2019
DOI: 10.2478/popets-2019-0071
|View full text |Cite
|
Sign up to set email alerts
|

Detecting TCP/IP Connections via IPID Hash Collisions

Abstract: We present a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine. The attack takes advantage of side-channels present in the Linux kernel’s handling of the values used to populate an IPv4 packet’s IPID field and applies to kernel versions of 4.0 and higher. We implement and test this attack and evaluate its real world effectiveness and performance when used on active connections to popular web servers. Our evaluation shows that the a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 22 publications
(29 reference statements)
0
11
0
Order By: Relevance
“…The existing implementation of pcapML uses a single thread. 1 We again leverage tcpreplay, and the same bigFlows.pcap traffic capture as our previous experiment examining disk overhead. We vary two input parameters.…”
Section: Pcapml Overhead and Performancementioning
confidence: 99%
“…The existing implementation of pcapML uses a single thread. 1 We again leverage tcpreplay, and the same bigFlows.pcap traffic capture as our previous experiment examining disk overhead. We vary two input parameters.…”
Section: Pcapml Overhead and Performancementioning
confidence: 99%
“…If yes, then the IPID of the packet is set to 0 directly. This assignment is due to Geoffrey et al's disclosure of a side channel in previous assignment methods, i.e., IPID of the RST packet was assigned based on one of the 2048 hash counters before version 4.18, which can be exploited to detect the presence of TCP connections [3]. If the packet is not a TCP RST packet, IP protocol checks the DF flag of the packet.…”
Section: Ipid Assignment In Linuxmentioning
confidence: 99%
“…Hence, if the attacker wants to force the counter to increase linearly and facilitate the observation, it needs to restrict the increment of system ticks related to the IPID counter. Usually, if more than 3 packets are sent to the server under 10 ms, the random value added to the IPID counter will never be larger than one [3]. We send ICMP request packets to the server in parallel and restrict the increment of system ticks.…”
Section: Constructing Hash Collisionsmentioning
confidence: 99%
See 2 more Smart Citations