[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: IPsec thing with REAP
On Mon, 10 Mar 2008, Iljitsch van Beijnum wrote:
To protect against spoofed keepalive packets, a host implementing both shim6
and IPsec MAY ignore incoming REAP keepalives if it has good reason to assume
that the other side will be sending IPsec-protected return traffic. I.e., if
a host is sending TCP data, it can reasonably expect to receive TCP ACKs in
return. If no IPsec-protected ACKs come back but unprotected keepalives do,
this could be the result from an attacker trying to hide broken connectivity.
I wonder how actionable this is from an implementor point of view.
Does a REAP implementor have access to the IPsec and TCP data and
state in example you gave? How?` Even if there was such access, it's
not obvious to make what kind of algorithm could be applied that would
be reliable.
--
Pekka Savola "You each name yourselves king, yet the
Netcore Oy kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings