[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: identifiers and security



> I am not sure how slightly this is...
> 
> suppose a host A with Locator LA
> A server B with locator LB
> and an attacker X with locator LX
> 
> A usually connects to B to get some information, for instance the news.
> 
> Now, X manages to be on the path between A and B for a while.
> Now, X starts a communication with A and pretends to be B, and X 
> creates a state in A mapping the identifier of A with locator LX.
> Note that it can do that because the verification will be based on the 
> RR and X will succeed because he is on the path.
> Then, X leaves the place and goes to somewhere more comfortable for him
> 
> Now, in the future when A tries to reach B he will contacting X... 
> forever ;-)
> 
> I don't feel that this would be acceptable

I agree at some level, because this was the conservative approach that
was taken in the MIPv6 security design.

But one can argue against that by:
 - if the attacker was on the path, why couldn't the attacker leave a small
   device (running on a battery for a month for instance) attached?

  Erik