[2806] in cryptography@c2.net mail archive
Re: CISCO PIX Vulnerability
daemon@ATHENA.MIT.EDU (Rick Smith)
Thu Jun 11 09:47:30 1998
Date: Wed, 10 Jun 1998 13:02:11 -0500
To: Damir Rajnovic <Damir.Rajnovic@eurocert.net>, BUGTRAQ@NETSPACE.ORG,
Firewalls@lists.gnac.net, cryptography@c2.net
From: Rick Smith <rick_smith@securecomputing.com>
Cc: first-teams@first.org, firewall-wizards@nfr.net
In-Reply-To: <v03007801b19b0b9bd8f5@[194.82.141.242]>
>Another thing is that PIX is using DES in ECB mode. CISCO admits that
>"....ECB is not generally considered to be the best mode in which to
>employ DES,...." but you'll have to live with it. CISCO will not fix
>that so you'll have to buy future IPSEC/IKE products.
IMHO, the really, really nasty problem with ECB mode is that the data
stream is vulnerable to trivial substitution attacks. If the encrypted
traffic consists of administrative commands, it won't be that hard to
collect a modest but interesting dictionary of plaintext/ciphertext pairs.
Then the attacker can forge command strings without ever having to brute
force the key itself.
Rick.
smith@securecomputing.com
"Internet Cryptography" at bookstores or http:/www.visi.com/crypto/