Ok, the attack with this procedure could work, however from Y point of view it 
is talking with A instead of X, so if there are additional actions on Y tied to 
peer’s ID, for example if Y install some firewall/ACL rules based on IDi, and 
only X is allowed to access some backend service via the installed firewall/ACL 
rule, this attack won’t get around that.

And beside configure properly, another mitigation against this attack without 
introducing new protocol changes is just Y mandate use of PPK (RFC8784).


From: Christopher Patton <cpat...@cloudflare.com>
Sent: Wednesday, July 30, 2025 11:11 AM
To: Jun Hu (Nokia) <jun...@nokia.com>
Cc: Michael Richardson <mcr+i...@sandelman.ca>; Valery Smyslov 
<smyslov.i...@gmail.com>; Scott Fluhrer (sfluhrer) <sfluh...@cisco.com>; ipsec 
<ipsec@ietf.org>
Subject: Re: [IPsec] Re: draft-smyslov-ipsecme-ikev2-downgrade-prevention


CAUTION: This is an external email. Please be very careful when clicking links 
or opening attachments. See the URL nok.it/ext for additional information.


Hi Jun, you're correct ... the attack isn't specific to PQ. It takes advantage 
of the presence of a weak key exchange method, regardless of whether the 
attacker uses a CRQC to break it.

But to answer your earlier question, the attack doesn't require re-signing the 
IKE_AUTH message from Y. The exact steps of the attack are:

1. X sends initiator IKE_INIT_SA to A
2. A rewrites initiator IKE_INIT_SA by dropping support for the strong key 
exchange and sends it to Y
3. Y sends responder IKE_INIT_SA to A
4. A sends (unmodified) responder IKE_INIT_SA to X
5. X sends initiator IKE_AUTH to A
6. A decrypts IKE_AUTH (by breaking the weak key exchange), signs it with A's 
key, re-encrypts it, and sends it to Y
7. Y sends responder IKE_AUTH to A
8. A sends (unmodified) responder IKE_AUTH to X

Here's the key: the victim responder Y only signs its own outbound messages, so 
even though X and Y have a split view of the handshake transcript, they never 
actually confirm this. Y would have sent the same IKE_AUTH in its conversation 
with A as it would have in its conversation with X.

Chris P.


On Wed, Jul 30, 2025 at 2:09 PM Jun Hu (Nokia) 
<jun...@nokia.com<mailto:jun...@nokia.com>> wrote:
Sorry, I need rephrase that, the attack doesn't rely on a CRQC could break a 
digital signature in live communication

-----Original Message-----
From: Jun Hu (Nokia)
Sent: Wednesday, July 30, 2025 11:08 AM
To: Michael Richardson <mcr+i...@sandelman.ca<mailto:mcr%2bi...@sandelman.ca>>
Cc: Valery Smyslov <smyslov.i...@gmail.com<mailto:smyslov.i...@gmail.com>>; 
'Christopher Patton' <cpat...@cloudflare.com<mailto:cpat...@cloudflare.com>>; 
'Scott Fluhrer (sfluhrer)' <sfluh...@cisco.com<mailto:sfluh...@cisco.com>>; 
'ipsec' <ipsec@ietf.org<mailto:ipsec@ietf.org>>
Subject: RE: [IPsec] Re: draft-smyslov-ipsecme-ikev2-downgrade-prevention

[HJ] sure, but my understanding is the attack we are discussing here doesn't 
rely on a CRQC

Jun Hu \(Nokia\) 
<jun.hu<http://jun.hu/>=40nokia....@dmarc.ietf.org<mailto:40nokia....@dmarc.ietf.org>>
 wrote:
    > So if A just passthrough Y's certificate payload to X in the IKE_AUTH
    > response A sent to X, how could A signs the AUTH payload without having
    > Y's private key that corresponds to Y's certificate?

The CRQC was able to break the quantum-unsafe algorithm, turning a public key 
into a private key.
(That's the point of the CRQC)

--
Michael Richardson <mcr+i...@sandelman.ca<mailto:mcr%2bi...@sandelman.ca>>   . 
o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide



_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to