请输入您要查询的百科知识:

 

词条 Reflection attack
释义

  1. Attack

  2. Solution

  3. See also

  4. References

{{about|the attack on authentication systems|the denial of service attack|Distributed Reflection Denial of Service}}

In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both directions. That is, the same challenge-response protocol is used by each side to authenticate the other side. The essential idea of the attack is to trick the target into providing the answer to its own challenge.[1]

Attack

The general attack outline is as follows:

  1. The attacker initiates a connection to a target.
  2. The target attempts to authenticate the attacker by sending it a challenge.
  3. The attacker opens another connection to the target, and sends the target this challenge as its own.
  4. The target responds to the challenge.
  5. The attacker sends that response back to the target on the original connection.

If the authentication protocol is not carefully designed, the target will accept that response as valid, thereby leaving the attacker with one fully authenticated channel connection (the other one is simply abandoned).

Solution

Some of the most common solutions to this attack are described below:

  • The responder sends its identifier within the response so, if it receives a response that has its identifier in it, it can reject it.[2]
    1. Alice initiates a connection to Bob
    2. Bob challenges Alice by sending a nonce. B -> A: N
    3. Alice responds by sending back her identifier and the nonce encrypted using the shared key Kab. A -> B: {A, N}Kab
    4. Bob decrypts the message, makes sure its from Alice and not a message he had sent in the past by finding A in it and not B and if the nonce is the same as the one he sent in his challenge then he accepts the message.
    5. Require the initiating party to first respond to challenges before the target party responds to its challenges.
    6. Require the key or protocol to be different between the two directions.

See also

  • Replay attack
  • Man-in-the-middle attack
  • Pass the hash

References

1. ^Computer Networks by Andrew S. Tanenbaum, 4th edition, {{ISBN|0-13-038488-7}}, pages 787-790.
2. ^Ross J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edition, page 21, {{ISBN|0-471-38922-6}}

2 : Computer security exploits|Computer access control protocols

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/20 10:51:10