
oss-sec mailing list archives
Re: CVE Request: IKEv1 protocol is vulnerable to DoS amplification attack
From: "Seaman, Chad" <cseaman () akamai com>
Date: Thu, 7 Jul 2016 16:27:08 +0000
Hi All, I’m Chad Seaman @ Akamai, the researcher who found, researched, and wrote the paper on the IKEv1 and IKEv2 flaws that could lead to amplification attacks. The opening e-mail states that IKEv2 is not believed to be affected, I can confirm that in some cases some implementations are indeed affected. There was some doubts about IKEv2 being affected and I was contacted by a Cisco engineer as well as one of the RFC authors, we constructed multiple IKEv2 probe payloads and did a series of secondary scans that specifically targeted IKEv2 hosts to confirm these results. Where hosts should respond once based on IKEv2 RFC specs, hundreds of thousands reply multiple times, roughly 110,000 reply 21 times or more per single probe, some of the worst offenders responded thousands of times. Regards, Chad
On Jun 14, 2016, at 10:34 AM, Paul Wouters <pwouters () redhat com> wrote: On 06/13/2016 10:40 AM, cve-assign () mitre org wrote:Its not libreswan which is flawed, but its the protocol which they are trying to implement.which implement IKEv1 are flawed, since they follow this protocolMany protocols could be described as "flawed." The IKEv1 protocol amplification concern does not make it flawed in a way that would lead to a per-protocol CVE ID assignment.Then you should pull the CVE-2016-5361 which deals with retransmission amplification in IKEv1 We are maintaining theCVE-2016-5361 ID assignment for the upstream announcement of "libreswan 3.16 vulnerable to DDOS attack. Please upgrade to 3.17"That statement on the libreswan website is clearly referring to CVE-2016-3071 not CVE-2016-5361. andaccompanying upstream patch, as described in the http://www.openwall.com/lists/oss-security/2016/06/10/4 post.Which again clearly refers to CVE-2016-5361 and not CVE-2016-3071 So again, please fix CVE-2016-5361 or drop it. Paul
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
Current thread:
- Re: CVE Request: IKEv1 protocol is vulnerable to DoS amplification attack Seaman, Chad (Jul 07)
- Re: CVE Request: IKEv1 protocol is vulnerable to DoS amplification attack Paul Wouters (Jul 08)
- <Possible follow-ups>
- Re: Re: CVE Request: IKEv1 protocol is vulnerable to DoS amplification attack Paul Wouters (Jul 12)