In message <[EMAIL PROTECTED]>, Gerard.Gastaud@alc
atel.fr writes:

>
>
>
>and the user may refuse to pay because it idid not ask for the flow label
that the malicious entity overwrote


An enemy who is overwriting flow labels could generate fake packets 
with arbitrary flow labels.  It's strictly easier -- instead of 
deleting and reinserting packets, you just generate them, with any 
fields you want.

If the routers can't cryptographically verify every flow labeled-packet
-- and they can't do that in any rational fashion, I suspect -- then 
the only other choice is border control.  Your border routers -- 
including the peering routers, if necessary -- have to check that 
incoming packets are, in some sense, "legal".  In particular, if you're 
going to charge someone extra for such services, you have to ensure 
that the right party sent the packets.  (This creates an interesting 
problem at peering links -- what do you do with packets that have a 
legal flow label for the peer, but not for you?)

                --Steve Bellovin, http://www.research.att.com/~smb
                Full text of "Firewalls" book now at http://www.wilyhacker.com


--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to