skip to main content
10.1145/2382196.2382258acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Collaborative TCP sequence number inference attack: how to crack sequence number under a second

Published:16 October 2012Publication History

ABSTRACT

In this study, we discover a new class of unknown side channels --- "sequence-number-dependent" host packet counters --- that exist in Linux/Android and BSD/Mac OS to enable TCP sequence number inference attacks. It allows a piece of unprivileged on-device malware to collaborate with an off-path attacker to infer the TCP sequence numbers used between a client and a server, leading to TCP injection and hijacking attacks. We show that the inference takes, in common cases, under a second to complete and is quick enough for attackers to inject malicious Javascripts into live Facebook sessions and to perform malicious actions on behalf of a victim user. Since supporting unprivileged access to global packet counters is an intentional design choice, we believe our findings provide important lessons and offer insights on future system and network design.

References

  1. Blind TCP/IP Hijacking is Still Alive. http://www.phrack.org/issues.php?issue=64&id=15.Google ScholarGoogle Scholar
  2. CERT Advisory CA-1995-01 IP Spoofing Attacks and Hijacked Terminal Connections. http://www.cert.org/advisories/CA-1995-01.html.Google ScholarGoogle Scholar
  3. Golomb Ruler. http://en.wikipedia.org/wiki/Golomb_ruler.Google ScholarGoogle Scholar
  4. Linux Blind TCP Spoofing Vulnerability. http://www.securityfocus.com/bid/580/info.Google ScholarGoogle Scholar
  5. Linux: TCP Random Initial Sequence Numbers. http://kerneltrap.org/node/4654.Google ScholarGoogle Scholar
  6. MSN Messenger Protocol. http://www.hypothetic.org/docs/msn/.Google ScholarGoogle Scholar
  7. RFC 1948 - Defending Against Sequence Number Attacks. http://tools.ietf.org/html/rfc1948.Google ScholarGoogle Scholar
  8. RFC 5961 - Improving TCP's Robustness to Blind In-Window Attacks. http://tools.ietf.org/html/rfc5961.Google ScholarGoogle Scholar
  9. RFC 793 - Transmission Control Protocol. http://tools.ietf.org/html/rfc793.Google ScholarGoogle Scholar
  10. Stateful Firewall and Masquerading on Linux. http://www.puschitz.com/FirewallAndRouters.shtml.Google ScholarGoogle Scholar
  11. sysctl Mac OS X Manual. https://developer.apple.com/library/mac/#documentation/Darwin/Reference/Manpages/man3/sysctl.3.html#//apple_ref/doc/man/3/sysctl.Google ScholarGoogle Scholar
  12. TCP Delayed Ack in Linux. http://wiki.hsc.com/wiki/Main/InsideLinuxTCPDelayedAck.Google ScholarGoogle Scholar
  13. S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In Proc. of IEEE Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proc. of USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting Privacy Leaks in iOS Applications. In NDSS, 2011.Google ScholarGoogle Scholar
  16. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proc. of USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Ensafi, J. C. Park, D. Kapur, and J. R. Crandall. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks using Model Checking. In Proc. of USENIX Security Symposium, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-delegation: Attacks and Defenses. In Proc. of USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Y. Gilad and A. Herzberg. Off-Path Attacking the Web. In Proc. of USENIX Workshop on Offensive Technologies (WOOT), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Guha and P. Francis. Characterization and Measurement of TCP Traversal through NATs and Firewalls. In Proc. ACM SIGCOMM IMC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Jana and V. Shmatikov. Memento: Learning secrets from process footprints. In Proc. of IEEE Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. L. Joncheray. A Simple Active Attack against TCP. In Proc. of USENIX Security Symposium, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. LEECH, P. RAYSON, and A. WILSON. Procfs Analysis. http://www.nsa.gov/research/_files/selinux/papers/slinux/node57.shtml.Google ScholarGoogle Scholar
  25. R. Morris. A Weakness in the 4.2BSD Unix TCP/IP Software. Technical report, 1985.Google ScholarGoogle Scholar
  26. Z. Qian and Z. M. Mao. Off-Path TCP Sequence Number Inference Attack -- How Firewall Middleboxes Reduce Security. In Proc. of IEEE Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique. In Proc. of IEEE Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS, 2011.Google ScholarGoogle Scholar
  29. D. X. Song, D. Wagner, and X. Tian. Timing Analysis of Keystrokes and Timing Attacks on SSH. In Proc. of USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Vuagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In Proc. of USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Z. Wang, Z. Qian, Q. Xu, Z. M. Mao, and M. Zhang. An Untold Stody of Middleboxes in Cellular Networks. In SIGCOMM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. P. A. Watson. Slipping in the Window: TCP Reset Attacks. In CanSecWest, 2004.Google ScholarGoogle Scholar
  33. K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In Proc. of USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Collaborative TCP sequence number inference attack: how to crack sequence number under a second

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
        October 2012
        1088 pages
        ISBN:9781450316514
        DOI:10.1145/2382196

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader