Presentation is loading. Please wait.

Presentation is loading. Please wait.

Slide 1 Isaac Ghansah Attacks on TCP/IP. slide 2 Internet Infrastructure local network Internet service provider (ISP) backbone ISP local network uTCP/IP.

Similar presentations


Presentation on theme: "Slide 1 Isaac Ghansah Attacks on TCP/IP. slide 2 Internet Infrastructure local network Internet service provider (ISP) backbone ISP local network uTCP/IP."— Presentation transcript:

1 slide 1 Isaac Ghansah Attacks on TCP/IP

2 slide 2 Internet Infrastructure local network Internet service provider (ISP) backbone ISP local network uTCP/IP for packet routing and connections uBorder Gateway Protocol (BGP) for route discovery uDomain Name System (DNS) for IP address discovery

3 slide 3 OSI Protocol Stack application presentation session transport network data link physical IP TCP email, Web, NFS RPC Ethernet

4 slide 4 Data Formats Application data data TCP header data TCP header data TCP header data TCP header IP header data TCP header IP header Ethernet header Ethernet trailer application layer transport layer network layer data link layer message segment packet frame

5 slide 5 TCP (Transmission Control Protocol) uSender: break data into packets Sequence number is attached to every packet uReceiver: reassemble packets in correct order Acknowledge receipt; lost packets are re-sent uConnection state maintained on both sides book remember received pages and reassemble mail each page

6 slide 6 IP (Internet Protocol) uConnectionless Unreliable, “best-effort” protocol uUses numeric addresses for routing Typically several hops in the route Alice’s computer Alice’s ISP Bob’s ISP Bob’s computer Packet Source 128.83.130.239 171.64.66.201 3 Dest Seq 128.83.130.239 171.64.66.201

7 slide 7 ICMP (Control Message Protocol) uProvides feedback about network operation “Out-of-band” messages carried in IP packets Error reporting, congestion control, reachability, etc. uExample messages: Destination unreachable Time exceeded Parameter problem Redirect to better gateway Reachability test (echo / echo reply) Message transit delay (timestamp request / reply)

8 slide 8 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are public Smurf attacks uTCP connection requires state SYN flooding uTCP state is easy to guess TCP spoofing and connection hijacking

9 slide 9 network Packet Sniffing uMany applications send data unencrypted ftp, telnet send passwords in the clear uNetwork interface card (NIC) in “promiscuous mode” reads all passing data Solution: encryption (e.g., IPSec), improved routing

10 slide 10 Smurf Attack gateway victim 1 ICMP Echo Req Src: victim’s address Dest: broadcast address Looks like a legitimate “Are you alive?” ping request from the victim Every host on the network generates a ping (ICMP Echo Reply) to victim Stream of ping replies overwhelms victim Solution: reject external packets to broadcast addresses

11 slide 11 “Ping of Death” uIf an old Windows machine received an ICMP packet with a payload longer than 64K, machine would crash or reboot Programming error in older versions of Windows Packets of this length are illegal, so programmers of Windows code did not account for them Solution: patch OS, filter out ICMP packets

12 slide 12 TCP Handshake CS SYN C SYN S, ACK C ACK S Listening… Store data (connection state, etc.) Wait Connected

13 slide 13 SYN Flooding Attack S SYN C1 Listening… Store data SYN C2 SYN C3 SYN C4 SYN C5 … and more data … and more

14 slide 14 SYN Flooding Explained uAttacker sends many connection requests with spoofed source addresses uVictim allocates resources for each request Connection state maintained until timeout Fixed bound on half-open connections uOnce resources exhausted, requests from legitimate clients are denied uThis is a classic denial of service (DoS) attack Common pattern: it costs nothing to TCP initiator to send a connection request, but TCP responder must allocate state for each request (asymmetry!)

