 2K2 – San Diego, CA Anton Rager Sr. Security Consultant Avaya Security Consulting.
Wireless and Security CSCI 5857: Encoding and Encryption.
Network Access for Remote Users: Practical IPSec Dr John S. Graham ULCC
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Secure Protocols and VPNs Stefek Zaba Hewlett-Packard Labs, Bristol
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
IT-320 Chapter 16 Network Security. Objectives 1. Define threat, vulnerability, and exploit, explaining how they relate to each other. 2. Given a scenario,
1 Methods and Protocols for Secure Key Negotiation Using IKE Author : Michael S. Borella, 3Com Corp.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
3:00. 2:59 2:58 2:57 2:56 2:55 2:54 2:53 2:52.
Bluetooth Low Energy Security Manager CSOS 홍성화. content Security Manager Introduction Security Properties Cryptographic Functions Security Manager Protocol.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Sheng Jiang (Speaker) Xu Chen Xuan Song Huawei Neighbor Cache Protection in Neighbor Discover Protocol draft-jiang-v6ops-nc-prtection-01 IETF 77 V6OPS.
Encrypt and MAC hash Derive key: Kj=H(Wj, Aj)
Reviews Rocky K. C. Chang 20 April 2007.
Somesh Jha University of Wisconsin
CSE 4905 IPsec II.
A Wireless LAN Security Protocol
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Top Fire Protection Services Ottawa available on Dubinskyconstruction
Slides have been taken from:
Challenge-Response Authentication
Virtual Private Networks (VPNs)
Challenge-Response Authentication
One-way Hash Function Network Security.
The “Modular” Approach
Key Exchange, Man-in-the-Middle Attack
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

IPSec/IKE Public Key Encryption Aggressive Mode vulnerability Initiator Responder HDR, SA, [ HASH(1),] KEi, Pubkey_r, Pubkey_r -----> PubKey_i, PubKey_i, HASH_R HDR,HASH_I ----->

IPSec/IKE Public Key Encryption Aggressive Mode vulnerability “Chess Grandmaster” attack“Chess Grandmaster” attack

IPSec/IKE Public Key Encryption Aggressive Mode vulnerability Initiator CheaterResponder HDR, SA, KEi, Pubkey_c, Pubkey_c -----> HDR, SA, KEi, Pubkey_r, Pubkey_r -----> HDR, SA, KEr, PubKey_c, PubKey_c, HASH_R HDR, SA, KEr, Pubkey_i, Pubkey_i, HASH_C HDR,HASH_I -----> HDR, HASH_C ----->

IPSec/IKE Public Key Encryption Aggressive Mode vulnerability HASH_x=prf(SKEIDxc,KEx|KEc|CKY-X|CKY-Y|IDxc) HASH_C=prf(SKEIDir, Kei|Ker|CKY-I|CKY-R|IDir) prf=HMAC or Keyed MAC KEx=g^DHPrivKey_x x=i, r SKEIDir=prf(HASH(Ni|Nr), CKY-I|CKY-R)HASH_x=prf(SKEIDxc,KEx|KEc|CKY-X|CKY-Y|IDxc) HASH_C=prf(SKEIDir, Kei|Ker|CKY-I|CKY-R|IDir) prf=HMAC or Keyed MAC KEx=g^DHPrivKey_x x=i, r SKEIDir=prf(HASH(Ni|Nr), CKY-I|CKY-R) If Cheater isn’t agreed with any side, attack will be stopped in Phase 2If Cheater isn’t agreed with any side, attack will be stopped in Phase 2 If Cheater is agreed with Initiator(cheater knows DHPrivKey_i), they can fake ResponderIf Cheater is agreed with Initiator(cheater knows DHPrivKey_i), they can fake Responder Attack is possible in Main and Aggressive ModeAttack is possible in Main and Aggressive Mode

IPSec/IKE Public Key Encryption Aggressive Mode vulnerability How to resolve problem? In protocol first and second message apply signature: 1. SIGNi(KEi) 2. SIGNr(KEr)How to resolve problem? In protocol first and second message apply signature: 1. SIGNi(KEi) 2. SIGNr(KEr)