Active defense gets serious: Announcing LaBrea 2.0

From: Tom Liston (tlistonat_private)
Date: Mon Sep 17 2001 - 10:42:34 PDT

  • Next message: Portnoy, Gary: "CodeBlue finally hitting, or what?"

    First we slooooowed 'em down...
    
    ...Now, we're gonna' STOP 'em.
    
    Announcing: LaBrea 2.0
    
    It all started a few weeks ago when we read this innocent little paragraph in
    Chapter 22 of Steven's TCP/IP Illustrated, Vol. 1:
    
    "The characteristic of the persist state that is different from the
    retransmission timeout in Chapter 21 is that TCP never gives up sending window
    probes. These window probes continue to be sent at 60-second intervals until the
    window opens up or either of the applications using the connection is
    terminated."
    
    What a lovely word "NEVER" is....
    
    As you may or may not know, LaBrea 1.x is a small Linux-based application that
    puts unused IP addresses on your network to use, creating a "tarpit" which slows
    down scans of your address space by establishing connections and forcing inbound
    connections to time-out.  LaBrea automates the process of "grabbing" unused IP
    addresses and adding them to its pool of "tarpit" addresses.
    
    But now, thanks to the word NEVER, we can take "active defense" to a whole new
    level.
    
    LaBrea is beginning to generate interest in those who know that an active stance
    against REAL attackers is necessary to the continued health of the Internet:
    
    "LaBrea gives its users a tactical advantage over 'zombie' computers like those
    compromised by the Code Red worms.  The computer security industry will find it
    a very intriguing utility."
    -- Rob Rosenberger, editor, Vmyths.com
    
    **New in LaBrea 2.0**
    
    When LaBrea is started with the "-p" flag, it will force connection attempts
    into the "persist" state.  You grab 'em, hold 'em, and NEVER let 'em go.
    
    Yes, that's right... I said "*NEVER* LET THEM GO"...
    
    How does it work?  Technical details:  The LaBrea "server" software allows a
    normal three-way handshake in response to a connect attempt.  During the
    handshake, the server sets a small (5 byte) TCP window.  When the client sends
    its first 5 bytes of data, the server responds with a TCP window of 0 (wait).
    The client then shifts into the "persist" state, where it sends what are called
    "window probe" packets at intervals that increase to a maximum of 4 minutes for
    an NT stack.  The LaBrea server answers these probes to hold the client in the
    persist state.  At this point, a connection can be maintained with a throughput
    of approximately 1215 bytes per hour.  All of this can be done without
    maintaining any "state" on the connections.  This vastly simplifies LaBrea's
    code.
    
    Because you're holding connections open, and because there is a bandwidth "cost"
    associated with doing that, the "-p" option requires that you specify the
    maximum bandwidth (in bytes/second) that you want to allocate to doing this.
    You set the maximum bandwidth, fire it off, and LaBrea takes care of the rest.
    It keeps a 5 minute running window of bandwidth allocated to holding open
    connections, and does it's best to keep you at or near the maximum you allow.
    (FYI: 1 byte/second is roughly equal to 3 scanning threads).
    
    What happens to the threads you don't grab?  LaBrea still tarpit's 'em... just
    like before.
    
    Using LaBrea before was a whole lot of fun... Now, it's just incredible.  I've
    had people ping scanning "virtual machines", running NMap on them, and even some
    enterprising folks very interested in the version of BIND that my LaBrea
    machines are running.  Ladies and gentlemen, we really CAN make a difference.
    
    But don't just take my word for it: check it out for yourself.  At the
    HackBusters site, we have a page showing the current "live" activity in our very
    own tarpit.  You can see the folks that are just visiting, and you can also
    check out a list of the very "special" people that we're hanging onto
    INDEFINITELY.  While you're there, grab a copy of the source code to LaBrea, or
    read our white paper entitled "Welcome to My Tarpit - The Tactical and Strategic
    Use of LaBrea."
    
    While you're looking at the "VIPs" as we're calling them, notice something: I've
    held onto some of them for more than 5 days... No, you didn't mis-read that: *5
    DAYS*...  And don't be fooled by the fact that everything there seems to be
    aimed at port 80.  Hackbusters lil' chunk o' IP space just seems to be sitting
    in the midst of CodeRed central...  LaBrea will capture anything that tries to
    initiate a full connection on ANY port.  Over the weekend, we had some Gnutella
    scanners on the line until they got a clue and gave up...
    
    We believe that by using tools like LaBrea, we can actually make a strong
    proactive stand to improve the "health" of the Internet.  Please consider
    setting up a tarpit.  Please pass the word to others.
    
    See: http://www.hackbusters.net
    
    Questions and comments can be directed to the address on the HackBusters site.
    



    This archive was generated by hypermail 2b30 : Mon Sep 17 2001 - 10:42:04 PDT