|
|
发表于 2007-3-4 20:46:39
|
显示全部楼层
其实不是啦,都是今天看的一篇论文《Ignoring the Great Firewall of XXX》
现在电信上封宽带路由器以及非法接入似乎也是用的这个法子。
另外,《Improving TCP's Robustness to Blind In-Window Attacks》这一篇draft对这种blind attack做了讨论。
draft-ietf-tcpm-tcpsecure-07.txt
TCP has historically been considered protected against spoofed packet injection attacks by relying on the fact that it is difficult to guess the 4-tuple (the source and destination IP addresses and the source and destination ports) in combination with the 32 bit sequence number(s). A combination of increasing window sizes and applications using a longer term connections (e.g. H-323 or Border Gateway Protocol [RFC4271]) have left modern TCP implementation more vulnerable to these types of spoofed packet injection attacks. Many of these long term TCP applications tend to have predictable IP addresses and ports which makes it far easier for the 4-tuple to be guessed. Having guessed the 4-tuple correctly, an attacker can inject a RST, SYN or DATA segment into a TCP connection by carefully crafting the sequence number of the spoofed segment to be in the current receive window. This can cause the connection to either abort or possibly cause data corruption. This document specifies small modifications to the way TCP handles inbound segments that can reduce the chances of a successful attack.
[ 本帖最后由 iLRainyday 于 2007-3-4 20:58 编辑 ] |
|