15 slide 15 Preventing Denial of Service uDoS is caused by asymmetric state allocation If responder opens a state for each connection attempt, attacker can initiate thousands of connections from bogus or forged IP addresses uCookies ensure that the responder is stateless until initiator produced at least 2 messages Responder’s state (IP addresses and ports of the con- nection) is stored in a cookie and sent to initiator After initiator responds, cookie is regenerated and compared with the cookie returned by the initiator

16 slide 16 SYN Cookies [Bernstein & Schenk] CS SYN C Listening… Does not store state F(source addr, source port, dest addr, dest port, coarse time, server secret) SYN S, ACK C sequence # = cookie Cookie must be unforgeable and tamper-proof (why?) Client should not be able to invert a cookie (why?) F=Rijndael or crypto hash Recompute cookie, compare with with the one received, only establish connection if they match ACK S (cookie) Compatible with standard TCP; simply a “weird” sequence number scheme More info: http://cr.yp.to/syncookies.html

17 slide 17 Anti-Spoofing Cookies: Basic Pattern uClient sends request (message #1) to server uTypical protocol: Server sets up connection, responds with message #2 Client may complete session or not (potential DoS) uCookie version: Server sends hashed connection data back –Send message #2 later, after client confirms he is listening Client confirms by returning hashed data –If source IP address is bogus, attacker can’t confirm Need an extra step to send postponed message #2 –Ok in TCP since the extra step (SYN-ACK) is already there

18 slide 18 Another Defense: Random Deletion 121.17.182.45 231.202.1.16 121.100.20.14 5.17.95.155 SYN C uIf SYN queue is full, delete random entry Legitimate connections have a chance to complete Fake addresses will be eventually deleted uEasy to implement half-open connections

19 slide 19 TCP Connection Spoofing uEach TCP connection has an associated state Sequence number, port number uTCP state is easy to guess Port numbers are standard, sequence numbers are often predictable Can inject packets into existing connections uIf attacker knows initial sequence number and amount of traffic, can guess likely current number Send a flood of packets with likely sequence numbers

20 slide 20 “Blind” IP Spoofing Attack Trusted connection between Alice and Bob uses predictable sequence numbers Alice Bob  SYN-flood Bob’s queue  Send packets to Alice that resemble Bob’s packets  Open connection to Alice to get initial sequence number uCan’t receive packets sent to Bob, but maybe can penetrate Alice’s computer if Alice uses IP address-based authentication For example, rlogin and many other remote access programs uses address-based authentication

21 slide 21 DoS by Connection Reset uIf attacker can guess current sequence number for an existing connection, can send Reset packet to close it With 32-bit sequence numbers, probability of guessing correctly is 1/2 32 (not practical) Most systems accept large windows of sequence numbers  much higher probability of success –Need large windows to handle massive packet losses uEspecially effective against long-lived connections For example, BGP (Border Gateway Protocol)

22 slide 22 User Datagram Protocol (UDP) uUDP is a connectionless protocol Simply send datagram to application process at the specified port of the IP address Source port number provides return address Applications: media streaming, broadcast uNo acknowledgement, no flow control, no message continuation uDenial of service by UDP data flood

23 slide 23 Countermeasures uAbove transport layer: SSL/TLS and SSH Protects against connection hijacking and injected data Does not protect against DoS by spoofed packets uAbove transport layer: Kerberos Provides authentication, protects against spoofing Does not protect against connection hijacking uNetwork (IP) layer: IPSec Protects against hijacking, injection, DoS using connection resets, IP address spoofing We will study IPSec in some detail

24 slide 24 DNS Attacks uDomain Name System (DNS) is a distributed database mapping host names to IP addresses For example, www.cs.utexas.edu  128.83.120.155www.cs.utexas.edu Network services trust host-address mappings returned in response to DNS queries –But DNS responses are not authenticated! uIf attacker takes over DNS server, can respond with addresses of attacker-controlled machines Some DNS services have known buffer overflows uCan use “zone transfer” requests to download a chunk of DNS database and map out the network

25 slide 25 Reverse DNS Spoofing uTrusted access is often based on host names E.g., permit all hosts in.rhosts to run remote shell uNetwork requests such as rsh or rlogin arrive from numeric source addresses System performs reverse DNS lookup to determine requester’s host name and checks if it’s in.rhosts uIf attacker can spoof the answer to reverse DNS query, he can fool target machine into thinking that request comes from an authorized host No authentication for DNS responses and typically no double-checking (numeric  symbolic  numeric)

26 slide 26 Reading Assignment u“IP Spoofing Demystified” from Phrack magazine u“SYN cookies” by Bernstein Both are online on the course website uOptional: Joncheray’s paper about TCP connection hijacking


Download ppt "Slide 1 Isaac Ghansah Attacks on TCP/IP. slide 2 Internet Infrastructure local network Internet service provider (ISP) backbone ISP local network uTCP/IP."

Similar presentations


Ads by Google