[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: I-D ACTION:draft-nordmark-multi6dt-shim-00.txt
El 03/11/2004, a las 1:28, Erik Nordmark escribió:
marcelo bagnulo braun wrote:
Just one additional nit...
note that HBAs are particularly restrictive in this aspect, since all
locators need to be known a priori. However, even if you use
alternative schemes that don't impose such restriction, like CGAs,
you still need to add security information at least in the same
packet that carries the new locator.
That requirement isn't obvious to me so I think it would warrant
discussion.
agree
The issue is whether it would be ok for the multi6 shim to pass a
packet to the ULP when the source locator has not been verified as
belonging to the peer. We all agree that we need to do such
verification before *sending* packets to a new locator, but what about
just accepting the packet?
good point
Things to take into account:
In today's Internet, when there is no ingress filtering anybody can
spoof the source IP address and the packets will be passed by IP to
the ULP. However, in today's Internet when there is some ingress
filtering it is possible to restrict the nodes which can actually
spoof the source IP address to those that are close to the path
between the real location of the IP address and the receiving node.
Well, if we allow hosts to accept packets coming from unverified
locators and present them as belonging to a different ULP identifier,
then not even ingress filtering would prevent such attacks. I mean,
today, if ingress filtering is deployed, then the problem of spoofed
addresses is reduced. If we allow the reception from unverified
locators, ingress filtering won't help any more in this problem.
OTOH, i understand that there is a long way between the level of
security provided by a semi deployed ingress filtering and the level of
security resulting from requiring the usage of cga or hbas to verify
any incoming locator. Perhaps a cookie would be enough to validate
incoming packets (it is clearly not enough to send packet to that
locator though)
Another point related to this is whether we consider this new incoming
locator as a hint to rehome the communication to that new locator. In
this case, we need additional certainty i guess.
regards, marcelo
If a host wants to prevent packet injection attacks today (such as
spoofed RCP RST packets, if it wants to prevent it from all nodes and
not depend on ingress filtering, wouldn't it use IPsec?
Erik
------------------------------------------
Please note that my former email address
mbagnulo@ing.uc3m.es is no longer in use
Please send mail to:
marcelo at it dot uc3m dot es
------------------------------------------