RE: data origin authentication
Joern Sierwald <joern@f-secure.com> Wed, 08 May 2002 14:09 UTC
Received: from lists.tislabs.com (portal.gw.tislabs.com [192.94.214.101]) by above.proper.com (8.11.6/8.11.3) with ESMTP id g48E9VL21389; Wed, 8 May 2002 07:09:31 -0700 (PDT)
Received: by lists.tislabs.com (8.9.1/8.9.1) id JAA14223 Wed, 8 May 2002 09:15:33 -0400 (EDT)
Message-Id: <5.1.0.14.0.20020508000513.02839fd8@dfintra.f-secure.com>
X-Sender: joern@dfintra.f-secure.com
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Wed, 08 May 2002 00:21:49 +0200
To: ipsec@lists.tislabs.com
From: Joern Sierwald <joern@f-secure.com>
Subject: RE: data origin authentication
In-Reply-To: <6F0AA176DA68704884B7507AE6907E180817DA@snake012.odetics.co m>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"; format="flowed"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by lists.tislabs.com id DAA13138
Sender: owner-ipsec@lists.tislabs.com
Precedence: bulk
At 12:01 07.05.2002 -0700, you wrote: >Hello, Joern >if you are a bad guy and you own a in-bound SA you can produced a faked ESP >packet that looks like its come from the other party of your in-bound SA. >Then you can claim that you got this packet from the other party. So the >data origin authentication of ESP (two parties know the same authentication >key) don't deliver non-repudiation of data origin. But a receiver can be >sure that the sender of an incoming ESP packet is only the other party of >the related in-bound SA or the receiver itself. For this proof, I guess, the >receiver needs only <dst IP address, protocol (ESP), SPI> to find the >related SA and the related authentication key. The receiver proofs the >authentication value and this proof delivers the answer, if the sender has >the identity the sender claimed. The check against the ip address of the >sender saves time (if you do it before) and is a MUST but for the data >authentication not really necessary. But I'm also a newcomer in IPSec and >may be I'm wrong. >Christina I question the "for the data authentication not really necessary" part. An example. Let's have a syslog client and server. syslog is _unidirectional_ UDP traffic. The connection between the client and the server is IPsec transport mode. Now, the IP address of the client (src) shows up in the logs of the server, and it is valuable information. If a man-in-the-middle would just alter the src address of the packets, the information in the server would be wrong. The point of authentication in ESP is that the information was not altered in transit! Since the authentication trailer in ESP does not handle the IP source address, the receiver has to check (memcmp) the source address with the expected one. That's part of authentication. Not some optimization to save time. Jörn
- data origin authentication Goeman Stefan
- Re: data origin authentication Henry Spencer
- Re: data origin authentication Joern Sierwald
- Re: data origin authentication Bill Sommerfeld
- RE: data origin authentication Goeman Stefan
- Re: data origin authentication Michael Richardson
- Re: data origin authentication Michael Richardson
- RE: data origin authentication Henry Spencer
- RE: data origin authentication Christina Helbig
- RE: data origin authentication Goeman Stefan
- RE: data origin authentication Joern Sierwald
- RE: data origin authentication Christina Helbig