Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Unix :: General :: cert0106.txt

CERT Advisory CA-96.01 UDP service denial





-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
CERT(sm) Advisory CA-96.01 
Original issue date: February 8, 1996 
Last revised: February 14, 1997 - Introduction - updated the IP spoofing
              reference to CA-96.21.
              Updates section - added pointers to CISCO documents.	      
	      
              A complete revision history is at the end of this advisory.

Topic: UDP Port Denial-of-Service Attack
- -----------------------------------------------------------------------------

The CERT Coordination Center has received reports of programs that launch
denial-of-service attacks by creating a "UDP packet storm" either on a system
or between two systems. An attack on one host causes that host to perform
poorly. An attack between two hosts can cause extreme network congestion in
addition to adversely affecting host performance.

The CERT staff recommends disabling unneeded UDP services on each host, in
particular the chargen and echo services, and filtering these services at the
firewall or Internet gateway.

Because the UDP port denial-of-service attacks typically involve IP spoofing,
we encourage you to follow the recommendations in advisory CA-96.21.

We will update this advisory as we receive additional information.
Please check advisory files regularly for updates that relate to your site

- -----------------------------------------------------------------------------

I.   Description

     When a connection is established between two UDP services,
     each of which produces output, these two services can produce a
     very high number of packets that can lead to a denial of service
     on the machine(s) where the services are offered. Anyone with network
     connectivity can launch an attack; no account access is needed.

     For example, by connecting a host's chargen service to the echo service
     on the same or another machine, all affected machines may be
     effectively taken out of service because of the excessively high number
     of packets produced. In addition, if two or more hosts are so connected,
     the intervening network may also become congested and deny service
     to all hosts whose traffic traverses that network.

II.  Impact

     Anyone with network connectivity can cause a denial of service.
     This attack does not enable them to gain additional access.

III. Solution

     We recommend taking all the steps described below.

     1. Disable and filter chargen and echo services.
        This attack is most readily exploited using the chargen or echo
        services, neither of which is generally needed as far as we are aware.
        We recommend that you disable both services on the host and filter
        them at the firewall or Internet gateway.

        To disable these services on a host, it is necessary to edit the
        inetd configuration file and cause inetd to begin using the new
        configuration. Exactly how to do this is system dependent so you
        should check your vendor's documentation for inetd(8); but on many
        UNIX systems the steps will be as follows:
         (1) Edit the inetd configuration file (e.g. /etc/inetd.conf).
         (2) Comment out the echo, chargen, and other UDP services not used.
         (3) Cause the inetd process to reread the configuration file
             (e.g., by sending it a HUP signal).

     2. Disable and filter other unused UDP services.
        To protect against similar attacks against other services, we
        recommend
           -  disabling all unused UDP services on hosts and
           -  blocking at firewalls all UDP ports less than 900 with
              the exception of specific services you require, such as
              DNS (port 53).

     3. If you must provide external access to some UDP services, consider
        using a proxy mechanism to protect that service from misuse.
        Techniques to do this are discussed in Chapter 8, "Configuring
        Internet Services," in _Building Internet Firewalls_ by Chapman
        and Zwicky (see Section IV below).

     4. Monitor your network.
        If you do provide external UDP services, we recommend monitoring
        your network to learn which systems are using these services and
        to monitor for signs of misuse. Tools for doing so include Argus,
        tcpdump, and netlog.

        Argus is available from
             ftp://ftp.net.cmu.edu/pub/argus-1.5/
             MD5 (argus-1.5.tar.gz) = 9c7052fb1742f9f6232a890267c03f3c

             Note that Argus requires the TCP wrappers to install:
             ftp://info.cert.org/pub/tools/tcp_wrappers/tcp_wrappers_7.2.tar.Z
             MD5 (tcp_wrappers_7.2.tar.Z) = 883d00cbd2dedd9bfc783b7065740e74

       tcpdump is available from
             ftp://ftp.ee.lbl.gov/tcpdump-3.0.2.tar.Z
             MD5 (tcpdump-3.0.2.tar.Z) = c757608d5823aa68e4061ebd4753e591

