Re: On-path attackers (Was: Re: Diversity and offensive terminology in RFCs)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Sep 21, 2018 at 9:17 AM Kathleen Moriarty
<kathleen.moriarty.ietf@xxxxxxxxx> wrote:
>
> On Fri, Sep 21, 2018 at 2:12 AM Jari Arkko <jari.arkko@xxxxxxxxx> wrote:
>>
>> Evan, Carsten, John, Yoav,
>>
>> > On Thu, Sep 20, 2018 at 09:10:51PM +0200, Carsten Bormann wrote:
>> >> The up-to-date term of art is “middleperson attack”
>> >
>> > Perhaps "on-path attack".
>>
>> I agree.
>>
>> I have actually preferred the use of the "on-path attacker” for a long time, for reasons not associated with this thread. While I have certainly used the term man-in-the-middle (and it is a widely understood term), for some reason I have found it imprecise. With “on-path” I can be accurate about the location of the attacker. It is also IMHO more nicely enhanced with additional qualifiers and variations:
>>
>> on-path attacker
>> on-path active attacker
>> on-path passive attacker (or eavesdropper)
>> off-path attacker

I don't quite agree. The essence of X-in-the-middle, say between B and
C, is that B and C end up only conversing with X. That is to say,
there are no messages directly between B and C because the attacker is
blocking them or because the attack causes B and C to be confused and
only exchange messages with X even though B and C could directly
exchange messages if they tried. "on-path" only implies ability to
observe messages. "active" only implies that the attacker initiates
messages or interferes with existing messages.

Thus all X-in-the-middle attackers are "on-path active attackers" but
not all "on-path active attackers" are X-in-the-middle attackers. For
example I do not consider an on-line active attacker that observes
traffic and just inserts new messages to mess things up, for example a
replay attacker, to be an X-in-the middle attacker.

Thanks,
Donald

> This sounds like a good suggestion to me, a direct and to the point description.
>
> Thanks,
> Kathleen
>>
>>
>> The principle that should apply is the description of something in clearly understandable language, using the characteristics of that something. And adding gender to those characteristics is just technically wrong, as John points out below.
>>
>> (There may be some other common attacks that deserve a good term. Or maybe I just don’t know what the term is. E.g., what is the name of an attack where there’s a central server between users, and it is the server that misbehaves?)
>>
>> > As an
>> > example, I've always found "man-in-the-middle" terminology
>> > problematic, but at least as much because it implies human
>> > intervention rather than something more automated as because of
>> > gender.
>>
>> +1
>>
>> > I don’t think we are promoting inclusiveness by resorting to obscure mythology
>>
>> +1
>>
>> Jari
>>
>
>
> --
>
> Best regards,
> Kathleen





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux