Title: ISAKMP IKE
1Lecture 14
- ISAKMP / IKE
- Internet Security Association and Key Management
Protocol / Internet Key Exchange - CIS 4362 - CIS 5357
- Network Security
2ISAKMP
- Policy Negotiation
- ISAKMP Protocols are constructed by chaining
together ISAKMP payloads to an ISAKMP header - Two Phases
- Establish a key-exchange SA
- Negotiate security services
3ISAKMP Exchange Types
- Basic 1
- Authentication
- Key Exchange
- Saturation protection
- Identity Protection 2 (Main mode IKE)
- Authentication
- Key Exchange
- Protects users identities
- Authentication Only 3
- Authentication
- Aggressive 4 (Aggressive Mode IKE)
- Authentication
- Key exchange
- No saturation protection
- Informational 5
- Information only
4ISAKMP Data Exchange Phases
- Establish a secure channel
- Use the secure channel to exchange information
for a protocol (such as IPSEC)
5ISAKMP Payload Types
- Certificate request
- Hash
- Signature
- Nonce
- Notification
- Delete SA
- Initiate SA
- Protocol cipher Proposal
- Transform ltSA attributegt
- Key Exchange
- Identification
- Certificate
6ISAKMP Fixed Header Format
- Initiator Cookie (64 bits)
- Responder Cookie (64 bits) (null in message from
the originator - Next Payload (8 bits)
- Major ISAKMP Version (4 bits)
- Minor ISAKMP Version (4 bits)
- Exchange Type (8 bits)
- Flags (8 bits)
- Message ID (32 bits)
- Message length (32 bits)
7Example ISAKMP Header Payload
ISAKMP Header
Key Exchange Payload
Nonce Payload
8IKE Phases
- In a design similar to Kerberos, IKE performs a
phase 1 mutual authentication based on public
keys and phase 2 re-authentication based on
shared secrets (from phase 1). - This allows multiple SAs to re-use the same
handshake. - Phase 1 has two modes
- Aggressive mode (3 messages)
- Main mode (6 messages)
9IKE Phase 1 Aggressive Mode
Alice
Bob
In aggressive mode, Alice chooses some Elgamal
context (p, g). Bob may not support it, and
reject the connection. If that happens, Alice
should try and connect to Bob using main
mode. Aggressive mode provides mutual
authentication, and a shared secretgab mod p,
which can be used to derive keys for the
symmetric crypto protocols.
10IKE Phase 1 Main Mode
Alice
Bob
K gab mod p
11Reasoning about IKE
- The SIGn-and-MAc (SIGMA) family of key exchange
protocols. - Introduced by Krawczyk to the IPsec working group
(1995), replaced Photuris. - Several interesting properties, tried to plug
certain holes in existing Key Exchange Protocols.
12Security Goals of SIGMA
- Mutual Authentication
- Key-binding Consistency
- If honest A establishes a key K, believing that B
is the other session peer, and B establishes the
same key K, it should believe that A is the peer
in this exchange - Secrecy (of the computed key)
- Optional
- Identity Protection, providing anonymity against
eavesdroppers for the two parties in a
communication
13Example of a BADH protocol(Basic Authenticated
DH)
Alice
Bob
K derived from gxy
The inclusion of both exponentials in each
signature prevents replay attacks, but does not
provide for key binding consistency.
14Key Binding Inconsistency
Alice
Bob
E
Outcome Alice thinks she shares key K with Bob,
while Bob thinks that he shares the same K with
Eve. Eve does not know the key, so this does not
violate authentication and/or secrecy.
15STS Protocol
Alice
Bob
K derived from gxy
- Intuitively this solves the consistency problem,
but no proof exists. - What if Eve registers Alices public key on her
name? - Even if Eve does not know Alices secret key, she
may be able to perform replay attacks to violate
consistency of key binding
16ISO Key Exchange
Alice
Bob
- Does not provide identity protection.
- Could be fixed by having Alice send an alias
- A h(A, r), which is revealed later, and have
the other - messages be encrypted under the DH key.
17Sigma Protocol (Basic)
Alice
Bob
Output from DH-value gxy encryption key Ke, mac
key Km
18SIGMA-I
Alice
Bob
Identity of the sender is protected against both
passive and active attacks. The identity of the
receiver is protected against passive attacks.
19Phase 1 Main mode, (shared secret
authentication)
Alice
Bob
Pre-shared secret J
K f(J, gab mod p, nA, nB, cA, cB)
20IKE Phase 2quick mode
Alice
Bob
- X, Y are session-identifiers for this flow
- X contains the cookies of the corresponding phase
1, - Y is 32-bit to identify this particular
connection. - Optionally some tags may be included to identify
- the type of traffic to be sent.