Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: CISCO PIX VulnerabilityRick Smith (rick_smithSECURECOMPUTING.COM)
Wed, 10 Jun 1998 13:02:11 -0500
- Messages sorted by: [ date ][ thread ][ subject ][ author ]
- Next message: avarice: "Re: Full Armor"
- Previous message: Tom Perrine: "Solaris 2.5.1 patch not effective?"
- In reply to: Damir Rajnovic: "CISCO PIX Vulnerability"
- Next in thread: Jamie Thain: "Re: CISCO PIX Vulnerability"
>Another thing is that PIX is using DES in ECB mode. CISCO admits that >"....ECB is not generally considered to be the best mode in which to >employ DES,...." but you'll have to live with it. CISCO will not fix >that so you'll have to buy future IPSEC/IKE products. IMHO, the really, really nasty problem with ECB mode is that the data stream is vulnerable to trivial substitution attacks. If the encrypted traffic consists of administrative commands, it won't be that hard to collect a modest but interesting dictionary of plaintext/ciphertext pairs. Then the attacker can forge command strings without ever having to brute force the key itself. Rick. smithsecurecomputing.com "Internet Cryptography" at bookstores or http:/www.visi.com/crypto/