[Hipsec-rg] next steps with draft-heer-hip-middle-auth-00
miika at iki.fi (Miika Komu) Wed, 23 January 2008 22:41 UTC
From: "miika at iki.fi"
Date: Thu, 24 Jan 2008 00:41:32 +0200
Subject: [Hipsec-rg] next steps with draft-heer-hip-middle-auth-00
In-Reply-To: <200801231650.52455.julien.IETF@laposte.net>
References: <77F357662F8BFA4CA7074B0410171B6D04049B5D@XCH-NW-5V1.nw.nos.boeing.com> <200801231524.05815.julien.IETF@laposte.net> <ECE85BC5-16DC-484F-A6CE-F1638B280882@cs.rwth-aachen.de> <200801231650.52455.julien.IETF@laposte.net>
Message-ID: <Pine.SOL.4.64.0801240020280.1083@kekkonen.cs.hut.fi>
On Wed, 23 Jan 2008, Julien Laganier wrote: > Hello Tobias, > > On Wednesday 23 January 2008, Tobias Heer wrote: >> Am 23.01.2008 um 15:24 schrieb Julien Laganier: >>> On Wednesday 23 January 2008, Tobias Heer wrote: >>>>> I am actually unclear about the goal of BEX inspection by >>>>> middlebox (e.g. signature verification). What kind of security >>>>> service does it offer? >>>> >>>> The goal is that the middlebox can verify the Identity of the >>>> hosts that communicate across it unambiguously. >>> >>> This is ambiguous in itself :) >>> >>> AFAIU, 'communicate' refers only the BEX. The middlebox doesn't >>> verify identity of the hosts sending payload packets (e.g., ESP). >> >> The "communicate" refers to the HIP control packets, e.g. BEX and ? >> UPDATE and the payload channel associated with the HIP control >> channel. The middlebox can derive some expected properties for the >> payload channel from the HIP control messages (e.g. IP address pairs >> and SPIs). It can use these properties to block certain payload that >> does not belong to an authenticated HIP association. > > Verifying IP addresses and SPIs does not provide a strong insurance that > the payload packets are indeed exchanged by the parties that > participated in the BEX. > > If no strong insurance is present, what's the value of verifying > signatures in HIP BEX since in the end payload packets are allowed in > based on unprotected packet fields (IPs and SPIs). A statefull firewall > would provide the same level of protection without verifying > signatures. Hi Julien, I didn't get the point with statefull firewalls, can you clarify? The SPI field is integrity protected. Also, a fake base exchange (to create a fake ESP channel) can pass all ACL checks in the firewall if the firewall does not check signatures in a mobile environment. However, just including signatures is not enough because an authentic base exchange can replayed to create a fake ESP channel. Thus, we need the middlebox to ensure the uniqueness of the base exchange with middlebox nonces that are signed by the end-hosts. What I am not sure is that what happens with the old middleboxes when both of the end-hosts move behind new middleboxes. I guess the old middboxes have to expire the state using timers, but attackers working at both ends could reuse the ESP channel until it expires. Anyway, this attack does not seem very realistic to me. -- Miika Komu http://www.iki.fi/miika/
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Miika Komu
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Miika Komu
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Samu Varjonen
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Samu Varjonen
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Tobias Heer
- [Hipsec-rg] next steps with draft-heer-hip-middle… Julien Laganier
- [Hipsec-rg] next steps with draft-heer-hip-middle… Samu Varjonen
- [Hipsec-rg] next steps with draft-heer-hip-middle… Miika Komu
- [Hipsec-rg] next steps with draft-heer-hip-middle… Henderson, Thomas R