>>>>> "Warren" == Warren Kumari <[email protected]> writes:
Warren> On Saturday, July 11, 2015, Christian Huitema
Warren> <[email protected]>
Warren> wrote:
Warren> On Saturday, July 11, 2015 8:50 AM, joel jaeggli wrote
>> ... [5] Section 5:
>>
>> Fake DHCP servers / fake RAs are currently a security concern -
>> this doesn't make them any better or worse.
>>
>> Please cite a reference for this, preferably with operational
>> recommendations on limiting these problems (e.g., ensure that
>> DHCP
Warren> and
>> RA traffic cannot be injected from outside/beyond the network
>> that
Warren> is relevant to the portal).
> There is definitely an
> attack vector there. Suppose an attacker can monitor the
> traffic, say on an unencrypted Wi-Fi hot spot. The attacker
> can see a DHCP request or INFORM, and race in a fake
> response with an URL of their own choosing. The mark's
> computer automatically connects there, and download some
> zero-day attack. Bingo!
Warren> An attacker with this level of access can already do
Warren> this. They fake a DHCP response with themselves as the
Warren> gateway and insert a 302 into any http connection. Or, more
Warren> likely they simply inject malicious code into some
Warren> connection.
I'm with Christian. The attack he describes--injecting a URI--is less
likely in my mind to be noticed than setting up a gateway. So, I do
consider this a new vector.
_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art