Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security The Internet

New Denial-of-Service Attack Is a Killer 341

ancientribe writes "Hacker RSnake blogs about a newly discovered and deadly denial-of-service attack that could well be the next big threat to the Internet as a whole. It goes after a broadband Internet connection and KOs machines on the other end such that they stay offline even after the attack is over. It spans various systems, too: the pair of Swedish researchers who found it have already contacted firewall, operating system, and Web-enabled device vendors whose products are vulnerable to this attack." Listen to the interview (MP3) — English starts a few minutes in — and you might find yourself convinced that we have a problem. The researchers claim that they have been able to take down every system with a TCP/IP stack that they have attempted; and they know of no fix or workaround.
This discussion has been archived. No new comments can be posted.

New Denial-of-Service Attack Is a Killer

Comments Filter:
  • by Aliks ( 530618 ) on Wednesday October 01, 2008 @08:11AM (#25216693)

    Some DOS attack on Slashdot in progress?

  • fearmongering (Score:5, Insightful)

    by passthecrackpipe ( 598773 ) * <passthecrackpipe@@@hotmail...com> on Wednesday October 01, 2008 @08:13AM (#25216697)
    While it is pretty interesting, and disturbing, we are once again faced with a "The Internet Will Cease To Exist And Your Brain Will Explode" vulnerability. We dont know exactly how it works, we dont know exactly what to do to stop it, fixes are not available, and we are all doomed. The podcast goes into enough detail about how they discovered it to be replicated by skilled evildoers without too much trouble, but nobody knows how long, easy or invasive a fix is going to be.
    • Re:fearmongering (Score:5, Insightful)

      by MyLongNickName ( 822545 ) on Wednesday October 01, 2008 @08:18AM (#25216751) Journal

      Sorry, but your entire argument is shot down by TFA. For those of you too lazy to read it, this gem "Robert and Jack are smart dudes. I've known them for years," clearly shows that your argument is moot. The author has known them for years from (presumably) T-Ball league. How can you argue with that?

      (this having to wait 5 minutes between posts is a pain in the ass. Anyone else stuck with this restriction?)

      • Re:fearmongering (Score:5, Insightful)

        by morgan_greywolf ( 835522 ) on Wednesday October 01, 2008 @08:37AM (#25216939) Homepage Journal

        Sorry, but your entire argument is shot down by TFA. For those of you too lazy to read it, this gem "Robert and Jack are smart dudes. I've known them for years," clearly shows that your argument is moot.

        Seriously....just saying "Yeah, these two dudes I know can break the whole Internet. Trust me. I've known them a long time." is just completely lame and useless.

        The article is nothing more than fear mongering and fudfudfud (please tag appropriately). Unless there's something to the interview beyond "I know how to break the Interwebs!!!", I'm from Missouri on this one.

        • Re: (Score:3, Informative)

          by stevied ( 169 )

          The interview does actually have a lot of detail.

          Skip to ~ 5m10s for the English.

      • by Cro Magnon ( 467622 ) on Wednesday October 01, 2008 @08:41AM (#25216973) Homepage Journal

        (this having to wait 5 minutes between posts is a pain in the ass. Anyone else stuck with this restriction?)

        My sig answers your question. :)

      • Re:fearmongering (Score:5, Insightful)

        by Yvanhoe ( 564877 ) on Wednesday October 01, 2008 @09:50AM (#25217763) Journal

        (this having to wait 5 minutes between posts is a pain in the ass. Anyone else stuck with this restriction?)

        Yes, limiting the possibilities to comment is clearly a bad idea. /. summaries have always been quite bad for as long I can remember it, but all the informational value is in the comments. Where else can you see a fearmongering article, people making some obvious remarks, getting insightful retorts to finally end on a +5 comment coming from a guy working in the lab TFA mentions ?

        Slashdot, don't fear posters. Your moderation system filters spam (and as*holeness) with enough efficiency, don't add nagging features !

    • Re: (Score:3, Informative)

      by jrl ( 4989 )

      It wasn't our intention to fear monger. In fact if you listen to the whole podcast we actually comment on the "Chicken Little" phenomenon in security research.

      For those wanting to stay abreast of these issues as more information is shared publicly, keep an eye on my blog [robertlee.name].

      I'm trying to keep a link to most news articles there. I've also been able to answer a few questions in the comments through that medium.

      --Robert

      • Re: (Score:3, Insightful)

        WTF? "Answer some questions"? there is 1 question, and it looks like you posted that yourself. blog whoring and fearmongering. Oh, and i did listen to the whole podcast.
    • "fixes are not available," /me inserts non-multisession live CDs into all my machines...

      "Bring it on!" :)

    • Re: (Score:3, Insightful)

      I am no networking Guru by any means, but after listening to the mp3, I don't see how this isn't fixable. Just based on the way routers will 'continue to spit out the same packet over and over' seems like a pure implementation issue of the TCP/IP stack.

      Please correct me if I am wrong, but I don't see how this cannot be fixed. Another super-scary (and warrantless) slashdot headline and summary IMHO.
  • Pfffft (Score:5, Funny)

    by MyLongNickName ( 822545 ) on Wednesday October 01, 2008 @08:13AM (#25216709) Journal

    Doesn't affect me. I haven't used DOS in YEARS. Some folks need to move up to Windows 3.1. That is where it is at.

    • Re:Pfffft (Score:4, Funny)

      by eserteric ( 442678 ) on Wednesday October 01, 2008 @08:18AM (#25216745)

      Uhh, you know that's still based on DOS right? You should update to Windows 95 like me to be safe.

    • Re: (Score:3, Funny)

      by ByOhTek ( 1181381 )

      Bah. I use Dr. Dos. It's a doctor so it fixes itself and I don't have to worry about these issues!

    • Please, DOS 5 is where it's at. No PC can be without it.
    • Do you know where I can get Windows 3.1 for my Apple ][?

  • Transcript (Score:5, Insightful)

    by commanderfoxtrot ( 115784 ) on Wednesday October 01, 2008 @08:14AM (#25216717) Homepage

    Do people really have time to listen to podcasts unless they are commuting?

    Is there a transcript???

    • Re: (Score:3, Insightful)

      Do people really have time to listen to podcasts unless they are commuting?

      Is there a transcript???

      To answer your question before I start my tirade: From the blog in question, "The podcast is still the most complete public source of information for these findings." http://blog.robertlee.name/ [robertlee.name]

      I know what you mean. Audio or video are pretty poor for the rate of information disseminated compared to text. This is doubly true when the creators aren't formally trained (presenters aren't actors, or the script is not professionally written). Then you wind up with unskilled individuals all over the internet bl

  • Not much information (Score:5, Informative)

    by mseeger ( 40923 ) on Wednesday October 01, 2008 @08:17AM (#25216733)
    Hi,

    Neither interview nor Link provides much information about the kind of attack. Between the lines they seem to be doing something with the ressource usage by manipulating tcp session parameters. But that's idle speculation for now.

    CU, Martin

    • Re: (Score:3, Informative)

      by martyb ( 196687 )

      Neither interview nor Link provides much information about the kind of attack. Between the lines they seem to be doing something with the ressource usage by manipulating tcp session parameters. But that's idle speculation for now.

      Looks like you may be onto something; found this writeup with a bit more detail: New attacks reveal fundamental problems with TCP [techtarget.com]

      Don't know enough about TCP/IP to comment, but maybe someone else here could elucidate or elaborate?

      • How it works (Score:5, Interesting)

        by Spy der Mann ( 805235 ) <`moc.liamg' `ta' `todhsals.nnamredyps'> on Wednesday October 01, 2008 @08:42AM (#25216981) Homepage Journal

        Many TCP servers use a technique known as a SYN cookie in order to prevent attackers using spoofed IP addresses from launching SYN flood denial-of-service attacks against them. The cookie is essentially a chosen TCP initial sequence number that is calculated using some specific hashed metadata that reflects the details of the specific TCP connection. Once the client returns a correct packet to the server, the server knows that the client isn't using a forged IP address.

        Sockstress computes and stores so-called client-side SYN cookies and enables Lee and Louis to specify a destination port and IP address. The method allows them to complete the TCP handshake without having to store any values, which takes time and resources. "We can then say that we want to establish X number of TCP connections on that address and that we want to use this attack type, and it does it," Lee said.

