I agree that we should have more discussion on this.

 

发件人: Michael Chen [mailto:[email protected]] 
发送时间: 2013年7月7日 23:51
收件人: 邓灵莉/Lingli Deng; [email protected]
主题: RE: [P2PSIP] An overlay resource leak scenario

 

Hi Lingli,

 

A secure system cannot rely on "well-behaved" client. What if this is an 
attack? A peer does nothing but register and store the new certificate.

 

The enrollment server side limit mentioned by Marc is another possible counter 
measure, but I think Remedy #1 is better. If you're going to keep the state 
information for the limit, why not just keep the expiration date of the 
certificate already issued. The server resource cause will be the same.

 

EKR's suggestion will also work, if there is no security risk with known 
user_name to Node-ID mapping.

 

This topic needs more discussions. Please add it to the Berlin agendas if none 
of the principal authors are able to respond before then.

 

Thanks

 

--Michael

--------- Original Message --------- 

Subject: 答复: [P2PSIP] An overlay resource leak scenario
From: "邓灵莉/Lingli Deng" <[email protected]>
Date: 7/4/13 3:57 pm
To: "'Michael Chen'" <[email protected]>, [email protected]

Hi Michael,

 

I don’t quite follow the case you described.

 

Shouldn’t a well-behaved rejoining peer be using the still valid certificate in 
the first place?

Otherwise, it is easy to exploit this to launch a DoS attack against ES, which 
must be protected.

 

BR

Lingli

 

_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to