1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
|
Internet Engineering Task Force (IETF) Y. Sheffer
Request for Comments: 6989 Porticor
Updates: 5996 S. Fluhrer
Category: Standards Track Cisco
ISSN: 2070-1721 July 2013
Additional Diffie-Hellman Tests
for the Internet Key Exchange Protocol Version 2 (IKEv2)
Abstract
This document adds a small number of mandatory tests required for the
secure operation of the Internet Key Exchange Protocol version 2
(IKEv2) with elliptic curve groups. No change is required to IKE
implementations that use modular exponential groups, other than a few
rarely used so-called Digital Signature Algorithm (DSA) groups. This
document updates the IKEv2 protocol, RFC 5996.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6989.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Sheffer & Fluhrer Standards Track [Page 1]
^L
RFC 6989 DH Tests July 2013
Table of Contents
1. Introduction ....................................................2
1.1. Conventions Used in This Document ..........................3
2. Group Membership Tests ..........................................3
2.1. Sophie Germain Prime MODP Groups ...........................3
2.2. MODP Groups with Small Subgroups ...........................3
2.3. Elliptic Curve Groups ......................................4
2.4. Transition .................................................4
2.5. Protocol Behavior ..........................................5
3. Side-Channel Attacks ............................................5
4. Security Considerations .........................................6
4.1. DH Key Reuse and Multiple Peers ............................6
4.2. DH Key Reuse: Variants .....................................7
4.3. Groups Not Covered by This RFC .............................7
4.4. Behavior upon Test Failure .................................7
5. IANA Considerations .............................................8
6. Acknowledgements ................................................8
7. References ......................................................9
7.1. Normative References .......................................9
7.2. Informative References .....................................9
1. Introduction
IKEv2 [RFC5996] consists of the establishment of a shared secret
using the Diffie-Hellman (DH) protocol, followed by authentication of
the two peers. Existing implementations typically use modular
exponential (MODP) DH groups, such as those defined in [RFC3526].
IKEv2 does not require that any tests be performed by a peer
receiving a public Diffie-Hellman key from the other peer. This is
fine for the common case of MODP groups. For other DH groups, when
peers reuse DH values across multiple IKE sessions, the lack of tests
by the recipient results in a potential vulnerability (see
Section 4.1 for more details). In particular, this is true for
Elliptic Curve (EC) groups, whose use is becoming ever more popular.
This document defines such tests for several types of DH groups.
In addition, this document describes another potential attack related
to the reuse of DH keys: a timing attack. This additional material
is taken from [RFC2412].
This document updates [RFC5996] by adding security requirements that
apply to many of the protocol's implementations.
Sheffer & Fluhrer Standards Track [Page 2]
^L
RFC 6989 DH Tests July 2013
1.1. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
2. Group Membership Tests
This section describes the tests that need to be performed by IKE
peers receiving a Key Exchange (KE) payload. The tests are
RECOMMENDED for all implementations but only REQUIRED for those that
reuse DH private keys (as defined in [RFC5996], Section 2.12). The
tests apply to the recipient of a KE payload and describe how it
should check the received payload. They are listed here according to
the DH group being used.
2.1. Sophie Germain Prime MODP Groups
These are currently the most commonly used groups; all these groups
have the property that (p-1)/2 is also prime; this section applies to
any such MODP group. Each recipient MUST verify that the peer's
public value r is in the legal range (1 < r < p-1). According to
[Menezes], Section 2.2, even with this check there remains the
possibility of leaking a single bit of the secret exponent when DH
keys are reused; this amount of leakage is insignificant.
See Section 5 for the specific groups covered by this section.
2.2. MODP Groups with Small Subgroups
[RFC5114] defines modular exponential groups with small subgroups;
these are modular exponential groups with comparatively small
subgroups, and all have (p-1)/2 composite. Section 2.1 of [Menezes]
describes some informational leakage from a small-subgroup attack on
these groups if the DH private value is reused.
