typo (see below)
 
From: Valery Smyslov <smyslov.i...@gmail.com> 
Sent: Wednesday, May 21, 2025 10:51 AM
To: 'Christopher Patton' <cpat...@cloudflare.com>
Cc: ipsec@ietf.org
Subject: RE: [IPsec] Binding properties of draft-ietf-ipsecme-ikev2-mlkem-00
 
Hi Chris,
 
[snipped]
 
It seems to me that both of these prerequisites are realistic:
 
1. When deploying a new protocol feature like this, in my experience there is 
usually a period of time where graceful fallback is an operational requirement. 
In particular, an ECDH+ML-KEM initiator may still need to talk to ECDH-only 
responders or vice versa.
 
2. If a responder having multiple users is a realistic deployment scenario, 
then I think one user impersonating another to the responder would be a 
realistic threat?
 
I agree that mandatory-ML-KEM would probably work, but I'm worried it might not 
be realistic, given 1., until the ecosystem has transitioned to ECDH+ML-KEM. We 
have some time, since the attack is not actually exploitable until "Q-day" 
(i.e., if/when a large enough quantum computer is built that can break ECDH). 
But we can't wait forever. it would be useful if there were other levers we 
could pull. Any ideas?
 
       While I agree that these prerequisites are not unrealistic, I think that 
by Q-day (the day we believe the CRQC exists) all hosts must be 
       already switched to the mode when PQ algorithms are mandatory, with no 
exception for “old” systems. And before this day the attack is impossible.
 
Do you think the working group would be open to a breaking change for the draft 
that mitigates this attack? In any case, I think it ought to be spelled out in 
security considerations.
 
       For the particular attack you described no breaking changes to the 
protocol are needed to defend. I can propose the following modification.
       What the attacker does in this attack – modifies initiator’s IKE_SA_INIT 
making it looking like initiator does not propose any PQ KE methods at all.
       Note, that an attacker does not have access to responder’s long-term 
authentication key and we can exploit this to detect this modification.
 
       My idea is that responder can hash the received IKE_SA_INIT message 
(actually, do a negotiated prf with some fixed or known key, since
       hash is not negotiated in IKEv2) and include the result into the 
response IKE_SA_INIT using some new status notification.
       Responder’s IKE_SA_INIT message is directly included into the data the 
responder authenticates, thus the attacker cannot change it unless
       responder’s private key is compromised or the attacker can break the 
authentication algorithm.
 
       When the initiator receives the IKE_SA_INIT response, it can check 
whether the content of this notification matches the IKE_SA_INIT message it 
sent.
       If not – the attack is detected. Initiator that does not support this 
extension will just ignore the unknown notification.
 
       Note that this does not protect against situation when responder’s 
long-term key is compromised and initiator’s one is not. 
       But in this case if the responder selects the hybrid key exchange and 
the attacker then modifies its selection as if only ECDH is selected, then the 
protocol will stuck – 
       the responder will expect IKE_INTERMEDIATE as next exchange and won’t 
accept IKE_AUTH that the attacker will initiate.
                                                                                
                                                                                
    ^^^^^^^^^^^^^^ the initiator
 
       I’m not sure if the attacker can fix this situation (it seems to me the 
answer is no, because even if it in between actively modifying
       all IKE messages, eventually it will have to authenticate all these 
messages on behalf on initiator, which seems
       infeasible, since we assume that initiator’s key is not compromised).
 
       And if both peers’ long-term keys are compromised and the attacker can 
break ECDH, then no defense is possible.
 
       Your opinion, will this defense work?
 
       Regards,
       Valery.
 
Chris P.
 
 
 
 
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to