Protecting Internet Key Exchange (IKE) Implementations from Distributed Denial of Service Attacks



Similar documents
Lecture 5.1: IPsec Basics

Internet Protocol Security IPSec

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

IPsec Details 1 / 43. IPsec Details

VPN with Windows 7 and Linux strongswan using IKEv2

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

IP Security. Ola Flygt Växjö University, Sweden

Configuring IKEv2 Load Balancer

T Cryptography and Data Security

Firewall Troubleshooting

Chapter 3. Network Domain Security

SonicOS Enhanced 3.2 IKE Version 2 Support

This paper is a follow-on to an earlier paper 1 and. An architecture for the Internet Key Exchange Protocol. by P.-C. Cheng

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Securing IP Networks with Implementation of IPv6

Network Security. Lecture 3

The BANDIT Products in Virtual Private Networks

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Client Server Registration Protocol

Internetwork Security

Unregister Attacks in SIP

Quick Note 051. Common Passwords/ID errors in IPsec VPN negotiation for TransPort routers. DRAFT July 2015

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

IPSec and SSL Virtual Private Networks

Improved IKE Key Exchange Protocol Combined with Computer Security USB Key Device

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

T Cryptography and Data Security

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Chapter 49 IP Security (IPsec)

ETSI TS V8.1.0 ( ) Technical Specification. Smart Cards; Secure channel between a UICC and an end-point terminal (Release 8)

Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology

Security Architecture for IP (IPsec)

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Chapter 4 Virtual Private Networking

Distributed Denial of Service Attacks & Defenses

VPN R Administration Guide. 15 October Classification: [Protected]

DoS/DDoS Attacks and Protection on VoIP/UC

Configuring SIP Support for SRTP

The English translation Of MBA Standard 0301

CS 494/594 Computer and Network Security

ETSI TS V8.9.0 ( )

DoS Protection for UDP-Based Protocols

IP SECURITY (IPSEC) PROTOCOLS

OPENID AUTHENTICATION SECURITY

Computer and Network Security

Introduction to Security and PIX Firewall

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Chapter 5 Virtual Private Networking Using IPsec

How To Fix A Username Enumeration On A Vpn On A Pc Or Ipv (Vpn) On A Password Protected Ipv 2 (Vvv) On An Ipv 3 (Vp) On Pc Or Password Protected (V

Network Security Part II: Standards

Laboratory Exercises V: IP Security Protocol (IPSec)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Security vulnerabilities in the Internet and possible solutions

Denial of Service Attacks

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Protocol Security Where?

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Using BroadSAFE TM Technology 07/18/05

Ethical Hacking Penetrating Web 2.0 Security

DDoS Protection on the Security Gateway

IMM2 Configurations User's Guide Version 1.0 (Jan 2013)

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Chapter 17. Transport-Level Security

DOMAIN NAME SECURITY EXTENSIONS

Branch Office VPN Tunnels and Mobile VPN

What is HIP? A brief introduction to the Host Identity Protocol. 5. Aug Holger.Zuleger@hnet.de

Using IPSec in Windows 2000 and XP, Part 2

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Cisco RV 120W Wireless-N VPN Firewall

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

CSCI 454/554 Computer and Network Security. Final Exam Review

CCNA Security 1.1 Instructional Resource

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Chapter 2 Virtual Private Networking Basics

Application Note: Onsight Device VPN Configuration V1.1

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Transport Layer Security Protocols

What is Web Security? Motivation

Attack Lab: Attacks on TCP/IP Protocols

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Lecture 17 - Network Security

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Transcription:

Protecting Internet Key Exchange (IKE) Implementations from Distributed Denial of Service Attacks draft-ietf-ipsecme-ddos-protection-01 Yoav Nir (ynir.ietf@gmail.com) Valery Smyslov (svan@elvis.ru) IETF 92

DoS Attacks on IKE Responder Denial of Service (DoS) attacks on IKE responder aimed to exhaust its resources by initiating requests that either do not complete or are unnecessary if attack is performed by multiple attackers then we call it Distributed Denial of Service (DDoS) attack The goal of the draft is to make the (D)DoS attacks costly for attackers

DoS Attacks on IKE Responder Depending on the point in the protocol flow, the attacks can be performed in IKE_SA_INIT Exchange in IKE_AUTH Exchange after IKE SA is established IKE Resumption (RFC5723) can be used to minimize the impact of DoS attacks in IKE_SA_INIT and IKE_AUTH exchanges

DoS Attacks in IKE_SA_INIT The goal of attack is to exhaust responder s memory by creating large number of half-open IKE SAs The attack costs nothing to attacker

DoS Attacks in IKE_SA_INIT countermeasures Limit the number of half-open IKE SAs from a single IPv4 address (IPv6 prefix) Using stateless cookies would require attackers to only use real IP-addresses Using puzzles would require attackers to consume substantial computational resources to make a request

DoS Attacks in IKE_SA_INIT puzzles Responder includes N(PUZZLE) along with N(COOKIE) into its response <-- HDR, N(COOKIE), N(PUZZLE), [V+][N+] PUZZLE Notification contains algorithm (PRF) to be used in puzzle calculation is selected by Responder from PRF transforms in Initiator s SA Payload puzzle difficulty level (requested number of trailing zero bits) can be set to 0, meaning get as many zero bits as you can

DoS Attacks in IKE_SA_INIT puzzles In IKE_SA_INIT the puzzle is: with given PRF and cookie find a key K such, that the result of PRF(K,cookie) contains the requested number of trailing zero bits for example: with HMAC_SHA256 and 2.4 GHz single core i5 it takes from 0,5 to 5 seconds to get 20 bits depending on the cookie

DoS Attacks in IKE_SA_INIT puzzles Legacy Initiators would ignore N(PUZZLE) and act as with stateless cookie from RFC7296 they would still have a chance to create IKE SA, but their requests would be marked with the lowest priority Initiator supporting puzzles would solve it and restart the exchange including N(COOKIE) along with the solution, which is contained in a new payload Puzzle Solution (denoted as PS) HDR, N(COOKIE), PS, SA, KE, Ni, [V+][N+] -->

DoS Attacks in IKE_SA_INIT puzzles Upon receiving request with PS payload the responder would verify the cookie and the solution if verifications fail either discard the message or give the initiator a new puzzle assign a priority to the request depending on puzzle difficulty the number of consecutive puzzles the initiator has solved the amount of time it took initiator to solve them

DoS Attacks in IKE_SA_INIT puzzles The responder weighs the priority of the request and its current load and either accepts the request rejects the request gives the initiator another puzzle (in case the puzzle appeared too easy) eventually the request either will be accepted or rejected

DoS Attacks in IKE_AUTH The attack on responder s CPU power and memory by sending garbage in IKE_AUTH request The attack costs nothing to attacker once it completes IKE_SA_INIT exchange The attack on responder s CPU power by sending invalid credentials The attack is costly for attacker since Responder must compute DH shared secret, that s why it is not considered in the draft

DoS Attacks in IKE_AUTH puzzles If the puzzles were used in IKE_SA_INIT then the responder could also give the initiator a new puzzle to make the attack garbage in IKE_AUTH request costly;; the responder includes N(PUZZLE) in IKE_SA_INIT response <-- HDR, SA, KE, Nr, N(PUZZLE), [V+][N+] PUZZLE Notification contains algorithm (PRF) to be used in puzzle calculation is selected from PRF transforms in Initiator s SA Payload (may differ from that in IKE_SA_INIT puzzle) puzzle difficulty level (cannot be 0 in this case)

DoS Attacks in IKE_AUTH puzzles In IKE_AUTH the puzzle is slightly different than in IKE_SA_INIT: with given PRF, responder s nonce Nr and responder s SPI find a key K such, that the result of PRF(K,Nr SPIr) contains the requested number of trailing zero bits such construction allows the initiator to reuse the same puzzle for both unfragmented and fragmented IKE messages in case of switching to IKE fragmentation

DoS Attacks in IKE_AUTH puzzles When initiator solves the puzzle it returns the solution in the PS payload outside the SK/SKF payload HDR, PS, SK {IDi, [CERT,] [CERTREQ,] [IDr,] AUTH, SA, TSi, TSr} --> This would allow the responder to verify the solution before it spend a lot of CPU resources computing SKEYSEED and the SK_* keys

DoS Attacks in IKE_AUTH puzzles The responder first verifies the solution if verification fails the message is discarded If puzzle solution is OK the responder computes DH shared secret, SKEYSEED, SK_* keys and decrypts the SK/SKF payload if puzzle solution is OK, but SK/SKF payload failed to pass ICV check, then the message is discarded, however the IKE SA is not immediately deleted and the computed keys are cached in it

Responder s Strategy Constantly monitor peers activity and resource consumption Use the following countermeasures once (D)DoS attack is detected (in an order of increasing attack volume) use stateless cookies use IKE_SA_INIT puzzles (use also IKE_AUTH puzzles if correspondent attack is detected) don t use zero-level puzzle difficulty increase puzzle difficulty

DoS Attacks after IKE SA is established The goal of the attacks is to force the victim to perform unnecessary work, like performing continuous endless Liveness Check continuous endless rekeying creating numerous Child SAs with the same Traffic Selectors The attacks are targeted mostly on CPU power, however some of them can consume memory too

DoS Attacks after IKE SA is established All these requests are legal in the protocol, so the victim cannot just refuse to do them The amount of work is roughly the same for both the attacker and the victim, so the attacks are more likely be distributed the attacker(s) could use NULL Authentication to remain anonymous

DoS Attacks after IKE SA is established countermeasures Don t increase IKE window size above the default value of 1 Use TEMPORARY_FAILURE notification to limit the rate of rekeying Use NO_ADDITIONAL_SAS notification to limit the number of equal Child SAs Introduce artificial delays while responding to requests

Thanks Comments? Questions? More details are in the draft Please review it and send feedback to the authors