On Tue, 14 Aug 2018, Scott Fluhrer (sfluhrer) wrote:

This is not a MITM attack, this is an impersonation attack.

If it is not a MITM, then the original connection will establish.

What original connection?  Mallet (the attacker) claims to be Alice (a valid 
node), and initiates to Bob.  When Mallet needs to include Alice's signature in 
the exchange, he performs a Bleitchenbacher attack against the real Alice, to 
compute what the signature needs to be.  Then, Mallet uses that signature to 
fool Bob into thinking he is talking to Alice.  Since Alice never had any idea 
she was supposed to be talking to Bob, she'll never send any packets his way...

How does Mallet get both Bob and Alice to use the same IKE SPI's ?

AUTH is computed over:

InitiatorSignedOctets = RealMessage1 | NonceRData | MACedIDForI
   GenIKEHDR = [ four octets 0 if using port 4500 ] | RealIKEHDR
   RealIKEHDR =  SPIi | SPIr |  . . . | Length
   RealMessage1 = RealIKEHDR | RestOfMessage1
   NonceRPayload = PayloadHeader | NonceRData
   InitiatorIDPayload = PayloadHeader | RestOfInitIDPayload
   RestOfInitIDPayload = IDType | RESERVED | InitIDData
   MACedIDForI = prf(SK_pi, RestOfInitIDPayload)

Note it contains SPIi and SPIr.

Paul

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to