From: Dawid Ciezarkiewicz <dpc@asn.pl>
To: James Morris <jmorris@namei.org>
Cc: netdev@vger.kernel.org
Subject: Re: [RFC] Ethernet Cheap Cryptography
Date: Mon, 16 Oct 2006 00:15:18 +0200 [thread overview]
Message-ID: <200610160015.19041.dpc@asn.pl> (raw)
In-Reply-To: <Pine.LNX.4.64.0610151729210.14523@d.namei>
On Sunday, 15 October 2006 23:35, you wrote:
> > Hi,
> > I'd be thankful for your opinions about that idea. Please forgive me any
> > nuances that I didn't know about.
>
> This limits the system to only talking to one other system on the same
> link. I guess you could have per-MAC keys and associate the crypto info
> with neighbor cache entries.
The idea is to use vlan and macvlan devices to separate encrypted traffic -
as you can just encrypt vlan device. Other than that - yes ccrypt was
considered as solution for point-to-point links.
> Likely need a cryptographer to review the protocol -- blindly using the
> first block of every encrypted packet as the IV smells problematic, for
> example.
Cryptographic part needs attention. I'm not a cryptographer and no
cryptographer have checked the idea or code.
And yes - this is little problematic, but I think the solution is good
enough - there is little chance to inject valid upper level packet, and even
if such event occur - there is no chance that can carry valid hostile
information.
The magic function is is_decoded_buffer_valid, which - using upper level
info - will just drop packets that weren't encrypted correctly. There are
little chances that spoofed frame after decryption will look like good
packet - for IPv4 I estimate them to be much less than 1 to 256 * 256 * 32
(2097152) and this can be rather easily improved.
Injected packets that will not pass such validation will not change stored IV,
so transmition will not be affected. And even when such frame will pass - it
will probable consist of garbages - the only effect will be using bad IV in
the next encryption - so next good frame will be dropped.
If ccrypt will be considered reasonable I was thinking about kernel warnings
on spoofing tries detection, using simple bad frames counters.
next prev parent reply other threads:[~2006-10-15 22:15 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-10-15 16:20 [RFC] Ethernet Cheap Cryptography Dawid Ciezarkiewicz
2006-10-15 21:35 ` James Morris
2006-10-15 22:15 ` Dawid Ciezarkiewicz [this message]
2006-10-18 3:21 ` Stephen J. Bevan
2006-10-18 3:25 ` David Miller
2006-10-18 9:51 ` Dawid Ciezarkiewicz
2006-10-18 10:16 ` David Miller
2006-10-18 11:35 ` Dawid Ciezarkiewicz
2006-10-18 9:15 ` Dawid Ciezarkiewicz
2006-10-18 14:31 ` Dawid Ciezarkiewicz
2006-10-19 3:57 ` Stephen J. Bevan
2006-10-19 15:58 ` Pawel Foremski
2006-10-20 2:18 ` Stephen J. Bevan
2006-10-20 2:59 ` David Miller
2006-10-21 2:17 ` Stephen J. Bevan
2006-10-21 2:20 ` David Miller
2006-10-20 20:18 ` Pawel Foremski
2006-10-21 1:58 ` Stephen J. Bevan
2006-10-21 2:28 ` Stephen Hemminger
2006-10-21 15:33 ` Pawel Foremski
2006-10-21 15:12 ` Pawel Foremski
2006-10-22 0:05 ` Stephen J. Bevan
2006-10-20 19:50 ` Dawid Ciezarkiewicz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200610160015.19041.dpc@asn.pl \
--to=dpc@asn.pl \
--cc=jmorris@namei.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).