Re: [homenet] [Int-area] [Captive-portals] [EXTERNAL] Re: Evaluate impact of MAC address randomization to IP applications

2020-09-30 Thread Philip Homburg
>We need some diagrams that we can all agree upon, and we need to name the >different observers. > >Each thing defends against different kinds of observers, and not all >observers can see all things. Observer may be the wrong term, the more standard term is attack scenario. Some attacks are

Re: [homenet] Please review security considerations of draft-homenet-babel-profile

2017-07-27 Thread Philip Homburg
>>> Yeah, the so-called "TTL hack". > >> Care to explain why it would not be useful? > >At the time I wrote down Babel, I decided that given that we have link-local >addresses that are securely scoped to a single link, the TTL hack is not >necessary. The TTL hack is used in ND. It strikes me as

Re: [homenet] Please review security considerations of draft-homenet-babel-profile

2017-07-26 Thread Philip Homburg
>Yeah, the so-called "TTL hack". Care to explain why it would not be useful? ___ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet

Re: [homenet] Please review security considerations of draft-homenet-babel-profile

2017-07-26 Thread Philip Homburg
In your letter dated Wed, 26 Jul 2017 20:49:10 +0200 you wrote: >> Historically, a popular brand of router would forward packets with LL source >. > >"Historically"? Has this been fixed? I wanted to give them the benefit of the doubt. Sometimes they do fix a bug and I didn't want to spend any

Re: [homenet] Please review security considerations of draft-homenet-babel-profile

2017-07-26 Thread Philip Homburg
>Nasty comments on list, please, compliments by private mail ;-) A trick used in some places, such as ND, is to require the receiver to check that the hop limit is equal to 255. This ensures that the packet has not been forwarded by any router (obviously the sender also has to send it with a hop

[homenet] draft-pfister-homenet-dot-00

2016-11-18 Thread Philip Homburg
Some remarks regarding draft-pfister-homenet-dot-00: (I'll ignore the specific value '.homenet') Section 2: "or only reachable from within the home "network (e.g., a web server hosted by the service provider and "providing a service that is specific to the home)." I think it is best to drop

Re: [homenet] write up of time without clocks

2016-11-13 Thread Philip Homburg
>You write TLS, but really, I think you mean PKIX (certificates). >AFAIK, TLS with raw public key or PSK doesn't care about time. > >While this might be a pedantic point, I think it's important to be clear >about where the problem is because it reveals that there are TLS uses which >do not have

Re: [homenet] write up of time without clocks

2016-11-05 Thread Philip Homburg
>Which in some implementations, means having a clock to know that your current >firmware is actually newer than the "proposed" new firmware (which is really >much older), or knowing that it's been too long since a firmware load. Where I entered the discussion is basically saying that only way to

Re: [homenet] write up of time without clocks

2016-11-03 Thread Philip Homburg
>>> ddos attack like against Dyn > >I could be wrong, but I believe that Dyn was DDoSed by the Mirai botnet, >which propagates by exploiting devices configured with default credentials. >This has nothing to do with outdated firmwares. The problem is that you cannot realistically update those

Re: [homenet] write up of time without clocks

2016-11-03 Thread Philip Homburg
> This started with a need for somewhat accurate system time for > certificate validation, right? I have to deal with stuff lacking > a RTC battery. I save system time every now and then in flash. > During startup, clock jumps forward to RTC when warm start occurs > (main power was not

Re: [homenet] write up of time without clocks

2016-11-02 Thread Philip Homburg
>> So the device should have the vendor's long term TLS certicate. With possibl >y >> an option for the user to disable this kind of security if the device is >> not actually connected to the internet. > >No, during disaster recovery the last thing you need is for ordinary people >to be faced with

Re: [homenet] [Babel-users] Detecting bridges

2015-12-18 Thread Philip Homburg
>> I.e., a router on wifi announces wifi and when a router that is on wired >> receives an announcement from a router on wifi it knows that there >> a bridge somewhere. > >Not a bad idea, but I'm a little hesitant to implement that, since it >would require defining a taxonomy of interface types at

Re: [homenet] [Babel-users] Detecting bridges

2015-12-17 Thread Philip Homburg
In your letter dated Wed, 16 Dec 2015 18:01:43 +0100 you wrote: > 1. use the wireless type by default (as with -w), people who have >lossless wired links will need to configure them manually; this is bad >for Homenet, which is expected to use wired links extensively, but >perhaps it

Re: [homenet] Reachability of distributed prefixes

2015-08-26 Thread Philip Homburg
In your letter dated Wed, 26 Aug 2015 15:07:50 +0200 you wrote: On Wed, Aug 26, 2015 at 2:31 PM, Juliusz Chroboczek j...@pps.univ-paris-diderot.fr wrote: What I'm saying is that neither DHCPv4 nor IPv6 RA are designed to deal with prefixes that last less than a few hours. See for example RFC

Re: [homenet] Let's make in-home ULA presence a MUST !?

