[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: I-D ACTION:draft-nordmark-multi6dt-shim-00.txt



marcelo bagnulo braun wrote:

Well, if we allow hosts to accept packets coming from unverified locators and present them as belonging to a different ULP identifier, then not even ingress filtering would prevent such attacks. I mean, today, if ingress filtering is deployed, then the problem of spoofed addresses is reduced. If we allow the reception from unverified locators, ingress filtering won't help any more in this problem.

Agreed.

OTOH, i understand that there is a long way between the level of security provided by a semi deployed ingress filtering and the level of security resulting from requiring the usage of cga or hbas to verify any incoming locator. Perhaps a cookie would be enough to validate incoming packets (it is clearly not enough to send packet to that locator though)

A hard-to-guess cookie would probably make things stronger than today
in the absense of ingress filtering. Today's ULP have varying verification from SCTPs use of a 32-bit verification tag, TCP's reliance on the sequence number being in the window, and UDP with nothing (but applications using UDP might have something).


Another point related to this is whether we consider this new incoming locator as a hint to rehome the communication to that new locator. In this case, we need additional certainty i guess.

If it is merely a hint, and there is a cookie to prevent the off-path attackers from triggering the hint, that might be sufficient.


   Erik