
Security Through Varying IPs 127
alanjstr writes "Reuters is reporting that an ex-CIA director and ex-KGB man have come together and developed a new way of 'hiding' internet communications. It does this by IP hopping: 'The Invicta system uses special cards to link protected computers to a central control unit. It lets clients decide how often they wish to vary IP addresses and specify which applications may be accessed on their network.'" I've always wondered if there could be a way through software to do this. Of course, a centralized server would need to route which would be a major bandwidth bottleneck.
This is why Iridium (satellite phones) was killed. (Score:1)
Satellite phones are the ultimate stealth device. The best they could do is trace you to the western hemisphere. Iridium didn't fail. It was killed by a collusion of law-enforcement agencies and world govt's that still have monopolies on their telcos. They saw Iridium as an "illegal circunvention device" to get around local monopolies. And law enforcement saw the potential for hiding from any trace.
This method of security has been around for years (Score:2)
Re:Ahh, I get it... (Score:1)
As someone else kindly pointed out, this is the same as frequency hopping in radio communications. You change frequency so often that an observing third party can't pick out the whole conversation. In fact (in the radio world), your communications pretty much just look like noise. This requires a fast processor, though, to implement properly.
Now, I admit, I haven't read the article, so this is a mostly uninformed point of view. However, if they plan to implement it anything like frequency hopping, I'm betting that the idea here is that this is for communication between two hosts that are aware of each other. They agree upon some IP hopping pattern at the beginning of the communication or even before the communication begins or figure out what the pattern is based on some set of acceptable patterns or, well, you get the idea. From that point on, the receiver listens for communications at the IPs that fall in the agreed-upon pattern. Whala, you are suddenly able to pick out the GOOD traffic. In order for it to be really secure, you need to be using IP hopping in both directions.
Re:...or you could use a real service. (Score:1)
...or you could use a real service. (Score:2)
Re:...or you could use a real service. (Score:2)
Mobile IP (Score:2)
Nothing new. . . (Score:1)
Re:Nothing new. . . (Score:1)
the specifications of how this has being done
should be
the specifications for how this has been done
It's tough writing comments on the run!
Re:Hoax? (Score:1)
Similar thing (Score:1)
Even though this technology is a bit different I don't see it being that great for security. Inside a corporate network this would be fine but on the internet this would be useless.
- If my IP address rotated all of the time how do my packets get back to me?
- Do these guys have to be my ISP? Wouldn't that mean that they would act as a firewall/router to the outside world?
I think I'll stick with encryption.
Re:Similar thing (Score:1)
It was a small hydro company. At least someone there was a little pro-active about security.
Re:what about MAC address? (Score:2)
Yes, but this changes with every hop of the packet. The initial MAC ID is from your computer, and is the MAC ID of your NIC.
Once this packet hits the first router, it forwards the packet and it now contains the MAC ID of the router's NIC.
The only time tracking MAC IDs is usefull is if you are on a broadcast LAN, like ethernet w/ dumb hubs, and you can sniff traffic. Otherwise, its all the routers/switches MACs...
Re:IP Spread Spectrum (Score:2)
there goes tcpwrappers (Score:2)
Do I have to prompt for a kerberos session every time the IP changes during a session? How easy would it be to hijack the session by fooling the stack into thinking that it legitimately changed to the attacker's IP? How easy would it be to DoS via spoofing parts of the protocol?
Frequency hopping radios are nifty, but we're not talking about beaming light. IP is much more complicated, and has more weak points.
IP V6 Sooner than Later (Score:1)
havn't they ever heard of encryption?
sheesh
KGB Expert my eye! (Score:1)
I do hope... (Score:1)
Whilst it is impractical/ impossible to lease IP addresses through DHCP multiple times per minute, it does sound as though it is a sort of faster DHCP.
I believe cable companies advertise the fact they use DHCP as a means of protecting the user from attacks in just this manner; of course the other reason is they don't want any pesky 'ol servers set up on their network....
If this uses a lot of IP addresses.... (Score:1)
Just a variation on spread spectrum (Score:2)
If you wanted to get fancy you could simultaneously assign several IPs and spread the packets amongst them (as well as periodically changing the IPs), to really confuse someone doing traffic analysis.
