首页> 外文会议>Internet Measurement Conference >Resilience of Deployed TCP to Blind Attacks
【24h】

Resilience of Deployed TCP to Blind Attacks

机译:将TCP部署到盲目攻击的恢复性

获取原文

摘要

As part of TCP's steady evolution, recent standards have recommended mechanisms to protect against weaknesses in TCP. But adoption, configuration, and deployment of TCP improvements can be slow. In this work, we consider the resilience of deployed TCP implementations to blind in-window attacks, where an off-path adversary disrupts an established connection by sending a packet that the victim believes came from its peer, causing data corruption or connection reset. We tested operating systems (and middleboxes deployed in front) of webservers in the wild in September 2015 and found 22% of connections vulnerable to in-window SYN and reset packets, 30% vulnerable to in-window data packets, and 38.4% vulnerable to at least one of three in-window attacks we tested. We also tested out-of-window packets and found that while few deployed systems were vulnerable to reset and SYN packets, 5.4% of connections accepted in-window data with an invalid acknowledgment number. In addition to evaluating commodity TCP stacks, we found vulnerabilities in 12 of 14 of the routers and switches we characterized - critical network infrastructure where the potential impact of any TCP vulnerabilities is particularly acute. This surprisingly high level of extant vulnerabilities in the most mature Internet transport protocol in use today is a perfect illustration of the Internet's fragility. Embedded in historical context, it also provides a strong case for more systematic, scientific, and longitudinal measurement and quantitative analysis of fundamental properties of critical Internet infrastructure, as well as for the importance of better mechanisms to get best security practices deployed.
机译:作为TCP稳定演化的一部分,最近的标准已经推荐了保护TCP中的弱点的机制。但采用,配置和部署TCP改进可能很慢。在这项工作中,我们考虑将部署的TCP实现的恢复能力盲目的窗口攻击,其中一个违法的对手通过发送受害者认为来自其对等体的数据包来破坏建立的连接,导致数据损坏或连接重置。我们在2015年9月在野外的WebServers中测试了WebServers的操作系统(和中级盒),发现了22%的连接容易受到窗口中的SYN和RESET数据包,易受窗口内数据包的30%,38.4%易受攻击我们测试的三个内窗攻击中的至少一个。我们还测试了窗口外包,发现,虽然很少部署的系统容易被重置和SYN数据包,但5.4%的连接接受了无效确认编号的窗口内数据。除了评估商品TCP堆栈之外,我们还发现了14个路由器中的12个以及我们所表征的漏洞 - 关键网络基础架构,其中任何TCP漏洞的潜在影响尤为尖叫。今天使用的最成熟的互联网运输协议中的这种令人惊讶的高水平漏洞是互联网脆弱性的完美插图。嵌入在历史背景下,它还为关键互联网基础设施的基本属性提供了强大的案例,以及对关键互联网基础设施的基本属性的定量分析,以及更好的机制来获得部署最佳安全实践的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号