[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Suggested modification to AES privacy draft



Derek Atkins  wrote:
>Scott Fluhrer <sfluhrer@cisco.com> writes:
>> - Suppose the attacker (Eve) can send packets through the SA.  This
>>   attacker may be a legitimate user that is not authorized to read
>>   all the traffic that is routed through the SA. [...]
>
>If you make the first assumption, then Eve either:
>	a) lives on the same host as Alice, or
>	b) lives behind the same SG as Alice
>
>In the case of a, Eve clearly has root so can get any keying
>information they want.  [...]

Uhhh... how so?  Your last statement doesn't follow.  Consider a
multi-user system using host keying, as a simple example.  Then if Eve
has a (non-root) account on the system, she can easily get data sent
through the SA, and Fluhrer's attack looks like it will work.  Am
I missing something?