[sldev] Cryptographic signing of UDP packets
Argent Stonecutter
secret.argent at gmail.com
Tue Dec 16 05:34:35 PST 2008
On 2008-12-16, at 05:35, Robin Cornelius wrote:
> Is this going to be ALL UDP packets or just certain ones that are
> certainly more sensitive than others? Not applying to all still leaves
> a potential attack point but wastes bandwidth. This is also related to
> the size of the signature. If the signature is too small a brute force
> attack may be possible by just trying combinations of packets and
> getting a reply from the server, too large a signature and we have
> massive UDP packets so more bandwidth and lag?
If you instead encrypt the UDP packets you won't need to add a
signature to the packet itself, you can just encrypt the packet with a
key passed through HTTPS CAPS at login. The computational overhead
should be similar for encryption or signing at equivalent levels of
security, and encryption would add privacy.
Since you have a secure channel via HTTPS, you don't need to use a
separate key exchange protocol, and you don't need the computational
overhead of private keys.
In fact just periodically exchanging a UUID over HTTPS to use in some
fast short-period encryption technique would probably be enough. Don't
serialize the packets, just keep updating the key.
More information about the SLDev
mailing list