[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: question about IPv6 Flow label





On 19/05/09 1:06 PM, "ZhangDong" <zhangdong_rh@huaweisymantec.com> wrote:

> 
>>>> Even, or perhaps especially, the authors of 3697 would disagree
>> with you
>>>> as to the security value you can associate with flow labels.
>>> 
>>> Note that it depends how you use it. Our idea was not to use it as
>>> a hash key (which would certainly be unwise), but as an extra piece
>>> of information that a blind attacker would have to guess to insert
>>> packets into a connection.  It looked like it might work, however
>>> the big stumbling block was that not all flows were actually sending
>>> with a consistent flow label.
>>  
>>  => But even if they are sending a consistent flow label, to do what you
>>  want, you need to ensure that the recepient can verify the flow
>> label, which
>>  is not possible unless both sender and receiver agree through
>> negotiation or
>>  in a predetermined manner on how to generate it.
>>  Of course if it is a predetermined manner, then you can't use a RNG
>> in the
>>  process and therefore a blind attacker can generate a valid packet anyway
>>  unless the flow label changes with each packet, right?
> 
> Hmm... So the flow label also needs security protection to some extent when it
> is uesd, right?

=> No, I was asking a question about what David said. The flow label doesn't
necessarily need security.

Hesham

> 
> Is there any document describe how the flow label is used by applications?
> 
> Dong Zhang
> Huaweisymantec Technologies Co., Ltd
> 
> 
>