Hi Tero,

On Thu, Jul 30, 2009 at 2:16 PM, Tero Kivinen <kivi...@iki.fi> wrote:

> Raj Singh writes:
> > 1. Initiator is behind N(P)AT and float the port to (4500, 4500)
> >
> > and send IKE_AUTH  with source port 4500 now N(P)AT changes source port
> > as 1024 but there is a man-in-the-middle who changes the port to other
> > host behind N(P)AT's port say 1025, still IKE_AUTH packet is
> authenticated.
> >
> > The responder establishes the SA with destination port as 1025 instead of
> > 1024 and sends the reply back to destination port 1025, so it will never
> > reach to original initiator . So the IKE SA will does not get established
> > on initiator But there is no mention of this DoS attack in the draft
> > ?
>
> When the initiator does not get packets, it will retrasnmit its packet
> and if the man-in-the-middle attacker is no longer there it will reach
> the other end and has source port of 1024. This will then be
> authenticated retransmission packet for the other end which will then
> retransmit its previous packet to the address where port numbers were
> swapped. As the packet was not new packet it will not update the SA,
> but next packet from the responder will cause it to update the port
> numbers.
>
> If the man-in-the-middle is still there then the attack is still
> ongoing and he can prevent communications between two peers. He does
> not even need to modify the ports, he can simply delete those
> packets...
>


Agree. But draft does NOT mention about this DoS attack in security
considerations.
We'll have a mention of it in draft as the parent SA itself will come UP
with wrong ports.


>
> > 2. The draft says the host that is NOT behind NAT SHOULD send packet to
> > IP address and port from which it received last authenticated packet.
> > A host behind behind a NAT SHOULD NOT do this because it opens a
> > DoS attack.
>
> Yes.
>
> > But how the location of host(Behind NAT or NOT) avoid DoS attack, say
> > when responder is having public IP, send an UDP encapsulated packet, some
> > man-in-the-middle changes the port, then initiator which is behind NAT
> wil
> > use ports from packet and will never reach the responder. This is also a
> > DoS attack.
> > Please let me how location of host (behind NAT or not) helps in avoiding
> > DoS attack ?
>
> If we take the most common case where the initiator / client is behind
> NAT and responder/server is not behind the NAT. Now the
> responder/server has fixed IP address which will NOT change. Thus if
> host which knows that other end is not behind NAT (i.e. initiator /
> client in this case) does not update IP-addresses at all, as it knows
> the other end has fixed IP-address the attacker cannot force both ends
> to change addresses at the same time. If client would take any packet
> and change other ends address to be as claimed in the headers then
> attacker could simply send one packet that would change client's view
> where the server is, and as the client is behind NAT his old NAT
> mapping would get destroyed after a time, and after that server cannot
> communicate to the client anymore at all.


> --
> kivi...@iki.fi
>

Thanks and Regards,
Raj
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to