        In summary, it works by establishing tons and tons of connections using carefully-forged SYN cookies [wikipedia.org]. The irony? "SYN Cookies are the key element of a technique used to guard against SYN flood attacks". ROFLMAO.

        And then it gets scarier:

        From the wikipedia article:

        The use of SYN Cookies does not break any protocol specifications, and therefore should be compatible with all TCP implementations.

        Now, are you ready to scream?

        the 2.6.26 Linux kernel added limited support of TCP options.

        Scream.

        • The technique was created by Daniel J. Bernstein and Eric Schenk in September 1996. The first implementation for SunOS was released by Jeff Weisberg a month later, and Eric Schenk released his Linux implementation in February 1997 (the current implementation uses e.g. net.ipv4.tcp_syncookies).

          From an old 2001 syn cookies vulnerability report: [linuxdevcenter.com]

          syncookies can be disabled on a running system by executing the command:

          echo 0 > /proc/sys/net/ipv4/tcp_syncookies

          (To the editors: Mind adding the above line to the summary? Thanks!)

          Patch your systems. NOW! (note that this makes them vulnerable to syn flood attacks, but at least those won't leave your system unusable until reboot!)

          • I just added the above line to /etc/rc.d/rc.local, but I really don't know if that leaves a window of time during boot where the vulnerability can be exploited.

            Any GNU/Linux expert who can inform us how to correctly patch our systems (until the official patch is released, of course)?

            • Re: (Score:3, Insightful)

              by Rob Kaper ( 5960 )

              Simple: put that line before your network cards are initialised. That's rc.inet1 in Slackware, YMMV elsewhere.

            • DON'T PANIC! (Score:4, Informative)

              by collinstocks ( 1295204 ) on Wednesday October 01, 2008 @09:25AM (#25217409) Journal

              If you are running Ubuntu 8.04, you probably aren't vulnerable (or at least I am not). See if you get what I got in the terminal:

              collin@collin:~$ cat /proc/sys/net/ipv4/tcp_syncookies
              0
              collin@collin:~$

            • On RedHat distros, and probably others, there is a utility called 'sysctl' and a config file called '/etc/sysctl.conf'. In Redhat, the following appears in /etc/sysctl.conf:

              # Controls the use of TCP syncookies
              net.ipv4.tcp_syncookies = 1

              Just change the 1 to a 0

              • Re: (Score:3, Informative)

                by PReDiToR ( 687141 )
                Under openSUSE 11 I found this setting at:

                YaST2 -> System -> /etc/sysconfig Editor -> Network -> General -> IP_TCP_SYNCOOKIES

                I don't remember messing with this setting, so my bet is that openSUSE defaults to on.
            • by the_B0fh ( 208483 ) on Wednesday October 01, 2008 @03:21PM (#25223267) Homepage

              WHY ARE YOU TAKING THE ADVICE OF RANDOM FOOLS OFF SLASHDOT? Go find out what syncookies first. Find out why syncookies were put in. Then find out what this attack is supposed to do. Then think for your self - do I want to protect against a known attack that has successfully brought down large sites, or do I want to turn that protection off because some fool suggested it on slashdot because I heard about a new scary attack?

              If you are truly worried, there are other things you can do - look at your routers, firewalls, etc. Also, look at other OS'es. OpenBSD doesn't have syncookies - why not?

          • Re: (Score:3, Interesting)

            by mishehu ( 712452 )
            Call me a skeptic... I'll wait until I hear about it being confirmed by the kernel devs or some well known security experts... I've heard the "internet is doomed!!!!!" too many times to knee-jerk...
          • by rtfa-troll ( 1340807 ) on Wednesday October 01, 2008 @10:41AM (#25218591)

            Now we see that a little bit of knowledge can be a dangerous thing.

            The point that's in the grandparent's post is not that your own syn-cookies can be used against you. Syn cookies on your server are doing the right thing and are protecting you against normal syn floods.

            What's happening in this attack is that the client side (the attacker) is using their own syn cookies to store information about connections on your server (instead of in their own memory). This allows them to handle more connections than otherwise. Unfortunately there is nothing you can do to stop this. They are using required behavior of the TCP stack for their information storage.

