[1047] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: New York Times article

daemon@ATHENA.MIT.EDU (Nesta Stubbs)
Sun Oct 15 22:03:05 1995

Date: Sun, 15 Oct 1995 17:45:59 -0500 (CDT)
From: Nesta Stubbs <nesta@cynico.com>
To: www-security@ns2.rutgers.edu
In-Reply-To: <9510122014.AA10873@mailserv-D.ftp.com>
Errors-To: owner-www-security@ns2.rutgers.edu

On Thu, 12 Oct 1995, Bob Quinn wrote:

> Markoff reveals a serious lack of understanding of Internet protocols.
> His article implies that NFS is used by SMTP, FTP and HTTP.  Somehow
> he got it in his head that NFS is a keystone for the entire Internet 
> protocol suite.
> 
But those protocols are susceptible to a similiar attack.  The difference 
is that your attacker has to consider sequence numbers since those are 
TCP protocols, while NFS is a UDP protocol.  It is not difficult to get 
the sequence number from the servers packet, then put it into your spoofs 
packet's header.  This is what the paper was about, the NFS issue was 
only explained because ti was a well known hole.  Kids have been doing 
TCP sequence number spoofing on IRC for a long time, and I'm sure they 
have spoofs for other protocols. 

Think of it this way.  I may not be able to get a sniffer and spoofer on 
one of the big routers along the backbone, but it is not difficult at all 
to place one on a Internet Service provider, most of which have security 
that's laughable, and then spoof TCP packets so that all the users D/Ling 
their secure browsers, or whatever program I want to infect, get 
corrupted copies.  Then I can just sniff al the cards I want as the 
6,000+ users of the local ISP go shopping online.  Team up with a bud on 
another coast, swap numbers, mix-em up a bit and we'de make soem decent 
money.


home help back first fref pref prev next nref lref last post