[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
New IETF I-Ds on Fragmentation-related security issues
- To: Full Disclosure <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: New IETF I-Ds on Fragmentation-related security issues
- From: Fernando Gont <fgont@xxxxxxxxxxxxxxx>
- Date: Thu, 15 Dec 2011 11:45:17 -0300
Folks,
We have published two new IETF I-Ds about fragmentation related security
issues. They mostly focus on the countermeasures/mitigations, but it
should be pretty obvious how you can exploit some of these vectors
against e.g. otherwise *unfragmented* traffic (i.e., you should at the
very least give this a thought, since it's likely to affect you).
The first I-D is entitled "Security Implications of Predictable Fragment
Identification Values"
(http://tools.ietf.org/id/draft-gont-6man-predictable-fragment-id-00.txt).
Its abstract is:
---- cut here ----
IPv6 specifies the Fragment Header, which is employed for the
fragmentation and reassembly mechanisms. The Fragment Header
contains an "Identification" field which, together with the IPv6
Source Address and the IPv6 Destination Address of the packet,
identifies fragments that correspond to the same original datagram,
such that they can be reassembled together at the receiving host.
The only requirement for setting the "Identification" value is that
it must be different than that of any other fragmented packet sent
recently with the same Source Address and Destination Address. Some
implementations simply use a global counter for setting the Fragment
Identification field, thus leading to predictable values. This
document analyzes the security implications of predictable
Identification values, and updates RFC 2460 specifying additional
requirements for setting the Fragment Identification, such that the
aforementioned security implications are mitigated.
---- cut here ----
The second I-D is entitled 'Processing of IPv6 "atomic" fragments'
(http://tools.ietf.org/id/draft-gont-6man-ipv6-atomic-fragments-00.txt).
Its abstract is:
---- cut here ----
IPv6 allows packets to contain a Fragment Header, without the packet
being actually fragmented into multiple pieces. Such packets
typically result from hosts that have received an ICMPv6 "Packet Too
Big" error message that advertises a "Next-Hop MTU" smaller than 1280
bytes, and are currently processed by hosts as "fragmented traffic".
By forging ICMPv6 "Packet Too Big" error messages an attacker can
cause hosts to employ "atomic fragments", and the launch any
fragmentation-based attacks against such traffic. This document
discusses the generation of the aforementioned "atomic fragments",
the corresponding security implications, and formally updates RFC
2460 and RFC 5722 such that the attack vector based on "atomic
fragments" is completely eliminated.
---- cut here ----
Any feedback will be very appreciated.
Thanks!
Best regards,
--
Fernando Gont
SI6 Networks
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492