             Note that tcpdump requires libpcap, available at
                 ftp://ftp.ee.lbl.gov/libpcap-0.0.6.tar.Z
                 MD5 (libpcap-0.0.6.tar.Z) = cda0980f786932a7e2eebfb2641aa7a0

       netlog is available from
              ftp://net.tamu.edu/pub/security/TAMU/netlog-1.2.tar.gz
              MD5 (netlog-1.2.tar.gz) = 1dd62e7e96192456e8c75047c38e994b

      5. Take steps against IP spoofing.
         Because IP spoofing is typically involved in UDP port
         denial-of-service attacks, we encourage you to follow the
         guidance in advisory CA-95:01, available from

               ftp://info.cert.org/pub/cert_advisories/CA-95:01.IP.spoofing

IV. Sources of further information about packet filtering

    For a general packet-filtering recommendations, see

         ftp://info.cert.org/pub/tech_tips/packet_filtering

     For in-depth discussions of how to configure your firewall, see

         _Firewalls and Internet Security: Repelling the Wily Hacker_
         William R. Cheswick and Steven M. Bellovin
         Addison-Wesley Publishing Company, 1994
         ISBN 0-201-63357

         _Building Internet Firewalls_
         Brent Chapman and Elizabeth D. Zwicky
         O'Reilly & Associates, Inc., 1995
         ISBN 1-56592-124-0

- ---------------------------------------------------------------------------
The CERT Coordination Center staff thanks Peter D. Skopp of Columbia
University for reporting the vulnerability and Steve Bellovin of AT&T Bell
Labs for his support in responding to this problem.
- ---------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in the Forum of Incident
Response and Security Teams (FIRST).

We strongly urge you to encrypt any sensitive information you send by email.
The CERT Coordination Center can support a shared DES key and PGP. Contact the
CERT staff for more information.

Location of CERT PGP key
         ftp://info.cert.org/pub/CERT_PGP.key

CERT Contact Information
- ------------------------
Email    cert@cert.org

Phone    +1 412-268-7090 (24-hour hotline)
                CERT personnel answer 8:30-5:00 p.m. EST
                (GMT-5)/EDT(GMT-4), and are on call for
                emergencies during other hours.

Fax      +1 412-268-6989

Postal address
        CERT Coordination Center
        Software Engineering Institute
        Carnegie Mellon University
        Pittsburgh PA 15213-3890
        USA

To be added to our mailing list for CERT advisories and bulletins, send your
email address to
        cert-advisory-request@cert.org

CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
        ftp://info.cert.org/pub/

CERT advisories and bulletins are also posted on the USENET newsgroup
        comp.security.announce


Copyright 1997 Carnegie Mellon University
This material may be reproduced and distributed without permission provided it
is used for noncommercial purposes and the copyright statement is included.

CERT is a service mark of Carnegie Mellon University.

=============================================================================
UPDATES

CISCO
- -----
   Cisco Alert Summary:
        http://www.cisco.com/warp/public/146/917_security.html

   Cisco Security Guide     
        http://www.cisco.com/univercd/data/doc/cintrnet/ics/icssecur.htm 


Silicon Graphics Inc.
- ---------------------

SGI acknowledges CERT Advisory CA-96.01 and is currently investigating.
No further information is available at this time.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Revision history

Feb. 14, 1997  Introduction - updated the  IP spoofing reference to CA-96.21.
	       Updates section - added pointers to CISCO documents.
Aug. 30, 1996  Information previously in the README was inserted into the
               advisory.
Feb. 23, 1996  Updates section - added information from Silicon Graphics, Inc.
Feb. 21, 1996  Solution, Sec. III.4 - added new URL for Argus.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMwTKXnVP+x0t4w7BAQEYVAP/fLxjusXIKs5FQ24u9hW9OS6B0ThgibBo
lqTdErwTHUhUXc5R3rveE0aEiSn4NhBiEK4hNUY2jpmvw9A24aoE5w5gH+4C/uoY
yb0aFqYDoef3amgcOhGmsMoOwgcWB9cesLom8Cih/UlRI6CeCwodpqDhQwd+SOGk
JFbZnh0xgrE=
=kXm1
-----END PGP SIGNATURE-----



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH