Re: [saag] can an on-path attacker drop traffic?

Alan DeKok <aland@deployingradius.com> Sun, 04 October 2020 16:46 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB94E3A08AF for <saag@ietfa.amsl.com>; Sun, 4 Oct 2020 09:46:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xCCstkQqxm0i for <saag@ietfa.amsl.com>; Sun, 4 Oct 2020 09:46:33 -0700 (PDT)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F44B3A08AE for <saag@ietf.org>; Sun, 4 Oct 2020 09:46:33 -0700 (PDT)
Received: from [192.168.46.130] (24-52-251-6.cable.teksavvy.com [24.52.251.6]) by mail.networkradius.com (Postfix) with ESMTPSA id 0742F198; Sun, 4 Oct 2020 16:46:30 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <B065DBF3-B6BC-44A9-906A-AA51FEA9ADBC@vpnc.org>
Date: Sun, 4 Oct 2020 12:46:29 -0400
Cc: IETF SAAG <saag@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <87DC9F8E-1FA9-48AC-9757-182E6E813014@deployingradius.com>
References: <CABcZeBPPZuRri7vC1gR+asmiyi+ABDA3RA16UHJQbEgW95+q_g@mail.gmail.com> <AD7F2CB8-6312-4E31-A4C9-29E81FDEC17E@huitema.net> <B065DBF3-B6BC-44A9-906A-AA51FEA9ADBC@vpnc.org>
To: Paul Hoffman <paul.hoffman@vpnc.org>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/R0uevzT0Vz9uqqaxiu98GtK1rks>
Subject: Re: [saag] can an on-path attacker drop traffic?
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Oct 2020 16:46:36 -0000


> On Oct 4, 2020, at 11:17 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:
> 
> I like Christian's triage (minus the "men"). The "where are they relative to the path" differentiation is likely to be more understandable to people who are not security geeks than "what they can do with creative use of packets". Using a road analogy: a person running a tollbooth, a person who can watch the cars go by and tell his colleagues when to enter the stream in order to do damage, a person who cannot see the traffic or send in cars but can cause lightning storms and send fake news to the cars on the road.

  My $0.02 is to call this "the council of attackers".  One is a malicious messenger, who rewrites messages he sends.  Another is the oppressive observer, who uses your information against you.  And the third is the chaos creator, who just breaks things so you can't use them.

  Alliteration is cute, and helps with memory.  :)
 
  Alan DeKok.