Advisory Reference | 236929 |
Release Date | 20 April 2004 |
Last Revision | 22 April 2004 |
Version Number | 1.4 |
• | Depend on long lived TCP connections |
• | Have known or easy-to-guess IP address end points |
• | Have easy to an easy-to-guess source TCP port |
As noted above BGP does use long lived TCP connections, and the IP addresses and
source port (and destination port) are sometimes available through the use of
BGP looking glasses (multi-source, multi-destination trace route tools) or DNS
resource records. Using “trace route” commands can provide information on
peering point IP addresses. Thus BGP is likely to be critically affected by the
TCP vulnerability.
These denial of service attacks can be carried out by single machine, or by
multiple co-operating systems (to form a distributed denial of service attack).
It is also possible to inject packets, which will be processed if they are in
the window. The difficulty with data injection attacks is that the receiving TCP
implementation will reassemble the packets received according to sequence
number, dropping any duplicate packets.
Vendor specific information will be released as it becomes available and if vendor permission has been received. Subscribers are advised to check the following URL regularly for updates:
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
[Please note that updates to this advisory will not be notified by email.]
This vulnerability has been assigned the CVE
name
CAN-2004-0230.
The Open Source Vulnerability Database ID
number for this vulnerability is
4030.
Mitigation
The following mitigation steps are still being evaluated and may be incomplete.
Customers should work with vendors for the workaround most appropriate for the
product in question.
In the absence of vendor patching of the TCP implementation, the following are
general mitigating steps:
• | Implement IP Security (IPSEC) which will encrypt traffic at the network layer, so TCP information will not be visible |
• | Reduce the TCP window size (although this could increase traffic loss and subsequent retransmission) |
• | Do not publish TCP source port information |
It should be noted that IPSEC provides confidentiality and authentication
services at the network layer, and can provide a measure of trust in the
authenticity of the end points as well as encryption of traffic between the end
points. However, in the context of the current attack IPSEC will reject
RST and SYN packets that are not part of a secure IP packet stream.
To change the TCP window size, in some Unix variants you can set a value of the
default TCP windows size by using the “sysctl” program (“ndd -set” in the case
of Sun Solaris). In the case of Microsoft Windows NT/2000/XP/2003, the default
window size can be changed by modifying the value of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
key. As noted above, great care should be exercised when altering the default
TCP window size as network performance could be adversely affected.
In the case of BGP, the following may counter the problem:
• | Implement ingress and egress filtering to check that the traffic entering or leaving the network has a source IP address that is expected on the router/firewall interface that receives the traffic |
• | Implement the TCP MD5 Signature Option to checksum the TCP packet carrying the BGP application data (see RFC 2385), being careful to set and maintain strong (i.e. difficult to guess) passwords to which the MD5 checksum is applied. Also see RFC 3562 which discusses the security requirements of this keying material. |
• | Limit the amount of information available through looking glasses and DNS resource records, being careful not to expose TCP port information unnecessarily |
The IETF ingress filtering standard is defined in
RFC 2827.
A discussion of egress filtering can be found at
http://www.sans.org/y2k/egress.htm.
The use of the TCP MD5 Signature Option will prevent the exploitation of this
vulnerability. Router customers should implement this on all BGP peering points
if it is supported by the router, upgrading the router firmware if necessary.
Solution
Please refer to the Vendor Information section of this advisory for
implementation specific remediation.
Some vendors will have reduced the
likelihood of successful denial of service by amending the TCP implementation to
issue a further acknowledgment packet challenge for RST and SYN packets that do
not have exactly the expected sequence number.
The Internet Engineering Task Force (IETF) has
published an Internet Draft to co-incide
with the release of this advisory.
The text of this draft is available from
the IETF web site:
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt
NISCC has produced best practice guidelines for BGP available at
http://www.niscc.gov.uk/BGP Filtering Guide.pdf
Secure configuration templates for BGP implementations on Cisco IOS and Juniper JUNOS can be found at:
• | Cisco | http://www.cymru.com/Documents/secure-bgp-template.html |
• | Juniper | http://www.qorbit.net/documents/junos-bgp-template.pdf |
Guidance on tuning of the IP stack for a number of different UNIX operating systems is available at
http://www.cymru.com/Documents/ip-stack-tuning.html
Vendor Information
The following vendors have provided information about how their products are affected
by these vulnerabilities.
