[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

New IETF I-Ds on Fragmentation-related security issues



Folks,

We have published two new IETF I-Ds about fragmentation related security
issues. They mostly focus on the countermeasures/mitigations, but it
should be pretty obvious how you can exploit some of these vectors
against e.g. otherwise *unfragmented* traffic (i.e., you should at the
very least give this a thought, since it's likely to affect you).

The first I-D is entitled "Security Implications of Predictable Fragment
Identification Values"
(http://tools.ietf.org/id/draft-gont-6man-predictable-fragment-id-00.txt).
Its abstract is:

---- cut here ----
   IPv6 specifies the Fragment Header, which is employed for the
   fragmentation and reassembly mechanisms.  The Fragment Header
   contains an "Identification" field which, together with the IPv6
   Source Address and the IPv6 Destination Address of the packet,
   identifies fragments that correspond to the same original datagram,
   such that they can be reassembled together at the receiving host.
   The only requirement for setting the "Identification" value is that
   it must be different than that of any other fragmented packet sent
   recently with the same Source Address and Destination Address.  Some
   implementations simply use a global counter for setting the Fragment
   Identification field, thus leading to predictable values.  This
   document analyzes the security implications of predictable
   Identification values, and updates RFC 2460 specifying additional
   requirements for setting the Fragment Identification, such that the
   aforementioned security implications are mitigated.
---- cut here ----


The second I-D is entitled 'Processing of IPv6 "atomic" fragments'
(http://tools.ietf.org/id/draft-gont-6man-ipv6-atomic-fragments-00.txt).
Its abstract is:

---- cut here ----
   IPv6 allows packets to contain a Fragment Header, without the packet
   being actually fragmented into multiple pieces.  Such packets
   typically result from hosts that have received an ICMPv6 "Packet Too
   Big" error message that advertises a "Next-Hop MTU" smaller than 1280
   bytes, and are currently processed by hosts as "fragmented traffic".
   By forging ICMPv6 "Packet Too Big" error messages an attacker can
   cause hosts to employ "atomic fragments", and the launch any
   fragmentation-based attacks against such traffic.  This document
   discusses the generation of the aforementioned "atomic fragments",
   the corresponding security implications, and formally updates RFC
   2460 and RFC 5722 such that the attack vector based on "atomic
   fragments" is completely eliminated.
---- cut here ----

Any feedback will be very appreciated.

Thanks!

Best regards,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492