## Wednesday, July 2, 2014

### H.323 Registration Weaknesses: Part 2

Last time, we have seen how Avaya's H.323 default gateway authentication method was vulnerable to an attacker that is able to passively intercept communications between a client and the gateway. Upon hearing this, we were pointed to the secure authentication method employed in Avaya's gear, with the proprietary OID 2.16.840.1.114187.1.6.2.

This new authentication method is based on DH-EKE, a password-based authenticated key exchange (PAKE). Invented by Bellovin and Merritt in the early 1990s, PAKE schemes kill two birds with one stone:

• They prevent dictionary attacks to recover passwords, even if an attacker is able to view all traffic;
• They prevent man-in-the-middle attacks if an active attacker does not know the password. This is an improvement over regular Diffie-Hellman key agreement.

Avaya's PAKE scheme is DH-EKE, One of the variants proposed originally by Bellovin and Merritt. Many more PAKE schemes have popped up over the years, like SPEKE, SRP, J-PAKE, or SPAKE2. Many of them are hindered by patents; EKE has the advantage of its patent having expired a few years ago.

In the secure scheme, the following message sequence happens between the gateway ($$G$$) and user ($$U$$):

• gatekeeperRequest ($$U \rightarrow G$$): $$U$$ generates their own Diffie-Hellman public key, $$\text{DH}_U$$, and encrypts it using AES-128 in CTR mode using a key derived from the first 16 bytes of SHA-1(password). $$U$$ sends this encrypted public key to $$G$$, along with a nonce $$R_e$$, and $$IV$$, the CTR mode nonce.
• gatekeeperConfirm ($$G \rightarrow U$$): $$G$$ generates its own Diffie-Hellman key $$\text {DH}_G$$ and computes the shared key $$K_m$$ after decrypting $$U$$'s public key. $$G$$ then sends back $$\text{DH}_G$$ (unencrypted), a nonce $$R_g$$, and the HMAC-SHA1-96 authenticator of this message (with a key derived from $$K_m$$).
• registrationRequest ($$U \rightarrow G$$): This request proceeds without any significant cryptographic material, except that an HMAC-SHA1-96 authenticator is appended to ensure that $$U$$ also knows the shared key $$K_m$$.
• registrationConfirm/registrationRejected ($$G \rightarrow U$$): This message notifies the client whether the registration failed or succeeded.

A good implementation of this protocol makes both offline password bruteforcing and man-in-the-middle attacks unfeasible, as pointed out above. When we analyzed Avaya's client software, however, we found the following optimization: the client did not generate a new Diffie-Hellman key for each registration. Instead, it caches the same $$\text{DH}_U$$ for every registration within the same session. This allows offline bruteforcing of the password, which can also lead to man-in-the-middle attacks.

How does this work? Suppose that an attacker captures two message exchanges like the above for the same user and password. Let $$\text{AES-CTR}_{K_p}(IV)$$ be the keystream obtained by encrypting $$\text{IV}, \text{IV}+1$$, etc, using $$K_p$$ = SHA1(password)[0:16]. Since $$\text{DH}_U$$ is the same for both exchanges, the encrypted content of the two gatekeeperRequest packets can be represented as follows:

$C_0 = \text{AES-CTR}_{K_p}(\text{IV}_0) \oplus \text{DH}_U \\ C_1 = \text{AES-CTR}_{K_p}(\text{IV}_1) \oplus \text{DH}_U$

We can use this fact to test whether a guessed password is correct. Suppose we guess a password p; then it is the correct password only if

$\text{AES-CTR}_{K_p}(\text{IV}_0) \oplus C_0 = \text{AES-CTR}_{K_p}(\text{IV}_1) \oplus C_1$

Therefore one password check requires only two AES encryptions and one SHA-1 evaluation, and can be made extremely fast. GPU crackers could have a field day with this.

Unlike the case in the previous post, a sufficiently strong password is enough to thwart bruteforce, since this scheme is using stronger cryptographic primitives. But it is a safe assumption that most passwords are weak, especially so in phones, where it is more likely than not simple a PIN number.

I should also stress that this bug has been fixed; Avaya's PSST was rather forthcoming and professional in the handling of our report, and made the necessary steps to resolve this issue as quickly as possible.