During the mission to the University of Oulu a Host Identity Protocol network architecture that allows eavesdropping and man-in-the-middle (MITM) attacks has been deployed and studied. The testbed consisted of two enterprise level HIPSwitches, a Conductor, a few routers, MITM host and two endpoint hosts. Such architecture allowed to study orchestration and tunnel establishment processes between HIP nodes and implement a simple attack on an overlay network which shows that only edge-to-edge connection authenticity is being provided.
Funded by European Cooperation in Science and Technology.