Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MITM Amplification Attacks #22

Closed
boaks opened this issue Nov 9, 2022 · 1 comment
Closed

MITM Amplification Attacks #22

boaks opened this issue Nov 9, 2022 · 1 comment

Comments

@boaks
Copy link

boaks commented Nov 9, 2022

Please add, that the other attacks could be applied "proactive" by an attacker.

But the attacks, changing the source address of a valid DTLS CID record, are passive attacks. The attacker must wait for such messages. That makes such attack in my opinion much less attractive.

A difference between (D)TLS and OSCORE is that in DTLS the updated address is used for all future records, while in OSCORE a new address is only used for responses to a specific request.

That depends on the roles.
A coap-server will usually also only send back the response to the last/current source address.
In my deployments, clients usually don't update the server's address using CID at all.
There is a difference in a description of a protocol, which offers symmetric function and is not coupled to other layers. And a real system, which can easily use such a coupling. Sure, someone may try a different approach, therefore draft-ietf-tls-dtls-rrc is on the way.

@emanjon
Copy link
Collaborator

emanjon commented Jan 17, 2023

Please continue discussion at
t2trg/t2trg-amplification-attacks#2

(Due to lack of owner rights I could not transfer this repository and instead had to make a new one, I will manually create new issues there for any open issues).

@emanjon emanjon closed this as completed Jan 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants