On Mon, 28 May 2007, Vishwas Manral wrote:
I noticed one more security issue like the Destination options header
attack. A packet is sent by using a destination header as a Multicast
Group address, and source address of the machine to be attacked. A
random Option type is added to the destination Options header, which
has the highest order two bits as 10 (send ICMP Reply to the source).

The above would cause ICMP packets to be sent to the source address
from all members of the multicast group to the source. This could very
eaily overwhelm the source

AFAICS, I don't see how this attack would be very effective. Multicast forwarding algorithms check (for loop prevention) that a packet destined to a multicast address comes from a topologically RPF-wise correct direction. So unless you assume a router has been compromised (and all bets are off) basically you can only spoof an address inside the subnet where the attacker is, but I don't see this as a very useful attack myself because it'd be more effective to attack directly.


--
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

--------------------------------------------------------------------
IETF IPv6 working group mailing list
[email protected]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to