[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: 2nd part Re: revision of architecture draft is now published
El 03/07/2004, a las 0:11, Geoff Huston escribió:
Hi Marcelo,
At 02:54 AM 1/07/2004, marcelo bagnulo braun wrote:
- about section 4.5
I am not sure about the following comment:
"Packet header rewriting by remote network elements has a large
number
of associated considerations, and documentation relating to the
considerations of the use of Network Address Translators [4]
contains
much of this material."
I mean, if the multi6 layer within the host replaces the received
locator by the ULP identifier, then it doesn't really matter the
locator than was actually carried in the packet, right? I mean, in
any case, the locator is transparent to the ULP which only deals with
the identifier.
Moreover, perhaps replacing locators by identifiers introduce some of
the nat problems, but in any case, i don't see how this related to
the fact that the locator is replaced by the host or by the edge
router. So perhaps some comment like this one is required but imho is
not restricted to this section but to all mechanisms that replace
locators by identifiers.
Perhaps you were considering other issues here?
What I was attempting to point out is that packet header rewriting by
_remote_ network elements is effectively a description of a session
hijacking technique. In order to allow locator rewriting in a manner
that is resilient to hijacking there needs to be some element of
visible authorization of the locator substitution. A session hijack
is an unauthorized and undetected rewriting of packet headers, while a
path switch is in effect a authorized rewrite of the packet headers.
If this is performed within the host then the authority issues are
somewhat different than when such a header rewrite is performed at
some point in the network path.
If this part of the document is unclear, then perhaps you could
suggest a clearer rewording of this?
Ok, this is not what i thought you were considering at this point.
Since you are aiming to a security issue, i would suggest that you
include a reference to the threats document here. I mean, i would say
that :
Packet header rewriting by remote network elements has a large number
of associated security considerations, and any packet rewriting
mechanism has to provide proper protection against the attacks
described in [threats], in particular against Redirection Attacks
regards, marcelo
regards,
Geoff