| .oO Phrack Magazine Oo. | |
| Volume Seven, Issue Forty-Nine | |
| File 2 of 16 | |
| Phrack Loopback | |
| ----------------------------------------------------------------------------- | |
| [The Netly News] | |
| September 30, 1996 | |
| Today, Berkeley Software Design, Inc. is expected to publicly release | |
| a near-perfect solution to the "Denial of Service," or SYN flooding attacks, | |
| that have been plaguing the Net for the past three weeks. The fix, dubbed | |
| the SYN cache, does not replace the need for router filtering, but it is | |
| an easy-to-implement prophylaxis for most attacks. | |
| "It may even be overkill," says Alexis Rosen, the owner of Public | |
| Access Networks. The attack on his service two weeks ago first catapulted | |
| the hack into public consciousness. | |
| The SYN attack, originally published by Daemon9 in Phrack, has | |
| affected at least three service providers since it was published last month. | |
| The attack floods an ISP's server with bogus, randomly generated connection | |
| requests. Unable to bear the pressure, servers grind to a halt. | |
| The new code, which should take just 30 minutes for a service provider | |
| to install, would keep the bogus addresses out of the main queue by saving two | |
| key pieces of information in a separate area of the machine, implementing | |
| communication only when the connection has been verified. Rosen, a master of | |
| techno metaphor, compares it to a customs check. When you seek entrance to a | |
| server, you are asked for two small pieces of identification. The server then | |
| sends a communique back to your machine and establishes that you are a real | |
| person. Once your identity is established, the server grabs the two missing | |
| pieces of identification and puts you into the queue for a connection. If | |
| valid identification is not established, you never reach the queue and the | |
| two small pieces of identification are flushed from the system. | |
| The entire process takes microseconds to complete and uses just a few | |
| bytes of memory. "Right now one of these guys could be on the end of a 300-baud | |
| modem and shut you down," says Doug Urner, a spokesman for BSDI. "With these | |
| fixes, they just won't matter." still, Urner stresses that the solution does | |
| not reduce the need for service providers to filter IP addresses at the router. | |
| Indeed, if an attacker were using a T1 to send thousands of requests per | |
| second, even the BSDI solution would be taxed. For that reason, the developers | |
| put in an added layer of protection to their code that would randomly drop | |
| connections during an overload. That way at least some valid users would | |
| be able to get through, albeit slowly. | |
| There have been a number of proposed solutions based on the random-drop | |
| theory. Even Daemon9 came up with a solution that looks for any common | |
| characteristics in the attack and learns to drop that set of addresses. For | |
| example, most SYN attacks have a tempo -- packets are often sent in | |
| five-millisecond intervals -- When a server senses flooding it looks for these | |
| common characteristics and decides to drop that set of requests. Some valid | |
| users would be dropped in the process, but the server would have effectively | |
| saved itself from a total lockup. | |
| Phrack editor Daemon9 defends his act of publishing the code for the | |
| attack as a necessary evil. "If I just put out a white paper, no one is | |
| going to look at this, no one is going to fix this hole," he told The | |
| Netly News. "You have to break some eggs, I guess. | |
| To his credit, Daemon9 actually included measures in his code that made | |
| it difficult for any anklebiting hacker to run. Essential bits of information | |
| required to enable the SYN attack code could be learned only from reading | |
| the entire whitepaper he wrote describing the attack. Also, anyone wanting to | |
| run the hack would have to set up a server in order to generate the IP | |
| addresses. "My line of thinking is that if you know how to set a Linux up | |
| and you're enough in computers, you'll have enough respect not to do this," | |
| Daemon9 says. He adds, "I did not foresee such a large response to this." | |
| Daemon9 also warns that there are other, similar protocols that can be | |
| abused and that until there is a new generation of TCP/IP the Net will be open | |
| to abuse. He explained a devastating attack similar to SYN called ICMP Echo | |
| Flood. The attack sends "ping" requests to a remote machine hundreds of times | |
| per second until the machine is flooded. | |
| "Don't get me wrong," says Daemon9. "I love the Net. It's my bread and | |
| butter, my backyard. But now there are too many people on it with no concern | |
| for security. The CIA and DOJ attacks were waiting to happen. These holes were | |
| pathetically well-known." | |
| --By Noah Robischon | |
| [ Hmm. I thought quotation marks were indicative of verbatim quotes. Not | |
| in this case... It's funny. You talk to these guys for hours, you *think* | |
| you've pounded the subject matter into their brains well enough for them to | |
| *at least* quote you properly... -d9 ] | |
| [ Ok. Loopback was weak this time. We had no mail. We need mail. Send us | |
| mail! ] | |
| ----<>---- | |