60 likes | 186 Vues
This document outlines significant changes to the GDOI framework, focusing on the GCKS authorization issues identified since the Montreal IETF. It discusses potential attacks that can occur when rogue devices impersonate key servers and describes conditions under which these attacks may happen. The document emphasizes the importance of proper GCKS authorization checks, including the validation of IKEv1 credentials and identity verification through CERT payloads. Mitigation strategies are recommended for GDOI group members and key servers to enhance security against these vulnerabilities.
E N D
GDOI Changes to Update Draft draft-ietf-msec-gdoi-update-01 Sheela Rowles Brian Weis
Changes since Montreal IETF • Address GDOI Attack
GCKS Authorization • Mitigation of attack by Meadows & Pavlovic if GCKS performs authorization based on IKEv1 credentials. • A rogue device can perpetrate a man-in-the-middle attack if the following conditions are true: • The rogue GDOI participant convinces an authorized member of the group (i.e., victim group member) that it is a key server for that group. • The victim group member, victim GCKS, and rogue group member all share IKEv1 authentication credentials. • The victim GCKS does not properly verify that the IKEv1 authentication credentials used to protect a GROUPKEY-PULL protocol are authorized to join the group.
GCKS Authorization (cont.) Attack Mitigations: • A GDOI group member SHOULD be configured with policy describing which IKEv1 identities are authorized to act as GCKS for a group. • A GDOI key server SHOULD perform one of the following authorization checks. • No CERT/POP: the GCKS SHOULD maintain a list of authorized group members for each group, where the group member identity is its IKEv1 authentication credentials. • Yes CERT/POP: the GCKS SHOULD verify that the identity in the CERT payload refers to the same identity in the IKEv1 authentication credentials.
POP Definition • Point of POP is to prove that the Phase 1 Key Identity is the same as the owner of the key distributed in the CERT.
POP Change Original RFC: POP_HASH = hash(“pop”| Ni | Nr) Intended since Montreal IETF: POP_HASH = hash(“pop” | SKEYID_A | Ni | Nr) Finally: POP_HASH = hash(“pop” | IKE-INIT-PH1-ID | IKE-RESP-PH1-ID | Ni | Nr)