EricssonResearch / coap-actuators

Other
3 stars 2 forks source link

2.3. The Response Delay and Mismatch Attack / DTLS #6

Closed boaks closed 2 years ago

boaks commented 3 years ago

The following attack can be performed if CoAP is protected by a security protocol where the response is not bound to the request in any way except by the CoAP token. This would include most general security protocols, such as DTLS, TLS, and IPsec, but not OSCORE.

The attacker performs the attack by delaying delivery of a response until the client sends a request with the same token

Using DTLS, it seems to be hard to determine, that the client uses the same token. Are there any additional assumptions about determining the token, if DTLS is used?

boaks commented 3 years ago

Let me add: RFC7252 is not that explicit about that, but, If the response is a "piggybacked response", the client may additionally check the MID and drop it on mismatch. That doesn't make the attack impossible, but lowers the probability.

emanjon commented 2 years ago

Good comments

boaks commented 2 years ago

Addressed. (I have an additional comment for the http and nstart-1, but I will open an new issue).