[Openswan Users] FW: NISCC Vulnerability Advisory IPSEC - 004033
mcr at xelerance.com
mcr at xelerance.com
Mon May 9 19:58:28 CEST 2005
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Paul" == Paul Wouters <paul at xelerance.com> writes:
>>> Abstract: Three attacks that apply to certain configurations of
>>> IPsec have been identified. These configurations use
>>> Encapsulating Security Payload (ESP) in tunnel mode with
>>> confidentiality only, or with
Paul> All normal configurations should always be using both
Paul> confidentiality and authentication.
>>> integrity protection being provided by a higher layer
>>> protocol. Some configurations using AH to provide integrity
>>> protection are also vulnerable.
Paul> AH is not really used at all. In fact, we recommend people
Paul> still use ESP (and not AH or ESP NULL) even if they trust the
Paul> encryption in other layers (eg WEP or WPA), which they should
Paul> not.
"higher layer" implies "TCP" to me.
Paul> Perhaps Michael can give a more detailed answer,
No, neither NISCC nor CERT have replied to my emails.
Where is the full text of the advisory?
- --
] Michael Richardson Xelerance Corporation, Ottawa, ON | firewalls [
] mcr @ xelerance.com Now doing IPsec training, see |net architect[
] http://www.sandelman.ca/mcr/ www.xelerance.com/training/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQn/rD4qHRg3pndX9AQG1vAP+O4eInL//dxKeoy5eIQ9SGyA2t7IDrSRd
W5GMh4zESSiIOVyvq6xwqSVn7ZF6O6PyE4ytkZsOQIo+GXG0rYKmPN6tl+OEVqAm
wgO7D94G1EeXvaxz5dfYIj6jvxRMGaKorlS86WecZ1FYnzcyf13FEHVdR88c+TVM
3uXG+gvbGw8=
=EHFC
-----END PGP SIGNATURE-----
More information about the Users
mailing list