{"id":6394,"date":"2018-09-05T03:40:29","date_gmt":"2018-09-05T03:40:29","guid":{"rendered":"https:\/\/lavellenetworks.com\/?p=6394"},"modified":"2021-04-07T07:36:30","modified_gmt":"2021-04-07T07:36:30","slug":"why-using-legacy-vpn-solutions-is-a-risk","status":"publish","type":"post","link":"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/","title":{"rendered":"Is this 20-year-old vulnerability present in your legacy VPN solutions?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h3><strong>Traditional IPSec VPN Security<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Last Month, academic researchers have published a paper on <strong><a href=\"https:\/\/www.ei.rub.de\/media\/nds\/veroeffentlichungen\/2018\/08\/13\/sec18-felsch.pdf\">\u201cThe Danger of Key Reuse: Practical Attacks on IPSec IKE\u201d<\/a>.\u00a0<\/strong>IPsec has emerged as the most commonly used IP level VPN to provide confidentiality, integrity, peer authentication, replay protection, and access control. IPSec keys can be configured statically or dynamically generated using IKE protocol.<\/p>\n<p>&nbsp;<\/p>\n<p>Internet Key Exchange (IKE) is used to negotiate, create, and manage keys for IPSec. IKE exists in two versions (IKEv1 and IKEv2) each with different modes and supports following authentication methods.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>Signature-based Authentication (IKEv1 and IKEv2)<\/li>\n<li>Public Key Encryption (PKE) based Authentication (IKEv1)<\/li>\n<li>Revised Public Key Encryption (RPKE) based Authentication (IKEv1)<\/li>\n<li>Pre-shared key (PSK) based Authentication (IKEv1 and IKEv2)<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>IKE consists of two phases.<\/p>\n<p>&nbsp;<\/p>\n<p>Phase-1: To authenticate the peer and derive keys for IKE<\/p>\n<p>Phase-2: To acquire keys for IPSec<\/p>\n<p>&nbsp;<\/p>\n<p><a class=\"dt-pswp-item\" href=\"https:\/\/lavellenetworks.com\/virtual-private-network-vpn-with-sd-wan\/\" data-dt-img-description=\"\" data-large_image_width=\"900\" data-large_image_height=\"480\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-6197\" src=\"https:\/\/lavellenetworks.com\/wp-content\/uploads\/2018\/08\/VPN-with-SD-WAN-1.png\" alt=\"\" width=\"900\" height=\"480\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>In this research, authors have shown possible strikes on IKE Phase-1 based on Blechenbacher Oracle that exploits RSA encryption with PKCS#1 v1.5 padding. The RSA algorithm needs padding and PKCS #1 v1.5 is a widely used padding mode. There are more secure padding modes for RSA (PSS\/OAEP), but they never gained widespread adoption.<\/p>\n<p>&nbsp;<\/p>\n<p>Bleichenbacher\u2019s oracle discovered fragilities in the implementation of the two RSA encryption based authentication in IKEv1 and signature-based authentication in IKEv1 and IKEv2. PSK based authentication also failed to stop dictionary based invasion if low entropy PSK is used.<\/p>\n<p>&nbsp;<\/p>\n<p>Though Bleichenbacher dates back to 1998 and 20-year-old, vulnerabilities are being discovered even now. \u201cCisco, Huawei, Clavister, ZyXel have published fixes or workaround\u2026\u201d and \u201cBy repeating these attacks, all IKE implementations can be broken\u201d, the paper has concluded.<\/p>\n<p>&nbsp;<\/p>\n<p>To counter these aggressions, following suggestions has been proposed.<\/p>\n<ol>\n<li>Key Separation \u2013 Not only the sender but every receiver must also be informed about this key separation.<\/li>\n<li>PKE, RPKE authentication modes must be deactivated in ALL devices<\/li>\n<li>Use High-entropy PSK<\/li>\n<\/ol>\n<p>However, numerous practical constraints prevail as above workarounds have to be applied on all the devices.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Lavelle SD-WAN <\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Lavelle <a href=\"https:\/\/lavellenetworks.com\/sd-wan-platform\/\"><strong>SD-WAN<\/strong><\/a> does not rely on IKE to generate keys but built-on a cutting-edge platform that offers invincible end-to-end security architecture. Lavelle SD-WAN solution is built ground-up considering several aspects of security with the following key factors that nurture sure-enough security.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Multi-layered Security Architecture<\/li>\n<li>Multiple levels of identification and authentication<\/li>\n<li>Mutual authentication with distinct identifiers and device fingerprints to defend the man in the middle<\/li>\n<li>Separate keys and certificates to different nodes and functions to assure key separation and bar key-reuse based intrusions<\/li>\n<li>Certificate pinning to distinguish MITM<\/li>\n<li>Multi-level encryption to secure data in transit and at rest<\/li>\n<li>Robust algorithms to sign, authenticate, conceal and integrity protect<\/li>\n<li>Strict version checks and policy enforcement<\/li>\n<li>Strong validation against configuration<\/li>\n<li>Continuous Authentication, Risk Assessment, and Frequent Key Refresh<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a class=\"dt-pswp-item\" href=\"https:\/\/lavellenetworks.com\/blog\/building-private-network-for-enterprises-using-scaleaon\/\" data-dt-img-description=\"\" data-large_image_width=\"683\" data-large_image_height=\"384\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-6395\" src=\"https:\/\/lavellenetworks.com\/wp-content\/uploads\/2018\/09\/scaleaon.png\" alt=\"\" width=\"683\" height=\"384\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>What looks secure is not truly secure!! If a 20-year-old vulnerability is still present in your legacy VPN solutions, a good time to migrate to a revolutionary solution that not just protects but is Always ON &#8211; ScaleAOn<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Traditional IPSec VPN Security &nbsp; Last Month, academic researchers have published a paper on \u201cThe Danger of Key Reuse: Practical Attacks on IPSec IKE\u201d.\u00a0IPsec has emerged as the most commonly used IP level VPN to provide confidentiality, integrity, peer authentication, replay protection, and access control. IPSec keys can be<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":6,"featured_media":20409,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[47],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is this 20-year-old vulnerability present in your legacy VPN solutions?<\/title>\n<meta name=\"description\" content=\"If a 20-year-old vulnerability is still present in your legacy VPN solutions, it is a good time to migrate to a revolutionary solution\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is this 20-year-old vulnerability present in your legacy VPN solutions?\" \/>\n<meta property=\"og:description\" content=\"If a 20-year-old vulnerability is still present in your legacy VPN solutions, it is a good time to migrate to a revolutionary solution\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Lavellenetworks\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-05T03:40:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T07:36:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2018\/09\/VPN-with-SD-WAN-900x450-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shyamaltw\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"3 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Lavellenetworks\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lavellenetworks.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2018\/09\/VPN-with-SD-WAN-900x450-1.png\",\"width\":900,\"height\":450},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/#webpage\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\",\"name\":\"Is this 20-year-old vulnerability present in your legacy VPN solutions?\",\"isPartOf\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/#primaryimage\"},\"datePublished\":\"2018-09-05T03:40:29+00:00\",\"dateModified\":\"2021-04-07T07:36:30+00:00\",\"author\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/a5af704b05b0f16ac3f3ef4ec378b968\"},\"description\":\"If a 20-year-old vulnerability is still present in your legacy VPN solutions, it is a good time to migrate to a revolutionary solution\",\"breadcrumb\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Blog\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/why-using-legacy-vpn-solutions-is-a-risk\/\",\"name\":\"Is this 20-year-old vulnerability present in your legacy VPN solutions?\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/a5af704b05b0f16ac3f3ef4ec378b968\",\"name\":\"Shyamal Kumar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2018\/05\/Shyamal-1-150x150.jpg\",\"caption\":\"Shyamal Kumar\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shyamalk\/\",\"https:\/\/twitter.com\/shyamaltw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6394"}],"collection":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=6394"}],"version-history":[{"count":2,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6394\/revisions"}],"predecessor-version":[{"id":20411,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/6394\/revisions\/20411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media\/20409"}],"wp:attachment":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=6394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=6394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=6394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}