Jeff,
    On Tuesday, February 6, 2024, 01:51:59 PM EST, Jeffrey Haas 
<jh...@pfrc.org> wrote:  
 
 Reshad,


On Feb 6, 2024, at 11:51 AM, Reshad Rahman <res...@yahoo.com> wrote:
 Jeff, you mention below that NULL auth with sequence numbers is impractical to 
use for optimizing authentication. I agree that NULL auth doesn't help with an 
active attacker, but it still gives protection against "random" attacks? 

Unfortunately not in all circumstances.  The attack in this case is a form of 
"blind injection" attack.  As John notes in other bit of the thread, when 
sessions are protected via GTSM, this limits where the attack can come from.  
So, this would apply to whomever can inject packets that successfully get past 
the other necessary checks.<RR> Ack, I get that part. I should have said "some 
protection" but yes the blind injection can get lucky.
TCP is vulnerable vs. some flavors of this as well.  Long lived tcp sessions, 
such as BGP, need the protections covered by tcp-md5/ao or other protection 
such as ipsec to guard against such things.


ISAAC works for active attacks but I don't understand why no-auth still works, 
no-auth is weaker than NULL auth: you don't need to be an active attacker to 
knock over a session with no-auth?

With no-auth, the only thing you can say is "the session is still up".  In the 
optimized case we're guarding against parameter changes so that's all we get to 
do.<RR> What I don't understand is no-auth still works in the statement below: 
if NULL auth is impractical, so should no-auth. What I am missing?"1. NULL auth 
and using the sequence numbers becomes impractical to use for optimizing 
authentication procedures.  ISAAC and no-auth still work. "
  

Reply via email to