IPv4 fragmentation --> The Rose Attack
Greetings and Salutations:
While this discussion pertains to IPv4, IPv6 also allows fragmentation and I
suspect IPv6 will also be affected by this attack.
This is an extension of the "Rose Attack" previously posted to the Bugtraq
mailing list. I have decided to call this attack the "New Dawn attack" to
differentiate this attack from the original "Rose Attack".
The following explanation is currently up to date and will be updated as
necessary:
http://digital.net/~gandalf/Rose_Frag_Attack_Explained.htm
http://digital.net/~gandalf/Rose_Frag_Attack_Explained.txt
After I released the initial Rose Attack, Paul Starzetz mentioned that you
can also cause high CPU utilization using a variation of this attack. The
high CPU is caused by sending a large number of small fragments (with
fragments missing) then sending the final fragment repetitively. Each time
the last fragment is sent the CPU tries to reassemble the entire fragment
with the associated allocate / free memory for the size of the fragment.
Of the machines I have had access to, this attack has caused any number of
the following problems:
1) Causes the CPU to spike, thus exhausting processor resources.
2) Legitimate fragmented packets are dropped intermittently (unfragmented
packets get through fine)
3) Legitimate fragmented packets are no longer accepted by the machine under
attack (unfragmented packets get through fine) until the fragmentation time
exceeded timers expire.
The following devices were tested. Some showed some or all of the above
Symptoms, Mac OS/X and Mandrake 10 did not show any problems. See the above
Rose_Frag_Attack_Explained.htm file for a table of the tests that were run
(bottom of the file):
1) Microsoft Windows 2000
2) Mandrake Linux 9.2
3) Mandrake Linux 10
4) Microsoft Windows XP
5) Mac OS/X V10.3.5
The following vendors have been notified of this condition prior to the
release of this announcement:
1) Microsoft
2) Cisco
3) Apple
Apple has provided a software fix:
CVE-IDs: CAN-2004-0744
Mandrake 10 / Linux Kernel v2.6 is not vulnerable.
Software implementation of the New Dawn Attack:
http://digital.net/~gandalf/NewDawn.c
http://digital.net/~gandalf/NewDawn2.c
http://digital.net/~gandalf/NewDawn3.c
http://digital.net/~gandalf/NewDawn4.c
You will need NetW(ib)(ox)(ag) for NewDawn3 and NewDawn4:
http://www.laurentconstantin.com/en/netw/
I used:
http://www.laurentconstantin.com/common/netw/download/v5/netw-ib-ox-ag-5.24.
0.tgz
The suggested software solution to this attack is to peruse the Linux Kernel
v2.6.8-rc4 /net/ipv4/ip_fragment.c code. They have done a pretty good job
(with the exception of the small fragment buffer IMHO) of keeping the above
problems to a minimum.
If you have any questions please ask.
Ken
------------------------------------------------------------------
Do not meddle in the affairs of wizards for they are subtle and
quick to anger.
Ken Hollis - Gandalf The White - gandalf@xxxxxxxxxxx - O- TINLC
WWW Page - http://gandalf.home.digital.net/
Trace E-Mail forgery - http://gandalf.home.digital.net/spamfaq.html
Trolls crossposts - http://gandalf.home.digital.net/trollfaq.html