what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

tcp.md5.router.dos.txt

tcp.md5.router.dos.txt
Posted Aug 17, 1999

Core router TCP MD5 option leaves several router operating systems open to 'TCP connection choke' denial of service attacks.

tags | exploit, denial of service, tcp
SHA-256 | cbe76d3e04caee5a104c39b8454a8c0f2646d67166dc9fdb403a893aa6d55891

tcp.md5.router.dos.txt

Change Mirror Download
Date: Mon, 14 Jun 1999 14:29:54 -0400
From: Craig Metz <cmetz@INNER.NET>
To: BUGTRAQ@netspace.org
Subject: TCP MD5 option problem

I was implementing the RFC 2385 ("Protection of BGP Sessions via the TCP MD5
Signature Option") option in the OpenBSD stack. For those who don't know the
significance of this option, it is used to provide some level of active attack
(primarily hijacking) protection for BGP sessions on Internet core routers. One
thing I noticed about the spec is that TCP options are completely excluded from
the MAC function.

The IOS TCP implementation doesn't appear to do anything significant with
TCP options and does not send any, and so, therefore, this doesn't seem to be
a problem on those systems. However, there are several other players in the
core router space (e.g., Juniper and Torrent/Ericsson) who use 4.4BSD-derived
operating systems, and those have networking stacks which DO use TCP options.
In particular, 4.4BSD processes the TCP MSS, timestamp, and window size
options, and includes enough padding that one might also be able to shuffle
things around and slip something else in.

A possible active attack might be to sniff a TCP packet in transit and to
spoof a version of that same packet with the TCP options changed, in hopes that
the genuine packet will be dropped in transit but the spoofed one will get
through. A quick read of the BSD source indicates that a MSS option's size of
zero will be internalized, which might be one possible attack to try. Such an
attack might be able to adjust TCP parameters to "choke" the TCP connection;
it will be alive and connected, but little to no routing data would move. That
in turn could be used either as a denial of service attack or to partition
groups of routers to make other attacks harder to detect.

I haven't cooked up a real exploit for this because I don't have any of the
routers that would be affected handy in my lab, but I suppose that someone so
inclined could do so given this discussion and some time to experiment.

The (IMO) obvious fix for this problem is to use IPsec's Authentication
Header (AH) and to deprecate the TCP MD5 option. There are several freely
available and viable AH implementations for BSD (including the NRL, OpenBSD,
and KAME ones) and I believe that modern IOS has AH code in it though it's not
currently set up for protecting routing traffic. AH covers all of the TCP
header and options, as well as typically having a better MAC function (the RFC
2385 option builds a MAC by appending the key, which is possibly the weakest
way to do it).

-Craig

-----------------------------------------------------------------------------------

Date: Wed, 16 Jun 1999 22:33:36 -0400
From: Steven M. Bellovin <smb@RESEARCH.ATT.COM>
To: BUGTRAQ@netspace.org
Subject: Re: TCP MD5 option problem

In message <199906141822.SAA05311@inner.net>, Craig Metz writes:

>
> The (IMO) obvious fix for this problem is to use IPsec's Authentication
> Header (AH) and to deprecate the TCP MD5 option. There are several freely
> available and viable AH implementations for BSD (including the NRL, OpenBSD,
> and KAME ones) and I believe that modern IOS has AH code in it though it's not
> currently set up for protecting routing traffic. AH covers all of the TCP
> header and options, as well as typically having a better MAC function (the RFC
> 2385 option builds a MAC by appending the key, which is possibly the weakest
> way to do it).

The RFC 2385 scheme describes a hack that was developed precisely because
IPSEC wasn't ready, and *something* was needed to protect BGP traffic.
You're absolutely right -- no one should use it for any new work.

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close