[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
El 21/07/2006, a las 19:13, Francis Dupont escribió:
In your previous mail you wrote:
=> I strongly disagree about the first point (the main threat of mip
is the remote redirection, time shifted attacks and similar things are
second order issues),
i agree that the main threat is redirection attacks and this is
reflected in 4218, but my point was that the most dificult attacks
to
prevent are the time-shifted attacks and this is why we end up with
things like _periodic_ RR in mip and HBA/CGA in shim.
=> IMHO the periodic RR in mip is more to get the attacker staying
on the path than to defend against the steal of future addresses...
i guess that we have a terminology issue here... as i understand,
requiring the attaack to stay in the path is prevent time-shifting
attacks...
from RFC4225 section 2.2. Timing
Without proper
protection, an attacker could attach itself between the home agent
and a correspondent node for a while, create a BCE at the
correspondent node, leave the position, and continuously update the
correspondent node about the mobile node's whereabouts.
But the real issue here is about the method: in security one has to
provide a defense against main threats, *then* secondary threats, etc.
well, the other option is to find a tools that prevents both primary
and secondary and so on...
As perfect security is impossible one has to accept some remaining
vulnerabilities...
agree
Here we are in trouble because the main threat is hard: the best known
defense, mutual strong authentication, is not deployable. So we get
poor mechanisms (like RR) and we try to improve them (like CBA) against
secondary threats when the main one still remains... I really like
to see shim far better than mip!
but do you think that the security resulting with HBAs and the
additional mechanisms available in shim are good enough?
If time shifted
attacks were not an issue, we could have used cookies for instance
or
hash chains to protect the shim in conjuction the already existent
routing based security (meaning the asumption that the routing
system
delivers packets to the rightful "owners" of the addresses)
=> again IMHO you miss the real issue...
So, the hypothesis of 4218 and of mip security is of course as you
say
that the fundamental threat is redirection attacks, but also that
time
shifted attacks need to be prevented... agree with this?
=> no: I really prefer to get time shifted attacks as a remaining
vulnerability than redirection.
of course... i mean time shifted attacks are a flavor of redirection
attack... i am assuming that a solution that does not provide
protection from the most basic forms of redirection attacks are simply
non starters...
among those security mechanisms that provide security to some form of
redirection attacks, i am advocating for those that also cover the most
diffult forms i.e. time shifted attacks...
I mean do you agree that we should deal with the threats described in
4218?
Of course it should be better to
have none but it is enough hard to choose between acceptable level
of security and deployable solutions to be at least as possible
disturbed by secondary threats.
i think HBA mechansim provides protection against most forms of
redirection attacks, including tiem shifted attacks
and I don't fully agree with the second because
the only issue is the global PKI (ie., issuing client certificates is
again second order).
global PKI is a big obstacle for deployment but imho the generation
of
client certificates it is also. I mean imagine having to create
client
certificate for every host in the internet. Imagine that for those,
you
need to verify the rightful ownership of the IP address included in
the
certificate. Technically this may be simple, but logistically, this
requires a lot of effort imho
=> by a global PKI I mean global certification *and* registration
authorities. The problem is not technical at all even I don't believe
we know how to do it in a reasonable timeframe at this scale today.
i guess we fully agree here
regards, marcelo
Regards
Francis.Dupont@point6.net