> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of
> Karl Auer
> Sent: Thursday, June 27, 2013 5:00 PM
> To: ipv6@ietf.org
> Subject: Re: draft-bonica-6man-frag-deprecate
> 
> On Fri, 2013-06-28 at 09:31 +1000, Mark Andrews wrote:
> > Then add a cryptographic checksum of the original packet when
> fragmenting.
> > 48 bits in a HBH should be enough.
> 
> Why HBH? Is that to prevent it being send in a fragment itself? And,
> um,
> I hate to suggest this, but isn't that sort of exactly what the AH
> header is for? I know, I know.... (covers head, ducks)

SEAL has the *option* to insert a per-segment HMAC that the destination
can use for data origin verification. Sort of like AH, but this is only
one *optional* mode of operation.

But that said, going back to Tony's scenario why would an adversary
that is already able to get the destination to accept its packets
bother with finessing the reassembly cache? Upper-layer checksums
would weed out bad reassemblies, while the attacker could much
more easily just inject whole packets that are evil.

Thanks - Fred
fred.l.temp...@boeing.com

> Regards, K.
> 
> --
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Karl Auer (ka...@biplane.com.au)
> http://www.biplane.com.au/kauer
> http://twitter.com/kauer389
> 
> GPG fingerprint: B862 FB15 FE96 4961 BC62 1A40 6239 1208 9865 5F9A
> Old fingerprint: AE1D 4868 6420 AD9A A698 5251 1699 7B78 4EEE 6017
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to