Hi!

An update ... no clear solution benefit for HIP denial-of-service mitigation. The main point being that artificial latency introduced by network-bound puzzles may be hard to control given the kind of "acceptable" delays for a legitimate HIP connection.

(in case someone wants to investigate further, I advanced these ideas for a different problem statement: http://www.connotech.com/time_ticket_sub_prot.html title "Internet Public Service Abuse Mitigation with a Time Ticket Sub-Protocol")

Regards,

- Thierry

Thierry Moreau wrote:
Hi,

I find quite interesting the active development of HIPv2 drafts. From an applied cryptography perspective, I appreciate this state-of-the-art secure protocol development.

Nonetheless, I am very novice in the design of puzzles for DOS attack mitigation. But I have this idea of network-bound puzzle so that the battery life of sensor devices is preserved.

Very roughly ...

The network-bound puzzle is a pair <URI,time0,time1>
If time0>=time1 the solution is zero
Otherwise, the solution is obtained from the "URI server" (using an plain UDP query) at a time no earlier than time1 (which the HIP initiator may guesstimate as now+(time1-time0) (I use absolute times such that the URI server need not be synchronized with the responder).

UDP queries to the URI server simply carry some value timeX (discrete resolution)
The URI server simply answers UDP queries with either
a) solutX (for timeX>=now), else
b) delayed UDP response solutX (if timeX in near future and the URI server is not currently under heavy load), or else
c) some "REQUEST TOO EARLY" negative response.

In practice, some secret pseudo-random sequence defines the successive solutions. I would guess a timeX resolution of 0.1 second would allow DOS attacks mitigation in low to medium throughput HIP responder hosts, but this is only from intuition.

The HIP responder may need a special arrangement with the URI server to learn the responses in advance (or on a priority basis during a DOS attack). I guess the two could be the same system (the URI server needs not be "trusted").

... end of rough idea.

Was this ever envisioned? Were the practicalities ever looked at?

Anyway, just my little suggestion.


Yes, I did look at
http://www.ietf.org/mail-archive/web/hipsec/current/msg03122.html
(Memory-bound puzzles in BEX)
and the reference by Rivest et al. (which does not address the DOS mitigation as it is understood nowadays but has something along the URI server idea for "timed-released crypto").

and
http://www.ietf.org/mail-archive/web/hipsec/current/msg03565.html
(New Version Notification for draft-hummen-hip-middle-puzzle-00.txt)


Regards,


_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to