Re: Strange IPSEC traffic

2023-11-14 Thread Niels Bakker

* Shawn L [Mon 13 Nov 2023, 18:12 CET]:

Is anyone else seeing a lot of 'strange' IPSEC traffic?


This mail server running FreeBSD did: (timestamps in CET, UTC+1)

Nov 10 00:58:55 mailserver kernel: ipsec_common_input: no key association found 
for SA 77.174.253.13/77b4/50
Nov 10 01:26:09 mailserver kernel: ipsec_common_input: no key association found 
for SA 77.174.253.13/03e8/50
Nov 11 10:15:22 mailserver kernel: ipsec_common_input: no key association found 
for SA 77.174.253.13/62861b0e/50
Nov 11 14:35:34 mailserver kernel: ipsec_common_input: no key association found 
for SA 77.174.253.13/048b828c/50
Nov 13 20:00:53 mailserver kernel: ipsec_common_input: no key association found 
for SA 77.174.253.13/a5ff/50

I don't remember ever seeing these log messages before.


-- Niels.


Re: Strange IPSEC traffic

2023-11-14 Thread Tom Beecher
>
> Last week somebody on the internet started a campaign to scan and perhaps
> to exploit some zero day ipsec vulnerabilities.
>

I've seen traffic like this for the better part of at least the last 7
years, fairly consistently.

It's definitely not something new.

On Mon, Nov 13, 2023 at 12:42 PM Adrian Minta 
wrote:

> On 11/13/23 19:10, Shawn L via NANOG wrote:
>
> Is anyone else seeing a lot of 'strange' IPSEC traffic?  We started seeing
> logs of IPSEC with invalid spi on Friday.  We're seeing it on pretty much
> all of our PE routers, none of which are setup to do anything VPN related.
> Most are just routing local customer traffic.
>
>
>
> decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, prot=50,
> spi=0x9D2D(2636972032), srcaddr=211.112.195.167, input
> interface=TenGigabitEthernet0/0/11
>
>
>
> decaps: rec'd IPSEC packet has invalid spi for destaddr=Y.Y.Y.Y, prot=50,
> spi=0x1469(342425600), srcaddr=74.116.56.244, input
> interface=TenGigabitEthernet0/0/5
>
>
>
> The destination address is always one of our customer's ip addresses.  The
> source seems to be all over the place, mostly Russia, Korea, China or south
> east asia.  It's not really impacting anything at the moment, just rather
> annoying.
>
>
>
> Thanks
>
>
>
> Shawn
>
>
> Hi Shawn,
>
> we saw a lot of syslog messages like these and the targets are cisco
> devices, some of witch, according to the data sheets, are not even capable
> of ipsec.
>
> Cisco is punting some ESP traffic to control plane on ios and ios-xe
> devices, regardless of the configuration.
>
> Last week somebody on the internet started a campaign to scan and perhaps
> to exploit some zero day ipsec vulnerabilities.
>
>
> This is the list of ip addresses we saw: https://pastebin.com/vrLRai9Q
>
>
>
> --
> Best regards,
> Adrian Minta
>
>
>
>


Re: Strange IPSEC traffic

2023-11-13 Thread Dobbins, Roland via NANOG

On Nov 14, 2023, at 00:12, Shawn L via NANOG  wrote:

The destination address is always one of our customer's ip addresses.


Attackers will sometimes use synthetic ESP, AH, GRE, or other protocols in DDoS 
attacks, because organizations often only think about TCP/UDP/ICMP in terms of 
ACLs, DDoS defense mechanisms, etc.



Roland Dobbins 


Re: Strange IPSEC traffic

2023-11-13 Thread Sabri Berisha
- On Nov 13, 2023, at 9:43 AM, Maurice Brown maur...@pwnship.com wrote:

Hi,

> A new attack was published against SSH and the paper authors are theorizing 
> that
> the attack is possible against IPSEC due to flaws in the CPU that are
> exploitable via brute force.

For those interested, here is the paper: https://eprint.iacr.org/2023/1711.pdf

It's written for SSH, but the authors theorize it will work for IPSec as well.

Thanks,

Sabri


Re: Strange IPSEC traffic

2023-11-13 Thread Maurice Brown
A new attack was published against SSH and the paper authors are theorizing
that the attack is possible against IPSEC due to flaws in the CPU that are
exploitable via brute force.

