LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

Re: [PATCH 1/2] Syncd Strong authentication extension

To: "LinuxVirtualServer.org users mailing list." <lvs-users@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [PATCH 1/2] Syncd Strong authentication extension
Cc: Wensong Zhang <wensong@xxxxxxxxxxxx>
Cc: ja@xxxxxx
Cc: keepalived-devel@xxxxxxxxxxxxxxxxxxxxx
From: Kjetil Torgrim Homme <kjetilho@xxxxxxxxxx>
Date: Thu, 15 Apr 2004 20:20:00 +0200
On Sat, 2004-03-27 at 20:39 +0100, Alexandre Cassen wrote: 
>          . Anti-replay prevention:  Since sequence number  is part
>            of  the  ICV computation, any  attacks  based on packet
>            replay will be dealt.
> [...]
>       The Sequence number is monotonically increased by  one  each
> time  a new syncd message is created. Since syncd is not an elec-
> tion protocol we don't need  to  deal  with  kind  of  anti-cycle
> mecanism  in  order  to broke a potential dropping loop. Instead,
> the syncd maintains a local sequence number counter  as  dropping
> policy.  This  mean, while processing incoming syncd message, the
> sequence number received in the syncd message is compared with  a
> local  copy,  if  sequence number in the syncd message is greater
> than the  local  copy  then  the  message  is  granted  otherwise
> dropped.

there is a replay attack here, if it works as stated.  server A has been
running for a long time, keeping server B up to date, and malicious user
M is able to capture a packet.  server A has to reboot, and starts
counting at 0.  the malicious user injects the old packet, and server B
will accept it, but drop new legitimate packets until the old high
watermark has been reached.

actually, how does server B know that the counter being reset by server
A's reboot is OK?  keeping A's counter on stable storage so that it is
kept across a crash seems impractical.

-- 
Kjetil T.



<Prev in Thread] Current Thread [Next in Thread>