Raj Singh writes:
> 1. Initiator is behind N(P)AT and float the port to (4500, 4500)
> 
> and send IKE_AUTH  with source port 4500 now N(P)AT changes source port
> as 1024 but there is a man-in-the-middle who changes the port to other
> host behind N(P)AT's port say 1025, still IKE_AUTH packet is authenticated.
> 
> The responder establishes the SA with destination port as 1025 instead of
> 1024 and sends the reply back to destination port 1025, so it will never
> reach to original initiator . So the IKE SA will does not get established
> on initiator But there is no mention of this DoS attack in the draft
> ?

When the initiator does not get packets, it will retrasnmit its packet
and if the man-in-the-middle attacker is no longer there it will reach
the other end and has source port of 1024. This will then be
authenticated retransmission packet for the other end which will then
retransmit its previous packet to the address where port numbers were
swapped. As the packet was not new packet it will not update the SA,
but next packet from the responder will cause it to update the port
numbers.

If the man-in-the-middle is still there then the attack is still
ongoing and he can prevent communications between two peers. He does
not even need to modify the ports, he can simply delete those
packets... 


> 2. The draft says the host that is NOT behind NAT SHOULD send packet to
> IP address and port from which it received last authenticated packet.
> A host behind behind a NAT SHOULD NOT do this because it opens a
> DoS attack.

Yes.

> But how the location of host(Behind NAT or NOT) avoid DoS attack, say
> when responder is having public IP, send an UDP encapsulated packet, some
> man-in-the-middle changes the port, then initiator which is behind NAT wil
> use ports from packet and will never reach the responder. This is also a
> DoS attack.
> Please let me how location of host (behind NAT or not) helps in avoiding
> DoS attack ?

If we take the most common case where the initiator / client is behind
NAT and responder/server is not behind the NAT. Now the
responder/server has fixed IP address which will NOT change. Thus if
host which knows that other end is not behind NAT (i.e. initiator /
client in this case) does not update IP-addresses at all, as it knows
the other end has fixed IP-address the attacker cannot force both ends
to change addresses at the same time. If client would take any packet
and change other ends address to be as claimed in the headers then
attacker could simply send one packet that would change client's view
where the server is, and as the client is behind NAT his old NAT
mapping would get destroyed after a time, and after that server cannot
communicate to the client anymore at all. 
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to