Blog » Is this 20-year-old vulnerability present in your legacy VPN solutions?
Last Month, academic researchers have published a paper on “The Danger of Key Reuse: Practical Attacks on IPSec IKE”. IPsec has emerged as the most commonly used IP level VPN to provide confidentiality, integrity, peer authentication, replay protection, and access control. IPSec keys can be configured statically or dynamically generated using IKE protocol.
Internet Key Exchange (IKE) is used to negotiate, create, and manage keys for IPSec. IKE exists in two versions (IKEv1 and IKEv2) each with different modes and supports following authentication methods.
IKE consists of two phases.
Phase-1: To authenticate the peer and derive keys for IKE
Phase-2: To acquire keys for IPSec
In this research, authors have shown possible strikes on IKE Phase-1 based on Blechenbacher Oracle that exploits RSA encryption with PKCS#1 v1.5 padding. The RSA algorithm needs padding and PKCS #1 v1.5 is a widely used padding mode. There are more secure padding modes for RSA (PSS/OAEP), but they never gained widespread adoption.
Bleichenbacher’s oracle discovered fragilities in the implementation of the two RSA encryption based authentication in IKEv1 and signature-based authentication in IKEv1 and IKEv2. PSK based authentication also failed to stop dictionary based invasion if low entropy PSK is used.
Though Bleichenbacher dates back to 1998 and 20-year-old, vulnerabilities are being discovered even now. “Cisco, Huawei, Clavister, ZyXel have published fixes or workaround…” and “By repeating these attacks, all IKE implementations can be broken”, the paper has concluded.
To counter these aggressions, following suggestions has been proposed.
However, numerous practical constraints prevail as above workarounds have to be applied on all the devices.
Lavelle SD-WAN does not rely on IKE to generate keys but built-on a cutting-edge platform that offers invincible end-to-end security architecture. Lavelle SD-WAN solution is built ground-up considering several aspects of security with the following key factors that nurture sure-enough security.
What looks secure is not truly secure!! If a 20-year-old vulnerability is still present in your legacy VPN solutions, a good time to migrate to a revolutionary solution that not just protects but is Always ON – ScaleAOn