SlideShare a Scribd company logo
1 of 18
Download to read offline
1
SECURITY PROBLEMS IN TCP/IP
     Reference: Security Problems in the TCP/IP Protocol Suite : by
        Steve Bellovin


     R-services
     Source-routing
     ARP attacks
     Session hijacking
     TCP session stealing




                                                                      2
SECURITY PROBLEMS IN R-SERVICES
    rsh and rcp use the .rhosts file in your directory, which lists hosts and accounts to
        allows access from without a password.
    Allowed by /etc/inetd
    Example .rhosts file:


        red.cs.umass.edu           brian
        *.cs.umass.edu          brian
        *   *




                                                                                            3
SECURITY PROBLEMS IN R-SERVICES
  Now that we know a machine is running rsh, how can we pretend to be
    another machine to gain access?


     Attack                           Defense


   Source routing                   ignore source routes
   False routing table updates      secure routing protocols
   Session hijacking                ssh/ secure connection
   ICMP redirects                   ?
   False ARP packets                Publish ARP tables
   TCP session stealing             ssh/ secure connection




                                                                        4
SECURITY PROBLEMS IN R-SERVICES


  Exploiting trusted relationships: C is a trusted host to S

  Source routing:
   IP source-route option
   The responder includes the source-route on the reply packets.
   Some/most OSs ignore source routes these days.

                                 X           1. C->S: spoofed packet
                                                (source-route; includes X)


                                2. replies
                  C                                S
  Open a TCP connection to rshd spoofing the address of a trusted host,
    but include yourself in the source route.



                                                                             5
SESSION HIJACKING

    Normal TCP operation from client, C, to server, S
     C->S: SYN(ISNC)
                                                        Client C               Server S
     S->C: SYN(ISNS), ACK(ISNC+1)
     C->S: ACK(ISNS +1)                                           SYN(ISNC)
     Client and Server exchange data
     ISN number generation                                    SYN(ISNS),
        4.2BSD: increments 128/sec                            ACK(ISNC+1
                                                                   )
        4.3BSD: increments 125000/sec
                                                                     ACK(ISNS+1)




                                                                                     6
SESSION HIJACKING

    Session hijacking: Find a machine, C, that’s down, guess the ISN. Usually in regular
        increments.
     X->S: SYN(ISNX) [spoofs C]               S: rshd server
     S->C: SYN(ISNS), ACK(ISNX +1)
     X->S: ACK(ISNS +1) [spoofs C; estimates ISNS]
     X->S: [ echo “* *” >> ~/.rhosts]         [spoofs C]
     X->S: RESET [spoofs C]
     X rlogins from anywhere in the world.

                                                        X          3. SYN(5000), ACK(1001)
        1. ISN estimation:       1: Disables C

                                                   2. SYN(1000)
                                      C                                    S
                                                 Trusted relationship




                                                                                             7
SESSION HIJACKING


    2. Session hijacking:

                                  X
                                                6: ACK(ISNS +1)
                                                     (spoofs C; estimates ISNS)
                                4: SYN(ISNX)
                                   (spoofs C)
                 C                                       S
                        5: SYN(ISNS), ACK(ISNX+1)


     3. Executes remote commands:

                                    X
                                                   7: [echo “* *” >> ~/.rhosts]
                                                              (spoofs C)
                                      8: RESET
                                      (spoofs C)
                            C                              S                      8
DISABLING HOSTS: SYN FLOODING DOS
   Send lots of spoofed SYN packets to a victim host


   Each SYN packet received causes a buffer to be allocated, and the limits of the
      listen()call to be reached.


   Morris invented SYN flooding just to launch a session hijacking attack, later used
      against Yahoo!




                                                                                        9
ATTACKING ROUTING TO EXPLOIT RSH


  Two types of routing: dynamic routing vs. static routing
  Dynamic routing updates
   OSPF: link-state algorithm
   RIP: distance vector algorithm

  Attacker injects a RIP update stating she has a path to host C
   All subsequent packets to C will be routed to the attacker.
   The attacker initiates connection to rshd of the server. (spoofing C)
  Defense: uses secure routing protocols
   Only accept authenticated updates.
   Requires key management.




