📄 threat_analysis_min_security.html
字号:
DA and receive service URLs that point to rogue services, receiveattributes that disrupt normal operation, or not receive any servicelocation information at all</td></tr><tr><td>Unauthorized Service Agent</td><td>An unauthorized service agent could be installed on the network withthe intention of duplicating a registrations made by authorized SAs. In environments involving DAs, unauthorized SA would cause the unauthorizedregistration, deregistration, and registration problems described below. In a multicast environments an unauthorized SA could cause duplicatereplies to be sent to service, attribute and service type requests. Duplicate replies may cause problems when several differing attributeslists are returned for the same service URL. UAs would be unableto tell which attributes are really valid.</td></tr><tr><td>Unauthorized Registrations with DA</td><td>Contacting the DA to register many bogus services of the same service-typeas a valid service. Even SLP enabled applications that rely on servicespecific security protocols (SSL, etc) would take a long time to connectto a valid service as it would probably have to iterate through a lot of bogus services before it found a valid one.</td></tr><tr><td>Unauthorized Deregistration with DA</td><td>Contacting the DA to de-registering valid registrations so that theycan not be found by UAs.</td></tr><tr><td>Unauthorized Reregistration with DA</td><td>Contacting the DA to replacing an existing registration with a newregistration with modified attributes. </td></tr><tr><td>Man-in-the-middle Modification </td><td>Contacting the DA to register many bogus services of the same service-typeas a valid service. Even SLP enabled applications that rely on servicespecific security protocols (SSL, etc) would take a long time to connectto a valid service as it would probably have to iterate through a lot of bogus services before it found a valid one.</td></tr><tr><td>Man-in-the-middle Replay</td><td>"transport-time" retransmission of SLP registration, or reply messagesthat were previously "sniffed" from the network.</td></tr><tr><td>Man-in-the-middle Scrambling</td><td>Blind "transport-time" modification of messages that makes them invalidso that they will be rejected by the valid SLP implementations.</td></tr></table><h3>Preventing Disruption Attacks</h3> <p> <br> <p>There are several approaches to solving security problems. Thefirst approach is to use SLPv2 security as specified by RFC 2608 and dealwith the associated manual configuration and management overhead. The second approach is to use custom security extensions to the SLPv2 protocol which may or may not be interoperable with other SLP software. Thethird approach would be to not use any SLP security enhancements at all.<br> <br> <p>Though provisions for security have been designed into the SLPv2 protocol,security is not a mandatory feature. The following table presentsthe vulnerability of SLPv2 to attack:<br> <table BORDER WIDTH="100%" NOSAVE ><tr><td><b>Attack</b></td><td><b>SLPv2 with RFC2608 security</b></td><td><b>SLPv2 with SSRTI-SLPv2</b></td><td><b>SLPv2 with out security</b></td></tr><tr><td>Unauthorized Directory Agent</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#FFFF00">DETECTABLE</font></b></td><td><b><font color="#FFFF00">DETECTABLE</font></b></td></tr><tr><td>Unauthorized Service Agent</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#FFFF00">DETECTABLE</font></b></td><td><b><font color="#FFFF00">DETECTABLE</font></b></td></tr><tr><td>Unauthorized Registrations with DA</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#FFFF00">DETECTABLE</font></b></td></tr><tr><td>Unauthorized Deregistration with DA</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td></tr><tr><td>Unauthorized Reregistration with DA</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td></tr><tr><td>Man-in-the-middle Modification</td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td></tr><tr><td>Man-in-the-middle Replay</td><td><b><font color="#FF9900">DETERRABLE</font></b></td><td><b><font color="#33CC00">PREVENTABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td></tr><tr><td>Man-in-the-middle Scrambling</td><td><b><font color="#CC0000">VULNERABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td><td><b><font color="#CC0000">VULNERABLE</font></b></td></tr></table><p><b><font color="#33CC00">PREVENTABLE </font></b><font color="#000000">-Attack can be prevented entirely.</font><br><b><font color="#FFFF00">DETECTABLE</font></b><font color="#000000">- Attack can not be prevented, but can be detected by appropriately writtenSLP software</font><br><b><font color="#FF9900">DETERRABLE</font></b><font color="#000000">- Attack can not be detected or entirely prevented, but it can be deterred</font><br><b><font color="#CC0000">VULNERABLE</font></b><font color="#000000">- Attack can not be prevented, deterred or detected</font><br> <br> <br> </body></html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -