Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:3477
HistorySep 10, 2002 - 12:00 a.m.

Strange Attractors and TCP/IP Sequence Number Analysis - One Year Later

2002-09-1000:00:00
vulners.com
20

Hello,

Over a year ago, I published a paper that attempted to analyze the
randomness of PRNGs used in TCP/IP stacks on several operating systems.
The approach I've chosen resulted in detecting some non-trivial
dependencies in several generators, and some amusing 3D pictures. The
original RAZOR research is available here:

http://razor.bindview.com/publish/papers/tcpseq.html

Since then, I've received numerous requests to publish a follow-up
document that would review some more operating system, and address the way
vendors addressed problems reported previously. I'm cross-posting this to
BUGTRAQ and VulnWatch, because some of newly included or re-tested systems
turned out to have fairly weak ISNs, and I would expect some vendor
response soon.

The new review is available here:

http://lcamtuf.coredump.cx/newtcp/

To explain the reason I decided to write this - I have a strong feeling
that this problem is still important nowadays, even if often downplayed.
There are several attack scenarios to consider:

  • high-profile information - website contents, e-mails, DNS zone
    transfers, ftp data, etc - is typically exchanged without encryption;
    the ability for an attacker to disrupt or modify the information flow
    in those streams is generally a bad thing in the real world; and
    weak ISNs make it much easier for a third party to accomplish this goal,

  • many systems still rely on IP addresses to implement the first line
    of defense; for example, limiting an access to a SSH or FTP
    server to a specific set of IP addresses is a common practice; the
    underlying service can become exposed if the system has weak ISNs,

  • IP addresses logged for a completed TCP/IP handshake are typically
    trusted by administrators for purposes such as tracking spam,
    script kiddies, or detecting unauthorized access. The ability for
    an attacker to act as an other system can mislead the administrator,

  • most of crypto protocols turned out to be less than perfect;
    susceptibility to MITM attacks is a pretty common problem,
    sometimes caused by the implementation, often caused by the human
    factor; blind spoofing makes it feasible to launch cerain MITM
    attacks.

Note that I'm not trying to be alarmistic, the sky is not falling yet, but
it's certainly something worth looking at.

Well :-) Have fun.


Michal Zalewski
Got jobs?