Certificate bug in open source IPsec VPN
03 May
0
0 views
The problem occurs when verifying signatures that are based on the Elliptic Curve Digital Signature Algorithm (ECDSA); if such signatures are verified using the OpenSSL plugin, strongSwan will handle empty, zeroed or otherwise invalid signatures as legitimate ones. The developers say that both IKEv1 and IKEv2 are affected.
If a connection definition with ECDSA authentication exists on the IPsec gateway, attackers can potentially use a forged digital signature or bogus certificate to gain unauthorised access. strongSwan 5.0.4 fixes the bug.