[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: address pair exploration, flooding and state loss



Hi Iljistch,

Iljitsch van Beijnum wrote:
Signature checks are relatively expensive: these are exactly the operations you want to avoid for suspect packets.

However, this could easily be done by having A give B a nonce that is (for instance) a timestamp and a hash over B's IP address, the timestamp and some secret data. If A then loses its state for B, B can prove to A it talked to A at the indicated time, and A can check this as long as it still has its piece of secret data. Since this doesn't have to change often, that will be likely.


In that case, the state required for generating the cookie would have to be simple (small?) enough to store in a non-volatile way, so that it too doesn't get lost easily. It could possibly be system wide, so long as there's no easy way to determine the secret, or generate fake cookies.

It may also to be useful to consider if the cookie contains
information about the original context state (which would have to
be sent from B->A in the query). This context state in the query
could help prove that the cookie was given for a particular SHIM6
context, and ensures that if there's a flow still in existence
the flow state can't be restored (if that's an aim) by someone
other than the original context owner.

While cookie generation wouldn't need to be standardized, it
would be useful to have an example incarnation which people could
point to (and implement).

Greg