            Some mitigation strategies that I can think of

            The parents "fix" will make things slightly worse during this attack since turning off syn-cookies will mean that your server will have to track even more TCP connections. Not just those that are active, but also those that have just started. Of course, it will also make the new attack pointless since they can just do a normal syn-flood instead.

            • Increase the TCP connection storage on your server to such a size that the DOS becomes impractical
            • Ensure that TCP connections time out after some time if they have not been authorised to a particular user
            • Impose a resource limit per authorised user on connections. Impose a separate resource limit on all non authorised users which will not interfere with authorised use.
            • Use IPSEC to authorise all incoming connections / alternatively prioritise authorised sessions.

            The best current full fix I can think of is to use IPSEC and ensure that all incoming connections are authorised. Your own users will still be able to DOS you, but at least you can hunt them down.

    • Found this [t2.fi] link through SANS.org:

      There's not fery much new detailother than stating that it's about "TCP state table manipulation". I'd guess they're keeping details to themselves until a fix can be found. My guess is that others will discover it just based on the broad area described.
    • by Trailrunner7 ( 1100399 ) on Wednesday October 01, 2008 @08:45AM (#25217007)
      Here's a better story with more info: http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332898,00.html [techtarget.com] Looks like they're able to mess with the session parameters, as you said.
  • by apathy maybe ( 922212 ) on Wednesday October 01, 2008 @08:17AM (#25216735) Homepage Journal

    My IPv4 address is 127.0.0.1 ...

    More seriously, I wonder if this actually affects *nix machines, and how the various environments in that area affect the attack.

    After all, they may find a single attack against all MS Windows XP machines, but they need a lot more then one to attack all Linux based systems (and then you throw in BSD based ones as well...).

    Meh, the article doesn't give much detail.

    • by erayd ( 1131355 ) * on Wednesday October 01, 2008 @08:20AM (#25216769)
      Unless it's a generic vulnerability in the TCP spec, in which case almost every implementation of it would be vulnerable - including all those Linux machines. Linux is not some magical shield, it takes responsible use to keep it secure.
      • by apathy maybe ( 922212 ) on Wednesday October 01, 2008 @08:34AM (#25216917) Homepage Journal

        Of course Linux is not a magical shield. But having a diverse eco-system is known to protect against many attacks.

        One of the reasons stories about how the banana is going extinct come up every few years is because the "modern" banana that most people in the over developed world can buy, are all clones! One disease can attack all the plants in the same manner.

        In the same way, computers that have the same OS tend to be vulnerable to the same attack. Because there are a lot more OSs based around Linux (and BSD), people running these OSs are less vulnerable, because they are in a diverse eco-system. Especially when these kernels and the user-land tools are FLOSS.

        As such, yes, it maybe a generic vulnerability in the TCP spec. (though how likely is that?), however, it is not specified, which is why I asked if it did affect *nix.

        If nothing else, due to the nature of FLOSS, the attack could quickly be coded around as soon as it is known, and then pushed out to many many people running auto-update systems (such as Debian, Ubuntu and similar). (Even if that breaks the spec.)

        • One of the reasons stories about how the banana is going extinct come up every few years is because the "modern" banana that most people in the over developed world can buy, are all clones! One disease can attack all the plants in the same manner.

          I wondered how long it would be before someone dragged out a banana analogy.

        • Re: (Score:3, Insightful)

          by SL Baur ( 19540 )

          Of course Linux is not a magical shield. But having a diverse eco-system is known to protect against many attacks.

          Amen! Even so, I would expect to see patches coming from David Miller shortly if Linux is truly vulnerable. Similar to how Linux was the first system to be protected against the F00F Intel Pentium hardware bug.

    • by BenoitRen ( 998927 ) on Wednesday October 01, 2008 @08:21AM (#25216779)

      Thief! That's MY address!

    • FTS:

      researchers claim that they have been able to take down every system with a TCP/IP stack that they have attempted

      Last time I checked, that includes Unix and BSD. Not only does it include BSD, but since the XP TCP stack literally is the BSD stack, I think youre point is pretty irrelevant.

    • (and then you throw in BSD based ones as well...)

      You do know that MS didn't write Windows' TCP stack on their own, right?

