Christmas tree packet
This article needs additional citations for verification. (July 2012)
The term derives from a fanciful image of each little option bit in a header being represented by a different-colored light bulb, all turned on, as in "the packet was lit up like a Christmas tree". It can also be known as a kamikaze packet, nastygram, or lamp test segment.
Christmas tree packets can be used as a method of TCP/IP stack fingerprinting, exposing the underlying nature of a TCP/IP stack by sending the packets and then awaiting and analyzing the responses. When used as part of scanning a system, the TCP header of a Christmas tree packet has the flags FIN, URG and PSH set. Many operating systems implement their compliance with the Internet Protocol standards in varying or incomplete ways. By observing how a host responds to an odd packet, such as a Christmas tree packet, inferences can be made regarding the host's operating system. Versions of Microsoft Windows, BSD/OS, HP-UX, Cisco IOS, MVS, and IRIX display behaviors that differ from the RFC standard when queried with said packets.
A large number of Christmas tree packets can also be used to conduct a DoS attack by exploiting the fact that Christmas tree packets require much more processing by routers and end-hosts than the "usual" packets do.
Christmas tree packets can be easily detected by intrusion-detection systems or more advanced firewalls. From a network security point of view, Christmas tree packets are always suspicious and indicate a high probability of network reconnaissance activities.
- Raymond, Eric S. "Christmas tree packet". The Jargon File. Retrieved 30 Nov 2016.
- J. Postel, ed. (September 1981). INTERNET PROTOCOL, DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION. IETF. doi:10.17487/RFC0791. RFC 791. IEN 128, 123, 111, 80, 54, 44, 41, 28, 26. Updated by RFC 1349, RFC 2574, and RFC 6864.
- S. Deering; R. Hinden (July 2017). Internet Protocol, Version 6 (IPv6) Specification. IETF. doi:10.17487/RFC8200. STD 86. RFC 8200.
- "Port Scanning Techniques". nmap.org.