[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006




El 31/07/2006, a las 1:04, Francis Dupont escribió:

 In your previous mail you wrote:

=> HBAs are weaker than CGAs

DO you know any attack that is easier in HBAs than in CGAs? could you
   describe it?

=> easy, you simply steal the whole set. There is nothing to find
because the victim can give you everything. This can't happen with
CGA because you should not know the private key.


but in this attack, the attacker is not changing the prefix set right?

so basically the attacker is not attacking the shim6 signalling, is just located in every path, so the attacker can do exactly the same if the shim6 protocol is secured using CGA (since the attacker is not really changing the locator set), right?

so from the shim6 signalling perspective, the security achieved against this attack is exactly the same wether you use CGA or HBA

Of course i agree that you could use CGA to protect data packets but this wouldn't be shim6 signalling protection but data packets protection, and this is out of the scope of the shim6 protocol


imho HBA and CGA are exactly equally strong, since the weakest point in both schemes is determined by the number of hash bits contained in the
   iid of the IPv6 address.

=> CGA has a RSA key pair too...

yes, but the resulting security is the security of the weakest link, so, even if you add a very long/strong key pair, the easier attack would be the attack on the hash

of course having very short key pair could indeed result in having cga security weaker than the hash, making CGAs weaker than CGAs... but the point is that this doesn't help to achieve better security that HBAs


In both schemes, an attacker must perform o(2^59) attempts in order to find an alternative CGA parameter data strucutre (with an alternative
   PRefix set in the case of HBAs and with an alternative public key in
   the case of CGA)

=> no, either the attacker has to find a key pair giving the same hash
or to inverse the public key into the private one. Both problems are
harder than for HBAs.

not really

we do agree that the attacker will do the easier attack, right?

so, let's assume that the key pair was selected in order to be stronger than the hash (if not the CGA security would be weaker)

so we can focus on the attack against the hash

In the CGA case, the attacker needs to find an alternative CGA parameter data structure with an alternative public key (the attacker's public key) In order to do that, the attacker will try with different modifier (it is easier than to try with different public keys), so the attacker needs to perform O(2^59) attempts to find the alternative CGA parameter data structure


In the HBA case, the attacker needs to find an alternative CGA parameter data structure that includes an alternative prefix set. In order to do that, the attacker will try with different modifiers, so the attacker needs to perform O(2^59) attempts to find the alternative CGA parameter data structure

the difficulty of the attack, hence the resulting security is the same for HBA and for CGAs




moreover, imho CGAs are residually weaker than HBAs, since in CGAs the
   private key can be compromised while in HBAs there is no secret that
   can be compromised

=> and ther is nothing private too. This is enough for multi-homing
where the property we're looking for is weaker than ownership.


agree

would you agree with the following:

from the persepctive of the shim6 protocol, HBAs and CGAs provide the same protection. i.e. the shim6 protocol security is the same when HBA and CGA are used to protect it

 (which provide ownership using the signature),
and than standard strong authentication (using some kind of PKI).

   agree that PKI is stronger, since the attacks may require more than
   o(2^59) attempts

=> no, the properties have different strength: this is not directly
related to the complexity of theorical attacks.


i guess is both things

you can achieve better protection because you can provide other security features (that are outside of the scope of the shim6 protocol protection) but if you use if for the shim6 protocol security, you could potetially achieve better protection because you don't have the limitation of the 59 bit long hash

Without the hash extension IMHO they would be too weak, now we have
to take advice from cryptographers to understand if/how to improve
them...

   i am not sure what do you mean by hash extensions...

=> reread the RFC (:-).

but anyway, we can change the hash function in HBA/CGA and we have the
   Sec parameter... this should be  enough for a few decades i heard...

=> a better hash function should give nothing more: if you have an ideal hash function giving 1000 bits and you take only 64 bits, the brute force
attack is still in 2^32 attempts for a collision between two values
and 2^64 for a collision with a given value. So as soon as the hash
function is not too bad it is enough.


so, this is enough protection for the shim6 protocol i guess

regards, marcelo


Regards

Francis.Dupont@point6.net