Questions tagged [ipsec]

For questions about the cryptographic protocols which form the basis of IPsec, which is one of the common security schemes used on the throughout. For general questions about IPsec, consider if your question fits our sister sites Super User and/or Security Stack Exchange better.

45 questions
10
votes
1 answer

What is the "shared secret" used for in IPSec VPN?

Can somebody explain what the "shared secret" and "password" do when opening/creating a VPN tunnel? In this specific case I setup a VPN to my Fritz!Box and I had to provide a shared secret (which was pregenerated and very long) and a password. I'd…
Krumelur
  • 1,205
  • 2
  • 11
  • 8
8
votes
1 answer

Detection of weak keys for AES-GCM

There are many papers out there that show that a message authenticated and encrypted by AES-GCM can be forged if the used key is weak (e.g. by Handschuh and Preneel, Saarinen or Procter and Cid). With weak keys I refer to the definition given by…
budderick
  • 435
  • 3
  • 11
5
votes
1 answer

Is IPsec IND-CCA secure provided the used block cipher is a pseudorandom function?

I am trying to solve the question whether "IPsec is IND-CCA secure provided the used block cipher is a pseudorandom function" (with IPsec using a variant of Encrypt-then-MAC) As a resource I am given the paper Mihir Bellare & Chanathip Namprempre…
4
votes
1 answer

What are the problems of IKEv1 aggressive mode (compared to IKEv1 main mode or IKEv2)?

I would like to seek confirmation/clarification of the following statements about IKE: IKEv1 aggressive mode is supposed to be “insecure” if used with PSK. But as far as I can see, correct (or more correct) would be the following IKEv1 aggressive…
4
votes
1 answer

Does IKEv2 protocol have two modes like IKE

IKE Protocol have 2 modes, that modes have different structure. Does IKEv2 protocol have two modes like IKE.
Gev_sedrakyan
  • 125
  • 1
  • 1
  • 5
3
votes
1 answer

Why can't AES-GCM be used in IKEv1 phase 1?

I was configuring a VPN on a firewall (fortigate) and realized that I could use AES-GCM for encryption in the IKEv1 phase 2 but not in the phase 1 and I was wondering why knowing that in IKEv2 we could use it in both phases. I have already checked…
user1990088
  • 175
  • 12
3
votes
1 answer

Why is "Next Header" field part of ESP trailer instead of ESP header?

Are there any reasons to place the "Next Header" field in ESP trailer instead of ESP header?
Elena Gurevich
  • 197
  • 1
  • 9
3
votes
1 answer

IPSec vs SSL : Similarities and Differences

I am studying SSL and IPSec. I can pretty much nail down the "very high level" differences and similarities between the two, but am struggling to find a "lower level" (but not too deep) look. This may seem like a dumb question, but do SSL and IPSec…
3
votes
1 answer

Can authenticated encryption reduce bandwidth overhead of per-packet encryption?

I know that authenticated encryption modes of operation like GCM offer certain security advantages, as well as increased performance. (On my laptop with AES-NI, the benchmark performance of AES-128-GCM is about 3.7× faster than…
2
votes
1 answer

ipsec, esp: Which key is used to generate the HMAC

Short Question: Are the keys for the ICV calculation and the encryption the same in IPSEC/ESP? Or do there exist two keys in the SA? Long Question: Before a new IPSEC-ESP connection is established, IKEv2 is used to start a new session. This involves…
byteunit
  • 123
  • 4
2
votes
1 answer

IPsec : transmission of Initialization Vector

I am currently carrying scholar research about IPsec protocol, and I have a question regarding the IP Encapsulating Security Payload (ESP). Is the initialization vector of operation mode transmitted in clear in the message ESP Payload ? If it is…
Cedric
  • 63
  • 5
2
votes
2 answers

Bellovin ESP Attack on UDP Packets

In Bellovin's ESP Attack, it is stated that: If $L_A$, $L_B$ are using UDP, attack is easier: Wait till session ends Allocate $L_B$'s UDP port to $X_B$ Replay all packets So, how does attacker know the UDP port of legitimate user $L$? Isn't it…
aselimkaya
  • 125
  • 1
  • 7
2
votes
1 answer

where does the prime number taken in DH algorithm in IPSEC

I am studying & configuring IPSEC ikev1 and in between i am analysing the wireshark captures. I am using the linux kernel for TCP/IP stack and user-space i took ipsec-tools. In the first two packet exchanges initiator is offering the proposals &…
Kumar2080
  • 21
  • 3
2
votes
0 answers

What are the well known protocols that offer perfect forward secrecy?

As far as I know these are the well known protocols that offer PFS TLS/SSL (with DHE-RSA, DHE-DSS, ECDHE-RSA or ECDHE-ECDSA) SSH (RFC4253) OTR (Protocol Version 3 Spec) IPsec (with IKEv1 and IKEv2) (RFC 2412) Are there any other well known…
2
votes
1 answer

Bellovin 96' attack on IPsec ESP protocol on encryption only option

Can you explain the actual attack? Why does the attacker need to firstly send some arbitrary UDP packet? How can the attacker break the privacy between A and B? Link: The article of Bellovin I'm attaching the slide for a reminder:
Bush
  • 2,160
  • 3
  • 18
  • 27
1
2 3