>It might be possible for an attacker to take a valid signature of data from
>the structure in 4.2,
>and present it as a valid signature of the same bytes interpreted with the
>structure in 4.1.
If you have worked out a concrete example showing how the attack works,
it would be good to see that. For this type of attack to be feasible, is it
required that the size
of the signature field equals the combined size of {Alg. ID, NLRI length, NLRI
prefix}?
If yes, observe that the size of the signature field (ECDSA-P256) = 64 octets +
a few variable #octets,
and the combined size of {Alg. ID, NLRI length, NLRI prefix} is either 6 octets
(IPv4) or 18 octets (IPv6).
Sriram
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr