[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New multi6 draft: WIMP
> I believe there is a problem with the gradual release of secret
> information (such as hash chains) when a man in the middle can trick
> both sides to become desynchronized such that side A has two messages
> in transit, messages M+1 and M+2, with an ealier message being M. M,
> M+1 and M+2 are protected using hashes X, X+1 and X+2, respectively.
> Side B can check whether message M+1 is authentic by taking X+1,
> performing a function over it and determining whether the result is
> equal to X. However, a man in the middle that already has X+2 could
> create X+1 and then use this value to create an authentic-looking
> message M+1. Or am I missing something?
I don't see why this is a problem when
1) the signalling protocol (which advances the hash element to use/reveal)
has at most one outstanding operation
2) the signalling protocol never gives up on an operation - keeps on
retransmitting until the host-pair context is abandoned
3) when a new host-pair context is created the initiator picks a new
ephemeral ID
I that case, the MiTM that appears after the initial exchange can't force
either end to reveal an "extra" hash element as you suggest.
Erik