Hello

We've discovered a very weird behavior in OpenBSD IPsec.

We run isakmpd -K and use ipsecctl with ipsec.conf to set up our IPsec
tunnels. When our peer adds a new network to an existing configuration on
his router, our OpenBSD box accepts the network without our intervention,
SAs and flows are created and started automatically.

I've tested this with fresh installations of OpenBSD 6.4 amd64. The test
VMs are called obsd1 and obsd2. They are directly connected to each other
on network 172.16.50.0/24.

After basic installation, I configured IP addresses, ipsec.conf and I
started isakmpd like this:

obsd1# ifconfig em0 | grep inet
        inet 172.16.50.51 netmask 0xffffffe0 broadcast 172.16.50.63
obsd1# ifconfig lo0 | grep "inet "
        inet 127.0.0.1 netmask 0xff000000
        inet 192.168.10.1 netmask 0xffffff00
        inet 192.168.100.1 netmask 0xffffff00
obsd1# isakmpd -Kv -f /var/run/isakmpd.fifo
obsd1# cat /etc/ipsec.conf
ike esp from { 192.168.10.0/24 } \
        to   { 192.168.20.0/24 } \
        local 172.16.50.51 peer 172.16.50.48 \
        psk "secret_pass"
obsd1# ipsecctl -f /etc/ipsec.conf




obsd2# ifconfig em0 | grep inet
        inet 172.16.50.48 netmask 0xffffffe0 broadcast 172.16.50.63
obsd2# ifconfig lo0 | grep "inet "
        inet 127.0.0.1 netmask 0xff000000
        inet 192.168.20.1 netmask 0xffffff00
obsd2# isakmpd -Kv -f /var/run/isakmpd.fifo
obsd2# cat /etc/ipsec.conf



ike esp from { 192.168.20.0/24 } \
        to   { 192.168.10.0/24 } \
        local 172.16.50.48 peer 172.16.50.51 \
        psk "secret_pass"
obsd2# ipsecctl -f /etc/ipsec.conf



The above works as expected. I can do:

obsd2# ping -I 192.168.20.1 -c 1 192.168.10.1
PING 192.168.10.1 (192.168.10.1): 56 data bytes
64 bytes from 192.168.10.1: icmp_seq=0 ttl=255 time=1.102 ms

--- 192.168.10.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.102/1.102/1.102/0.000 ms



Now to the point. I modified obsd1 (and I've NOT modified obsd2). I added
the network 192.168.100.0/24 to ipsec.conf:

obsd1# cat /etc/ipsec.conf
ike esp from { 192.168.10.0/24 192.168.100.0/24 } \
        to   { 192.168.20.0/24 } \
        local 172.16.50.51 peer 172.16.50.48 \
        psk "secret_pass"
obsd1# ipsecctl -f /etc/ipsec.conf


And it works (as not expected by me):

obsd2# ipsecctl -sf
flow esp in from 192.168.10.0/24 to 192.168.20.0/24 peer 172.16.50.51 srcid
172.16.50.48/32 dstid 172.16.50.51/32 type use
flow esp in from 192.168.100.0/24 to 192.168.20.0/24 peer 172.16.50.51
srcid 172.16.50.48/32 dstid 172.16.50.51/32 type use
flow esp out from 192.168.20.0/24 to 192.168.10.0/24 peer 172.16.50.51
srcid 172.16.50.48/32 dstid 172.16.50.51/32 type require
flow esp out from 192.168.20.0/24 to 192.168.100.0/24 peer 172.16.50.51
srcid 172.16.50.48/32 dstid 172.16.50.51/32 type require
obsd2# ping -I 192.168.20.1 -c 1 192.168.100.1
PING 192.168.100.1 (192.168.100.1): 56 data bytes
64 bytes from 192.168.100.1: icmp_seq=0 ttl=255 time=1.013 ms

--- 192.168.100.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.013/1.013/1.013/0.000 ms


We do protect our network with firewalls so our peers cannot use this to
introduce new networks, but a different thing happened today.

We'd already had the network 192.168.100.32/27 in our ipsec.conf with peer
A and the tunnel to peer A was up and running.

Peer B added the network 192.168.100.0/24 to IPsec configuration on their
side and SAs and flows were automatically created for the new network on
our router. This would be a bigger issue if it happened the opposite way
(peer B using a larger netmask).

Our PF configuration doesn't help to mitigate the problem as it doesn't
know from/to which peer does the traffic on enc0 flow.

The problem showed itself up on OpenBSD 5.5. The demo described above was
done on OpenBSD 6.4, as I've already mentioned.

Does anybody see any misconfiguration or misunderstanding on our side? Or
is this a bug (IMHO a security bug) in OpenBSD IPsec implementation?

Reply via email to