Replay Attacks - Columbus State University

advertisement
Replay Attacks
Replay Attack
• First, attacker intercepts a message
– Not difficult to do
Replay Attack
• Later, attacker retransmits (replays) the
message to the original destination host
– Does not have to be able to read a message to
replay it
Replay Attack
• Why replay attacks?
– To gain access to resources by replaying an
authentication message
– In a denial-of-service attack, to confuse the
destination host
Thwarting Replay Attacks
• Put a time stamp in each message to ensure that
the message is “fresh”
– Do not accept a message that is too old
• Place a sequence number in each message
– Do not accept a duplicated message
Message
Time
Stamp
Sequence
Number
Thwarting Replay Attacks
• In request-response applications,
– Sender of request generates a nonce (random
number)
– Places the nonce in the request
– Server places the nonce in the response
– Neither party accepts duplicate nonces
Request
Nonce
Response
Nonce
Thwarting Replay Attacks
• To prevent changes in the message being
replayed
– Message integrity is needed
– Requires a digital signature or equivalent
• See HMAC under IPsec
Message
Digital Signature
Or HMAC
Download