-
Key: DDSSEC12-94
-
Status: open Implementation work Blocked
-
Source: Real-Time Innovations ( Dr. Gerardo Pardo-Castellote, Ph.D.)
-
Summary:
There is an inherent DoS network amplification attack that exploits peer-to-peer discovery. See https://issues.omg.org/browse/DDSIRTP26-6
This issue should be addressed by DDS-Security. Likely using some pre-shared key mechanics to protect all messages not otherwise protected. For example, the authentication handshakes.
-
Reported: DDS-SECURITY 1.1b1 — Fri, 12 Nov 2021 16:28 GMT
-
Updated: Mon, 25 Mar 2024 15:55 GMT
-
Attachments:
- encode_rtps_auth_only.svg 22 kB (image/svg+xml)
- encode_rtps_encryption.svg 23 kB (image/svg+xml)
DDSSEC12 — Provide pre-shared protection for unauthenticated messages
- Key: DDSSEC12-94
- OMG Task Force: DDS Security 1.2 RTF