Please note that JPCERT/CC have released a Japanese language advisory for this vulnerability
which contains additional information regarding Japanese vendors. This advisory is available at
http://www.jpcert.or.jp/at/2004/at040003.txt.
Certicom | |
Certicom has examined the National Infrastructure Security Coordination
Centre (NISCC) advisory and determined it is not vulnerable. Certicom Developer Toolkits for SSL (SSL Plus, SSL Plus for Java, Security Builder SSL-C and Security Builder SSL-J) do not provide a TCP/IP transport mechanism, but rather utilize the supported operating system's TCP/IP stack. The vulnerability is against the TCP/IP stack itself, and not directly against the functionality offered by Certicom toolkits. Therefore, there is no patch or workaround that can be implemented within Certicom products. The patch or workaround must be provided by the operating system vendor. Customers are urged to contact their operating system vendors to determine if they have provided a workaround to this advisory. If you have any further questions please do not hesitate to contact support@certicom.com. |
|
Check Point | |
The latest release for VPN-1/FireWall-1
(R55 HFA-03) contains a protection against this vulnerability. The
protection applies to both the firewall device and to hosts behind the
firewall. Please refer to the Check Point web site for further information at: http://www.checkpoint.com/techsupport/alerts/tcp_dos.html. |
|
Cisco | |
Cisco Systems is addressing the vulnerabilities identified by NISCC
Vulnerability Advisory 236929 across its entire product line. Cisco
has released two related advisories: TCP Vulnerabilities in Multiple IOS-Based Cisco Products http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml TCP Vulnerabilities in Multiple Non-IOS Cisco Products http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml |
|
Cray Inc | |
Cray Inc. is vulnerable on their UNICOS, UNICOS/mk and UNICOS/mp systems. Spr's have been opened to track this issue. Please contact your local Cray Service Representative for more information. | |
Hitachi | |
Hitachi is investigating the potential impact to Hitachi's products. | |
Innovaphone | |
Not vulnerable. | |
Internet Initiative Japan, Inc (IIJ) | |
IIJ will release a new firmware to fix this vulnerability. Details are available on their web site at http://www.seil.jp/en/ann/announce_en_20040421_01.txt. | |
InterNiche | |
=== NicheStack v2.0 TCP/IP === InterNiche Technologies has updated its NicheStack v2.0 TCP/IP product to handle the scenarios described in NISCC Vulnerability Notice #236929. The patch is available to all InterNiche customers in accordance with the terms of their current support agreements. More information can be found on www.iNiche.com or through support@iNiche.com === NicheLite v2.0 TCP/IP === InterNiche Technologies has updated its NicheLite v2.0 TCP/IP product to handle the scenarios described in NISCC Vulnerability Notice #236929. The patch is available to all InterNiche customers in accordance with the terms of their current support agreements. More information can be found on www.iNiche.com or through support@iNiche.com |
|
Juniper Networks | |
Juniper Networks products are susceptible to this vulnerability. Software is
available that implements several mechanisms to mitigate the associated risks. Customers
should contact Juniper Networks Technical Assistance Center for availability and
download instructions. Additional information is posted on our web site at https://www.juniper.net/support. |
|
Lucent Technologies | |
Lucent Technologies is aware of this vulnerability advisory and is investigating any potential impact to its product portfolio. As further information becomes available, Lucent will provide information directly to its customers, if appropriate. | |
Mitel Networks | |
Mitel is aware of the vulnerability and is working with the vendors of our underlying networking software to assess the impact and, if necessary, determine potential solutions. When more information becomes available, an advisory will be issued. Please contact 'security@mitel.com' if you have specific questions. | |
MRLG | |
A new version of the Multi-Router Looking Glass tool (4.3.0) has been released. This includes a patch that prevents a remote user from utilising the "sh ip bgp neighbors" functionality. This new version is available from ftp://ftp.enterzone.net/looking-glass/CURRENT/. | |
NEC | |
NEC is aware of this vulnerability and is trying to determine potential impacts on our products. | |
Nortel Networks | |
Nortel Networks has evaluated this issue and testing has confirmed that it
is possible to successfully exploit this vulnerability. However, the
preconditions for a successful exploitation require levels of access to the
network that are unlikely to be achieved in a normal network operating
environment; furthermore, such levels of access would enable other forms of
attack with much greater impact than that achievable by exploiting this
vulnerability. Nortel Networks is continuing to validate that this vulnerability has no serious consequences for Nortel equipment, and will update this statement periodically. |
|
Polycom | |
Polycom has investigated the potential
impact to our products for NISCC Advisory 236929. Specific product information will be provided at http://www.polycom.com/securitycenter. |
|
Secure Computing Corporation | |
The Sidewinder and Sidewinder G2 firewalls offer protection against this attack at all releases. As application-layer firewalls, Sidewinder and Sidewinder G2 offer protection to systems behind the firewall as well as protecting management connections to the firewall. | |
Yamaha | |
Pending. |
• | Steve Bellovin, Rob Thomas and Paul Watson for their contributions to this advisory. |
• | Cisco Systems Inc. and Juniper Networks Inc. for their help with the content of this advisory and for their support during the disclosure process. |
• | JPCERT/CC for their assistance in co-ordinating this disclosure in Japan. |
Internet Engineering Task Force | |||
RFC 793 Transmission Control Protocol | |||
http://www.ietf.org/rfc/rfc793.txt | |||
RFC 1323 TCP Extensions for High Performance | |||
http://www.ietf.org/rfc/rfc1323.txt | |||
RFC 1771 A Border Gateway Protocol 4 (BGP-4) | |||
http://www.ietf.org/rfc/rfc1771.txt | |||
RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option | |||
http://www.ietf.org/rfc/rfc2385.txt | |||
RFC 2827 Network Ingress Filtering | |||
http://www.ietf.org/rfc/rfc2827.txt | |||
RFC 3562 Considerations for the TCP MD5 Signature Option | |||
http://www.ietf.org/rfc/rfc3562.txt | |||
RFC 3682 Generalized TTL Security Mechanism | |||
http://www.ietf.org/rfc/rfc3682.txt | |||
Internet Draft - Transmission Control Protocol security considerations | |||
http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt | |||
NISCC | |||
Best Practice Guidelines - Border Gateway Protocol | |||
http://www.niscc.gov.uk/BGP Filtering Guide.pdf | |||
Configuration and Tuning Guides | |||
Secure BGP Template for Cisco IOS | |||
http://www.cymru.com/Documents/secure-bgp-template.html | |||
JUNOS Secure BGP Template | |||
http://www.qorbit.net/documents/junos-bgp-template.pdf | |||
UNIX IP Stack Tuning Guide | |||
http://www.cymru.com/Documents/ip-stack-tuning.html | |||
Other Documents | |||
SANS discussion on egress filtering | |||
http://www.sans.org/y2k/egress.htm | |||
Vulnerability Databases | |||
Common Vulnerabilities and Exposures (CVE) | |||
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0230 | |||
Open Source Vulnerability Database (OSVDB) | |||
http://www.osvdb.org/displayvuln.php?osvdb_id=4030 |
Contact Information
The NISCC Vulnerability Management Team can be contacted as follows:
vulteam@niscc.gov.uk
(Please quote the advisory reference in the subject line.) |
|
Telephone | +44 (0)20 7821 1330 Extension 4511
(Monday to Friday 08:30 - 17:00) |
Fax | +44 (0)20 7821 1686 |
Post | Vulnerability Management Team NISCC PO Box 832 London SW1P 1BG |
April 20, 2004: | Initial release (1.0) |
April 21, 2004: | Corrected hyperlinks (1.1) |
Inserted impact statement for Cisco (1.1) | |
Inserted impact statement for Mitel (1.1) | |
Inserted MRLG patch reference (1.2) | |
April 22, 2004: | Revised impact statement for Certicom (1.3) |
Inserted impact statement for Nortel Networks (1.3) | |
Inserted impact statement for Secure Computing Corporation (1.3) | |
Inserted references section (1.4) | |
Inserted impact statement for Lucent Technologies (1.4) |