Re:Police Radios (Score:1)
I've been trained on the SINCGARS model radio in the Army. It can jump between 100 frequencies per second and you can supposedly still make out what is being said , even if 30% of the hopset is being jammed.
Let's clear up the obscurity... (Score:2)
This is not about securing a system, it's about making it harder to find, period, as you said.
A grain of salt (Score:1)
From the 'gotcha' front, I wonder how they addressed the problem allowable IP addresses to jump between. I would think you would always be limited to the subdomain routed by the host you connect to. If you are connecting from and to huge domains, it's not as bad, but if there is very little traffic in or out, it would be easy to reassemble your session simply by ignoring the IPs and capturing everything. Either way, you are relying on obscurity to provide security.
Although I wouldn't call it a bad idea, I don't think this qualifies as a good one.
-Trevor
Robert Hanssen wanted to work here. (Score:1)
Invicta doesn't appear to have a website. Maybe because they don't have an IP address for search engines to crawl? How would that work, anyway? If it switches addresses all the time, how do you keep a connection open?
Re:Not a troll... (Score:1)
Yep, get Windows 2000. It can change IP's, DNS servers, and more without rebooting.
sounds like IP spoofing (Score:2)
Maybe they have a lot of destination addresses too, but somewhere, somehow this has to be routed to the receiving end. Of course, it could be the central server, but then that would be nothing but a router.
Of course, one could also split an encrypted file/text in blocks, and send those in a particular order to/from a number of IP addresses. Kind of like a key. But that would be a pointless excercise: from 8ip's to 8 ip's would be equivalent to 6 bits extra keyspace (2^6 possibilities). It would just be just a little harder to get all of the traffic.
----------------------------------------------
Multiproxy (Score:1)
Re:Security through Vapor? (Score:2)
You'll basically have an SLA ID (Site-Level Aggregation Identifier) of 16 bits and an Interface ID of 64 bits. How can any company need more than this? Well, for starters, every company I know of over 1000 employees has many service providers for different divisions, acquired companies, failover, etc. Since those high 48 bits are used to identify unicast addressing and an ISP, you will have to have multiple SLA ID blocks....
When I posted, I thought the Interface ID was only 32 bits, so this is a much better situation. Certainly in a world where people allocate addresses as efficiently as we did in the early days of IPv4, we need not worry.
I give IPv6 unicast address space 10 years (5 more than my previous estimate) before we run out, and have to start chopping up the IPX space to give out....
Re:Security through Vapor? (Score:2)
The number was not 1 billion in the article, it was "billions", so your comment, "Now as we all know, 32 bits is roughly 1 billion
No, the space given to companies is very generous (vastly moreso than with v4) but if companies start planning based on using 32 bits per unique device, we won't last very long....
Re:Security through Vapor? (Score:2)
Assertion of fact 1: There are 64+16 bits of address available per ISP customer entity in IPv6. How the first 16 are managed is still slightly up in the air, and may not be available to the customer to directly manipulate.
Assertion of fact 2: The article suggested that using "billions" of IP addresses per device would soon be reasonable. Because of "increases in cyberspace".
Assertion of fact 3: Most medium-to-large companies will (conservatively) use 8-16 bits on subnetting, regardless of their actual need. How do I know this? Every such company I've interacted with ALREADY uses that much space in private addressing, and every one of them that I've spoken to plans to allocate IPv6 space to all of their private addresses, even if they're non-routable. This fact is based on the speculation that they will follow through with their plans, and that I've seen a representitive sample.
Extrapolation/Speculation 1: If companies start thinking in terms of using 32 bits of address for a single device (64 TIMES the normal allocation per device), you'll start seeing more abuses balooning out from there (I cite a major backbone provider that currently uses two
Extrapolation/Speculation 2: Given about 16 bits of subnetting space left over for your average large company on day one and the above speculation, I expect that to get used up in about 5-10 years. Why? Well, for one 5-10 years is the span of time that it took to go from "class B addresses are being restricted" to "we're breaking up class As to avoid an IP address crisis" in the 32-bit address space. Also, in the next 5-10 years, I expect to see 1) every household in the US and other major nations become IPv6 address space consumers 2) easily an order of magnitude more multi-home companies 3) massive need for routable IPs in pupblic places on wireless LANs. Take the coffee shop in Mountain View (Dana St Roasting Company) as an example. Such a place will need to allocate 128 IPs even if their peak crowd of 128 users all have IPs in every other public place that they use the network.
