North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Cisco's Statement about IPR Claimed in draft-ietf-tcpm-tcpsecure
- From: Iljitsch van Beijnum
- Date: Thu May 13 13:50:19 2004
On 13-mei-04, at 19:07, Todd Vierling wrote:
Whereas the Internet-Draft claims, by assuming that both source and
Guess what, they call them drafts because they're not finished yet. So
why don't you say something to the author?
ports are knowns, the number of bits required for the attack is 16 (or
lower) and thus can cause connection resets "even at DSL speed."
A 2^[28..33] problem is much more difficult to attack than a 2^[14..16]
problem. It's amazing that such a cheap source of entropy --
the source port appropriately -- is being so readily discounted.
(In case you're curious, 2^33 is achievable for things like BGP, where
I don't think you can fully randomize the source port as it might clash
with well-known ports. Also, it may be somewhat expensive to make ports
truly random. (But not as expensive as doing MD5 for the whole
not certain which end initiated the connection. You get one extra bit
the originator choice, on top of a fully randomized 16-bit port and a
window size: 2^33.)
But why are you assuming the window size is 64k? This is completely
unnecessary, and not done in practice by "real" routers: those
typically use a 16k window. It should even be possible to set the
window to a very small size, such as 64 bytes. That's enough to receive
the initial BGP header, after which the window can be set to a larger
size until the session is idle again.