Re: resistance to swamping attacks.
touch@isi.edu Fri, 20 September 1996 19:07 UTC
Received: from relay.hq.tis.com by neptune.TIS.COM id aa28218; 20 Sep 96 15:07 EDT
Received: by relay.hq.tis.com; id PAA17145; Fri, 20 Sep 1996 15:10:54 -0400
From: touch@isi.edu
MMDF-Warning: Parse error in original version of preceding line at neptune.TIS.COM
Received: from sol.hq.tis.com(10.33.1.100) by relay.tis.com via smap (V3.1.1) id xma017138; Fri, 20 Sep 96 15:10:26 -0400
Received: from relay.hq.tis.com by tis.com (4.1/SUN-5.64) id AA28121; Fri, 20 Sep 96 15:09:36 EDT
Received: by relay.hq.tis.com; id PAA17132; Fri, 20 Sep 1996 15:10:25 -0400
Received: from zephyr.isi.edu(128.9.160.160) by relay.tis.com via smap (V3.1.1) id xma017127; Fri, 20 Sep 96 15:10:08 -0400
Received: from ash.isi.edu (ash-a.isi.edu) by zephyr.isi.edu (5.65c/5.61+local-23) id <AA14985>; Fri, 20 Sep 1996 12:12:31 -0700
Date: Fri, 20 Sep 1996 12:12:15 -0700
Posted-Date: Fri, 20 Sep 1996 12:12:15 -0700
Message-Id: <199609201912.AA02342@ash.isi.edu>
Received: by ash.isi.edu (5.65c/4.0.3-6) id <AA02342>; Fri, 20 Sep 1996 12:12:15 -0700
To: touch@isi.edu, sommerfeld@apollo.hp.com
Subject: Re: resistance to swamping attacks.
Cc: kim@morningstar.com, ipsec@TIS.COM
X-Auto-Sig-Adder-By: faber@isi.edu
Sender: ipsec-approval@neptune.tis.com
Precedence: bulk
> From sommerfeld@apollo.hp.com Fri Sep 20 11:57:22 1996 > X-Authentication-Warning: thunk.orchard.medford.ma.us: sommerfeld owned process doing -bs > To: touch@isi.edu > Cc: kim@morningstar.com, ipsec@tis.com > Subject: Re: resistance to swamping attacks. > Date: Fri, 20 Sep 1996 14:57:02 -0400 > From: Bill Sommerfeld <sommerfeld@apollo.hp.com> > > > Aren't authentication functions symmetric, almost by definition? > > > > Joe > > well, RSA signatures aren't (expense depends on the length of the > exponent and the public exponent is usually made short so signature > verification is fast at the expense of making signing expensive) but > those are clearly too expensive to use in per-packet transforms. > But then you're authenicating the signature, but not the packet itself, no? In that case, I can replay a signed connection-establishment request with random source addrs. Joe ---------------------------------------------------------------------- Joe Touch - touch@isi.edu http://www.isi.edu/~touch/ ISI / Project Leader, ATOMIC-2, LSAM http://www.isi.edu/atomic2/ USC / Research Assistant Prof. http://www.isi.edu/lsam/
- resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. Kim L. Toms
- Re: resistance to swamping attacks. Robert Moskowitz
- Re: resistance to swamping attacks. Matt Crawford
- Re: resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. touch
- Re: resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. touch
- Re: resistance to swamping attacks. Bill Sommerfeld
- Re: resistance to swamping attacks. touch
- Re: resistance to swamping attacks. Germano Caronni
- Re: resistance to swamping attacks. touch
- Re: resistance to swamping attacks. Germano Caronni