  • Coral cache link (Score:2, Informative)

    by erayd ( 1131355 ) *
  • by Drakkenmensch ( 1255800 ) on Wednesday October 01, 2008 @08:19AM (#25216757)
    It sort of makes you wonder - if such a critical, destructive and EASY way to cripple the entire internet exists... why hasn't it been discovered yet so late in the game, and why are the usual DOS targets still operating normally?

    The simple fact that I'm posting this reply makes me doubt the "ZOMG UNSTOPPABLEZ" aspect of this claim, is all.

  • Nah (Score:4, Funny)

    by Twinbee ( 767046 ) on Wednesday October 01, 2008 @08:23AM (#25216799)

    Ignore the story, there's very little chance that a single virus can take down all systems, especially if the user is not running Windows.

    I for instance have multiple rock solid software and hardware firewalls, and most ports blocked - I'd like to see it try taking dow

  • by radi0man ( 191807 ) on Wednesday October 01, 2008 @08:23AM (#25216803)

    Here's a link to an article in English:

    http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332898,00.html [techtarget.com]

    From the article:

    Many TCP servers use a technique known as a SYN cookie in order to prevent attackers using spoofed IP addresses from launching SYN flood denial-of-service attacks against them. The cookie is essentially a chosen TCP initial sequence number that is calculated using some specific hashed metadata that reflects the details of the specific TCP connection. Once the client returns a correct packet to the server, the server knows that the client isn't using a forged IP address.

    Sockstress computes and stores so-called client-side SYN cookies and enables Lee and Louis to specify a destination port and IP address. The method allows them to complete the TCP handshake without having to store any values, which takes time and resources. "We can then say that we want to establish X number of TCP connections on that address and that we want to use this attack type, and it does it," Lee said.

    • So.. setting up a SYN cookie handshake takes up memory on the server. And by calculating the correct response to a SYN cookie challange they defeat the handshake, opening the port on the server, and then they set a new connection from a new forged IP address. This takes up memory and connections on the server machine, leaving connections to time out.

      Do I have this correct?

      • by Anonymous Coward on Wednesday October 01, 2008 @09:39AM (#25217619)

        I don't think so. From the techtarget article, it seems that they are using a technique invented for the server side, but on the client side.

        It's a way of calculating the syncookies, so that the server doesn't need to store anything, until it receives the third packet (ACK) of the three way handshake, thus being able to handle syncookie'd connections just as fast as normal connections. My understanding is that these guys use the same technique on the client, so that they don't need to store anything either.

        They send the first packet (SYN), and forget about it.

        When the server responds (SYNACK) several thousand packets later - this is a flood, remember - they know the server cookie, and can recalculate their own cookie. Thus they can send the third packet (ACK) and complete the handshake, establishing the connection. The server now inserts the connection into its connection table. The client does not, it's doing a DOS attack, not trying to communicate.

        When the client doesn't need to keep track of its connections, it can start new connections as fast as bandwidth allows. Basically syn-cookies just became useless, and we're back at square one.

        However, for servers that don't have this no-memory implementation of syncookies, but still store the syncookie itself, it gets even worse. Not only are you using up all available connections, but you also fill up the syncookie table. This may be where the "does not recover after the attack" comes in. Previously syncookies would prevent the flooding in the first place, and thus you would never fill up the syncookie table. So that part of the code never got tested.

        Of course this is just how *I* understand it.

    • by The Famous Brett Wat ( 12688 ) on Wednesday October 01, 2008 @10:07AM (#25218059) Homepage Journal

      Sockstress computes and stores so-called client-side SYN cookies

      This isn't supposed to be possible. SYN cookies [cr.yp.to] are supposed to contain at least 24 bits worth of entropy, produced by running a server-side secret through a one-way hashing function. You can easily obtain a SYN cookie by performing the initial SYN with the server. A SYN+ACK comes back which contains the SYN cookie (as the initial sequence number). The cookie so received is unique per TCP connection (IP address and port numbers at both ends), and valid only for a limited time. The server side does not maintain any state information until the cookie is returned in the client's ACK.

