SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    RE: FCIP iFCP encapsulation proposal



    Bob,
    
    You are assuming that a debug analyzer would store the entire TCP frame.
    Perhaps, but just as likely only iFCP payload is stored as the analyzer may
    assume TCP does not require debugging and perhaps not seen depending on
    where the filter is placed.  Even so, a binary image of an entire Ethernet
    frame is not likely to be contained completely within an Ethernet frame as a
    storage block.  It is likely to be fragmented.  Even if the definition of a
    valid header was extended to include a valid trailer from the previous PDU,
    you still will be confronted with the same problem.  A TCP header placed
    anywhere before an apparently valid header will not be of any concern to a
    header search.
    
    The method of delivery is simply the image is contained within storage
    blocks delivered as legitimate payload.  Once synchronization loss due to a
    packet drop, the ability to determine payload from headers is removed and
    that was the point that David was making.  In other words, it may not even
    be a malicious act for this error to occur.
    
    Doug
    
    > -----Original Message-----
    > From: Robert Snively [mailto:rsnively@brocade.com]
    > Sent: Thursday, March 15, 2001 9:18 AM
    > To: 'Douglas Otis'; Robert Snively; Black_David@emc.com; ips@ece.cmu.edu
    > Subject: RE: FCIP iFCP encapsulation proposal
    >
    >
    > Doug,
    >
    > The binary image is of ethernet frames.  It requires the existence
    > of a matching TCP/IP connection with matching TCP headers,
    > including pdu sequencing information, which is not knowable
    > from the spoofer.  How are these delivered?
    >
    > The same question is true for each of the other layers of the
    > transfer, and the same unlikely scenario must be played back
    > for each.  I just don't see such data being delivered by
    > a responsible software layer.
    >
    > Bob
    >
    > >  -----Original Message-----
    > >  From: Douglas Otis [mailto:dotis@sanlight.net]
    > >  Sent: Wednesday, March 14, 2001 1:15 PM
    > >  To: Robert Snively; Black_David@emc.com; ips@ece.cmu.edu
    > >  Subject: RE: FCIP iFCP encapsulation proposal
    > >
    > >
    > >  Bob,
    > >
    > >  With out discussing spoofing where attackers successfully guess TCP
    > >  sequences (made too easy in some cases), a binary image is
    > >  stored and then
    > >  legitimately sent as a payload, with the example being
    > >  binary content of a
    > >  debug analyzer.  In this case, headers contained within the
    > >  payload could be
    > >  seen as valid.  The valid header within the payload may fool
    > >  a process that
    > >  attempts to recover header synchronization following a
    > >  dropped packet.  This
    > >  header may carry the same information in current use and be
    > >  acted upon or
    > >  send the connection into error oblivion. It would appear to
    > >  represent a
    > >  weakness that can be exploited.  Dropped packets happen.
    > >
    > >  Doug
    > >
    > >
    > >
    >
    
    


Home

Last updated: Tue Sep 04 01:05:18 2001
6315 messages in chronological order