[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: identifiers and security



> > If we add some multihoming signaling whereby an attacker, which was on
> > the path (e.g., by being on the same WiFi subnet as the victim) for a 
> > short
> > time period, can cause damage by essentially using the state creation
> > as a way to preserve it's on-path'ness forever, then folks are 
> > concerned.
> 
> And justifyably so. But wouldn't it be possible to address this in 
> other ways? Such as having per-direction or even per-session state 
> rather than per-address?

If you assume that there is an upper timelimit on how long a (TCP)
connection can last one could take such an approach.
But as far as I know the designers of TCP didn't envision such
an upper limit, thus some connections might last forever.

> I think if the redirection problem by attackers that are on-path 
> temporarily is limited to individual unprotected sessions, we are not 
> materially worse off than today as the same attacker could break the 
> sessions today also, and redirecting an unprotected session presumably 
> isn't worse than breaking it as the contents aren't secret.

I think there is a difference between
 - someone breaking into to office looking at the pieces of paper on
   my desk
 - someone breaking into my office and installing a device which allows
   them to look at all future pieces of paper I will place on my desk

Thus there is a difference between looking at unprotected communication
while being on the path, and looking at unprotected communication
long after having left the path.
But this might be a case where we can make things be slightly worse than
in today's Internet since this communication was unprotected in any case.

  Erik