Hi All

   I have some doubt about Security of IKEv2 protocol.  In the process


   Of generating Keys, every parameter is taken from IKE_SA_INIT Messages  

   Which is un-unencrypted. 

 

   If attacker using some tools capturing all the IKE Packets from network,


   he can easily generates the Keys.  Although attacker can not establish a


   SA without proper configuration information, but still he can easily get 

   the Keys, and he will be able to decrypt all  the  IKE Encrypted and  

   IPSEC Encrypted packets.    

 

   Don't you think this is a big Security Risk? In IKEv1 Pre-shared key
auth, PSK was taken as  part of key

   Calculation with is a secret to generate Key and provides some level of
Security.  

 

   IKE Key generation process: 

 

   SKEYSEED = prf(Ni | Nr, g^ir)

 

   {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } = prf+

                 (SKEYSEED, Ni | Nr | SPIi | SPIr )

 

With Regards

Syed Ajim 

 

 

 

 

****************************************************************************


 

This e-mail and attachments contain confidential information from HUAWEI,
which is intended only for the person or entity whose address is listed
above. Any use of the information contained herein in any way (including,
but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient's) is
prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it!

 

****************************************************************************


 

________________________________

 

 

 

 

-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of
[email protected]
Sent: Monday, November 22, 2010 1:30 AM
To: [email protected]
Subject: IPsec Digest, Vol 79, Issue 11

 

If you have received this digest without all the individual message

attachments you will need to update your digest options in your list

subscription.  To do so, go to 

 

https://www.ietf.org/mailman/listinfo/ipsec

 

Click the 'Unsubscribe or edit options' button, log in, and set "Get

MIME or Plain Text Digests?" to MIME.  You can set this option

globally for all the list digests you receive at this point.

 

 

 

Send IPsec mailing list submissions to

      [email protected]

 

To subscribe or unsubscribe via the World Wide Web, visit

      https://www.ietf.org/mailman/listinfo/ipsec

or, via email, send a message with subject or body 'help' to

      [email protected]

 

You can reach the person managing the list at

      [email protected]

 

When replying, please edit your Subject line so it is more specific

than "Re: Contents of IPsec digest..."

 

 

Today's Topics:

 

   1. Re: HA protocol replay protection (Yaron Sheffer)

 

 

----------------------------------------------------------------------

 

Message: 1

Date: Sun, 21 Nov 2010 00:01:47 +0200

From: Yaron Sheffer <[email protected]>

Subject: Re: [IPsec] HA protocol replay protection

To: Pekka Riikonen <[email protected]>

Cc: IPsecme WG <[email protected]>, Tero Kivinen <[email protected]>,   Raj

      Singh <[email protected]>

Message-ID: <[email protected]>

Content-Type: text/plain; charset=US-ASCII; format=flowed

 

Hi Pekka,

 

the text you are quoting provides implementation guidance (probably good 

one), but does not "recommend" (in the RFC 2119 sense of the word, i.e. 

equivalent to a normative SHOULD) to do so. We should have stronger text 

if we are to avoid accidental replay.

 

Thanks,

      Yaron

 

On 11/20/2010 02:14 PM, Pekka Riikonen wrote:

> 

> :

> : Let's take the extreme case where the cluster and the peer synchronize

> : the SA, then there is no IKE traffic, and then they synchronize the SA

> : again. If we don't do anything special, the second pair of synch

> : messages will be identical to the first, i.e. will look like a replay.

> : So we have to prevent this case. One trivial solution is to mandate one

> : liveness test (initiated by the peer) immediately after the synch.

> :

> Note that draft recommends that the sync is done only when the IKE SA is

> actually needed.  If there is not IKE traffic then the sync would have

> never been done in the first place.

> 

> ...

>     Since there can be a large number of sessions at the standby member,

>     and sending synchronization exchanges for all of them may result in

>     overload, the standby member can choose to initiate the exchange in a

>     "lazy" fashion: only when it has to send or receive the request.  In

>     general, the standby member is free to initiate this exchange at its

>     discretion.

> ...

> 

> I've implemented the lazy sync, it's seems the best way to do it.

> 

>     Pekka

 

 

------------------------------

 

_______________________________________________

IPsec mailing list

[email protected]

https://www.ietf.org/mailman/listinfo/ipsec

 

 

End of IPsec Digest, Vol 79, Issue 11

*************************************

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to