TCP RST attack

Jacques A. Vidrine nectar at FreeBSD.org
Wed Apr 21 04:51:47 PDT 2004


On Tue, Apr 20, 2004 at 07:44:37PM +0200, Dag-Erling Smørgrav wrote:
> Mike Tancsa <mike at sentex.net> writes:
> > http://www.uniras.gov.uk/vuls/2004/236929/index.htm
> 
> The advisory grossly exaggerates the impact and severity of this
> fea^H^H^Hbug.  The attack is only practical if you already know the
> details of the TCP connection you are trying to attack, or are in a
> position to sniff it.  

Well, the whole point is that *although in the past it was widely
believed otherwise*, this attack is practical today in some real world
situations.  It many cases the only unknown is the source port number,
and even that can be predictable.

[...]
> I don't believe BGP sessions are as exposed as the advisory claims
> they are, either.  The possibility of insertion attacks (which are
> quite hard) was predicted six years ago, when RFC 2385 (Protection of
> BGP Sessions via the TCP MD5 Signature Option) was written.  RST
> attacks may cause route flapping, but that can be avoided with a short
> hysteresis (though this may be impractical for backbone routers)

If the DoS attack causes route flapping, then the attack is a success.

> Insertion attacks against SSL connections are practically impossible,
> so the only risk there is an RST attack, which most browsers should
> handle gracefully.
> 
> DNS connections (even zone transfers) are so short-lived that you
> would have to be very, very lucky to pull off an insertion or RST
> attack against.

Yes, these seem to be stretches.

> The most likely attack scenario to come out of this is probably gamers
> and IRC weenies kicking eachother off servers (the server's IP address
> and port number are known, the servers often reveal client IP
> addresses to other clients, and the client often uses a fixed source
> port, or one from a relatively small range)

Every time someone is kicked off an IRC server (or otherwise restrained
from online chat), global productivity rises :-)

Cheers,
-- 
Jacques Vidrine / nectar at celabo.org / jvidrine at verio.net / nectar at freebsd.org


More information about the freebsd-security mailing list