Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Replay attacks don't work because of the nonce, so that's handled successfully.

But an attacker with an active man in the middle position might change the outer (unencrypted) src IP of a packet. However, that src will need to be able to produce authentic replies; otherwise the session will quickly be deemed invalid, so that mitigates any potential very oddball amplification attacks you could dream up. And regardless, an attacker with this kind of active man in the middle can already drop packets at will, so this isn't a vulnerability.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: