The attacker could generate some malicious state in the victims machine so
that when the victim wants to initiate a communication will send the traffic
to the attacker. So now the attacker can impersonate the server and send
back modified answers for instance.
For example, you have a host A that is running ODP. The host is not communicationg with anyone.
Supose now that there is a very well known server, that A usually connects
to, for instance a newspaper web page, that have address B.
Supose that there is an attacker that has an address C
During an inactivity period, the Attacker initates the communication with A
and pretends to have address B
(receiving packets containing keys sent from
A to B, the attacker can achieve that if he is in the same lan than A). Now
it generates some ODT state in A mapping the address B (of the server) to
its own address C.
Considering that the state mapping B to C is indefinite,
later on when the user of arrives and tries to contact B it will be actually sending packets to C.
Would this attack be possible with ODP?
If so, don't you think this is security risk?
My personal opinion about MIPv6 is that it is unsuitable for multihoming
support becuase the required modifications would introduce inacceptable
security risks as the one described above.
However, i folks think that those security risks are acceptable, i think it
would be interesting to consider it, because the available code and
implementations.
But for now, i would focus the discussion on which is the
desired level of security. IMHO a multihoming solution shouldn't introduce
new security issues to the internet that is it should be as secure as fixed
single homed ip