                                                                            10
ICMP ATTACK


  ICMP redirect: forces a machine to route through you.
   Requires an existing connection
   Open a spoofed connection to the host you want to attack.
   Then send a spoofed ICMP redirect to the victim redirecting it to the gateway you’ve
    compromised.


  Others
   ICMP destination unreachable
   Frequent ICMP source quenches




                                                                                           11
ARP ATTACKS

    When a machines sends an ARP request out, you could answer that you own the
       address.
     But in a race condition with the real machine.
    Unfortunately, ARP will just accept replies without requests!
    Just send a spoofed reply message saying your MAC address owns a certain IP
        address.
     Repeat frequently so that cache doesn’t timeout


    Messages are routed through you to sniff or modify.




                                                                                  12
ARP SPOOFING - COUNTERMEASURES


  “Publish” MAC address of router/default gateway and trusted hosts to prevent ARP spoof

   Statically defining the IP to Ethernet address mapping


  Example:
        arp -s hostname 00:01:02:03:04:ab pub




                                                                                           13
TCP SESSION STEALING

    Reference: “A Simple Active Attack Against TCP” by Laurent Joncheray.
        In Proceedings of 5th USENIX Unix Security Symposium. June 1995

    Active attack using desynchronized states
           The attacker is in the path b/w the client and the server
           The attacker can sniff all the packets and inject some spoofed packets
           Steps:
            1. The attacker sniffs the communication b/w the two.
            2. The attacker disables the communication by desynchronizing the
            client and the server.
            3. The attacker injects spoofed packets that acceptable for both ends.




                                                                                     14
TCP SESSION STEALING

    Desynchronized state b/w client C and server S
     Both in “Established state”
     No data is being sent (stable state)
     S_SEQ  C_ACK and C_SEQ  S_ACK


    When S_ACK < C_SEQ < S_ACK + S_Wind:
     The packet is accepted (buffered) but not sent to the user
    When C_SEQ > S_ACK + S_Wind or C_SEQ < S_ACK :
     The packet is dropped
    In both cases, the ACK(S_ACK) is sent (ACK packet with S_SEQ,
        S_ACK)




                                                                    15
TCP SESSION STEALING

    In a desynchronized state, the attacker can send any acceptable data to the server
     E.g. [echo myhost >> ~/.rhost] for rlogin




                                       X          2: X->S (spoofing C): S_ACK, S_SEQ
     1: C->S: C_SEQ, C_ACK
                                                            [echo myhost >> ~/.rhost]

                                                               (accepted)
                                               (dropped)
                  C                                           S
           C_SEQ, C_ACK                                    S_SEQ, S_ACK

                      S_SEQ  C_ACK and C_SEQ  S_ACK

                                                                                         16
DESYNCHRONIZATION
                                                                      X       3,4, 6

                                                                          2
  Early desynchronization                                C                             S
                                                                          1
       1. C->S(Syn): C_Seq0     ; C: Syn_Sent
       2. S->C(Syn/Ack): S_Seq0, C_Seq0+1 ; S: Syn_Rcvd
                                 ; C: Established (C_Seq0+1, S_Seq0+1)

       (before the packet C->S(Ack): S_Seq0+1)
       3. X->S(spoofing C, Rst)
       4. X->S(spoofing C, Syn): X_Seq0 ; the same port # used in (1)
       5. S->C(Syn/Ack): S_Seq1, X_Seq0+1
       6. X->S(spoofing C, Ack): S_Seq1+1
                                  ; S: Established (S_Seq1+1, X_Seq0+1)




                                                                                       17
THE ATTACK

    Null data desynchronization

    1. The attacker watches the session without interfering.
    2. During a quiet period, the attacker sends a large amount of null data (IAC, NOP for
      telnet): nothing happens, server only changes the TCP Ack number
    3. Now, when the client sends data, it is dropped by the server because it’s lower
      than the server’s window.
    4. The attacker does the same with the client.


