Topic: Fake of packets
Greetings! In some project I implemented RMI which transport part uses libsodium. For an exchange of keys it is used functions from section Diffie-Hellman from libsodium. For enciphering/decoding functions AEAD crypto_secretbox_easy () and crypto_secretbox_open_easy () from here are used. All works as it is necessary, except for that moment that sometimes in a body of packets the garbage, that type comes that I resulted in the adjacent subject the Author: niXman Date: 10.01 16:59. And here I am am confused with that function crypto_secretbox_open_easy () successfully decrypts this "bad" packet, means, this packet has been spoiled"before application to it crypto_secretbox_easy () which, actually both ciphers this packet and adds to it an authentification tag (on the opposite side). I caught such packets only two times. It is very rare, because this code works already about half a year. Still strangeness that at a feast sent this packet it is impossible to receive IP the address that is similar on SYN-flood attack. Concerning "fake" of packets before enciphering, I think, it can be made by substitution msvcrt ` functions memcpy (). But how with it to struggle? To write the, though and not the fastest implementation of this function (with .)? A global question: how to be protected? Thanks. clients - on , the compiler - MinGW-W64. The server - .