Off-Path TCP Exploits: Global Rate Limit Considered Dangerous

被引:0
作者
Cao, Yue [1 ]
Qian, Zhiyun [1 ]
Wang, Zhongjie [1 ]
Dao, Tuan [1 ]
Krishnamurthy, Srikanth V. [1 ]
Marvel, Lisa M. [2 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM | 2016年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we report a subtle yet serious side channel vulnerability (CVE-2016-5696) introduced in a recent TCP specification. The specification is faithfully implemented in Linux kernel version 3.6 (from 2012) and beyond, and affects a wide range of devices and hosts. In a nutshell, the vulnerability allows a blind off-path attacker to infer if any two arbitrary hosts on the Internet are communicating using a TCP connection. Further, if the connection is present, such an off-path attacker can also infer the TCP sequence numbers in use, from both sides of the connection; this in turn allows the attacker to cause connection termination and perform data injection attacks. We illustrate how the attack can be leveraged to disrupt or degrade the privacy guarantees of an anonymity network such as Tor, and perform web connection hijacking. Through extensive experiments, we show that the attack is fast and reliable. On average, it takes about 40 to 60 seconds to finish and the success rate is 88% to 97%. Finally, we propose changes to both the TCP specification and implementation to eliminate the root cause of the problem.
引用
收藏
页码:209 / 225
页数:17
相关论文
共 26 条
  • [1] ABRAMOV R., 2013, J COMPUTERS SECURITY
  • [2] Alexander G, 2015, IEEE INFOCOM SER
  • [3] [Anonymous], P ACM SIGCOMM IMC
  • [4] Bellovin S. M., 2002, P 2 ACM SIGCOMM WORK
  • [5] Beverly Robert., 2013, Internet Society Article
  • [6] Braden R., 1989, REQUIREMENTS INTERNE
  • [7] CHEN Q. A., 2015, CCS
  • [8] Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow
    Chen, Shuo
    Wang, Rui
    Wang, XiaoFeng
    Zhang, Kehuan
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 191 - 206
  • [9] ENSAFI R., 2014, PAM
  • [10] Ensafi Roya., 2010, USENIX Security