This leakage can be prevented if the recipient performs a test on the
peer's public value; however, this test is expensive (approximately
as expensive as what reusing DH private values saves). In addition,
the NIST standard ([NIST-800-56A], Section 5.6.2.4) requires that
test; hence, anyone needing to conform to that standard will need to
implement the test anyway.
Sheffer & Fluhrer Standards Track [Page 3]
^L
RFC 6989 DH Tests July 2013
Because of the above, the IKE implementation MUST choose between one
of the following two options:
o It MUST check both that the peer's public value is in range (1 < r
< p-1) and that r^q = 1 mod p (where q is the size of the
subgroup, as listed in the RFC defining the group). DH private
values MAY then be reused. This option is appropriate if
conformance to [NIST-800-56A] is required.
o It MUST NOT reuse DH private values (that is, the DH private value
for each DH exchange MUST be generated from a fresh output of a
cryptographically secure random number generator), and it MUST
check that the peer's public value is in range (1 < r < p-1).
This option is more appropriate if conformance to [NIST-800-56A]
is not required.
See Section 5 for the specific groups covered by this section.
2.3. Elliptic Curve Groups
IKEv2 can be used with elliptic curve groups defined over a field
GF(p) [RFC5903] [RFC5114]. According to [Menezes], Section 2.3,
there is some informational leakage possible. A receiving peer MUST
check that its peer's public value is valid; that is, the x and y
parameters from the peer's public value satisfy the curve equation,
y^2 = x^3 + ax + b mod p (where for groups 19, 20, and 21, a=-3 (mod
p), and all other values of a, b, and p for the group are listed in
the RFC defining the group).
We note that an additional check to ensure that the public value is
not the point at infinity is not needed, because IKE (see Section 7
of [RFC5903]) does not allow for encoding this value.
See Section 5 for the specific groups covered by this section.
2.4. Transition
Existing implementations of IKEv2 with Elliptic Curve Diffie-Hellman
(ECDH) groups may be modified to include the tests described in the
current document, even if they do not reuse DH keys. The tests can
be considered as sanity checks and will prevent the code having to
handle inputs that it may not have been designed to handle.
ECDH implementations that do reuse DH keys MUST be enhanced to
include the above tests.
Sheffer & Fluhrer Standards Track [Page 4]
^L
RFC 6989 DH Tests July 2013
2.5. Protocol Behavior
The recipient of a DH public key that fails one of the above tests
must assume that the sender is either truly malicious or has a bug in
its implementation. The behavior defined below attempts to balance
resistance to attackers that are trying to disrupt the IKE exchange,
against the need to help a badly implemented peer by providing useful
error indications.
If this error happens during the IKE_SA_INIT exchange, then the
recipient MUST drop the message that contains an invalid KE payload
and MUST NOT use that message when creating the IKE security
association (SA).
If the implementation employs the DoS-resistant behavior proposed in
Section 2.4 of [RFC5996], it may simply ignore the erroneous request
or response message, and continue waiting for a later message
containing a legitimate KE payload.
If DoS-resistant behavior is not implemented and the invalid KE
payload was in the IKE_SA_INIT request, the implementation MAY send
an INVALID_SYNTAX error notification back and remove the in-progress
IKE SA; if the invalid KE payload was in the IKE_SA_INIT response,
then the implementation MAY simply delete the half-created IKE SA and
re-initiate the exchange.
If the invalid KE payload is received during the CREATE_CHILD_SA
exchange (or any other exchange after the IKE SA has been
established) and the invalid KE payload is in the request message,
the Responder MUST reply with an INVALID_SYNTAX error notification
and drop the IKE SA. If the invalid KE payload is in a response, the
Initiator getting this reply MUST immediately delete the IKE SA by
sending an IKE SA Delete notification as a new exchange. In this
case, the sender evidently has an implementation bug, and dropping
the IKE SA makes it easier to detect.
3. Side-Channel Attacks
In addition to the small-subgroup attack, there is also a potential
timing attack on IKE peers when they are reusing Diffie-Hellman
secret values. This is a side-channel attack, which means that it
may or may not be a vulnerability in certain cases, depending on
implementation details and the threat model.