On Mon, Nov 13, 2023 at 9:42 AM Adrian Minta  wrote:

> On 11/13/23 19:10, Shawn L via NANOG wrote:
>
> Is anyone else seeing a lot of 'strange' IPSEC traffic?  We started seeing
> logs of IPSEC with invalid spi on Friday.  We're seeing it on pretty much
> all of our PE routers, none of which are setup to do anything VPN related.
> Most are just routing local customer traffic.
>
>
>
> decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, prot=50,
> spi=0x9D2D(2636972032), srcaddr=211.112.195.167, input
> interface=TenGigabitEthernet0/0/11
>
>
>
> decaps: rec'd IPSEC packet has invalid spi for destaddr=Y.Y.Y.Y, prot=50,
> spi=0x1469(342425600), srcaddr=74.116.56.244, input
> interface=TenGigabitEthernet0/0/5
>
>
>
> The destination address is always one of our customer's ip addresses.  The
> source seems to be all over the place, mostly Russia, Korea, China or south
> east asia.  It's not really impacting anything at the moment, just rather
> annoying.
>
>
>
> Thanks
>
>
>
> Shawn
>
>
> Hi Shawn,
>
> we saw a lot of syslog messages like these and the targets are cisco
> devices, some of witch, according to the data sheets, are not even capable
> of ipsec.
>
> Cisco is punting some ESP traffic to control plane on ios and ios-xe
> devices, regardless of the configuration.
>
> Last week somebody on the internet started a campaign to scan and perhaps
> to exploit some zero day ipsec vulnerabilities.
>
>
> This is the list of ip addresses we saw: https://pastebin.com/vrLRai9Q
>
>
>
> --
> Best regards,
> Adrian Minta
>
>
>
>


RE: Strange IPSEC traffic

2023-11-13 Thread Mike Lewinski via NANOG
I can confirm we started seeing this on Nov 9th at 19:10 UTC across all markets 
from a variety of sources.

If you want to filter it with ingress ACLs they need to include subnet base and 
broadcast addresses in addition to interface address, so a router at 
192.168.1.1/30 with a customer potentially running IPSEC at 192.168.1.2 would 
require all this to silence the log messages:

access-list 100 deny esp any host 192.168.1.0
access-list 100 deny esp any host 192.168.1.1
access-list 100 deny esp any host 192.168.1.3
access-list 100 permit ip any any

I started with an ACL only on the interface address and then noticed I was 
still getting logs on base/broadcast addresses.

Could be recon for the IKEv2 vulnerability in this:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ravpn-auth-8LyfCkeC
https://blogs.cisco.com/security/akira-ransomware-targeting-vpns-without-multi-factor-authentication

Or zero day. Even though the devices they are hitting are not configured for 
IPSEC we are filtering it anyway (and for good measure " no crypto isakmp 
enable").


Mike


Re: Strange IPSEC traffic

2023-11-13 Thread Adrian Minta

On 11/13/23 19:10, Shawn L via NANOG wrote:


Is anyone else seeing a lot of 'strange' IPSEC traffic?  We started 
seeing logs of IPSEC with invalid spi on Friday. We're seeing it on 
pretty much all of our PE routers, none of which are setup to do 
anything VPN related.  Most are just routing local customer traffic.


decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, 
prot=50, spi=0x9D2D(2636972032), srcaddr=211.112.195.167, input 
interface=TenGigabitEthernet0/0/11


decaps: rec'd IPSEC packet has invalid spi for destaddr=Y.Y.Y.Y, 
prot=50, spi=0x1469(342425600), srcaddr=74.116.56.244, input 
interface=TenGigabitEthernet0/0/5


The destination address is always one of our customer's ip addresses.  
The source seems to be all over the place, mostly Russia, Korea, China 
or south east asia.  It's not really impacting anything at the moment, 
just rather annoying.


Thanks

Shawn



Hi Shawn,

we saw a lot of syslog messages like these and the targets are cisco 
devices, some of witch, according to the data sheets, are not even 
capable of ipsec.


Cisco is punting some ESP traffic to control plane on ios and ios-xe 
devices, regardless of the configuration.


Last week somebody on the internet started a campaign to scan and 
perhaps to exploit some zero day ipsec vulnerabilities.



This is the list of ip addresses we saw: https://pastebin.com/vrLRai9Q

--
Best regards,
Adrian Minta



Strange IPSEC traffic

2023-11-13 Thread Shawn L via NANOG

Is anyone else seeing a lot of 'strange' IPSEC traffic?  We started seeing logs 
of IPSEC with invalid spi on Friday.  We're seeing it on pretty much all of our 
PE routers, none of which are setup to do anything VPN related.  Most are just 
routing local customer traffic.
 
decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, prot=50, 
spi=0x9D2D(2636972032), srcaddr=211.112.195.167, input 
interface=TenGigabitEthernet0/0/11
 
decaps: rec'd IPSEC packet has invalid spi for destaddr=Y.Y.Y.Y, prot=50, 
spi=0x1469(342425600), srcaddr=74.116.56.244, input 
interface=TenGigabitEthernet0/0/5
 
The destination address is always one of our customer's ip addresses.  The 
source seems to be all over the place, mostly Russia, Korea, China or south 
east asia.  It's not really impacting anything at the moment, just rather 
annoying.
 
Thanks
 
Shawn