      If they are actually computing SYN cookies on the client side, it's evidence of a weak SYN cookie implementation. Computation of the cookie should be infeasible without access to the server-side secret. Of course, this may be a case of sloppy reporting. As usual, we aren't given all the details of this earth-shattering vulnerability. We are simply left to guess whether these folks (and those that report on them) know what they're talking about or not.

      They could be guessing cookies, and that would explain the "it will hurt intermediate systems" excuse they used for not demonstrating it, since they'd need to flood the peer TCP with millions of randomly-guessed initial sequence numbers. Incidentally, if this is a TCP SYN-flood attack of this sort, the "after effects" they mention have to do with the fact that all the TCP connections must time out naturally -- a process which might take several minutes per connection, depending on the configuration of the listening server application. The process is naturally limited by bandwidth and the size of the TCP state table: you have to be able to send successful fake ACKs fast enough to fill the TCP state table. All the usual mitigations for TCP SYN floods apply, such as increasing the state table size and reducing the timeout for open but idle connections.

      It's not at all clear that this is any worse than the kind of DDoS attack that a typical botnet can unleash. In that case, you get thousands of perfectly real TCP connections from multiple addresses almost simultaneously. So maybe this attack doesn't require a botnet, but I don't see that it's a big new threat (as I've described it).

      • Re: (Score:3, Informative)

        Sockstress computes and stores so-called client-side SYN cookies

        This isn't supposed to be possible.

        I took it to mean that the client is doing something equivalent to the "normal" SYN cookies that servers use, so that it doesn't have to remember what connections it's in the middle of trying to open.

  • Power grids? (Score:3, Insightful)

    by Porchroof ( 726270 ) on Wednesday October 01, 2008 @08:28AM (#25216857) Homepage
    Why do I constantly find stories about how our power grids, nuclear energy sites, military bases, Federal government, etc., etc., will be taken down by Internet hackers? Please don't tell me that all of those resouces are accessible over the Internet. Why in God's name would put such resources on the Interet?
  • pff (Score:5, Funny)

    by amnezick ( 1253408 ) * on Wednesday October 01, 2008 @08:29AM (#25216861) Homepage

    Typical /. reaction to potential danger:

    "Hah. Until I don't taste nuclear winter snow I don't believe that's gonna happen'"

    Give the man his nuke. He earned it.

  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Wednesday October 01, 2008 @08:29AM (#25216865)
    Comment removed based on user account deletion
  • The sky is falling! (Score:4, Interesting)

    by slashqwerty ( 1099091 ) on Wednesday October 01, 2008 @08:30AM (#25216875)
    Another security researcher claims the sky is falling. There are no details, no proof of concept, nothing to prove the alleged vulnerability even exists. Here's something those researchers should learn: if you can't back up your claims with proof it doesn't exist!
  • Why didn't they publish a detailed description of their exploit? If they don't supply enough information to let any script kiddie with "toolz" create havoc and end Western Civilization, they must be just blowing smoke and sowing FUD, right?

    • Because IF they are right AND this vulnerability will expose every IP device on the network to a DoS, THEN it's pretty fricking dangerous.
  • The interview is in Dutch, not Swedish. And since the researchers' names are Robert E. Lee and Jack C. Lewis, I don't believe they are Swedish either.
  • by Lord Byron II ( 671689 ) on Wednesday October 01, 2008 @08:45AM (#25217009)

    Quickly, go yank the cable/dsl connection right out of the wall before its too late!

    Come on... I'm not going to listen to mp3, but the /. summary and the article both are dangerously low on details. This effects every machine with a TCP/IP stack? IPv4 and IPv6? Leaves the machines in a permanent state of DOS? There's no prevention? No fix? And you can't even test it because it might take down "other devices between here and there"?

    Pardon me, I'm off to find myself a huge grain of salt.

  • Let's assume that they have actually discovered this industry sweeping exploit.

    So they went and contacted the vendors like good white hats. Now, if their intent was in being contributers to the greater good of security they would stop at this level of correspondence and work with the companies until the problem is fixed.

    However, they released this article to inform the public. Normally when someone does this it is with the intension of providing the public with the knowledge, tools, or rallying them activis

  • I read TFA, but somehow I missed the part about the nth complexity binary loop [tamu.edu].