Sheffer & Fluhrer Standards Track [Page 5]
^L
RFC 6989 DH Tests July 2013
The remainder of this section is quoted from [RFC2412], Section 5,
with a few minor clarifications. This attack still applies to IKEv2
implementations, and both to MODP groups and ECDH groups. We also
note that more efficient countermeasures are available for EC groups
represented in projective form, but these are outside the scope of
the current document.
Timing attacks that are capable of recovering the exponent value used
in Diffie-Hellman calculations have been described by Paul Kocher
[Kocher]. In order to nullify the attack, implementors must take
pains to obscure the sequence of operations involved in carrying out
modular exponentiations.
One potential method to foil these timing attacks is to use a
"blinding factor". In this method, a group element, r, is chosen at
random, and its multiplicative inverse modulo p is computed, which
we'll call r_inv. r_inv can be computed by the Extended Euclidean
Method, using r and p as inputs. When an exponent x is chosen, the
value r_inv^x is also calculated. Then, when calculating (g^y)^x,
the implementation will calculate this sequence:
A = r*g^y
B = A^x = (r*g^y)^x = (r^x)(g^(xy))
C = B*r_inv^x = (r^x)(r^(-1*x))(g^(xy)) = g^(xy)
The blinding factor is only necessary if the exponent x is used more
than 100 times.
4. Security Considerations
This entire document is concerned with the IKEv2 security protocol
and the need to harden it in some cases.
4.1. DH Key Reuse and Multiple Peers
This section describes one variant of the attack prevented by the
tests defined above.
Suppose that IKE peer Alice maintains IKE security associations with
peers Bob and Eve. Alice uses the same secret ECDH key for both SAs,
which is allowed with some restrictions. If Alice does not implement
these tests, Eve will be able to send a malformed public key, which
would allow her to efficiently determine Alice's private key (as
described in Section 2 of [Menezes]). Since the key is shared, Eve
will be able to obtain Alice's shared IKE SA key with Bob.
Sheffer & Fluhrer Standards Track [Page 6]
^L
RFC 6989 DH Tests July 2013
4.2. DH Key Reuse: Variants
Private DH keys can be reused in different ways, with subtly
different security implications. For example:
1. DH keys are reused for multiple connections (IKE SAs) to the same
peer and for connections to different peers.
2. DH keys are reused for multiple connections to the same peer
(e.g., when the peer is identified by its IP address) but not for
different peers.
3. DH keys are reused only when they had not been used to complete
an exchange, e.g., when the peer replies with an
INVALID_KE_PAYLOAD notification.
Both the small-subgroup attack and the timing attack described in
this document apply at least to options #1 and #2.
4.3. Groups Not Covered by This RFC
There are a number of group types that are not specifically addressed
by this RFC. A document that defines such a group MUST describe the
tests required by that group.
One specific type of group would be an even-characteristic elliptic
curve group. Now, these curves have cofactors greater than 1; this
leads to a possibility of some information leakage. There are
several ways to address this information leakage, such as performing
a test analogous to the test in Section 2.2 or adjusting the ECDH
operation to avoid this leakage (such as Elliptic Curve Cryptography
Cofactor Diffie-Hellman (ECC CDH), where the shared secret really is
hxyG). Because the appropriate test depends on how the group is
defined, we cannot document it in advance.
4.4. Behavior upon Test Failure
The behavior recommended in Section 2.5 is in line with generic error
treatment during the IKE_SA_INIT exchange, per Section 2.21.1 of
[RFC5996]. The sender is not required to send back an error
notification, and the recipient cannot depend on this notification
because it is unauthenticated and may in fact have been sent by an
attacker trying to launch a DoS attack on the connection. Thus, the
notification is only useful to debug implementation errors.
Sheffer & Fluhrer Standards Track [Page 7]
^L
RFC 6989 DH Tests July 2013
On the other hand, the error notification is secure in the sense that
no secret information is leaked. All IKEv2 Diffie-Hellman groups are
publicly known, and none of the tests defined here depend on any
private key. In fact, the tests can all be performed by an
eavesdropper.
