Jeff, good catch.

We can document both ways, ie we can let implementations decide which of the 2 
methods below they prefer? Or is the concern that this will cause a DISCUSS?

Regards,
Reshad.

Sent from my iPhone

> On Jan 28, 2024, at 12:21 PM, Jeffrey Haas <jh...@pfrc.org> wrote:
> 
> Optimizing Auth Authors and Working Group,
> 
> The text on github is coming along, thanks.  Much of the work has been
> toward resolving procedural discussions vs. the secure sequence numbers
> draft.  While doing my latest review, it occurred to me that the periodic
> reauthentication procedure is perhaps flawed.
> 
> When running in the optimized mode, authentication may be disabled, the new
> NULL auth type, or Meticulous Keyed ISAAC.  For disabled or NULL, the intent
> of periodic re-authentication was to address active attacks on the Up
> portion of the session.[1]
> 
> The procedures have a BFD implementation periodically sending out
> authenticated control packets.  However, there's no way in the current
> procedures to synchronize that the receiver of those packets should expect
> authentication.
> 
> Thus, it's possible for an active attacker to simply drop the strong
> authentication packets and simply continue to inject either the
> unathenticated packets, or the next expected sequence numbers in the NULL
> auth mode.
> 
> There's at least two possible ways to address this:
> 1. We simply don't worry about periodic re-auth for no-auth or NULL-auth.
> We thus don't protect against this attack.  If you care about this attack,
> use Meticulous Keyed ISAAC and the attack goes away.
> 2. We test periodic strong authentication by using a Poll sequence.  If we
> don't receive a Fin within the Detect Interval with strong auth, compromise
> should be expected.
> 
> 
> -- Jeff
> 
> [1] Yes... the only attack we have in this mode is "keep the session Up when
> it might otherwise not be".  I expect the usual hilarity when we get to
> security area review.
> 

Reply via email to