Re: [saag] can an on-path attacker drop traffic?

Fernando Gont <fernando@gont.com.ar> Fri, 02 October 2020 03:01 UTC

Return-Path: <fernando@gont.com.ar>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D7BC3A0C32 for <saag@ietfa.amsl.com>; Thu, 1 Oct 2020 20:01:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.213, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JCkYL0Nmnsso for <saag@ietfa.amsl.com>; Thu, 1 Oct 2020 20:01:14 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 731D93A0C11 for <saag@ietf.org>; Thu, 1 Oct 2020 20:01:14 -0700 (PDT)
Received: from [IPv6:2800:810:464:399:85a9:9e7:d7fe:7d2c] (unknown [IPv6:2800:810:464:399:85a9:9e7:d7fe:7d2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 409B1283A5B; Fri, 2 Oct 2020 03:01:10 +0000 (UTC)
To: Michael Richardson <mcr+ietf@sandelman.ca>, saag@ietf.org
References: <4645.1599064072@localhost>
From: Fernando Gont <fernando@gont.com.ar>
Message-ID: <6859c97d-3f0c-0361-5e72-5b82e93568f7@gont.com.ar>
Date: Thu, 1 Oct 2020 23:54:06 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <4645.1599064072@localhost>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/Kj1HnwbeVi3Kpr_DcVApcyBhsKM>
Subject: Re: [saag] can an on-path attacker drop traffic?
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Oct 2020 03:01:17 -0000

On 2/9/20 13:27, Michael Richardson wrote:
[...]
> 
> A firewall or router is a potential on-path attacker, but it can also drop packets.
> What do we call this?
> This was historically called a MITM, and it implied all the attributes of
> on-path.  But it is unclear to me if MITM > on-path, or MITM == on-path.

FWIW, I'd call this "man in the middle", and I'd say MITM > on-path.

MITM implies the attacker receives the packets, and then it's up to the 
attacker to just inspect and pass on, or inspect & drop, or simply drop.

Thanks,
-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@si6networks.com
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1