Nico Williams wrote this message on Mon, Aug 18, 2014 at 19:14 -0500:
> On Mon, Aug 18, 2014 at 03:52:07PM -0700, John-Mark Gurney wrote:
> > John-Mark Gurney wrote this message on Mon, Aug 18, 2014 at 15:42 -0700:
> > > I have reviewed the security considerations on the other proposals,
> > > and I must say that they need to be fleshed out... The TLS one is
> > > especially lacking in details... It says nothing about various attacks
> > > that it is vulnerable to... The others aren't much better...
> >
> > Just for the proposals, I feel that a minimum of the following should
> > be included in the security considerations section:
> >
> > 1. What happens upon spoofed packets, including fake and replayed
> > packets
> > 2. What happens upon deleted data
> > 3. How are attackers able to force close your connection, if any.
> >
> > I'm sure others have ideas of what should be included.
>
> Requirements are needed too.
>
> I realize now that we can't expect to defend well against RST attacks,
> as they are a DoS attack after all. A sufficiently well-equiped and
There are mitigation tecniques, like timeout for unauthed RST and
the like...
> positioned adversary can just stop all bits moving for the given
> connection or client/server pair.
Agreed...
> I'm having a harder time with confidentiality-but-not-integrity
> protection for the octet streams though. IMO integrity protection for
> the octet streams has to be a requirement, so that the answers to (1)
> must be "replays are detected and dropped" and "fake segments are
> dropped", while the answer to (2) must be the same as for plain TCP.
Agreed, but some of the proposals like TLS's has nothing of the
above, and I just want to make sure that we have a minimum of what
must be said about how each proposal handles various attacks...
For example, the only thing that the TLS's proposal says in it's
security considerations section is that it's vulnerable to attack
because they can remove the TCP-TLS option... Nothing about spoofed
packets, or dropped packets, etc...
Not even a reference to TLS's security considerstaions... Though
RFC5925's security considerations section is useless... Please read
the whole doc for them (yes, they did call out Appendix D, E, and
F)... :(
--
John-Mark Gurney Voice: +1 415 225 5579
"All that I will do, has been done, All that I have, has not."
_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc