[19716] in bugtraq

home help back first fref pref prev next nref lref last post

Re: TCP Timestamping and Remotely gathering uptime information

daemon@ATHENA.MIT.EDU (Valdis Kletnieks)
Mon Mar 19 20:04:11 2001

Message-ID:  <200103180517.f2I5H9d16883@foo-bar-baz.cc.vt.edu>
Date:         Sun, 18 Mar 2001 00:17:09 -0500
Reply-To: Valdis.Kletnieks@VT.EDU
From: Valdis Kletnieks <Valdis.Kletnieks@VT.EDU>
X-To:         Darren Reed <avalon@COOMBS.ANU.EDU.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Your message of "Fri, 16 Mar 2001 04:52:47 +1100." 
              <200103151752.EAA11989@cairo.anu.edu.au>

On Fri, 16 Mar 2001 04:52:47 +1100, Darren Reed <avalon@COOMBS.ANU.EDU.AU>  said:
> One potential use of uptime information to an attackers advantage is in
> attacking things which use the current time (seconds, microseconds,
> whatever) as a seed for some sort of thing when the start up at boot

The first use *I* thought of was as follows:

If you know (via careful extended observation) that a given server reboots
every alternate Thursday at 4:30AM (or whenever their test time is), it
allows you to lay the groundwork for a spoofing attack or other mischief
while the spoofed machine is down for the reboot and unable to complain
about the impostor...

As a bonus - they probably will skip the reboot unless they had a config
change staged.  As a result, you *know* what will get blamed for any and
all weirdness seen during the reboot - every sysadmin I know will look at
a weird message at 4:30AM and think "What did I just change, and how the
<bleep> did it cause THAT error?". ;)

				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech

home help back first fref pref prev next nref lref last post