Resilience of Deployed TCP to Blind Attacks

M. Luckie, Robert Beverly, Tiange Wu, M. Allman, K. Claffy
{"title":"Resilience of Deployed TCP to Blind Attacks","authors":"M. Luckie, Robert Beverly, Tiange Wu, M. Allman, K. Claffy","doi":"10.1145/2815675.2815700","DOIUrl":null,"url":null,"abstract":"As part of TCP's steady evolution, recent standards have recommended mechanisms to protect against weaknesses in TCP. But adoption, configuration, and deployment of TCP improvements can be slow. In this work, we consider the resilience of deployed TCP implementations to blind in-window attacks, where an off-path adversary disrupts an established connection by sending a packet that the victim believes came from its peer, causing data corruption or connection reset. We tested operating systems (and middleboxes deployed in front) of webservers in the wild in September 2015 and found 22% of connections vulnerable to in-window SYN and reset packets, 30% vulnerable to in-window data packets, and 38.4% vulnerable to at least one of three in-window attacks we tested. We also tested out-of-window packets and found that while few deployed systems were vulnerable to reset and SYN packets, 5.4% of connections accepted in-window data with an invalid acknowledgment number. In addition to evaluating commodity TCP stacks, we found vulnerabilities in 12 of 14 of the routers and switches we characterized -- critical network infrastructure where the potential impact of any TCP vulnerabilities is particularly acute. This surprisingly high level of extant vulnerabilities in the most mature Internet transport protocol in use today is a perfect illustration of the Internet's fragility. Embedded in historical context, it also provides a strong case for more systematic, scientific, and longitudinal measurement and quantitative analysis of fundamental properties of critical Internet infrastructure, as well as for the importance of better mechanisms to get best security practices deployed.","PeriodicalId":340581,"journal":{"name":"Proceedings of the 2015 Internet Measurement Conference","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 Internet Measurement Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2815675.2815700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

As part of TCP's steady evolution, recent standards have recommended mechanisms to protect against weaknesses in TCP. But adoption, configuration, and deployment of TCP improvements can be slow. In this work, we consider the resilience of deployed TCP implementations to blind in-window attacks, where an off-path adversary disrupts an established connection by sending a packet that the victim believes came from its peer, causing data corruption or connection reset. We tested operating systems (and middleboxes deployed in front) of webservers in the wild in September 2015 and found 22% of connections vulnerable to in-window SYN and reset packets, 30% vulnerable to in-window data packets, and 38.4% vulnerable to at least one of three in-window attacks we tested. We also tested out-of-window packets and found that while few deployed systems were vulnerable to reset and SYN packets, 5.4% of connections accepted in-window data with an invalid acknowledgment number. In addition to evaluating commodity TCP stacks, we found vulnerabilities in 12 of 14 of the routers and switches we characterized -- critical network infrastructure where the potential impact of any TCP vulnerabilities is particularly acute. This surprisingly high level of extant vulnerabilities in the most mature Internet transport protocol in use today is a perfect illustration of the Internet's fragility. Embedded in historical context, it also provides a strong case for more systematic, scientific, and longitudinal measurement and quantitative analysis of fundamental properties of critical Internet infrastructure, as well as for the importance of better mechanisms to get best security practices deployed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
部署TCP对盲攻击的恢复能力
作为TCP稳步发展的一部分,最近的标准推荐了防止TCP弱点的机制。但是TCP改进的采用、配置和部署可能很慢。在这项工作中,我们考虑了部署的TCP实现对窗口内盲攻击的弹性,在这种攻击中,偏离路径的对手通过发送受害者认为来自其对等的数据包来破坏已建立的连接,导致数据损坏或连接重置。我们在2015年9月测试了网络服务器的操作系统(以及部署在前端的中间件),发现22%的连接容易受到窗口内SYN和重置数据包的攻击,30%容易受到窗口内数据包的攻击,38.4%容易受到我们测试的三种窗口内攻击中的至少一种攻击。我们还测试了窗口外的数据包,发现虽然很少部署的系统容易受到重置和SYN数据包的攻击,但5.4%的连接接受带有无效确认号的窗口内数据。除了评估商品TCP堆栈外,我们还在14个路由器和交换机中发现了12个漏洞——任何TCP漏洞的潜在影响都特别严重的关键网络基础设施。在目前使用的最成熟的互联网传输协议中,存在如此高水平的漏洞是互联网脆弱性的完美例证。在历史背景下,它还为对关键互联网基础设施的基本属性进行更系统、更科学、更纵向的测量和定量分析,以及为部署最佳安全实践提供更好机制的重要性,提供了强有力的案例。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Session details: Search and Ads Management Plane Analytics Session details: Analyses Quantifying Interference between Measurements on the RIPE Atlas Platform Session details: What's in a Name?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1