Re: [IPsec] Regarding ISAKMP SA lifetime negotiation.

Tero Kivinen <kivinen@iki.fi> Tue, 05 March 2013 10:41 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 762F021F8887 for <ipsec@ietfa.amsl.com>; Tue, 5 Mar 2013 02:41:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.699
X-Spam-Level:
X-Spam-Status: No, score=-101.699 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_12=0.6, J_CHICKENPOX_36=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gMmdFR1zVKYV for <ipsec@ietfa.amsl.com>; Tue, 5 Mar 2013 02:41:00 -0800 (PST)
Received: from mail.kivinen.iki.fi (fireball.kivinen.iki.fi [IPv6:2001:1bc8:100d::2]) by ietfa.amsl.com (Postfix) with ESMTP id A4CBE21F87BA for <ipsec@ietf.org>; Tue, 5 Mar 2013 02:40:59 -0800 (PST)
Received: from fireball.kivinen.iki.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.14.5/8.14.5) with ESMTP id r25AebqF000594 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 Mar 2013 12:40:37 +0200 (EET)
Received: (from kivinen@localhost) by fireball.kivinen.iki.fi (8.14.5/8.12.11) id r25Aeakx007323; Tue, 5 Mar 2013 12:40:36 +0200 (EET)
X-Authentication-Warning: fireball.kivinen.iki.fi: kivinen set sender to kivinen@iki.fi using -f
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-ID: <20789.52132.677614.30811@fireball.kivinen.iki.fi>
Date: Tue, 05 Mar 2013 12:40:36 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Yoav Nir <ynir@checkpoint.com>
In-Reply-To: <AE23EA6D-D6D2-43C1-AEBC-0D4F4A299B75@checkpoint.com>
References: <0E86FFD429E5FA4A97B86698F6C32AF81C271A91@xmb-rcd-x04.cisco.com> <20788.45136.1741.27834@fireball.kivinen.iki.fi> <AE23EA6D-D6D2-43C1-AEBC-0D4F4A299B75@checkpoint.com>
X-Mailer: VM 7.19 under Emacs 21.4.1
X-Edit-Time: 9 min
X-Total-Time: 16 min
Cc: "ipsec@ietf.org" <ipsec@ietf.org>, "Anoop V A (anova)" <anova@cisco.com>
Subject: Re: [IPsec] Regarding ISAKMP SA lifetime negotiation.
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Mar 2013 10:41:00 -0000

Yoav Nir writes:
> > Anything extra (notifications etc) you send inside the main mode or
> > agressive mode packets are not authenticated, so sending responder
> > life time notifications is not good idea (and the other end will
> > simply ignore it).
> 
> This is true for MM2, but not for MM6. MM6 is encrypted and
> authenticated, so the peer can and should (if they implemented the
> draft) use it.

MM6 is encrypted, but not authenticated, except for certain parts
inside the packet. The MM5/MM6 do have SIG (certificates)/HASH
(pre-shared keys) payload, but that only covers certain parts:

    HASH_I = prf(SKEYID, g^xi | g^xr | CKY-I | CKY-R | SAi_b | IDii_b )
    HASH_R = prf(SKEYID, g^xr | g^xi | CKY-R | CKY-I | SAi_b | IDir_b )

So if original MM5/MM6 has notification payload and attacker can guess
where it is (not very hard), he can modify it (even when it is
encrypted).

This is one of the things we did fix in the IKEv2, and thats why IKEv2
do MAC all of the payloads, and the authentication hash do include the
whole IKE_SA_INIT packet so it also gets authenticated.
-- 
kivinen@iki.fi