5 years was never a hard number in my original message, and when I found out that the allocation was 64 not 32 bits per customer, I backed off to "5-10" years, but there's no argument that before that article showed up 128-bit addresses seemed like a whole hell of a lot more network, and the end of IPv6 address space may have just become visible on the horizon....
Then again, I thought that IPv4 addresses were too limited back in '89 and admitted that I was wrong in '91.... It's a matter of perspective and experience that makes us able to critique the past so clearly; I doubt that all of what I've said here will be certain.
Re:Security through Vapor? (Score:3)
Company X has 100 applications that require a VPN (say, 100 data feed vendors). So, they do the usual IP address math that big companies do (round up the the nearest obscene order of magnitude). So, a billion addresses per application is roughly 32 bits.
Now, I need about 100 of those, but clearly growth is a concern, so let's say I need about 8 bits worth.
Ok, so before that company even gets off the ground. Before they even start deploying IPv6 on their servers, desktops, etc. They're using 256 COMPANIES worth of standard IPv6 allocation. If every company does this (and of course, this is a conservative example), we're talking about a gold-rush on IPv6 addresses that would exaust the non-reserved addresses trivially in the first 5 years.
Let's not be hasty, though, let's assume that we can multiplex these puppies. So, one device might be able to handle multiple servers and clients and rotate the IPs correctly using one IP space. Cool, so for each server-side device IBM buys, only one company's worth of v6 allocation need be used. That should give us another couple of years of life on the namespace.
All things considered, this is a very bad idea. Rotating through 20 addresses to confuse the issue can add some difficulty for crackers, but using "billions" of addresses will add you to my "rude Internet citizens" list.
Security through Vapor? (Score:5)
How about an Anonymous IP Router? (Score:1)
This would be less centralized and offer anonymity, in addition to making it hard to trace the connection.
Re:SecureID (Score:1)
bitch to set up but it works great specially with kerberos...and it works with unixes and mainframes too. had an old universe mainframe install running it once.
*shudder* (Score:2)
------
Re:...or you could use a real service. (Score:1)
Imbed data in ip address? (Score:1)
Re:Security through Vapor? (Score:1)
I am not a security expert, but this idea doesn't strike me as very useful or secure. Maybe somebody with more knowledge of the Internet than talking about "cyber addresses" could add some ideas.
Working with MS networking.... (Score:3)
security through obscurity (Score:4)
All this sounds like is a time based routing mechanism nothing more, and I don't really see how changing the IP address is going to save a misconfigured machine. For one, somewhere down the line the address is going to delegate out, so if say someone is browsing via 10.10.1.16 and they're browsing say something on my server and my logs show:
198.81.129.14
"http://www.antioffline.com/cia-soviet/" "Mozilla/4.0 (compatible; MSIE 5.5;Windows NT 5.0)"
Then about one second later
198.81.129.193 "http://www.antioffline.com/cia-soviet/" "Mozilla/4.0 (compatible; MSIE 5.5;Windows NT 5.0)"
Now this is typically another visitor or whatever, but if the connections were so repetitive enough with the same browser fingerprint coming through I can probably correlate them both together by their netblocks depending on who owned the block. So unless they plan on purchasing completely obsolete netblocks like say 198.81.129.0-255 then 198.83.0.0.-255 than how do they expect to stay obscured from view? Keep in mind that there are hardly any complete netblocks to purchase in that fashion (class A s close to impossible), so what are they really planning on doing?
Now if they partnered with ISP's to snag dhcp addresses not being used from a wide variety of places, say Earthlink here, MomandPopISP there, then it'd be a plus for them however simple traceroutes, and block lookups can give you their information. (who owns the block etc)
All it sounds like is a sort of a dhcp-round-robbin-routing set up which is not going to save them still, if someone is really intent on getting access to their networks, they'd run out of address ranges before their scheme would work.