The situation when the failure occurs in the CREATE_CHILD_SA exchange
is different, since everything is protected by an IKE SA. The peers
are authenticated, and error notifications can be relied on. See
Section 2.21.3 of [RFC5996] for more details on error handling in
this case.
5. IANA Considerations
IANA has added a column named "Recipient Tests" to the Transform
Type 4 - Diffie-Hellman Group Transform IDs registry for IKEv2
[IANA-IKEv2-Registry].
This column has been initially populated as follows.
+------------------------------------+-----------------------+
| Number | Recipient Tests |
+------------------------------------+-----------------------+
| 1, 2, 5, 14, 15, 16, 17, 18 | RFC 6989, Section 2.1 |
| 22, 23, 24 | RFC 6989, Section 2.2 |
| 19, 20, 21, 25, 26, 27, 28, 29, 30 | RFC 6989, Section 2.3 |
+------------------------------------+-----------------------+
Groups 27-30 are defined in [RFC6954].
Future documents that define new DH groups for IKEv2 are REQUIRED to
provide this information for each new group, possibly by referring to
the current document.
6. Acknowledgements
We would like to thank Dan Harkins, who initially raised this issue
on the IPsec mailing list. Thanks to Tero Kivinen and Rene Struik
for their useful comments. Much of the text in Section 3 is taken
from [RFC2412], and we would like to thank its author, Hilarie Orman.
The document was originally prepared using the lyx2rfc tool, created
by Nico Williams.
Sheffer & Fluhrer Standards Track [Page 8]
^L
RFC 6989 DH Tests July 2013
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
"Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 5996, September 2010.
7.2. Informative References
[IANA-IKEv2-Registry]
IANA, "Internet Key Exchange Version 2 (IKEv2)
Parameters",
<http://www.iana.org/assignments/ikev2-parameters/>.
[Kocher] Kocher, P., "Timing Attacks on Implementations of Diffie-
Hellman, RSA, DSS, and Other Systems", December 1996,
<http://www.cryptography.com/timingattack/paper.html>.
[Menezes] Menezes, A. and B. Ustaoglu, "On Reusing Ephemeral Keys In
Diffie-Hellman Key Agreement Protocols", December 2008,
<http://www.cacr.math.uwaterloo.ca/techreports/2008/
cacr2008-24.pdf>.
[NIST-800-56A]
National Institute of Standards and Technology (NIST),
"Recommendation for Pair-Wise Key Establishment Schemes
Using Discrete Logarithm Cryptography (Revised)", NIST PUB
800-56A, March 2007.
[RFC2412] Orman, H., "The OAKLEY Key Determination Protocol",
RFC 2412, November 1998.
[RFC3526] Kivinen, T. and M. Kojo, "More Modular Exponential (MODP)
Diffie-Hellman groups for Internet Key Exchange (IKE)",
RFC 3526, May 2003.
[RFC5114] Lepinski, M. and S. Kent, "Additional Diffie-Hellman
Groups for Use with IETF Standards", RFC 5114,
January 2008.
Sheffer & Fluhrer Standards Track [Page 9]
^L
RFC 6989 DH Tests July 2013
[RFC5903] Fu, D. and J. Solinas, "Elliptic Curve Groups modulo a
Prime (ECP Groups) for IKE and IKEv2", RFC 5903,
June 2010.
[RFC6954] Merkle, J. and M. Lochter, "Using the Elliptic Curve
Cryptography (ECC) Brainpool Curves for the Internet Key
Exchange Protocol Version 2 (IKEv2)", RFC 6954, July 2013.
Authors' Addresses
Yaron Sheffer
Porticor
EMail: yaronf.ietf@gmail.com
Scott Fluhrer
Cisco Systems
1414 Massachusetts Ave.
Boxborough, MA 01719
USA
EMail: sfluhrer@cisco.com
Sheffer & Fluhrer Standards Track [Page 10]
^L
|