VPN Flaw Allows Denial of Service 64
An anonymous reader writes "Finnish researchers at the University of Oulu have found a vulnerability in ISAKMP (Internet Security Association and Key Management Protocol) -- the technology used in IPsec virtual private network and firewall products from a range of networking companies, including Cisco and Juniper Networks. Cisco said the security flaw could cause devices to reset over and over, which could cause a temporary denial-of-service attack. It did not mention the possibility of the device being taken over by an intruder, while Juniper said it has been aware of the problem since June, so software issued on or after July 28 provide fixes for the flaw."
This seems like a protocol issue (Score:3, Insightful)
Re:This seems like a protocol issue (Score:2, Insightful)
Though one would hope this doesn't cause problems in itself..
Oh Cisco... (Score:3, Funny)
Try again. (Score:5, Informative)
FTFA [uniras.gov.uk]:
That doesn't strike me as a protocol problem.
Re:Try again. (Score:1, Interesting)
Re:This seems like a protocol issue (Score:5, Informative)
The advisory says:
The OpenBSD developers fixed this early 2004 [neohapsis.com]:
There's the problem (Score:1)
Your TLAs are broken.
Gah, I like to think that I'm technically savy, but when there are 2 FLAs and a SLA in a row, and I don't know what any of them mean, I feel a little sad.
Re:This seems like a protocol issue (Score:2)
Re:This seems like a protocol issue (Score:1, Insightful)
Re:This seems like a protocol issue (Score:1)
description. Read the advisory: http://www.uniras.gov.uk/niscc/docs/br-20051114-01 013.html?lang=en [uniras.gov.uk]
It specifically states implementation of protocol. The whole problem is related to incorrect
parser engines of SNMP, IKEv1 and ASN.1 et al. type data structures.
Arash Partow
Original publication (Score:3, Informative)
"ABSTRACT
The Internet Security Association and Key Management Protocol (ISAKMP), is designed to establish, negotiate, modify and delete Security Associations. ISAKMP provides a consistent framework for transferring key and authentication data which is independent of the key generation technique, encryption algorithm and authentication mechanism. Internet Key Exchange (IKE), a derivate of ISAKMP, is a key protocol in the Internet Security Architecture (IPsec). A subset of IKE Phase 1 negotiation was chosen as the subject protocol for vulnerability assessment through syntax testing and test-suite creation. A survey of the related standards was made. Test-material was prepared and tests were carried out against a sample set of existing implementations. Results were gathered and reported. Some of the implementations available for evaluation failed to perform in a robust manner under the test. Some failures had information security implications, and should be considered as vulnerabilities. Therefore, this robustness test-material should be adopted for evaluation and development of ISAKMP/IKE products."
There is not a lot of info on NISCC site (Score:5, Insightful)
Well... We kind'a all know this already. The weaknesses of agressive mode were all over BUGTRAQ more then 2 years ago and if you are still using it you "Get whatever Christmas you deserve".
Re:There is not a lot of info on NISCC site (Score:2)
That's not the problem. Read the report, http://www.ee.oulu.fi/research/ouspg/protos/testin g/c09/isakmp/index.html [ee.oulu.fi], and look at the table at the bottom. There were just as many failures in main mode (i.e. non-aggressive mode) as in aggressive mode. Disabling aggressive mode is no counter-measure.
And these are implementation failures, not protocol failures. Generally they are
There does not seem to be any IPsec exploiting (Score:5, Interesting)
We have always had an explicit allow list for isakmp packets only for the known peers, and a deny with logging for all other sources.
Over the years, there have been only very few logged packets. No need to tell you how many NETBIOS and other wellknown exploitable service packets have been counted (we don't even log these).
It does not look like IPsec is a popular attack vector. Same for PPTP, by the way.
Re:There does not seem to be any IPsec exploiting (Score:2)
I get more hits on random ports than known ones (I don't log 137/139/445 either) - I think it's spambots trying to find infected machines.
Re:There does not seem to be any IPsec exploiting (Score:2)
It's allways a good idea to restrict access to a service to legitimate peers on layer 3. Unfortunatly, this does not work if your peers use unpredictable IPs (VPN-roadwarriors).
It does look like an attack vector which should bother lots of admins.
graf0z.
Thanks Jupiner! (Score:5, Funny)
Gee, thanks for letting the rest of the world know too!
Re:Thanks Jupiner! (Score:1)
eBay Sucks!
And, how do you get that update? (Score:2, Interesting)
Re:Lex Karpela.. (Score:2, Funny)
Summary (Score:4, Insightful)
Not news kids, just development as usual.
Oh, and I like the bit about "possibly executing code." That, I believe, is FUD. Prove that you can execute code.
Re:Summary (Score:1)
Dear AC,
They are the ones claiming that code execution is possible therefore they are the ones who should provide proof.
Every single vulnerability disclosure says "could result in code execution". It doesn't mean that they have any evidence or can even construct a plausible scenario in which code execution may theoretically result. It's just another box to tick and they tick it because the security is largely full of scaremongering, publicity seeking idiots in search of venture capital.