Now on the spook/snoop side of things... I say TMTOWTPGPSAM! (There's More Than One Way To Sign PGP Sign A Message) to keep info from eyes other than the intended recipient.
Re:Ahh, I get it... (Score:1)
Good question!..
This isn't like hopping ports, which theoretically might be able to do the same thing.. You're hopping IP's which means that the DNS server needs to know where the hell you are. If the DNS server knows where you are, then what's stopping me from querying the DNS server to find you?? I like the idea of hopping ports every few seconds, and firing encrypted packets that contain the next port, or a random seed included with the original request that defines the jump sequence...
It's heavy in fluff, no substance (Score:2)
--Mike--
Re:Security through Vapor? (Score:2)
Unconquered? Same planet, same people, doh. (Score:2)
Closed source network hardware + Promiscuity between security layers = Lower security
So this is the latest "unbreakable" huh? I'm sure nobody at the NSA, CIA, or KGB wants to know what's in those networks too. Cute.
How do you know this isn't just opening a big fat vpn tunnel right into your company so other people can look at your network? Cuts both ways.
Oh, check out www.invicta.com -- Looks like they haven't bothered to buy up their domain for a whole year. That's confidence I suppose.. Guess there's no site to have taken down.
Another story from a year ago here [inet-one.com].
I haven't seen anything except untechnical fluff articles and only a couple over a year. The idea of a Russian guy calling his system Latin for "Unconquered" isn't slick, it's dumb. You just need someone at their physical location, something he should know about. What idiot will trust him to install the thing?
Are we *sure* he's stopped working for KGB/CIA? (Score:2)
Re:IP V6 Sooner than Later (Score:1)
Frequency hopping, random thoughts etc. (Score:2)
The concept of frequency hopping [hedylamarr.at] was invented by Hedy Lamarr [hedylamarr.at] in the 1930's. It is currently being used in several countries as a secure way of sending military orders.
The advantage of frequency hopping to IP hopping seems to be that it's (probably) harder to predict frequencies than it is to predict IP addresses. No doubt they will/have figure/d out how to allocate a large anough IP space to make a fairly secure transmission and how to sync the sender and receiver.
(...and what to do about the unused IP's... hmmm... You only really need one big pool of IP addresses for a set of computers, don't you? Then it's just a matter of juggling the IP's around and make sure every computer in the set of computers know what IP they themselves and their respective communication partner at any moment have... The more computer that are communicationg over the pool of IP's, the more secure the channel is.)
And now, let's all repeat the mantra of the day: Computers do what we tell them to do. Thus no computer system will ever be completely secure.
Re:Very cool idea.... (Score:1)
Sounds like obscurity to me.
Also I doubt they'll be able to apply this to servers. All the crap I had to go through when my IP address changed - notifying all my clients, changing zone files, updating WHOIS info, ...
Now imagine doing this every 5 minutes when your IP changes.
save some money... (Score:2)
just use dyndns.org [dyndns.org] yourself!
Re:Sequencing, randomness, etc ... (Score:1)
Or charity work for unemployed Russian tech workers ...
Sequencing, randomness, etc ... (Score:2)
If the sequence used by these cards is not completely random then observing the stream of packets from either of the two connected computers will allow one to extrapolate the formula used to sequence the address progress.
If I have the formula I need only a small ordered list of the IP addresses being used and I can predict what the next IP address will be. With that, I am in the loop.
This sounds like a glorified network card to me. This might confuse the kiddiez, but I suspect persons who use this company's products would be much better relying on very strong encryption and rigid security practices.
Security through TCP Sequence Number (Score:2)
Single point of failure/false sense of security (Score:2)
Invicta, Invita... (Score:2)
---
Fluffware (Score:2)
In order to route IPs on the Internet, route aggregation is required. An end host isn't going to be able to switch its address amongst many different network addresses, only to different IPs in a subnet. Given that someone who wants to compromise a machine has to have a way to find/connect to it first, it is trivial to relocate a machine. Also, see if ARIN wants to assign whole blocks of IPs for machines to hop around on.
IPv6? Maybe that would make this slightly more useful. But if a machine is supposed to be accessible, you have to make it known where it is -- if it isn't accessible, then you SHOULD just put a firewall blocking all inbound traffic, and that's that.
