> On May 30, 2022, at 8:00 AM, Christian Huitema <huit...@huitema.net> wrote:
> 
> The bar against TCP injection attacks might be lower than you think. An 
> attacker that sees the traffic can easily inject TCP packet with sequence 
> number that fit in the flow control window and are ahead of what the actual 
> sender produced. 


It might be useful to be more specific about the issue. Data injection attacks 
on TCP connections interfere with the IPsec stream in a similar way to IP or 
UDP fragment attacks on IP or UDP tunnels that use fragmentation. 

In all three cases, attackers can corrupt in-transit packets via IP packet 
attacks, which is not possible with an unfragmented IPsec message.

In all three cases, this happens when an injection can overwrite a portion of 
an IPsec message.

Data isn’t injected to the user, though.

Joe




_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to