Detecting TCP/IP Connections via IPID Hash Collisions

Author:

Alexander Geoffrey1,Espinoza Antonio M.1,Crandall Jedidiah R.1

Affiliation:

1. University of New Mexico

Abstract

Abstract We present a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine. The attack takes advantage of side-channels present in the Linux kernel’s handling of the values used to populate an IPv4 packet’s IPID field and applies to kernel versions of 4.0 and higher. We implement and test this attack and evaluate its real world effectiveness and performance when used on active connections to popular web servers. Our evaluation shows that the attack is capable of correctly detecting the IP-port 4-tuple representing an active TCP connection in 84% of our mock attacks. We also demonstrate how the attack can be used by the middle onion router in a Tor circuit to test whether a given client is connected to the guard entry node associated with a given circuit. In addition we discuss the potential issues an attacker would face when attempting to scale it to real world attacks, as well as possible mitigations against the attack. Our attack does not exhaust any global resource, and therefore challenges the notion that there is a direct one-to-one connection between shared, limited resources and non-trivial network side-channels. This means that simply enumerating global shared resources and considering the ways in which they can be exhausted will not suffice for certifying a kernel TCP/IP network stack to be free of privacy risk side-channels.

Publisher

Walter de Gruyter GmbH

Subject

General Medicine

Reference37 articles.

1. [1] Alexa. Alexa Top 500 Global Sites. https://www.alexa.com/topsites.

2. [2] G. Alexander and J. R. Crandall. Off-path round trip time measurement via TCP/IP side channels. In 2015 IEEE Conference on Computer Communications (INFOCOM), pages 1589–1597. IEEE, 2015.

3. [3] Y. Angel and P. Winter. obfs4 (the obfourscator). https://gitweb.torproject.org/pluggable-transports/obfs4.git/tree/doc/obfs4-spec.txt, 2014.

4. [4] Antirez. new tcp scan method. Posted to the bugtraq mailing list, 18 December 1998.

5. [5] S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of the 6th ACM Conference on Computer and Communications Security, CCS ’99, pages 1–7, New York, NY, USA, 1999. ACM.

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. ZPredict: ML-Based IPID Side-channel Measurements;ACM Transactions on Privacy and Security;2024-06-20

2. SDN-Enabled Content Dissemination Scheme for the Internet of Vehicles;Computers, Materials & Continua;2023

3. DNS Cache Poisoning Attack: Resurrections with Side Channels;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12

4. Machine Learning Analysis of IP ID Applications;2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S);2021-06

5. Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID;IEEE/ACM Transactions on Networking;2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3