Another day, another "revolution". *sigh*
Re:Can someone explain the advantages of this? (Score:1)
something like this where two computers want to talk to eachother.
comp1: hey comp2
comp2: sup, here's my new ip
comp1[new ip] i'm down, here's my public key, and my new ip
comp2[new ip]: cool, here's my public key and my new ip
comp1[new ip/encrypted] here's my new super secrect receipe for grits.
something like that, which is bassicly a publickey/privatekey system with changing ip's. which i supose would help with man in the middle attacks.. maybe.
-Jon
Police Radios (Score:1)
"Set us up the IP block!" -- caffeinated_spork (Score:2)
--
I think it's a guard against packet sniffing... (Score:1)
Seth
Isn't this less useful... (Score:1)
I could see the utility of two distant computers carrying on a conversation, each changing their IP to be a pain to packet sniffers, I guess, but wouldn't encryption be more secure?
Ahhh. One feature would be the ability to specify which applications are available to the outside. Well, couldn't a firewall do that as well?
Also, if the IP address keeps changing, how exactly would their servers be available? If not by DNS (which wouldn't change fast enough and would defeat the purpose) then they'd only be available by IP, right? Of course, if the IP keep changing, how would you know the one for the server you wish to connect to?
Sounds daft to me.
--
AOL's Proxy Cache Already Does This (Score:1)
152.163.188.1
152.163.188.35
152.163.188.65
152.163.188.37
. . .
Often, the IP is changing between requesting each graphic from the index.html page.
This is probably just simple load-balancing taking place, but the results are very similar to this so-called "new technology" for hiding the source IP.
Even with a sufficiently large and diverse IP pool, this would essentially be only as secure as the random number generator that picks your next IP address. And we all know how robust and un-crackable random number algorithms are. . .
later,
kristau
Problems (Score:2)
So this is "not suited for widespread deployment."
Analog to CDMA (Score:1)
Hmmmmm... (Score:1)
Re:IP V6 Sooner than Later (Score:1)
If you really think about it, this is not going to benefit most companies one iota for protecting their corporate traffic. Think about it...most big corps run their own dark fiber now, have their own networks and routing policies trans/internationally. So what if you modulate your IP space out in the big bad world? Smaller corps use VPN's and such in addition to smaller pipes. The paranoid ones encrypt everything. I don't see how modulating IP's, which must fit into predictable ranges anyways, is going to really help things along much.
However, there is one area of use by big corps that can afford this toy. That is snooping on their competition. Most IDS systems don't come with the kind of configuration that can handle fingerprinting this toy's kind of traffic. You have to script it in or find a vendor(with really good consulting staff) that knows their stuff. This toy gives folks with deep pockets a substantial advantage over someone who won't or can't buy it or the protection they need.
As for the infallibility of this toy, it would be interesting to see some pros tear it apart and see what ticks. I am betting there are some holes there.
mrgoat
No, that was INVITA.. (Score:1)
..as in:
We'd like to "invita" you to our country, special party, very elite, BYOB, and don't forget your toothbrush.
Maybe "invita-tion" would make a good New Hacker's Dictionary term: getting invited to something that is going to be detrimental to your health/career/whathaveyou. Probably not in the hacker psyche deeply enough though.
Re:IP V6 Sooner than Later (Score:2)
Nothing is really "completely random." When creating large sets of random numbers you usually have to rely on some algorithm to create them, which rules out the "random" bit by the definition of an algorithm.
--
Re:security through obscurity (Score:2)
You're assuming they plan to own the IP addresses they say they're coming from--i.e., non-spoofed IP's. Given that this plan originated from the CIA and (former?) KGB I would say that that's a dangerous assumption.
--
Someone sell these people an Egress (Score:1)
Idiocy (Score:1)
If you own multiple connections to the internet in more than one country and could switch between them, it would be more interesting. But different RTTs and switchover times will kill you then.
Sounds simply useless...
Better schedule your transfers. (Score:1)
But seriously... It sounds good in theory, but if developers don't code their apps for the instantaneous IP change, it could seriously cause major headaches.
