[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: threats ID



Marcelo,

On Jan 19, 2004, at 19:55, marcelo bagnulo wrote:
After some mail exchanges with Pekka N., my understanding is that that there
is an important distinction to be made between these two cases when
considering the hijacking attack. The point is that in transport layer
solutions, the hijcack attack is limited to the existent established
connection while in the IP layer (shim layer also) solutions the attack
applies to the complete endnode.

Thank you. A very good explanation.


This also relates somewhat to performance. If you have per-connection state,
then you have to create the state separately for each connection. If you
have per-host state, then you create the state on first connection, and
then share it with the other ones that are created during the lifetime
of the state.


Whether a per-host state (in addition to the per-connection state) is a good
idea is an architectural issue. In my opinion, many of the shim approaches
do create a kind of a new layer, say layer 3.5, which contains a per-host
state, potentially shared by multiple transport layer connections.


Because the attack applies to the endnode,
the attacker can do things like establishing a connection creating some state
so that future communications initated by the victim are also redirected.
That is, in IP layer solutions, the complete identity of the victim is
hijacked for all the applications and for all the communications,
pre-establihed or future communications (as long as the malicous state
exists in the victim)

Right.


This implies that the risk is very different in one case than in the other
one and different security solutions are required.

Well, I might not call the risks "very" different, but they are different.


So I guess that i agree with Masataka that a return routability check with a
cookie is enough to redirect a connection but IMHO this is not enough to
redirect a complete identity at the IP layer level.

If I understand Ohta-san correctly, he perceives that an architectural change that creates a per-host state at the end-hosts in the IP layer, or one that creates a new layer between IP and transport, are abhorrent and should not be considered. Hence, my perhaps faulty understanding of his thoughts is that the concept of location-independent IP layer identity does not exist. But maybe I understand his thoughts wrong.

I, on the the other hand, certainly believe that adding location-independent
IP layer identity would be good for the Internet.


While (if) there is such a large disagreement between Ohta-san and me,
it may be impossible to agree on security.

--Pekka Nikander