Re:Summary (Score:2)
Mind you, the original page does say
"Each failed test-case represents at minimum a denial of service type chance of exploiting the foun
Looks like implementation (Score:3, Informative)
Re:Looks like implementation (Score:2)
Here is a concrete payoff of OpenBSD pro-active stance with respect to security: fixed early 2004 [neohapsis.com].
It is pretty common to fix these sorts of bugs it complicated protocols like ISAKMP.
Yeah, complicated protocolls implementations are particularly suspectible to format string vulnerabilities and buffer overflows....
Well, I knew something was up... (Score:3, Interesting)
Yay, I now have a $500 cisco paper weight.
Re:Well, I knew something was up... (Score:2)
Re:Well, I knew something was up... (Score:2)
Well, I'll definitely give you the more versatile part. But, I want something quiet (there's enough noise in the computer room as it is!) and this router does use less power than the typical PC... well I suppose if I used a P233MMX system as a router it wouldn't be that bad on power, but used parts, meh, bad luck lately with used stuff. At least with a NEW network appliance I'm (in theory) getting a higher reliability device.
Plus, I've already purchased it. :P
Re:Well, I knew something was up... (Score:4, Informative)
From the Cisco security advisory [cisco.com]:
Summary
Multiple Cisco products contain vulnerabilities in the processing of IPSec IKE (Internet Key Exchange) messages. These vulnerabilities were identified by the University of Oulu Secure Programming Group (OUSPG) "PROTOS" Test Suite for IPSec and can be repeatedly exploited to produce a denial of service.
Cisco has made free software available to address this vulnerability for affected customers. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. (emphasis mine)
Then later in the same document, there's a whole section about Obtaining Fixed Software including a subsection for Customers without Service Contracts (emphasis mine) which I assume is your case.
Re:Well, I knew something was up... (Score:2)
Yes, that section would apply to me. I do not have a service contract with them. (Nor do I want one).
Interestingly enough, though, is the fact that I don't even use VPN on this router... which leads me to believe I missed a previous DOS exploit for my router.
Re:Well, I knew something was up... (Score:2)
I recently downloaded and gave a try to Auditor [distrowatch.com], which comes bundled with a list of exploits for nearly all recent software flaws (not just Cisco) and for which there is a public advisory and exploit code available. Scary, but
Re:Well, I knew something was up... (Score:2)
Thanks for the link to Auditor, I didn't know about that useful tool until your post. Yeah, it's scary knowing that some of the "wrong hands" probably do use it.
I'll be taking a look at the previously known exploits on Cisco's site and seeing which one is probably the problem I experienced. I'll see about getting the patched IOS version. Eitherway, however, I'll more than likely be putting it on eBay even if I don't get the update. I'll just note in the auction that the buyer will need to obtain the updat
So block the VPN ports (Score:2)
Re:So block the VPN ports (Score:2)
Re:Well, I knew something was up... (Score:2)
Maybe they just offer a ZIP of a
Did I mention linux is a fine router for loads smaller than the PCI bus can handle?
Re:Well, I knew something was up... (Score:2)
Re:Well, I knew something was up... (Score:2)
Send me a 'show version' from the router and your Cisco.com username to my email addy, and I'll see what I can do ;)
Re:Well, I knew something was up... (Score:1)
Re:OpenBSD? (Score:1, Informative)
Now almost 2 years latter, I am lost for words.
I'm not even going to say anything (Score:2)
Re:I'm not even going to say anything (Score:2)
Well that's pretty dumb. (Score:3, Insightful)
Re:Well that's pretty dumb. (Score:1)
If your server is compromised you have bigger things to worry about than someone _maybe_ being able to execute arbitrary code on the client (who runs their client as root anyway). If you have a user with a valid key atta
Re:Well that's pretty dumb. (Score:2)
And tons of people run their client as root, they have to in order to add routes. Just dropping priv later doesn't solve everything.
CheckPoint's Reply (Score:2, Informative)
Solution ID: #sk31316
Product: VPN-1/FireWall-1
Version: NG AI, NGX
Last Modified: 14-Nov-2005
Symptoms
On Monday, November 14th, NISCC has issued a warning about a possible denial of service condition for IKEv1. No known exploit exists.
(NISCC Vulnerability Advisory 273756)
Cause
This issue was identified using the PROTOS ISAKMP Test Suite for IKEv1 which was published through NISCC.
The issue is due to a problem with the implementation of the IKE protocol.
The issue might cause a crash of
VPN Denial of Service? I don't think so... (Score:1)
We've been using this unpatched VPN to communicate to the outside world for months and we've never had any prob...[NO CARRIER]
Openswan released update (Score:2)
Okey, soooo.... (Score:3, Informative)
Might've been better phrased if it read as a vulnerability with "a number of popular implementations of IKEv1" as opposed to a vulnerability with the protocol.