[3690] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Is a serial cable as good as thin air?

daemon@ATHENA.MIT.EDU (David R. Conrad)
Thu Dec 3 15:11:40 1998

Date: Thu, 3 Dec 1998 14:24:42 -0500 (EST)
From: "David R. Conrad" <drc@adni.net>
To: cryptography@c2.net
In-Reply-To: <Pine.BSF.4.05.9812012346410.11062-100000@ouch.oof.net>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The original poster mentioned that the secure host would verify that all
data coming in over the serial connection was in the proper format.  Thus
it is being contemplated that an attacker could compromise the outer host
and send arbitrary data to the secure host.

An attacker might not try to send packets of entirely forged data, but
merely, say, add a single byte to each packet transmitted.  This would
cause all packets of data to fail the format test, and would constitute
a denial of service attack.

Since I'm sure you'll be logging any invalid packets received (modulo
error detection/correction?) and studying them carefully, there should be
no difficulty detecting such a condition.

David R. Conrad <drc@adni.net>
"On two occasions I have been asked [by members of Parliament!], `Pray,
Mr. Babbage, if you put into the machine wrong figures, will the right
answers come out?'  I am not able rightly to apprehend the kind of
confusion of ideas that could provoke such a question." -- Charles Babbage

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQA/AwUBNmbliYPOYu8Zk+GuEQLd4ACeK55J5T8IxAXOECr7YYY6wuEDYzAAnjAw
DI3yAkEM55/Tnym5yeZ4oc0T
=NLum
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post