Jump to content

TCP reset attack

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Jbartas (talk | contribs) at 02:36, 5 April 2009 (Created page to fulfill link in "RAW Sockets" page). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Also known as "Forged TCP Resets", "spoofed TCP reset packets" or "TCP reset attacks". These terms refer to a method of tampering with internet communications. Sometimes the tampering is malicious, other times it is beneficial.

Technical Background

The Internet is, in essence, a system for individual computers to exchange electronic messages, or packets of data. This system includes hardware to carry the messages, such as copper and fiber optics cables, and a formalized system for formatting the messages, called "protocols". The basic protocol used on the Internet is the IP protocol [1], which is usually coupled with additional protocols such as TCP [2] or UDP. IP/TCP is the protocol set used for email and web browsing. Each protocol has a block of in formation, called a header, included near the front of each packet. Headers contain information about which computer sent the packet, which computer should receive it, the packet size, etc.

TCP (as opposed to other protocols such as UDP) is used over IP when a virtual connection is required between two computers. TCP software on the two machines which will communicate (for example a workstation with a browser and a web server) by exchanging a stream of packets. Using a TCP connection gives the computers an easy way to exchange data items to big for a single packet, such as video clips, email attachments, or music files. Although some web pages are small enough for a single packet, they are sent over TCP connections for convenience.

TCP resets.

The stream of packets in a TCP connection each contains a TCP header. Each of these headers contains a bit known as the "Reset" flag. In most packets this bit is set to 0 and has no effect, however if this bit is set to 1 it indicates to the receiving computer that the computer should immediately stop using the TCP connection - It should not send any more packets using the connections identifying numbers (called ports), and discard any further packets it receives with headers indicating they belong to that connection. A TCP reset basically kills a TCP connection instantly.

When used as designed this can be a useful tool. One common application is the scenario where a computer (we'll call it computer A) crashes while a TCP connection is in progress. The computer on the other end (computer B) will continue to send TCP packets since it does not know computer A has crashed. When computer A reboots, it will then receive packets from the old pre-crash connection. Computer A has no context for these packets and no way of knowing what to do with them, so it might send a TCP reset to the sender of the packets - computer B. This reset lets computer B know that the connection is no longer working. The user on computer B can now try another connection or take other action.

Forging TCP resets.

In the scenario above the TCP reset bit was sent by a computer which was one of the connections endpoints. It's possible for a 3rd computer to monitor the TCP packets on the connection, and then send a "forged" packet containing a TCP reset to one or both endpoints. The headers in the forged packet must indicate, falsely, that it came form an endpoint, not the forger. This information includes the endpoint IP addresses and port numbers. Every field in the IP and TCP headers must be set to a convincing forged value for the fake reset to trick the endpoint into closing the TCP connection. Properly formatted forged TCP resets can be a very effective way to disrupt any TCP connection the forger wants, as long as the connection packets can be read by the forger.

Are forgeries good or bad?

One obvious application of forged TCP reset is to maliciously disrupt TCP connections without the consent of the two parties which own the endpoints - more on this below. However, network security systems using forged TCP resets have been designed as well. Software engineer John Bartas built a prototype "Buster" software package in 1995 that would send forged resets to any TCP connection which used port numbers in a short list. Linux volunteers proposed doing something similar with Linux firewalls in 2000 [3], and the Snort open source package used TCP resets to disrupt suspicious connections as early as 2003 [citation needed]

Comcast Controversy

By late 2007 Comcast began using forged TCP resets to cripple peer-to-peer and certain groupware applications on their customers computers [4]. This started a controversy, which was followed by the creation of the Network Neutrality Squad (NNSquad) by Lauren Weinstein, Vint Cerf, David Farber, Craig Newmark and other well-know founders and champions of the Internet.[5] In 2008 the NNSquad released the NNSquad Network Measurement Agent, a Windows software program written by John Bartas, which could detect Comcast's forged TCP resets and distinguish them from real endpoint-generated resets. Ironically the technology to detect the resets was developed from the earlier "Buster" program which used forged resets to block malware and ads in web pages.[6]

In January 2008 the FCC announced it would investigate Comcasts use of forged resets, and on On August 21, 2008 it ordered Comcast to terminate the practice.

The term "forged"

Some ISP spokespeople dislike the use of the term "forged" when referring to these TCP resets. They have also argued that these resets are a legitimate way to reduce network traffic. [7]