    Defense: ssh connection, or IPsec




                                                                                             18

More Related Content

What's hot

Network Security
Network SecurityNetwork Security
Network Securitymoviebro1
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographyMONIRUL ISLAM
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 

What's hot (20)

IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network security
Network securityNetwork security
Network security
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Dmz
Dmz Dmz
Dmz
 
Symmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptographySymmetric and asymmetric key cryptography
Symmetric and asymmetric key cryptography
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 

Viewers also liked

Viewers also liked (20)

security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
Tcp
TcpTcp
Tcp
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
Presentation1
Presentation1Presentation1
Presentation1
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
Network infrastructure - TCP/IP
Network infrastructure - TCP/IPNetwork infrastructure - TCP/IP
Network infrastructure - TCP/IP
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Ip address
Ip addressIp address
Ip address
 

Similar to Security problems in TCP/IP

Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigationsMukesh Chaudhari
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentationdegarden
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocolsAbdessamad TEMMAR
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNChao Chen
 
Copy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackCopy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackVishal Gurujuwada
 
New flaws in WPA-TKIP
New flaws in WPA-TKIPNew flaws in WPA-TKIP
New flaws in WPA-TKIPvanhoefm
 
Os detection with arp
Os detection with arpOs detection with arp
Os detection with arpDavid Clark
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationPriyanka Aash
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleHimani Singh
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)NYversity
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...idsecconf
 

Similar to Security problems in TCP/IP (20)

6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Pentesting layer 2 protocols
Pentesting layer 2 protocolsPentesting layer 2 protocols
Pentesting layer 2 protocols
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
08 tcp-dns
08 tcp-dns08 tcp-dns
08 tcp-dns
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Copy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackCopy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attack
 
12 tcp-dns
12 tcp-dns12 tcp-dns
12 tcp-dns
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
New flaws in WPA-TKIP
New flaws in WPA-TKIPNew flaws in WPA-TKIP
New flaws in WPA-TKIP
 
Os detection with arp
Os detection with arpOs detection with arp
Os detection with arp
 
Sockets
SocketsSockets
Sockets
 
Sockets
SocketsSockets
Sockets
 
Cryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotationCryptographic Protocols: Practical revocation and key rotation
Cryptographic Protocols: Practical revocation and key rotation
 
Type of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 exampleType of DDoS attacks with hping3 example
Type of DDoS attacks with hping3 example
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 

More from Sukh Sandhu

Qualified Social Media Expert
Qualified Social Media ExpertQualified Social Media Expert
Qualified Social Media ExpertSukh Sandhu
 
An introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lectureAn introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lectureSukh Sandhu
 
Healthy Foods and Junk Food - Sharing some Information
Healthy Foods and Junk Food - Sharing some InformationHealthy Foods and Junk Food - Sharing some Information
Healthy Foods and Junk Food - Sharing some InformationSukh Sandhu
 
Mark-up languages
Mark-up languagesMark-up languages
Mark-up languagesSukh Sandhu
 
How to build a web page - SES Magazine
How to build a web page - SES MagazineHow to build a web page - SES Magazine
How to build a web page - SES MagazineSukh Sandhu
 
Content management system requirements checklist
Content management system requirements checklistContent management system requirements checklist
Content management system requirements checklistSukh Sandhu
 
The HTML Beginner Tutorial
The HTML Beginner Tutorial The HTML Beginner Tutorial
The HTML Beginner Tutorial Sukh Sandhu
 
Personal development plan
Personal development planPersonal development plan
Personal development planSukh Sandhu
 
How to write a good business letter
How to write a good business letter   How to write a good business letter
How to write a good business letter Sukh Sandhu
 
When You Are Angry
When You Are AngryWhen You Are Angry
When You Are AngrySukh Sandhu
 

More from Sukh Sandhu (12)

Qualified Social Media Expert
Qualified Social Media ExpertQualified Social Media Expert
Qualified Social Media Expert
 
An introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lectureAn introduction to microsoft office 2007 lecture
An introduction to microsoft office 2007 lecture
 
