[69927] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP/BGP vulnerability - easier than you think

daemon@ATHENA.MIT.EDU (Iljitsch van Beijnum)
Wed Apr 21 15:53:24 2004

In-Reply-To: <Pine.LNX.4.58.0404212015580.22749@fogarty.jakma.org>
Cc: nanog@merit.edu
From: Iljitsch van Beijnum <iljitsch@muada.com>
Date: Wed, 21 Apr 2004 21:47:22 +0200
To: Paul Jakma <paul@clubi.ie>
Errors-To: owner-nanog-outgoing@merit.edu


On 21-apr-04, at 21:17, Paul Jakma wrote:

>> I'm not recommending this for "small" peers as the crypto DoS risk
>> is worse than what happens when the attack is executed
>> successfully.

> Why would MD5 be more of a crypto DoS risk with IPSec AH headers than
> with bgp tcp-md5?

Beats me. But why do you bring up IPsec?

Anyway, what needs to happen is a form of crypto where the expensive 
algorithms are only executed for good packets and not for all packets.

For instance, in addition to the regular MD5 checksum we also include a 
checksum of part of the sequence number and the/a password. Since we 
know what sequence numbers to expect, we can calculate these additional 
checksum beforehand so the only thing that needs to happen for each 
(possibly spoofed) packet is checking whether it contains the right 
sequence number derived checksum. If it does, we know that the packet 
came from the actual peer so we proceed to check the MD5 checksum to 
make sure the data wasn't modified in transit.


home help back first fref pref prev next nref lref last post