ā08-21-2013 07:20 PM
Hello All,
I am wondering if Aggressive Mode PSK hash attack can be applied to Main Mode negotiation while using wildacrd crypto IKE like:
crypto isakmp key xxxxx address 0.0.0.0 0.0.0.0?
I know that using ike-scan tool there is a possibility of obtaining hashed PSK from remote peer while using aggressive mode for IKE, so wondering if the same applies for wildcard PSK, but using Main Mode.
Thanks!
ā08-22-2013 02:49 AM
I'm not sure I get the question, but in MM the identity is prtected using SKEYID, which takes as a factor PSK.
You need to know the PSK to decode the identity, so it's not a matter of "simple hashing".
For pre-shared keys: SKEYID = prf(pre-shared-key, Ni_b | Nr_b)
http://www.ietf.org/rfc/rfc2409.txt
section 5.
ā08-22-2013 05:56 AM
Thanks Marcin,
My question is while using wildcard PSK for DMVPN peers over internet along with main mode, can this key be somehow compromised by remote party since anybody is able to send IKE requests to the HUB routers, because of a wildcard PSK use.
I know there is a vulnerability but only in aggressive mode ( I disbaled AM)- obtaining PSK hash and then crack it
ā08-22-2013 06:29 AM
To exchange Identities (i.e. perform authnetication) you would need to have already SKEYID calculated, which requires PSK, and DH exchange.
Thus you cannot properly protect MM5 or MM6, if you had wrong PSK. Those are the only moments AFAIR where PSK is being used in exchange.
The weakness of using one wildcard PSK is that once it's compromised entire domain is at risk.
I don't see any practical means of getting PSK from MM exchange.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide