Re: [Last-Call] Opsdir telechat review of draft-ietf-anima-constrained-join-proxy-10

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jürgen Schönwälder via Datatracker wrote:
    > I am still struggling with the fact that the constrained Join
    > Proxy does allow attackers to send packets to arbitrary link-local
    > endpoints. The new security considerations text gives this advice:

Yes, attackers who are already inside the network.
They can send to arbitrary destinations on the insecure side of the network.

This is not a drive-by attack from an outsider, but an attack of an outside
by an insider.  So there is definitely some kind of exfiltration channel
here.  But, if it's an LLN network of low-power radios, then any device can
also just send unencrypted traffic on arbitrary channels at arbitrary times.

Having a different node (the Join Proxy) send the traffic allows for a
certain amount of diversion of origin, and perhaps there is a power savings
to the malevolent insider.

If one is running RPL, with RH3 headers, then the attackers can *already*
do this kind of thing.

--
Michael Richardson <mcr+IETF@xxxxxxxxxxxx>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux