Re: resistance to swamping attacks.

touch@isi.edu Fri, 20 September 1996 19:07 UTC

Received: from relay.hq.tis.com by neptune.TIS.COM id aa28218; 20 Sep 96 15:07 EDT
Received: by relay.hq.tis.com; id PAA17145; Fri, 20 Sep 1996 15:10:54 -0400
From: touch@isi.edu
MMDF-Warning: Parse error in original version of preceding line at neptune.TIS.COM
Received: from sol.hq.tis.com(10.33.1.100) by relay.tis.com via smap (V3.1.1) id xma017138; Fri, 20 Sep 96 15:10:26 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA28121; Fri, 20 Sep 96 15:09:36 EDT
Received: by relay.hq.tis.com; id PAA17132; Fri, 20 Sep 1996 15:10:25 -0400
Received: from zephyr.isi.edu(128.9.160.160) by relay.tis.com via smap (V3.1.1) id xma017127; Fri, 20 Sep 96 15:10:08 -0400
Received: from ash.isi.edu (ash-a.isi.edu) by zephyr.isi.edu (5.65c/5.61+local-23) id <AA14985>; Fri, 20 Sep 1996 12:12:31 -0700
Date: Fri, 20 Sep 1996 12:12:15 -0700
Posted-Date: Fri, 20 Sep 1996 12:12:15 -0700
Message-Id: <199609201912.AA02342@ash.isi.edu>
Received: by ash.isi.edu (5.65c/4.0.3-6) id <AA02342>; Fri, 20 Sep 1996 12:12:15 -0700
To: touch@isi.edu, sommerfeld@apollo.hp.com
Subject: Re: resistance to swamping attacks.
Cc: kim@morningstar.com, ipsec@TIS.COM
X-Auto-Sig-Adder-By: faber@isi.edu
Sender: ipsec-approval@neptune.tis.com
Precedence: bulk

> From sommerfeld@apollo.hp.com Fri Sep 20 11:57:22 1996
> X-Authentication-Warning: thunk.orchard.medford.ma.us: sommerfeld owned process doing -bs
> To: touch@isi.edu
> Cc: kim@morningstar.com, ipsec@tis.com
> Subject: Re: resistance to swamping attacks. 
> Date: Fri, 20 Sep 1996 14:57:02 -0400
> From: Bill Sommerfeld <sommerfeld@apollo.hp.com>
> 
> > Aren't authentication functions symmetric, almost by definition?
> > 
> > Joe
> 
> well, RSA signatures aren't (expense depends on the length of the
> exponent and the public exponent is usually made short so signature
> verification is fast at the expense of making signing expensive) but
> those are clearly too expensive to use in per-packet transforms.
> 

But then you're authenicating the signature, but not the packet
itself, no?

In that case, I can replay a signed connection-establishment request
with random source addrs.

Joe
----------------------------------------------------------------------
Joe Touch - touch@isi.edu		    http://www.isi.edu/~touch/
ISI / Project Leader, ATOMIC-2, LSAM       http://www.isi.edu/atomic2/
USC / Research Assistant Prof.                http://www.isi.edu/lsam/