Hi,

  Should "return_routability_check" use flight retransmission [1] ?

Should the heartbeat message be re-used instead of the proposed new message exchange?

  It sounds really similar, except that if heartbeat failed we terminate the connection and for "return_routability_check" we update the peer address.

  Must heartbeat message be authenticated and encrypted using the currently active security context ? reading the RFC[2] it's not clear to me.

  heartbeat RFC also explains how to handle heartbeat message during handshake. Maybe this RFC should clarify this too.

Simon

[1] https://tools.ietf.org/html/rfc6347#section-4.2.4
[2] https://tools.ietf.org/html/rfc6520

Le 09/07/2019 à 11:05, Hannes Tschofenig a écrit :

Hi all,

working on the DTLS connection id drafts we noticed that there is one security aspect, which could benefit from an extra mitigation technique.

The issue is that an on-path adversary could intercept and modify the source IP address  (and the source port) of a DTLS datagram.  Even if receiver checks the authenticity and freshness of the packet, the recipient is fooled into changing the CID-to-IP/port association. This can lead to black-holed or redirected traffic. Of course, an on-path adversary can do lots of things to traffic and the problem is self-fixing but it still lead us to work on a solution in form of a return-routability check.

Here is the draft:

https://tools.ietf.org/html/draft-tschofenig-tls-dtls-rrc-00

Ciao

Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to