Also there would need to be downtime for an IP before it was used again, otherwise I could make a request, (then if hypothetically I changed IPs, and my old one was assigned immediately) the other user with my old IP would recieve the packets. Which could be a huge security risk, if transfering sensitive material.
next P2P application (Score:1)
Just an idea.
reuters a good source? (Score:2)
I'm assuming their solution is hardware based ("special cards"), with a star topology from the central unit. I'm sure that the special cards will not be running a variation of ethernet, but some other, more secure transport. If it is standard ethernet, the network would be switched.
The "central unit" acts as a switch / router, and allows some kind of address changing. No other hubs / switches are on the network, except perhaps between "central units"
I am assuming that reuters or yahoo is wrong, and this protocol is based on the switching of MAC addresses, rather than IP.
If so, then the whole network would have to be revamped in order to put this in place. Existing routers would most likely not be able to handle MAC switching - perhaps a software upgrade could change that though. I'm pretty sure that the company would just sell their central units as hubs / switches. Why not have a monopoly on the propriatary network that you designed?
So, while they are at it, they might as well couple this with fiber optics, with the central unit watching the strength of the signal for drops (i.e. a fiber optic tap is detectable - unlike ethernet, which can be tapped just by planting something on the cat-5 jacket (CIA $$$$ stuff) - or by cutting into the wire and installing a repeater/sniffer unit. We are talking about fairly expensive "spy" stuff either way.
If not, if the address switching is indeed IP, there would certainly be a way to sniff the network and to filter out MAC adresses from all other data being sent across the network. If the "special cards" or the network were designed to prevent sniffing, that would
Either way - it is essentially security through obsurity, but it makes life a lot harder for those trying to compromise computers - although hosting a server with this would be difficult - unless the Central unit acted as a gateway of some kind.
More info is certainly needed - if someone can post some that would really clear things up.
The slashdot 2 minute between postings limit: /.'ers since Spring 2001.
Pissing off hyper caffeineated
Seems like a lot of trouble to go through (Score:1)
The more things change... (Score:4)
--
Re:Security through Vapor? (Score:1)
Lets assume there are 4billion people (2^32) each wanting to run 4billion apps (2^32) each requiring 4 billion IPs (2^32).
Total IP consumption 2^96. So we can grow by a factor of 4 billion (2^32) before we need to worry.
2^128 is Big, Really Big. In fact you don't want to know quite how big it is.
So long, And thanks for all the fish.
Tim.
Re:Not a troll... (Score:1)
Just another step in the ladder (Score:3)
Of course, a centralized server would need to route which would be a major bandwidth bottleneck.
And, of course, a centralized server could also be very easily tapped by a Carnivore-like device.
I guess it could scare off a few skript kiddies though.
Re:IP V6 Sooner than Later (Score:4)
Downfall (Score:2)
How can I short this company? (Score:1)
(BTW, I've already patented a similar security method: I train packs of chipmunks to plug and unplug 10baseT cables into random ports, thwarting any attempt to break in across the related links.)
--Mike
This is a great concept... (Score:3)
Re:This method of security has been around for yea (Score:1)
it's called a "Dial-up account", and I've been using it's security feature of random IP addresses (aka "dynamic" IP) for years. News sure travels slowly huh
Yeah, crappy ISPs can now advertise their high line drop rates as "security features".
Repeat?? (Score:2)
Odd that they would have the same name...
Viv
-----------
On a similar note... (Score:1)
http://www.digitech.org/~tjunkie/idea.html [digitech.org]
It's a pretty simple idea, not very flashy, and, oh, it's a freaking bandwidth hog. But, same time, it might be fun to play with.
Ed R.Zahurak
Re:IP V6 Sooner than Later (Score:2)
Why let somebody else have all of the fun (and profits)? Create a small division and don't associate it with the rest of your company specifically designed to "break" this unbreakable scheme.
Re:Hoax? (Score:2)
Not a troll... (Score:1)
perhaps it would be wise now not to expect security on a win box? (but that would definitly be read as a troll)
BW limitations (Score:1)
Put another way, the router used has to handle all that bandwith anyway, just make it a little smarter.
New clothes on old ideas? (Score:1)
Spread spectrum meets NAT.
