[VulnWatch] Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later

From: Michal Zalewski (lcamtufat_private)
Date: Mon Sep 09 2002 - 17:31:51 PDT

  • Next message: Michal Zalewski: "[Full-Disclosure] Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later"

    Hello,
    
    Over a year ago, I published a paper that attempted to analyze the
    randomness of PRNGs used in TCP/IP stacks on several operating systems.
    The approach I've chosen resulted in detecting some non-trivial
    dependencies in several generators, and some amusing 3D pictures. The
    original RAZOR research is available here:
    
      http://razor.bindview.com/publish/papers/tcpseq.html
    
    Since then, I've received numerous requests to publish a follow-up
    document that would review some more operating system, and address the way
    vendors addressed problems reported previously. I'm cross-posting this to
    BUGTRAQ and VulnWatch, because some of newly included or re-tested systems
    turned out to have fairly weak ISNs, and I would expect some vendor
    response soon.
    
    The new review is available here:
    
      http://lcamtuf.coredump.cx/newtcp/
    
    To explain the reason I decided to write this - I have a strong feeling
    that this problem is still important nowadays, even if often downplayed.
    There are several attack scenarios to consider:
    
      - high-profile information - website contents, e-mails, DNS zone
        transfers, ftp data, etc - is typically exchanged without encryption;
        the ability for an attacker to disrupt or modify the information flow
        in those streams is generally a bad thing in the real world; and
        weak ISNs make it much easier for a third party to accomplish this goal,
    
      - many systems still rely on IP addresses to implement the first line
        of defense; for example, limiting an access to a SSH or FTP
        server to a specific set of IP addresses is a common practice; the
        underlying service can become exposed if the system has weak ISNs,
    
      - IP addresses logged for a completed TCP/IP handshake are typically
        trusted by administrators for purposes such as tracking spam,
        script kiddies, or detecting unauthorized access. The ability for
        an attacker to act as an other system can mislead the administrator,
    
      - most of crypto protocols turned out to be less than perfect;
        susceptibility to MITM attacks is a pretty common problem,
        sometimes caused by the implementation, often caused by the human
        factor; blind spoofing makes it feasible to launch cerain MITM
        attacks.
    
    Note that I'm not trying to be alarmistic, the sky is not falling yet, but
    it's certainly something worth looking at.
    
    Well :-) Have fun.
    
    
    -- 
    Michal Zalewski
    Got jobs?
    



    This archive was generated by hypermail 2b30 : Mon Sep 09 2002 - 18:44:20 PDT