[rescue] RFA: firewall
Steve Sandau
ssandau at gwi.net
Tue Jan 11 16:55:36 CST 2005
Thanks, Gavin. That does all make sense. I also now know what a receive
window is.
So, once a conversation is started the sequence numbers are predictable.
While I was thinking that the random thing was to prvent someone
stepping into the middle of an existing exchange, it is really to
prevent starting an exchange with a host that appears to be someone it
is not.
I'm posting this whole thing to the rescue list as you asked...
Steve
Gavin Hubbard wrote:
> Hi Steve
>
> The explanation that Wes posted was not entirely correct.
>
> Where Wes went wrong was that the sequence numbers for a TCP connection
> _are_always_ sequential. This is how the hosts at each end of the TCP
> link reassemble the packets in the correct order. The key to the IP
> spoofing attack is that some types of hosts generate predictable initial
> sequence numbers (ISN).
>
> A TCP connection is initiated when a computer_0 sends a SYN packet to
> computer_1. After receiving the SYN, computer_1 sends an ACK packet
> along with an ISN. In reply, computer_0 sends a SYN/ACK packet in which
> the ISN is incremented by 1. This process is sometimes called a
> three-way-handshake. Once the three-way-handshake is completed, a TCP
> connection has been successfully initiated between the hosts.
>
> When either host in the connection receives a packet from the other
> host, the sequence number is checked and the following occurs:
>
> a) If the sequence number is where it should be, the data is placed into
> the next available position in the receive buffer
>
> b) If the sequence number is less than it should be, the packet is
> treated as a retransmission and the packet is discarded.
>
> c) If the sequence number is larger than expected but still within the
> limit of the receive window, it is held in the TCP buffer until the
> missing packets arrive.
>
> d) If the sequence number is larger than expected, and outside the
> receive window, the packet is dropped and the host responds with a
> packet that contains the expected sequence number.
>
> To understand why all of this is important, you might want to consider
> the following hypothetical IP spoofing attack:
>
> 1. The attacker identifies a host that he wants to spoof. He begins to
> DDOS this host. This means that any traffic the host receives will be
> dropped.
>
> 2. The attacker now sends a flood of forged SYN packets to a server he
> wants to attack. The SYN packets have their source address set to the IP
> address of the machine that is being DDOS'd. This fills up the TCP queue
> in the server. Once the TCP queue is filled, the server starts to drop
> all incoming SYN packets. The reason the SYN queue must be filled is
> because attacker needs to stop other people connecting to the server (as
> each new connection creates a new ISN).
>
> 3. The server sends out ACK packets in reply to each of the SYN packets
> it has placed in the TCP queue. Because the host that corresponds to the
> forged address is being DDOS'd, it cannot send out SYN/ACK packets in
> response and therefore no SYN/ACK packets are received by the server. If
> the host whose IP address is being forged was reachable, it would send
> an RST (reset) packet back to the server and this would abort the
> connection.
>
> 4. The attacker sends a forged SYN/ACK packet to the server. Because the
> attacker does not see the SYN packets sent out by the server, he needs
> to guess what the ISN was and increment it by one. If the correct ISN is
> chosen, the server believes that the three-way-handshake is completed
> and starts placing data from the attacker into the receive buffer.
> Importantly, it believes that the data is coming from a host at the
> forged source address.
>
> ---------------
>
> The ISN is simply a 32-bit number. Historically BSD systems had a
> terrible way of generating ISNs. They simply added 128,000 per second
> and 64,000 per connection. Because you can get the round-trip-time
> simply by pinging a host, all you needed to do was divide the RTT by 2
> and increment the last received ISN accordingly.
>
> The code used to generate ISNs is now much more robust. There is a dated
> but interesting paper that compares the different ISN generating
> algorithms in commercial operating systems at
> http://alon.wox.org/tcpseq.html
>
> Hopefully this post explains why randomised ISNs are a good thing. If
> you need more information, the RFCs are a good place to start.
>
> Regards,
>
> Gavin Hubbard
>
>
> P.S. I cannot post to rescue at sunhelp.org from this host. If you could
> forward this email to the rescue list, I'd be very grateful.
>
>
>
>
More information about the rescue
mailing list