On Wed Jan 25 04:41:29 2012, Evgeniy Khramtsov wrote:
On 25.01.2012 09:30, Mike Wacker wrote:
I saw this in RFC 6120:

"To reduce the possibility of a denial-of-service attack, (a) the receiving entity SHOULD NOT close the stream with a <see-other-host/> stream error until after the confidentiality and integrity of the stream have been protected via TLS or an equivalent security layer (such as the SASL GSSAPI mechanism), and (b) the receiving entity MAY have a policy of following redirects only if it has authenticated the receiving entity. In addition, the initiating entity SHOULD abort the connection attempt after a certain number of successive redirects (e.g., at least 2 but no more than 5)."

Does anyone have any clarification to this section and the specific DoS threat if TLS (or authentication) does not happen before <see-other-host>?


Indeed, what problem could occur with unauthenticated redirections?

I thought only Brits were allowed to do sarcasm?

There's one DoS and a general attack:

1) General attack is to spoof the TCP response and redirect to a server of your choice. Note that TLS prevents the TCP stream spoofing; authentication also prevents DNS spoofing. This accounts for the SHOULD NOT and the MAY.

2) Specific DoS is to setup a loop of servers redirecting to each other. You'd likely spoof into the loop. This would cause a continuous connection loop. This accounts for the final SHOULD.

Dave.
--
Dave Cridland - mailto:[email protected] - xmpp:[email protected]
 - acap://acap.dave.cridland.net/byowner/user/dwd/bookmarks/
 - http://dave.cridland.net/
Infotrope Polymer - ACAP, IMAP, ESMTP, and Lemonade

Reply via email to