Download presentation
Presentation is loading. Please wait.
Published byBrenda O’Connor’ Modified over 9 years ago
1
Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research smb@research.att.com http://www.research.att.com/~smb
2
Layer Violations for Fun and Profit Steven M. Bellovin AT&T Labs Research smb@research.att.com http://www.research.att.com/~smb
3
Assumptions l It is reasonable for some authorized parties to look at some packet header fields. –It is relatively harmless if unauthorized parties see the same fields. l These authorized parties should not participate in the key management dialog, nor should they be given keying material. l Packet examination should be context-free. l Packet modification is not necessary (or desirable).
4
Is this Necessary? Safe? l Many reasons already given for packet header inspection. l (Unauthorized) eavesdropper primarily learns IP addresses and port numbers. –The former are very hard to conceal; the latter are probably discernable by traffic analysis. l Don’t share keys, so monitoring station subversion not a serious problem.
5
Principles for Proposed Scheme l Packets specify amount of leading portion that is in the clear. –Exposure amount optional and negotiated. –Don’t change integrity check boundary at all. l Add padding, for boundary alignment and cipher blocksize match. l Move protocol number to the start, in the clear.
6
Proposed TF-ESP Format clearlenProtoFlags (Reserved) SPI Anti-replay counter Cleartext payload Cleartext padding IV (if needed) Encrypted padding Encrypted payload padlenPadding Encrypted Integrity
7
Features l Flag bit -- “replayable”. l Possibly move integrity check boundary, to permit modifiable fields. –Are there any safe ones? l Header fields at fixed offsets from start (unless, of course, there are IP options). l Cleartext boundary is dangerous -- better not expose TCP checksum on short packets!
8
“Disclosure” Header Protolendiff Source PortDest Port Sequence Number Dest Address Acknowledegment Source Address Window
9
A Cleaner Solution? l Contains copies of interesting encrypted fields. –Must be truthful or zero. l Leaks almost as much information. –But easier to avoid mistakes. l Possibly larger than TF-ESP scheme. l Provides high-quality plaintext/ciphertext pairs. –Could we just use a stronger cipher?
10
Suggested Alternatives l SSL –Must change every application. –Vulnerable to active denial-of-service attack. –Doesn’t handle UDP. l SSL plus AH –Must still change every application. –Still doesn’t handle UDP.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.