Noel's summary of the technical flaws in the claims
about GSE security is entirely consistent with reality.

Both Steve Bellovin and I were on the IAB a few years 
back when the issue of the "GSE Analysis" draft came up.
Steve was quite clear that the claims that existing
"IP Address-based authentication" (sic) were meaningful
were widely rejected within the security community.

Among of the points he made were that IP address forgery 
is      (1) widespread in the deployed Internet,
        (2) practical for an attacker to undertake, 
        and (3) well known historically. 
        [CERT CA-1995-01, CERT CA-1995-18]

The only viable fix for these well-understood failures
of "address-based authentication" (sic), as tli already 
pointed out, is to deploy IPsec transport-mode for the 
packets being protected.  

(Tunnel-mode IPsec doesn't bind the IP address(es) of 
the tunnelled IP packet to the IPsec Security Association, 
unlike transport-mode IPsec, so with tunnel-mode there 
is no cryptographic authentication of the addresses.)

IPsec for ILNP is actually an improvement over IPsec for IP,
because it only binds cryptographically to the Identifier
value.  This means that locator-rewriting has no impact
on the IPsec processing and also no impact on the provided
security properties.  

(Of course, only the authorised parties known the IPsec 
Security Association attributes, such as the crypto key, 
so an attempted forger would not be able to create a packet 
with IPsec that passed cryptographic authentication
while claiming to be from some intended-victim's identifier.)

Yours,

Ran


_______________________________________________
rrg mailing list
[email protected]
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to