论文标题

混合iPID分配的分数TCP漏洞

Off-Path TCP Exploits of the Mixed IPID Assignment

论文作者

Feng, Xuewei, Fu, Chuanpu, Li, Qi, Sun, Kun, Xu, Ke

论文摘要

在本文中,我们通过操纵新的混合iPID分配方法来揭示一种新的途中TCP劫持攻击,该方法可用于终止受害者TCP连接或将伪造的数据注入受害者TCP连接中,该方法在Linux内核版本4.18及以后广泛使用,以帮助防御TCP抢劫攻击。攻击有三个步骤。首先,分组攻击者可以将TCP数据包的iPID分配降级从更安全的基于每个插座的策略到基于较不安全的哈希的策略,从而构建一个共享的iPID计数器,以形成受害者的侧渠道。其次,攻击者通过观察受害者的共享iPid计数器来检测到TCP连接的存在。第三,攻击者通过观察共享iPID计数器的侧通道来渗透序列编号和检测到连接的确认数。因此,攻击者可以完全劫持连接,即重置连接或中毒数据流。 我们评估了这种情况下TCP在现实世界中的影响。我们对SSH DOS,操纵网络流量和中毒BGP路由表的案例研究显示了其在广泛应用程序上的威胁。我们的实验结果表明,我们的分数TCP攻击可以在215秒内构建,成功率超过88%。最后,我们分析了利用的根本原因,并开发了一种新的iPID分配方法来击败这一攻击。我们在Linux 4.18中的防御原型,并通过对互联网上的真实应用进行广泛评估来确认其有效性。

In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate victim TCP connections or inject forged data into victim TCP connections by manipulating the new mixed IPID assignment method, which is widely used in Linux kernel version 4.18 and beyond to help defend against TCP hijacking attacks. The attack has three steps. First, an off-path attacker can downgrade the IPID assignment for TCP packets from the more secure per-socket-based policy to the less secure hash-based policy, building a shared IPID counter that forms a side channel on the victim. Second, the attacker detects the presence of TCP connections by observing the shared IPID counter on the victim. Third, the attacker infers the sequence number and the acknowledgment number of the detected connection by observing the side channel of the shared IPID counter. Consequently, the attacker can completely hijack the connection, i.e., resetting the connection or poisoning the data stream. We evaluate the impacts of this off-path TCP attack in the real world. Our case studies of SSH DoS, manipulating web traffic, and poisoning BGP routing tables show its threat on a wide range of applications. Our experimental results show that our off-path TCP attack can be constructed within 215 seconds and the success rate is over 88%. Finally, we analyze the root cause of the exploit and develop a new IPID assignment method to defeat this attack. We prototype our defense in Linux 4.18 and confirm its effectiveness through extensive evaluation over real applications on the Internet.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源