2014-10-15 Thread Philip Homburg
In your letter dated Wed, 15 Oct 2014 16:58:43 +0200 you wrote: Please understand that there are way more non-geeks out there that have no interest in computers except use them than there are geeks who care about IP addressing. *Our* job is to make it work for *them*, without forcing our world

Re: [homenet] Let's make in-home ULA presence a MUST !?

2014-10-14 Thread Philip Homburg
In your letter dated Tue, 14 Oct 2014 16:59:30 +0200 you wrote: Because this is the only way that application developers will learn to handle it. I'm happy my ISP doesn't do that. I would probably just use a tunnel instead. One of the advantages of IPv6 is that it is way easier to run publicly

Re: [homenet] Please review the No IPv4 draft

2014-04-19 Thread Philip Homburg
In your letter dated Fri, 18 Apr 2014 09:57:21 -0430 you wrote: You are absolutely right, thanks. But anyway the scenario I mentioned above can also exists (and for good or bad eventually will happen).. I just wanted to express my position about the option NO-IPv4 in DHCPv4 I'd say that if

Re: [homenet] Please review the No IPv4 draft

2014-04-18 Thread Philip Homburg
In your letter dated Thu, 17 Apr 2014 22:16:19 -0430 you wrote: I like the idea of having the No-IPv4 option for DHCPv6. I don't like the idea of having this option in a v4 world; mainly because in mix networks where you might have some folks which only speak IPv4, imagine a case where this

Re: [homenet] Please review the No IPv4 draft

2014-04-16 Thread Philip Homburg
In your letter dated Wed, 16 Apr 2014 09:07:46 -0400 you wrote: Philip Homburg pch-homene...@u-1.phicoh.com wrote: Does that include all edge cases and the user interface? I.e. DHCPv4 has configured an address and by mistake a RA orders IPv4 to be shutdown. Do you just

Re: [homenet] Please review the No IPv4 draft

2014-04-15 Thread Philip Homburg
In your letter dated Tue, 15 Apr 2014 09:46:38 -0400 you wrote: Le 2014-04-15 07:28, Toke H=F8iland-J=F8rgensen a =E9crit : Simon Perreault simon.perrea...@viagenie.ca writes: = Correct. But if DHCP or RAs are not filtered at layer 2, a rogue user can already do this today without this

Re: [homenet] Please review the No IPv4 draft

2014-04-15 Thread Philip Homburg
In your letter dated Tue, 15 Apr 2014 11:24:48 -0400 you wrote: Le 2014-04-15 09:56, Philip Homburg a écrit : Right, to a certain extent that is true, of course; but not in the same drive-by fashion where a single packet can put everyone offline (if the option is not in the regular

Re: [homenet] Please review the No IPv4 draft

2014-04-15 Thread Philip Homburg
In your letter dated Tue, 15 Apr 2014 12:05:59 -0400 you wrote: http://resources.infosecinstitute.com/slaac-attack/ When you have unfiltered L2 access, there are LOTS of evil things you can do. The world is not black and white. Rogue RAs are easy for hit and run attacks. Maybe I should already

Re: [homenet] Please review the No IPv4 draft

2014-04-15 Thread Philip Homburg
In your letter dated Tue, 15 Apr 2014 11:24:31 -0500 you wrote: I think you are talking apples and oranges. Simon, you are assuming a functio nal configuration environment; in such an environment, the change would be fair ly trivial. Philip, I think you are assuming the current status quo on

Re: [homenet] Please review the No IPv4 draft

2014-04-15 Thread Philip Homburg
In your letter dated Tue, 15 Apr 2014 12:09:48 -0500 you wrote: On Apr 15, 2014, at 11:47 AM, Philip Homburg pch-homene...@u-1.phicoh.com wro te: On the other hand, if you need have RAs signal suspend and resume of IPv4 you are looking at rewriting the management code of lots of different Linux