[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Time shifitng/future redirection attacks (was RE: Identifiers
On 29-mrt-04, at 15:32, marcelo bagnulo wrote:
The protection for a connection can be done once in the connection
lifetime.
The problem here, then is at which layer your solution is working.
If you adopt a transport layer solution which the locator set
exchanged only
applies to that particular connection, the security checks can be
simplified, IMHO like one RR check.
However, if you adopt a shim layer or IP layer solution, the solution
has no
knowledge about
connections, so the exchanged locator set will apply to all
connections,
present and future, incoming and outgoing. That is why IMHO we have to
take
care of time shifting attacks when considering shim/IP layer solutions
which
may require additional mechanisms
Ok, this is a useful constraint: either our mechanisms must work
per-session (or group of sessions created within a short timeframe) or
we need strong(er) authentication than just return routability.
as i said in previous mails, i think CBID add value and are a good
option
and of course the provide protection from this attacks.
Yes. The nice thing about 64 bit CBIDs is that you can just put them in
the bottom 64 bits and they're not in the way. This allows being
backward compatible as long as there are no outages. It's not even
necessary to negotiate additional addresses at this point if good hints
towards available addresses for the correspondent are available at at
least one end.
However, in this case the upper layers must still be aware of the
locator bits. Having ULPs work with identifiers exclusively would be
cooler but more complex.