[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: AH-MD5




Charlie Perkins says:
> Say we have two protocols -- IP, and XXP.  XXP was invented in 1999.
> Just by coincidence that nobody thought of, it is possible with
> protocol XXP to cause a packet to emerge that looks like a valid
> IP packet (but isn't) and seems to have a long IP length field.
> Then the resulting XXP packet, authenticated with an MD5 checksum,
> may be vulnerable to a variety of append attack to "fill out" the
> rest of the "pretend-IP" packet to be something dangerous.

I don't understand how this exploit works. Could you explain it in
more detail? Wouldn't exploiting this require that the attacker steal
the MD5 key somehow? After all, you wouldn't normally be
authenticating an XXP packet with the same key that you'd be using for
some arbitrary IP connection (or at least, you'd have only a tiny
chance of doing so -- no greater a chance than of using the same MD5
key for two arbitrary IP SAIDs).

Perry


References: