Security gaps identified in internet protocol IPsec

August 15, 2018, Ruhr-Universitaet-Bochum
Credit: CC0 Public Domain

In collaboration with colleagues from Opole University in Poland, researchers at Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum (RUB) have demonstrated that the internet protocol IPsec is vulnerable to attacks. The internet key exchange protocol IKEv1, which is part of the protocol family, has vulnerabilities that enable potential attackers to interfere with the communication process and intercept specific information.

The research results are published by Dennis Felsch, Martin Grothe and Prof Dr. Jörg Schwenk from the Chair for Network and Data Security at RUB, and Adam Czubak and Marcin Szymanek from Opole University on 16 August 2018 at the Usenix Security Symposium, and are available on their blog.

Secure and encrypted communication

As an enhancement of internet protocol (IP), IPsec has been developed to ensure cryptographically secure communication via publicly accessible insecure networks, such as the internet, by using encryption and authentication mechanisms. This type of communication is often used by enterprises whose employees operate from decentralised workplaces—for example, as sales reps or from a home office—and need to access company resources. The protocol can also be used to set up (VPNs).

In order to enable an encrypted connection with IPsec, both parties must authenticate and define shared keys that are necessary for communication. Automated key management and authentication, for example, via passwords or digital signatures, can be conducted via the internet Key Exchange protocol IKEv1.

"Even though the protocol is considered obsolete and a newer version, IKEv2, has been long available on the market, we see in real-life applications that IKEv1 is still being implemented in operating systems and still enjoys great popularity, even on newer devices," explains Dennis Felsch. But this protocol has vulnerabilities, as the researchers found during their analysis.

Bleichenbacher's attack successful

In the course of their project, the researchers attacked the encryption-based logon mode of IPsec by deploying the so-called Bleichenbacher's attack, which was invented in 1998. In this attachl, errors are deliberately incorporated into an encoded message, which is then repeatedly sent to a server. Based on the server's replies to the corrupted message, an attacker can draw progressively better conclusions about the encrypted contents.

"Thus, the attacker approaches the target step by step until he reaches his goal," says Martin Grothe. "It is like a tunnel with two ends. It's enough if one of the two parties is vulnerable. Eventually, the vulnerability permits the attacker to interfere with the , to assume the identity of one of the communication partners, and to actively commit data theft."

Bleichenbacher's attack proved effective against the hardware of four network equipment providers. The affected parties were Clavister, Zyxel, Cisco and Huawei. All four manufacturers have been notified, and have now eliminated the security gaps.

Passwords under scrutiny

In addition to the encryption-base logon mode, the researchers have also been looking into password-based login. "Authentication via passwords is carried out with hash values, which are similar to a fingerprint. During our attack, we demonstrated that both IKEv1 and the current IKEv2 present vulnerabilities and may be easily attacked—especially if the password is weak. Accordingly, a highly complex password provides the best protection if IPsec is deployed in this mode," says Grothe. The vulnerability was also communicated to the Computer Emergency Response Team (CERT), which coordinates the response to IT security incidents. CERT provided assistance to the researchers as they notified the industry about the vulnerability.

The identified Bleichenbacher vulnerability is not a bug per se, but rather an implementation error that can be avoided—it all depends on how manufacturers integrate the in their devices. Moreover, the attacker must enter the network before in order to exploit this . Nevertheless, the researchers' successful attack has demonstrated that established protocols such as IPsec still include the Bleichenbacher gap, making them potentially vulnerable to attack.

Explore further: Email encryption standards hacked

More information: Dennis Felsch, Martin Grothe, Jörg Schwenk, Adam Czubak, Marcin Szymanek: The dangers of key reuse: practical attacks on IPsec IKE, 2018, Online preview: … /presentation/felsch

Related Stories

Email encryption standards hacked

May 14, 2018

A research team from the University of Applied Sciences (FH) in Münster, Horst Görtz Institute for IT Security at Ruhr-Universität Bochum (RUB), and Katholieke Universiteit Leuven has demonstrated that the two most common ...

Security gaps identified in LTE mobile telephony standard

June 28, 2018

By abusing security weaknesses in the LTE mobile telephony standard, attackers are able to identify which web pages a user visits and to reroute him to a scam website. This is the result of a study carried out by security ...

Recommended for you

Archaeologists discover Incan tomb in Peru

February 16, 2019

Peruvian archaeologists discovered an Incan tomb in the north of the country where an elite member of the pre-Columbian empire was buried, one of the investigators announced Friday.

Where is the universe hiding its missing mass?

February 15, 2019

Astronomers have spent decades looking for something that sounds like it would be hard to miss: about a third of the "normal" matter in the Universe. New results from NASA's Chandra X-ray Observatory may have helped them ...

What rising seas mean for local economies

February 15, 2019

Impacts from climate change are not always easy to see. But for many local businesses in coastal communities across the United States, the evidence is right outside their doors—or in their parking lots.

The friendly extortioner takes it all

February 15, 2019

Cooperating with other people makes many things easier. However, competition is also a characteristic aspect of our society. In their struggle for contracts and positions, people have to be more successful than their competitors ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.