[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: draft-nordmark-multi6-threats-01.txt
Hi Erik & Marcelo,
> > Section 1 - Introduction
> >
> > "These attacks pose threats against confidentiality,
> > integrity, and availability."
> >
> > I guess that i could make sense to also include impersonation attacks
> > (or the way you prefer to call them) in which the attacker pretneds to
> > be one party of the communication, since they are also considered in
> > the doc
>
> I think such attacks are and end to accomplish threats against the above.
> For instance, I might be successful in convincing somebody that I am
> Santa Claus, but if they are not going to engage Santa in some way
> that has no effect. If they do believe that they are having confidential
> communication with Santa Claus but they are instead communicating
> (with confidentiality) with me then there was an attack on confidentiality.
> But perhaps "authenticity" should be added to the above list?
Well, I think that authenticated at this layer is very difficult. One could
make a case that you could authenticate Santa Claus' IP address but not
Santa himself - what if one of his elves is actually talking to you, Erik?
What we should consider is that a multihoming event doesn't cause any
redirection attacks, so that at first you were talking to Santa Claus'
computer then after the event you were talking to Mrs. Claus' computer.
Trying to authenticate the user at the multi6 level probably would be
impossible & goes beyond the 'do no harm' edict.
John