TCP reset attack
Also known as "Forged TCP Resets", "spoofed TCP reset packets" or "TCP reset attacks". These terms refer to a method of tampering with internet communications. Sometimes the tampering is malicious, other times it is beneficial.
Technical Background
The Internet is, in essence, a system for individual computers to exchange electronic messages, or packets of data. This system includes hardware to carry the messages, such as copper and fiber optics cables; and a formalized system for formatting the messages, called "protocols". The basic protocol used on the Internet is the IP protocol, which is usually coupled with additional protocols such as TCP (Transmission Control Protocol[1]) or UDP (User Datagram Protocol). TCP/IP is the protocol set used for email and web browsing. Each protocol has a block of information, called a header, included near the front of each packet. Headers contain information about which computer sent the packet, which computer should receive it, the packet size, etc.
TCP (as opposed to other protocols such as UDP) is used with IP when a virtual connection is required between two computers. TCP software on the two machines which will communicate (for example a workstation with a browser and a web server) by exchanging a stream of packets. Using a TCP connection gives the computers an easy way to exchange data items to big for a single packet, such as video clips, email attachments, or music files. Although some web pages are small enough for a single packet, they are sent over TCP connections for convenience.
TCP resets.
The stream of packets in a TCP connection each contains a TCP header. Each of these headers contains a bit known as the "Reset" flag. In most packets this bit is set to 0 and has no effect, however if this bit is set to 1 it indicates to the receiving computer that the computer should immediately stop using the TCP connection - It should not send any more packets using the connections identifying numbers (called ports), and discard any further packets it receives with headers indicating they belong to that connection. A TCP reset basically kills a TCP connection instantly.
When used as designed this can be a useful tool. One common application is the scenario where a computer (we'll call it computer A) crashes while a TCP connection is in progress. The computer on the other end (computer B) will continue to send TCP packets since it does not know computer A has crashed. When computer A reboots, it will then receive packets from the old pre-crash connection. Computer A has no context for these packets and no way of knowing what to do with them, so it might send a TCP reset to the sender of the packets - computer B. This reset lets computer B know that the connection is no longer working. The user on computer B can now try another connection or take other action.
Forging TCP resets.
In the scenario above the TCP reset bit was sent by a computer which was one of the connection endpoints. It's possible for a 3rd computer to monitor the TCP packets on the connection, and then send a "forged" packet containing a TCP reset to one or both endpoints. The headers in the forged packet must indicate, falsely, that it came from an endpoint, not the forger. This information includes the endpoint IP addresses and port numbers. Every field in the IP and TCP headers must be set to a convincing forged value for the fake reset to trick the endpoint into closing the TCP connection. Properly formatted forged TCP resets can be a very effective way to disrupt any TCP connection the forger can monitor.
Are forgeries good or bad?
One obvious application of forged TCP reset is to maliciously disrupt TCP connections without the consent of the two parties which own the endpoints - more on this below. However, network security systems using forged TCP resets have been designed as well. A prototype "Buster" software package was in demonstrated 1995 that would send forged resets to any TCP connection which used port numbers in a short list. Linux volunteers proposed doing something similar with Linux firewalls in 2000 [2], and the open source Snort (software) used TCP resets to disrupt suspicious connections as early as 2003 [3]
Comcast Controversy
By late 2007 Comcast began using forged TCP resets to cripple peer-to-peer and certain groupware applications on their customers computers [4][5]. This started a controversy, which was followed by the creation of the Network Neutrality Squad (NNSquad) by Lauren Weinstein, Vint Cerf, David Farber, Craig Newmark and other well-know founders of and champions of openness on the Internet.[6] In 2008 the NNSquad released the NNSquad Network Measurement Agent, a Windows software program written by John Bartas, which could detect Comcast's forged TCP resets and distinguish them from real endpoint-generated resets. Ironically the technology to detect the resets was developed from the earlier Open-source "Buster" [7] software which used forged resets to block malware and ads in web pages.
In January 2008 the FCC announced it would investigate Comcasts use of forged resets, and on On August 21, 2008 it ordered Comcast to terminate the practice.
The term "forged"
Some ISP spokespeople dislike the use of the term "forged" when referring to these TCP resets. They have also argued that these resets are a legitimate way to reduce network traffic. [8]
References
- ^ TCP specification
- ^ May 2000 Linux discussion archives
- ^ SNORT discussion archive re: TCP resets
- ^ Section of Wikipedia Comcast article
- ^ Associated Press, Comcast Blocks Some Internet Traffic
- ^ NNSquad home page
- ^ Buster (TCP reset based software)home page
- ^ Article on validity of resets as managment tool - From Dave Faber's IP list