[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Time shifitng/future redirection attacks (was RE: Identifiers



[People, why are we CC'ing everyone and their little sister?]

On 29-mrt-04, at 2:21, marcelo bagnulo wrote:

Correct. That is how the Internet works. Multi6 doesn't have to fix that.
We have to make sure that *if* the host we contact using IPA subsequently
asserts that it can also be contacted using IPZ, that assertion is true.

If i understand what you are saying correctly, this approach wouldn't really
prevent the attacks presented in section 4.1.2 Premiditated redirection of
draft-nordmark-multi6-threats-00.txt, right?

Or in more general terms, this would allow time shifting attacks as
presented in section 2.2. Timing in draft-nikander-mobileip-v6-ro-sec-02.
Note that MIP design especially limited BCE entries lifetime to a few
minutes to deal with this type of attacks.

Which is of course something we can't do. As I said before, if someone in the middle can redirect an ongoing session, I don't consider this materially worse than what can happen today (disrupt the session). However, redirecting not only the current session but also future ones would be unacceptable. It doesn't seem too hard to avoid this, though: new sessions can be forced through a "real" address rather than a negotiated backup address. Unfortunately, in a NOID/DHT-like scheme this probably means the application needs to be involved with this. Example:


X publishes addresses A and B in the DNS.
Y contacts X on A
X negotiates C as an additional address
A dies
the session from Y to X starts flowing over C
Y wants to set up a new session to X
Y tries address A
address A times out
Y tries address B

And this is without adding crypto-based identifiers to the mix. Making all of this more flexible and more secure can be done using crypto-based 64 bit identifiers. I think those are a great idea, but so far there has been very little discussion on this topic.