Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Flaw Puts TCP Data Transfer At Risk

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
0rganism Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-21-04 02:08 PM
Original message
Flaw Puts TCP Data Transfer At Risk
Flaw Puts TCP Data Transfer At Risk
By Michael Singer

A vulnerability found in Transmission Control Protocol (TCP) could allow an attacker to shut down parts of the Internet, U.S. and U.K. officials said Tuesday in separate alerts.

The U.K. National Infrastructure Security Coordination (NISCC) said systems that rely on persistent TCP connections, for example routers supporting Border Gateway Protocol (BGP), (define) are most at risk. The impact of this vulnerability varies by vendor and application, according to NISCC, but in some deployment scenarios it is rated critical.

TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

Engineers at Cisco Systems (Quote, Chart) and the NISCC were the first to find the problem that allows remote attackers to terminate network sessions. Advisories with NISCC and the CERT Coordination Center suggest multiple uses of this type of attack could range from data corruption or session hijacking to a full denial of service (define) condition.
... more at http://www.internetnews.com/xSP/article.php/3343161
Printer Friendly | Permalink |  | Top
Options Remain Donating Member (475 posts) Send PM | Profile | Ignore Wed Apr-21-04 02:15 PM
Response to Original message
1. why is this news
any network tech has known this for decades.

TearForger
Printer Friendly | Permalink |  | Top
 
0rganism Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-21-04 02:23 PM
Response to Reply #1
3. Good question. Why is it news now?
Edited on Wed Apr-21-04 02:23 PM by 0rganism
Why is the IETF just now getting around to trying to fix it?

Why did the Cisco guys suddenly freak out about it?

The news piece is tantamount to advertising the problem.

Maybe because Cisco's decided to fix more holes in their firmware:

Cisco warns of more critical software holes
Critical security holes affect almost every product the company makes

By Paul Roberts, IDG News Service April 21, 2004
Cisco Systems Inc. warned its customers about two critical security holes that affect almost every product the company makes. The vulnerabilities could be used by malicious hackers to create so-called "denial of service" (DoS) attacks, causing Cisco products to abruptly restart or drop active connections with other devices.
... http://www.infoworld.com/article/04/04/21/HNmoreciscoholes_1.html

If they publish these fixes in light of a panic over the basic TCP bug, maybe they don't look so irresponsible?
Printer Friendly | Permalink |  | Top
 
htuttle Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-21-04 02:16 PM
Response to Original message
2. I've been trying to get a handle on this flaw since they reported it
And I'm not entirely sure it's all that 'new'.

If I'm understanding what they are all hinting at, this exploit basically relies on spoofing packets, and possibly guessing the packet 'sequence numbers' to do various 'man-in-the-middle' type attacks, like sending RST packets to each end, etc...

If this is the case, this flaw has not only been known for a very long time, but is one of the reasons behind the design of IPv6 (everybody ready to switch? Me neither...).

Here's an article google threw at me describing how this exploit was used by Mitnick at one point in the 90's:
http://www.networkcomputing.com/unixworld/security/001.txt.html

IIRC, the quality of sequence number generation is one of the things that are looked at when a platform's security status is evaluated.

Unless I'm misunderstand what this 'new' flaw is, I guess.
Printer Friendly | Permalink |  | Top
 
0rganism Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-21-04 02:25 PM
Response to Reply #2
4. you're quite right, it's an old flaw getting major publicity now
I think it may be cover for Cisco to fix its own problems
cf http://www.infoworld.com/article/04/04/21/HNmoreciscoholes_1.html
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon Apr 29th 2024, 08:36 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC