Security gaps identified in Internet protocol 'IPsec'

August 14, 2018

In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the Internet protocol "IPsec" is vulnerable to attacks. The Internet Key Exchange protocol "IKEv1", which is part of the protocol family, has vulnerabilities that enable potential attackers to interfere with the communication process and intercept specific information.

The research results are published by Dennis Felsch, Martin Grothe and Prof Dr Jörg Schwenk from the Chair for Network and Data Security at RUB as well as Adam Czubak and Marcin Szymanek from Opole University on 16 August 2018 at the Usenix Security Symposium as well as on their blog.

Secure and encrypted communication

As an enhancement of Internet protocol (IP), "IPsec" has been developed to ensure cryptographically secure communication via publicly accessible resp. insecure networks, such as the Internet, by using encryption and authentication mechanisms. This type of communication is often relevant for enterprises whose employees operate from decentralised workplaces - for example as sales reps or from home office - and have to access company resources. The protocol can, moreover, be utilised to set up virtual private networks, or VPNs.

In order to enable an encrypted connection with "IPsec", both parties must authenticate and define shared keys that are necessary for communication. Automated key management and authentication, for example via passwords or digital signatures, can be conducted via the Internet Key Exchange protocol "IKEv1".

"Even though the protocol is considered obsolete and a newer version, namely IKEv2, has been long available in the market, we see in real-life applications that it is still being implemented in operating systems and still enjoys great popularity, even on newer devices," explains Dennis Felsch. But it is precisely this protocol that has vulnerabilities, as the researchers found out during their analysis.

Bleichenbacher's attack successful

In the course of their project, the researchers attacked the encryption-based logon mode of "IPsec" by deploying the so-called Bleichenbacher's attack, which had been invented in 1998. Its principle is: errors are deliberately incorporated into an encoded message, which is then repeatedly sent to a server. Based on the server's replies to the corrupted message, an attacker can gradually draw better and better conclusions about the encrypted contents.

"Thus, the attacker approaches the target step by step until he reaches his goal," says Martin Grothe and adds: "It is like a tunnel with two ends. It's enough if one of the two parties is vulnerable. Eventually, the vulnerability permits the attacker to interfere with the communication process, to assume the identity of one of the communication partners, and to actively commit data theft."

Bleichenbacher's attack proved effective against the hardware of four network equipment providers. The affected parties were Clavister, Zyxel, Cisco, and Huawei. All four manufacturers have been notified and have now eliminated the security gaps.

Passwords under scrutiny

In addition to the encryption-base logon mode, the researchers have also been looking into password-based login. "Authentication via passwords is carried out with hash values, which are similar to a fingerprint. During our attack, we demonstrated that both IKEv1 and the current IKEv2 present vulnerabilities and may be easily attacked - especially if the password is weak. Accordingly, a highly complex password provides the best protection if IPsec is deployed in this mode," concludes Martin Grothe. The vulnerability was also communicated to the Computer Emergency Response Team (CERT), as it coordinates the response to actual IT security incidents and provided assistance to the researchers as they notified the industry about the vulnerability.

All-clear for users and network equipment providers

The identified Bleichenbacher vulnerability is not a bug in the standard but rather an implementation error that can be avoided - it all depends on how manufacturers integrate the protocol in their devices. Moreover, the attacker has to enter the network first, before he can do anything. Nevertheless, the researchers' successful attack has demonstrated that established protocols such as "IPsec" still include the Bleichenbacher gap that makes them potentially vulnerable to attack.
Presentation at symposium

The research team headed by Jörg Schwenk will present the vulnerabilities at the Usenix Security Symposium, which will be taking place from 15 to 17 August 2018 in Baltimore, USA.

Online preview

Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek: The dangers of key reuse: practical attacks on IPsec IKE, 2018, Online preview:

Ruhr-University Bochum

Related Communication Articles from Brightsurf:

Video is not always effective in science communication
What we can learn for online public relations: - Keep the information concise so that one can go thorough it within about 1 minute.

Ultraviolet communication to transform Army networks
Of ever-increasing concern for operating a tactical communications network is the possibility that a sophisticated adversary may detect friendly transmissions.

Adding noise for completely secure communication
How can we protect communications against 'eavesdropping' if we don't trust the devices used in the process?

How serotonin balances communication within the brain
Our brain is steadily engaged in soliloquies. These internal communications are usually also bombarded with external sensory events.

Breaking the communication code
Ever wonder how mice talk to each other. We don't have a dictionary quite yet, but UD neuroscientist Josh Neunuebel and his lab have linked mice chatter (their ultrasonic vocalizations) with specific behaviors.

A new twist on quantum communication in fiber
New research done at the University of the Witwatersrand in Johannesburg, South Africa, and Huazhang University of Science and Technology in Wuhan, China, has exciting implications for secure data transfer across optical fiber networks.

Study traces evolution of acoustic communication
A study tracing acoustic communication across the tree of life of land-living vertebrates reveals that the ability to vocalize goes back hundreds of millions of years, is associated with a nocturnal lifestyle and has remained stable.

Should preschool writing be more communication and less ABCs?
Writing instruction in early education should be about more than letter formation and penmanship, argue Michigan State University researchers who found preschool teachers don't often encourage writing for communication purposes.

Trump's Twitter communication style shifted over time based on varying communication goals
The linguistic and discursive style of Donald Trump's tweets varied systematically before, during, and after the 2016 presidential campaign, depending on the communicative goals of Trump and his team, according to a study published Sept.

Intercultural communication crucial for engineering education
In an increasingly connected world it helps to engage with other cultures without prejudice or assumption.

Read More: Communication News and Communication Current Events is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to