Internet Key Exchange
In computing, Internet Key Exchange is the protocol used to set up a security association in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication ‒ either pre-shared or distributed using DNS ‒ and a Diffie–Hellman key exchange to set up a shared session secret from which cryptographic keys are derived. In addition, a security policy for every peer which will connect must be manually maintained.
History
The Internet Engineering Task Force originally defined IKE in November 1998 in a series of publications known as RFC 2407, RFC 2408 and RFC 2409:- RFC 2407 defined the Internet IP Security Domain of Interpretation for ISAKMP.
- RFC 2408 defined the Internet Security Association and Key Management Protocol.
- RFC 2409 defined the Internet Key Exchange.
The parent organization of the IETF, The Internet Society, has maintained the copyrights of these standards as freely available to the Internet community.
Architecture
Most IPsec implementations consist of an IKE daemon that runs in user space and an IPsec stack in the kernel that processes the actual IP packets.User-space daemons have easy access to mass storage containing configuration information, such as the IPsec endpoint addresses, keys and certificates, as required. Kernel modules, on the other hand, can process packets efficiently and with minimum overhead—which is important for performance reasons.
The IKE protocol uses UDP packets, usually on port 500, and generally requires 4–6 packets with 2–3 round trips to create an SA on both sides. The negotiated key material is then given to the IPsec stack. For instance, this could be an AES key, information identifying the IP endpoints and ports that are to be protected, as well as what type of IPsec tunnel has been created. The IPsec stack, in turn, intercepts the relevant IP packets if and where appropriate and performs encryption/decryption as required. Implementations vary on how the interception of the packets is done—for example, some use virtual devices, others take a slice out of the firewall, etc.
IKEv1 consists of two phases: phase 1 and phase 2.
IKEv1 phases
IKE phase one's purpose is to establish a secure authenticated communication channel by using the Diffie–Hellman key exchange algorithm to generate a shared secret key to encrypt further IKE communications. This negotiation results in one single bi-directional ISAKMP Security Association. The authentication can be performed using either pre-shared key, signatures, or public key encryption. Phase 1 operates in either Main Mode or Aggressive Mode. Main Mode protects the identity of the peers and the hash of the shared key by encrypting them; Aggressive Mode does not.During IKE phase two, the IKE peers use the secure channel established in Phase 1 to negotiate Security Associations on behalf of other services like IPsec. The negotiation results in a minimum of two unidirectional security associations. Phase 2 operates only in Quick Mode.
Problems with IKE
Originally, IKE had numerous configuration options but lacked a general facility for automatic negotiation of a well-known default case that is universally implemented. Consequently, both sides of an IKE had to exactly agree on the type of security association they wanted to create – option by option – or a connection could not be established. Further complications arose from the fact that in many implementations the debug output was difficult to interpret, if there was any facility to produce diagnostic output at all.The IKE specifications were open to a significant degree of interpretation, bordering on design faults, giving rise to different IKE implementations not being able to create an agreed-upon security association at all for many combinations of options, however correctly configured they might appear at either end.
Improvements with IKEv2
The IKEv2 protocol was described in Appendix A of RFC 4306 in 2005. The following issues were addressed:- Fewer Request For Comments : The specifications for IKE were covered in at least three RFCs, more if one takes into account NAT traversal and other extensions that are in common use. IKEv2 combines these in one RFC as well as making improvements to support for NAT traversal and firewall traversal in general.
- Standard Mobility support: There is a standard extension for IKEv2 named used to support mobility and multihoming for it and Encapsulating Security Payload. By use of this extension IKEv2 and IPsec can be used by mobile and multihomed users.
- NAT traversal: The encapsulation of IKE and ESP in User Datagram Protocol enables these protocols to pass through a device or firewall performing NAT.
- Stream Control Transmission Protocol support: IKEv2 allows for the SCTP protocol as used in Internet telephony protocol, Voice over IP.
