-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Some thoughts on the ISAKMP advisory. http://www.uniras.gov.uk/niscc/docs/br-20051114-01013.html?lang=en While reading over this my first thoughts are 'they wrote a fuzzer, it exposed some vulnerabilities, interesting but not too interesting'. I think this advisory is a tad overblown (headlined on slashdot as 'VPN flaw allows denial of service', yes I know its only slashdot!). There is no design flaw in ISAKMP that is being exposed here, merely an ISAKMP fault injection suite that exposed some implementation bugs (some of which may be exploitable, I have no idea). Some quotes from this advisory: <quote> The scope was further narrowed to IKE phase 1 with pre-shared secret authentication. Rationale behind this selection was: IKE phase 1 does not require any special preconditions as phase 2 does. Additionally, phase 1 aggressive mode allows sending several payloads in the first packet. IKE phase 1 authentication with pre-shared secret is required from all ISAKMP/IKE implementations. Potential IKE vulnerabilites in above scope can be roughly categorised based on the on the IKE identity and shared secret: A. Vulnerability does not require a valid identity nor a shared secret (greatest impact). B. Vulnerability requires a valid identity but not the shared secret. C. Vulnerability requires both a valid identity and the corresponding shared secret (smallest impact). </end quote> Test cases shown here: http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp/ indicate some vulnerabilities did not require a valid identity or shared secret, therefore mitigation mentioned in the advisory: "If possible, use packet filters and accept ISAKMP negotiations only from trusted IP-addresses" is irrelevant considering ISAKMP runs on top of UDP and spoofing an IP address is trivial. All in all i commend this team for writing this fuzzer and exposing some flaws in many ISAKMP implementations. Thanks for reading. -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkN6resACgkQ8+KJMsQVzCGQCwCgsdiojVpAC3Ja9FHJ92DdbjRYwSYA oKUGIfaVaCgs2mVHBizhukFPGtLa =xB6U -----END PGP SIGNATURE----- Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485