Olivier Bonaventure wrote this message on Tue, Aug 19, 2014 at 11:51 +0200:
> Christian,
> 
> >>Stepping up a level, it seems important to figure out what we are
> >>trying to achieve with DoS prevention. An on-path attacker can just
> >>suppress tcpinc negotiation or block packets until the TCP state
> >>machine gives up. So, this mostly applies to off-path attackers?
> >
> >Actually, we already have evidence of "listen in the middle, inject from 
> >the side." It would be nice to protect against such attacks. That means 
> >preventing RST injection.
> >
> >>But
> >>for most settings, just having it be relatively difficult for an off-path
> >>attacker to DoS the connection would probably be OK, since you
> >>have application layer mechanisms that deal with other types of
> >>network failure anyway.
> >
> >Looking at the big picture, an encrypted TCP can be naturally extended to 
> >support multi-homing. If we do that, then we will regret giving 
> >misbehaving on-path agents a way to DOS a connection.
> >
> >In fact, it seems that the reasonable balance is to empower the endpoints 
> >of the TCP connection. Detect that an RST is not signed, and let the end 
> >point decide whether to believe it or to ignore it. Use channel binding to 
> >detect MITM, then let the application decide whether to continue using the 
> >MITM connection or not. Etc.
> 
> I agree with you but instead of extending an encrypted TCP to support 
> multihoming, we could extend Multipath TCP to support encryption.
> 
> Looking at the RST attack which is currently discussed, Multipath TCP 
> already provides a solution to cope with this attack. Since Multipath 
> TCP supports make before break and break before make, the reception of a 
> RST on a subflow (even if there is only one subflow) would terminate 
> this subflow but not the Multipath TCP connection. A Multipath TCP host 
> that receives a RST can simply recreate a new subflow and the connection 
> (as seen from the application) would continue. The reception of the RST 
> would cause a small interruption of the dataflow (during the 
> reestablishment of one subflow), but this is similar to classical 
> retransmissions for packet losses. This works for TLS, SSH, BGP or 
> whatever application runs above Multipath TCP.

Though if the new subflow uses a different key, we'd need a way to
signal the upper layers to reauth the new channel, otherwise it'd be
a great way to MITM an authenticated connection...

> Although this WG was chartered to extend regular TCP and not Multipath 
> TCP, I think that Multipath TCP already contains several mechanisms 
> (subflow management, middlebox interference, data sequence numbers 
> notably) that will be very useful for any TCPinc proposal.

-- 
  John-Mark Gurney                              Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to