- Simple message exchange: IKEv2 has one four-message initial exchange mechanism where IKE provided eight distinctly different initial exchange mechanisms, each one of which had slight advantages and disadvantages.
- Fewer cryptographic mechanisms: IKEv2 uses cryptographic mechanisms to protect its packets that are very similar to what IPsec ESP uses to protect the IPsec packets. This led to simpler implementations and certifications for Common Criteria and FIPS 140-2, which require each cryptographic implementation to be separately validated.
- Reliability and State management: IKEv2 uses sequence numbers and acknowledgments to provide reliability and mandates some error processing logistics and shared state management. IKE could end up in a dead state due to the lack of such reliability measures, where both parties were expecting the other to initiate an action - which never eventuated. Work arounds were developed but not standardized. This meant that different implementations of work-arounds were not always compatible.
- Denial of Service attack resilience: IKEv2 does not perform much processing until it determines if the requester actually exists. This addressed some of the DoS problems suffered by IKE which would perform a lot of expensive cryptographic processing from spoofed locations.
HostA -------------------------------------------------- HostB
|HDR,sai1,kei,Ni--------------------------> |
| <----------------------------HDR,N|
|HDR,N,sai1,kei,Ni----------------> |
| <--------------------------HDR,SAr1,ker,Nr|
Protocol extensions
The IETF ipsecme working group has standardized a number of extensions, with the goalof modernizing the IKEv2 protocol and adapting it better to high volume,
production environments. These extensions include:
- IKE session resumption: the ability to resume a failed IKE/IPsec "session" after a failure, without the need to go through the entire IKE setup process.
- IKE redirect: redirection of incoming IKE requests, allowing for simple load-balancing between multiple IKE endpoints.
- IPsec traffic visibility: special tagging of ESP packets that are authenticated but not encrypted, with the goal of making it easier for middleboxes to analyze the flow.
- Mutual EAP authentication: support for EAP-only authentication of both of the IKE peers; the goal is to allow for modern password-based authentication methods to be used.
- Quick crash detection: minimizing the time until an IKE peer detects that its opposite peer has crashed.
- High availability extensions: improving IKE/IPsec-level protocol synchronization between a cluster of IPsec endpoints and a peer, to reduce the probability of dropped connections after a failover event.
Implementations
Microsoft Windows 7 and Windows Server 2008 R2 partially support IKEv2 as well as MOBIKE through the VPN Reconnect feature.
There are several open source implementations of IPsec with associated IKE capabilities. On Linux, Libreswan, Openswan and strongSwan implementations provide an IKE daemon which can configure to the KLIPS or XFRM/NETKEY kernel-based IPsec stacks. XFRM/NETKEY is the Linux native IPsec implementation available as of version 2.6.
The Berkeley Software Distributions also have an IPsec implementation and IKE daemon, and most importantly a cryptographic framework, which makes supporting cryptographic accelerators much easier. OCF has recently been ported to Linux.
A significant number of network equipment vendors have created their own IKE daemons, or license a stack from one another.
There are a number of implementations of IKEv2 and some of the companies dealing in IPsec certification and interoperability testing are starting to hold workshops for testing as well as updated certification requirements to deal with IKEv2 testing. held its latest IKEv2 Interoperability Workshop in Orlando, FL in March 2007 with 13 vendors from around the world.
The following open source implementations of IKEv2 are currently available:
- ,
- strongSwan,
- Libreswan,
- Openswan,
- ,
- Racoon and from the KAME project,
- from the OpenBSD project.,
-
Vulnerabilities
IPSec VPN configurations which allow for negotiation of multiple configurations are subject to MITM-based downgrade attacks between the offered configurations, with both IKEv1 and IKEv2. This can be avoided by careful segregation of client systems onto multiple service access points with stricter configurations.
Both versions of the IKE standard are susceptible for an offline dictionary attack when a low entropy password is used. For the IKEv1 this is true for main mode and aggressive mode.