  • I'm safe (Score:5, Funny)

    by goddidit ( 988396 ) on Wednesday October 01, 2008 @09:24AM (#25217393)
    This doesn't me since use I UDP all communications communications for.
  • Because in a week I'm going to be auto-DOSing every frigging zombie which connects to my servers and tries to send spam or crack SSH.

    (No, not really. Besides, the botnet people would probably turn off syncookies on their zombies)

  • by nweaver ( 113078 ) on Wednesday October 01, 2008 @09:30AM (#25217471) Homepage

    It sounds like a blind resource consumption attack against SYN-cookie implementations, no? (Without SYN-cookies, the attack is trivial, just spoof SYNs).

    http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1332898,00.html [techtarget.com]

    SYN-cookies are a simple idea. Upon receiving a SYN, rather than creating all the state, the server returns a SYN/ACK with the SEQ value = H(IP,ACK value). Thus when it sees the ACK packet it can check that the value is returned, and then create all the state.

    If this is the case, it seems to require that a SYN-cookie be predictible, that the attacker can probe a client to predict what H(IP,ACK value) is. IF that is the case then there is an easy fix: simply use more and better random data as salt in a better hash function.

    Simply because ANY blind resource consumption attack against a SYN-cookie server requires knowing what the SEQ value from the server for the SYN/ACK in order to establish a connection by sending the proper ACK (and then some data to load the server further).

    If the attacker can't predict the SYN/ACK's SEQ value, it can't construct a proper ACK and cause the server to consume resources.

  • by erroneus ( 253617 ) on Wednesday October 01, 2008 @09:31AM (#25217483) Homepage

    ...something about this article made me think of something else.

    With these caps and limits being placed on customers of Comcast and others, I have to wonder if the customer is being protected or endemnified against people attacking their accounts with massive data packets in order to fill up their limits? This wouldn't be a [D]DoS exactly, but potentially, it could be an [E]DoS in effect -- E meaning "Expensive."

    I know personally, after having realized this, if I knew any Comcast customers I didn't particularly like, I might be tempted to set up a dyndns entry for their IP address and mention them on slashdot...

  • Outpost24 (Score:4, Informative)

    by mrhoodie ( 1376073 ) on Wednesday October 01, 2008 @09:40AM (#25217625)
    You can find more information at my friends blog http://blog.robertlee.name/ [robertlee.name] he is one of the researchers at http://www.outpost24.com/ [outpost24.com] that discovered this vulnerability together with Jack Louis. This is probably the best place to find links for intervies, other articles and keep yourself updated with this issue. They will among other things present this at T2 in Finland this friday http://www.t2.fi/schedule/2008/#speech8 [t2.fi]
  • by nweaver ( 113078 ) on Wednesday October 01, 2008 @09:54AM (#25217855) Homepage

    The observation: You can use a SYN-cookie like trick on the client side as well for an attacker:

    You send SYNs where the initial seq # = H(sip, dip, sport, dport).

    Now when you get a SYN/ACK back, you can send the ACK to complete the handshake. You can use the ACK field back from the server to know where you are in what data to send (just subtract the value from the initial sequence # to know what the next piece of data to send is), and you can know where you are in the received data (if necessary) by storing just the server's initial sequence #.

    As a result, you can now interact with the server without having to maintain ANY TCP session state, or just a single word (the server's initial seq #), allowing the attacker to use vastly fewer resources to tie up server resources.

    On one hand, this is a cool trick, and potentially useful for an attacker: if you have only a couple of machines and really want to tie up server resources, you can use this quite quickly.

    But OTOH, attackers already have so many zombie resources that this really doesn't necessarily buy the attacker all that much: If you have 10K machines banging on a server, the 10K machines have a good 2000x more state than the servers. So who cares about stateholding requirements on the zombie side? Thus I think its only really relevant if you wanted to DOS google, akamai, or some similar very-high-resource infrastructure.

    And as the attacker can't SPOOF packets with this (it needs to see the SYN/ACK), the zombies can be filtered if the DOS is detected and the attacker's identified as well.

  • by doc_doofus ( 1102559 ) on Wednesday October 01, 2008 @11:12AM (#25219081)

    It goes after a broadband Internet connection

    Ha, ha, laugh at my dial-up connection now!

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...