Still, it looks new and interesting, but it still depends on a lot of out-of-band information, and I'd hate to be in charge of their BGP tables.
//jbaltz
--
Re:Very cool idea.... (Score:4)
I'd have to say that this is a not-so-clasic example, and in fact a neat idea, but when it comes down to it it's still securing a system through making it difficult to find.
It's admittedly a neat technology, but it it really secure?
--CTH
--
Re:Ahh, I get it... (Score:2)
The real difference between the frequency-hopping analogy and reality is the simple fact that unlike FH communications, the internet is supposed to be as interoperable as possible. A Mac can look at the same web page as a Solaris box, or even Windows (if it stays up long enough, obviously, for the page to load). This is accomplished through...wait for it...well-documented and widely disseminated standards. To make the comparison with frequency-hopping systems accurate, you'd need to have all or most transciever manufacturers decide on a few standards, then agree to make all of their systems so that they work with all other ones (by adhering to the standard). And once you do that, how well do you think frequency-hopping will hide what you're saying?
Ahh, I get it... (Score:3)
They keep moving around so many times a second that the bad guys can't find them. If a bad guy manages to ping an address that's a target, by the time he even types the "n" in "nmap" it's another address.
But the GOOD traffic can find them? How the hell does this thing know the difference? It sounds like they came up with a great way to hide a computer (especially if they end up trying to pretend to be someone else's IP range in the process), but they totally ignore the fundamental problem: how to tell good traffic from bad without a human having to examine it. This has to be some of the worst snake oil I have ever seen.
variation of DHCP? (Score:2)
Isn't this just a variation of some kind of dynamic host configuration?
Unfortuantly, in both cases, hit the control server (e.g. DHCP, trn, etc.) and the whole system is down. There is also the cavet that at some point the dynamic address must be available to the public (in my case via dynamic DNS), so if my script kiddies were smart enough, they could have had their program get my address from my DNS server and adjust their attack accordingly. Or taken down the DNS server, so I would have defeated my purpose.
In either case you shouldn't rely on security through haystack and needle methods. You can always burn the haystack if you don't care about the needle.
Not really a shield (Score:4)
Ravenous Bugblatter Beast of Langley, VA (Score:2)
--Blair
Weakest Link. (Score:2)
What they fail to mention is that their Central Control Unit is running an out-of-the-box copy of RedHat 6.0.
-
Seriously; how secure can this be if it is revolving around a single (or cluster) of control units that dictate, record, log, and monitor the IP addresses?
Sounds to me like they're selling us NSA-quality security, along with NSA-approved backdoors and line tapping capability.
-
How about this--instead of having a single control center managing the IP pool, we create a peer-to-peer network where, upon joining, you effectively 'donate' your 'IP address' (some form of tunneling/enscapulation would be in use?) to the community pool.
The network client continuously searches for a new partner to exchange addresses with, based on specified variables, and trades your address with theirs.
Instead of being a one-to-one swap, it's going to be take an address, pass it on.. the first few may be easy to track, but once you've done your 10th or 40th swap (each sequential exchange gives the new partner the address you procured in the last exchange), the paper trail is extensive.
Just a random thought, it may be effective when combined with some existing solutions.
Jason Fisher [feroxtech.com]
Hoax? (Score:2)
what about MAC address? (Score:2)
Still, I wonder about a few things. First, how can you implement time-based IP-hopping when IP is not time-dependent? That is, what happens when the connection between the two machines encounters a bit of congestion? The destination will have hopped on to a new address and the packetes will never arrive... unless there's something I'm missing.
Second, don't the packets contain things like the MAC address of the ethernet card? Are they saying that their technology either will not include this information, or switch it right along with the IP address?
As glorious as it sounds, somehow I don't see this being nearly as effective against MitM as signal-hopping with radio frequencies. With a radio scanner you would either have to monitor all available frequencies to try to put the session together or synch with the session and hop along with it, which is fairly difficult. However with packet sniffing, everything that passes is available for reading. The only way I can see this being halfway useful is if somehow every address used had a different route between the two machines, which isn't really feasible.
So... it's a nice idea I suppose but it sounds to me like it's mostly hype.
Re:Not a troll... (Score:2)
43rd Law of Computing: