Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

New DoS Attack Is a Killer
Dark Reading ^ | 30 September 2008 | RSnake

Posted on 10/01/2008 1:28:30 PM PDT by ShadowAce

Things are a-brewin’ in Sweden. Sweden is not just home of the infamous bikini team, it is also the home of Outpost 24, an equally sexy software-as-a-service network scanning service, and the employer of my friend Robert E. Lee and his colleague Jack C. Louis. These guys are the inventors of UnicornScan, a user-land TCP stack turned into a port scanner. Never heard of it? Use Nmap exclusively? Well if you run Linux, I suggest checking it out, especially if missed ports in your portscan is inexcusable. But I digress.

Robert and Jack are smart dudes. I've known them for years, and they've always been one step ahead of the game. A couple of years ago, Jack found some anomalies in which machines would stop working in some very specific circumstances while being scanned. A few experiments, tons of reading through documentation, and one mysteriously named tool called "sockstress" later, and the two are now touting a nearly universal denial-of-service (DoS) attack that can be performed on almost any normal broadband Internet connection -- in just a few seconds.

How bad is it? Well, in an interview --- (fast-forward five minutes in to hear it in English), the two were asked if they could take out a data center. While they've never tried, it appears to be a totally plausible attack. Worse yet, unlike most DoS attacks, the machines often do not come back online once the attack is over. The victim system just doesn’t respond any more. Great, huh?

Robert and I talk a lot, and I asked him if he'd be willing to DoS us, and he flatly said, "Unfortunately, it may affect other devices between here and there so it's not really a good idea." Got an idea of what we're talking about now? This appears not to be a single bug, but in fact at least five, and maybe as many as 30 different potential problems. They just haven't dug far enough into it to really know how bad it can get. The results range from complete shutdown of the vulnerable machine, to dropping legitimate traffic.

The two researchers have already contacted multiple vendors since the beginning of September (I've had a small hand in getting them in contact with one of the vendors). Robert and Jack are waiting with no specific timeline to hear back from the affected TCP stack vendors. Think firewalls, OSes, Web-enabled devices, and so on. Yup, they'll all need to be hardened, if the vendors can come up with a good solution to the problem. IPv6 services appear to be more affected by the fact that they require more resources and are no more secure since they still reside on top of an unhardened TCP stack.

Jack and Robert are both trying to be as forthcoming as possible with the affected vendors without giving any specific information on how the attack works to the public at large -- openly acknowledging how dangerous the attack really is. Their hope is that the vendors appreciate the problem and come up with fixes that may not be initially obvious to them. I asked Robert when they planned to release their tool, to which he said he wasn't sure he would "ever release sockstress." The details, however, will be forthcoming once vendor patches are available. There are no mitigating short-term fixes, folks.

I feel winter slowly coming, and it would be a shame if entire power grids could be taken offline with a few keystrokes, or if supply chains could be interrupted. I hear it gets awfully cold in Scandinavia.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: computer; dos; internet; tech; techalert

1 posted on 10/01/2008 1:28:31 PM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

2 posted on 10/01/2008 1:29:03 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I read this a lot about DoS attacks and other such things being feared because of possible impacts on power grids and other infrastructure, but has there really ever been a case of this? Just curious...


3 posted on 10/01/2008 1:38:36 PM PDT by DonaldC
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
Sweden is not just home of the infamous bikini team

Rules!{p>

4 posted on 10/01/2008 1:39:01 PM PDT by Old Sarge (Illic Est Haud Deus)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Hey, Shadow Ace! Long time, no see.

Don't see much of Bushwa and the Yellow Buzzard. :-)

5 posted on 10/01/2008 1:39:36 PM PDT by justlurking (The only remedy for a bad guy with a gun is a good guy with a gun.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
Sweden is not just home of the infamous bikini team, it is also the home of Outpost 24, an equally sexy software-as-a-service network scanning service

A line that could only be written by one of these:


6 posted on 10/01/2008 1:40:46 PM PDT by r9etb
[ Post Reply | Private Reply | To 1 | View Replies]

To: Old Sarge
Whoa! I like that rule.

I'll forgo my usual response (quoting Jayne from "Firefly").

7 posted on 10/01/2008 1:42:45 PM PDT by justlurking (The only remedy for a bad guy with a gun is a good guy with a gun.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: justlurking
Hey, Shadow Ace! Long time, no see.

Been busy. Haven't been home since late August. :)

Don't see much of Bushwa and the Yellow Buzzard. :-)

Bush dropped away a few years ago, and GE (I'm guessing here) got tired of being beaten on every conversation he had with people who know better. :)

8 posted on 10/01/2008 1:47:01 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Old Sarge
Rules

It is bad karma to post an odd number of pictrues of women in a thread. You need to add 1 or 3 or 5 or ... more.

9 posted on 10/01/2008 1:49:01 PM PDT by mlocher (USA is a sovereign state.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: mlocher

DULY NOTED AND LOGGED!! LOL!


10 posted on 10/01/2008 1:52:22 PM PDT by Old Sarge (Illic Est Haud Deus)
[ Post Reply | Private Reply | To 9 | View Replies]

To: ShadowAce
Been busy. Haven't been home since late August. :)

It's been about 2 years since I was here. I seem to come back about every election cycle.

11 posted on 10/01/2008 1:53:16 PM PDT by justlurking (The only remedy for a bad guy with a gun is a good guy with a gun.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Old Sarge

For a dollar more they could’ve been blondes.


12 posted on 10/01/2008 1:53:34 PM PDT by JoJo Gunn
[ Post Reply | Private Reply | To 4 | View Replies]

To: Old Sarge

Wow! Nice hair...


13 posted on 10/01/2008 2:02:05 PM PDT by papasmurf (I ain't your Daddy's Conservative, OK?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce; hiredhand

BTTT


14 posted on 10/01/2008 2:19:32 PM PDT by Squantos (Be polite. Be professional. But have a plan to kill everyone you meet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Squantos

THANKS for the heads-up! I’m looking into it NOW!


15 posted on 10/01/2008 2:21:32 PM PDT by hiredhand (Understand the CRA and why we're facing economic collapse - see my about page.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Squantos

I’ll grab a copy of this ASAP and see what it will do. :-)


16 posted on 10/01/2008 2:23:43 PM PDT by hiredhand (Understand the CRA and why we're facing economic collapse - see my about page.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: ShadowAce

If their tool affects Cisco devices, we would all be screwed if that thing goes ‘public’.


17 posted on 10/01/2008 2:41:03 PM PDT by KoRn ("Change": Come Help A Nitwit Get Elected)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
For some reason, this one sounds pretty scary.

I remember years ago seeing a small ARPA-net node sitting at Gunter AFS, back before we had Email, Usenet, and Internet. The original underpinnings of the Internet were developed to be cooperative, with what at the time were reasonable measures to eliminate or recover from "errant" devices. Computer "viruses" et al were unknown at that time.

With all of the info about various attacks we read lately, we realize again and again how fragile software can be.

18 posted on 10/01/2008 5:19:23 PM PDT by ken in texas (come fold with us - team #36120)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Old Sarge

Oh yummy!


19 posted on 10/02/2008 11:36:01 AM PDT by Ernest_at_the_Beach (No Burkas for my Grandaughters!)
[ Post Reply | Private Reply | To 4 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson