[13514] in bugtraq

home help back first fref pref prev next nref lref last post

Re: usual iploggers miss some variable stealth scans

daemon@ATHENA.MIT.EDU (antirez)
Sun Jan 23 19:42:07 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000122150248.A226@nagash.suidshell.net>
Date:         Sat, 22 Jan 2000 15:02:48 +0100
Reply-To: antirez@invece.org
From: antirez <antirez@INVECE.ORG>
X-To:         bugtraq@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <4036B8ED3AAED3118F9E00A0CC58F9F1864F@MAIL>; from
              OFriedrichs@SECURITY-FOCUS.COM on Wed, Jan 19,
              2000 at 11:36:01AM -0800

On Wed, Jan 19, 2000 at 11:36:01AM -0800, Oliver Friedrichs wrote:
> variables in a stack unrelated to TCP state that can be used to identify
> an OS - and are also virtually impossible for someone to fix.  Virtually
> every commercial and free OS supports different IP otions, and will
> handle them in different ways.  It would be virtually impossible to get
> every vendor to synchronize what they support.  TCP options give you
> even more variety.  CyberCop Scanner 5.5 uses a variety of these methods
> to identify the target OS..  Anthony Osbourne can probably comment more

Also it's possible to use the ID field of the IP protocol to check if
some host are Win*, OpenBSD > 2.5 or Other using a few of often not logged
packets. the Win* ID has different byte ordering, OpenBSD is truly-random
and others incremental. IMHO it's a lot important that OS detection is
done using few often not logged packets. For example the algorithm used
in nmap and in queso does a fixed number of tests and checks if the profile
match a table. A better algorithm may do an initial test using only
not logged packets and do all tests only if required. A lot of people think
that OS detection is just a joke but think at buffer overflows: what shell
code the attacker will use?
About the flags not logged by iplogger the correct way to avoid this is
to log all packets that does NOT match a list of "sane" packets.
The 'unclean' module of Netfilter do a lot of checks in order to discard
all not standard packets: it's a good idea if you are frustrated by
TCP/IP-stack attacks. Anyway since using IP ID you are able to do a SYN
scan using a fake IP address maybe it's more important to fix the
ID predictability issue than iplogger.
Finally: if OS TCP/IP stacks synchronization is so hard to reached maybe
we need some RFC that comments all not clear TCP/IP issue? I want hope
that vendors (except Microsoft...) will follow the RFC.

antirez

home help back first fref pref prev next nref lref last post