Healthy Foods and Junk Food - Sharing some Information
Healthy Foods and Junk Food - Sharing some InformationHealthy Foods and Junk Food - Sharing some Information
Healthy Foods and Junk Food - Sharing some Information
 
HTML standards
HTML standardsHTML standards
HTML standards
 
Mark-up languages
Mark-up languagesMark-up languages
Mark-up languages
 
How to build a web page - SES Magazine
How to build a web page - SES MagazineHow to build a web page - SES Magazine
How to build a web page - SES Magazine
 
Content management system requirements checklist
Content management system requirements checklistContent management system requirements checklist
Content management system requirements checklist
 
Web standards
Web standards Web standards
Web standards
 
The HTML Beginner Tutorial
The HTML Beginner Tutorial The HTML Beginner Tutorial
The HTML Beginner Tutorial
 
Personal development plan
Personal development planPersonal development plan
Personal development plan
 
How to write a good business letter
How to write a good business letter   How to write a good business letter
How to write a good business letter
 
When You Are Angry
When You Are AngryWhen You Are Angry
When You Are Angry
 

Recently uploaded

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Security problems in TCP/IP

  • 1. 1
  • 2. SECURITY PROBLEMS IN TCP/IP Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin R-services Source-routing ARP attacks Session hijacking TCP session stealing 2
  • 3. SECURITY PROBLEMS IN R-SERVICES rsh and rcp use the .rhosts file in your directory, which lists hosts and accounts to allows access from without a password. Allowed by /etc/inetd Example .rhosts file: red.cs.umass.edu brian *.cs.umass.edu brian * * 3
  • 4. SECURITY PROBLEMS IN R-SERVICES Now that we know a machine is running rsh, how can we pretend to be another machine to gain access? Attack Defense  Source routing ignore source routes  False routing table updates secure routing protocols  Session hijacking ssh/ secure connection  ICMP redirects ?  False ARP packets Publish ARP tables  TCP session stealing ssh/ secure connection 4
  • 5. SECURITY PROBLEMS IN R-SERVICES Exploiting trusted relationships: C is a trusted host to S Source routing:  IP source-route option  The responder includes the source-route on the reply packets.  Some/most OSs ignore source routes these days. X 1. C->S: spoofed packet (source-route; includes X) 2. replies C S Open a TCP connection to rshd spoofing the address of a trusted host, but include yourself in the source route. 5
  • 6. SESSION HIJACKING Normal TCP operation from client, C, to server, S  C->S: SYN(ISNC) Client C Server S  S->C: SYN(ISNS), ACK(ISNC+1)  C->S: ACK(ISNS +1) SYN(ISNC)  Client and Server exchange data  ISN number generation SYN(ISNS),  4.2BSD: increments 128/sec ACK(ISNC+1 )  4.3BSD: increments 125000/sec ACK(ISNS+1) 6
  • 7. SESSION HIJACKING Session hijacking: Find a machine, C, that’s down, guess the ISN. Usually in regular increments.  X->S: SYN(ISNX) [spoofs C] S: rshd server  S->C: SYN(ISNS), ACK(ISNX +1)  X->S: ACK(ISNS +1) [spoofs C; estimates ISNS]  X->S: [ echo “* *” >> ~/.rhosts] [spoofs C]  X->S: RESET [spoofs C]  X rlogins from anywhere in the world. X 3. SYN(5000), ACK(1001) 1. ISN estimation: 1: Disables C 2. SYN(1000) C S Trusted relationship 7
  • 8. SESSION HIJACKING 2. Session hijacking: X 6: ACK(ISNS +1) (spoofs C; estimates ISNS) 4: SYN(ISNX) (spoofs C) C S 5: SYN(ISNS), ACK(ISNX+1) 3. Executes remote commands: X 7: [echo “* *” >> ~/.rhosts] (spoofs C) 8: RESET (spoofs C) C S 8
  • 9. DISABLING HOSTS: SYN FLOODING DOS Send lots of spoofed SYN packets to a victim host Each SYN packet received causes a buffer to be allocated, and the limits of the listen()call to be reached. Morris invented SYN flooding just to launch a session hijacking attack, later used against Yahoo! 9
  • 10. ATTACKING ROUTING TO EXPLOIT RSH Two types of routing: dynamic routing vs. static routing Dynamic routing updates  OSPF: link-state algorithm  RIP: distance vector algorithm Attacker injects a RIP update stating she has a path to host C  All subsequent packets to C will be routed to the attacker.  The attacker initiates connection to rshd of the server. (spoofing C) Defense: uses secure routing protocols  Only accept authenticated updates.  Requires key management. 10
  • 11. ICMP ATTACK ICMP redirect: forces a machine to route through you.  Requires an existing connection  Open a spoofed connection to the host you want to attack.  Then send a spoofed ICMP redirect to the victim redirecting it to the gateway you’ve compromised. Others  ICMP destination unreachable  Frequent ICMP source quenches 11
  • 12. ARP ATTACKS When a machines sends an ARP request out, you could answer that you own the address.  But in a race condition with the real machine. Unfortunately, ARP will just accept replies without requests! Just send a spoofed reply message saying your MAC address owns a certain IP address.  Repeat frequently so that cache doesn’t timeout Messages are routed through you to sniff or modify. 12
  • 13. ARP SPOOFING - COUNTERMEASURES “Publish” MAC address of router/default gateway and trusted hosts to prevent ARP spoof  Statically defining the IP to Ethernet address mapping Example: arp -s hostname 00:01:02:03:04:ab pub 13
  • 14. TCP SESSION STEALING Reference: “A Simple Active Attack Against TCP” by Laurent Joncheray. In Proceedings of 5th USENIX Unix Security Symposium. June 1995 Active attack using desynchronized states  The attacker is in the path b/w the client and the server  The attacker can sniff all the packets and inject some spoofed packets  Steps: 1. The attacker sniffs the communication b/w the two. 2. The attacker disables the communication by desynchronizing the client and the server. 3. The attacker injects spoofed packets that acceptable for both ends. 14
  • 15. TCP SESSION STEALING Desynchronized state b/w client C and server S  Both in “Established state”  No data is being sent (stable state)  S_SEQ  C_ACK and C_SEQ  S_ACK When S_ACK < C_SEQ < S_ACK + S_Wind:  The packet is accepted (buffered) but not sent to the user When C_SEQ > S_ACK + S_Wind or C_SEQ < S_ACK :  The packet is dropped In both cases, the ACK(S_ACK) is sent (ACK packet with S_SEQ, S_ACK) 15
  • 16. TCP SESSION STEALING In a desynchronized state, the attacker can send any acceptable data to the server  E.g. [echo myhost >> ~/.rhost] for rlogin X 2: X->S (spoofing C): S_ACK, S_SEQ 1: C->S: C_SEQ, C_ACK [echo myhost >> ~/.rhost] (accepted) (dropped) C S C_SEQ, C_ACK S_SEQ, S_ACK S_SEQ  C_ACK and C_SEQ  S_ACK 16
  • 17. DESYNCHRONIZATION X 3,4, 6 2 Early desynchronization C S 1 1. C->S(Syn): C_Seq0 ; C: Syn_Sent 2. S->C(Syn/Ack): S_Seq0, C_Seq0+1 ; S: Syn_Rcvd ; C: Established (C_Seq0+1, S_Seq0+1) (before the packet C->S(Ack): S_Seq0+1) 3. X->S(spoofing C, Rst) 4. X->S(spoofing C, Syn): X_Seq0 ; the same port # used in (1) 5. S->C(Syn/Ack): S_Seq1, X_Seq0+1 6. X->S(spoofing C, Ack): S_Seq1+1 ; S: Established (S_Seq1+1, X_Seq0+1) 17
  • 18. THE ATTACK Null data desynchronization 1. The attacker watches the session without interfering. 2. During a quiet period, the attacker sends a large amount of null data (IAC, NOP for telnet): nothing happens, server only changes the TCP Ack number 3. Now, when the client sends data, it is dropped by the server because it’s lower than the server’s window. 4. The attacker does the same with the client. Defense: ssh connection, or IPsec 18