Presentation is loading. Please wait.

Presentation is loading. Please wait.

Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research

Similar presentations


Presentation on theme: "Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research"— Presentation transcript:

1 Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research smb@research.att.com http://www.research.att.com/~smb

2 Layer Violations for Fun and Profit Steven M. Bellovin AT&T Labs Research smb@research.att.com http://www.research.att.com/~smb

3 Assumptions l It is reasonable for some authorized parties to look at some packet header fields. –It is relatively harmless if unauthorized parties see the same fields. l These authorized parties should not participate in the key management dialog, nor should they be given keying material. l Packet examination should be context-free. l Packet modification is not necessary (or desirable).

4 Is this Necessary? Safe? l Many reasons already given for packet header inspection. l (Unauthorized) eavesdropper primarily learns IP addresses and port numbers. –The former are very hard to conceal; the latter are probably discernable by traffic analysis. l Don’t share keys, so monitoring station subversion not a serious problem.

5 Principles for Proposed Scheme l Packets specify amount of leading portion that is in the clear. –Exposure amount optional and negotiated. –Don’t change integrity check boundary at all. l Add padding, for boundary alignment and cipher blocksize match. l Move protocol number to the start, in the clear.

6 Proposed TF-ESP Format clearlenProtoFlags (Reserved) SPI Anti-replay counter Cleartext payload Cleartext padding IV (if needed) Encrypted padding Encrypted payload padlenPadding Encrypted Integrity

7 Features l Flag bit -- “replayable”. l Possibly move integrity check boundary, to permit modifiable fields. –Are there any safe ones? l Header fields at fixed offsets from start (unless, of course, there are IP options). l Cleartext boundary is dangerous -- better not expose TCP checksum on short packets!

8 “Disclosure” Header Protolendiff Source PortDest Port Sequence Number Dest Address Acknowledegment Source Address Window

9 A Cleaner Solution? l Contains copies of interesting encrypted fields. –Must be truthful or zero. l Leaks almost as much information. –But easier to avoid mistakes. l Possibly larger than TF-ESP scheme. l Provides high-quality plaintext/ciphertext pairs. –Could we just use a stronger cipher?

10 Suggested Alternatives l SSL –Must change every application. –Vulnerable to active denial-of-service attack. –Doesn’t handle UDP. l SSL plus AH –Must still change every application. –Still doesn’t handle UDP.


Download ppt "Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research"

Similar presentations


Ads by Google