Ключевые слова:security, tcp, (найти похожие документы) Subject: [Phrack] T/TCP vulnerabilities
---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 06 of 15
-------------------------[ T/TCP vulnerabilities
--------[ route|daemon9 <firstname.lastname@example.org>
----[ Introduction and Impetus
T/TCP is TCP for Transactions. It is a backward compatible extension for
TCP to facilitate faster and more efficient client/server transactions. T/TCP
is not in wide deployment but it is in use (see appendix A) and it is supported
by a handful of OS kernels including: FreeBSD, BSDi, Linux, and SunOS. This
article will document the T/TCP protocol in light detail, and then cover some
weaknesses and vulnerabilities.
----[ Background and primer
TCP is a protocol designed for reliability at the expense of expediency
(readers unfamiliar with the TCP protocol are directed to the ancient-but-
Whenever an application is deemed to require reliability, it is usually built
on top of TCP. This lack of speed is considered a necessary evil. Short lived
client/server interactions desiring more speed (short in terms of time vs.
amount of data flow) are typically built on top of UDP to preserve quick
response times. One exception to this rule, of course, is http. The
architects of http decided to use the reliable TCP transport for ephemeral
connections (indeed a poorly designed protocol).
T/TCP is a small set of extensions to make a faster, more efficient TCP.
It is designed to be a completely backward compatible set of extensions to
speed up TCP connections. T/TCP achieves its speed increase from two major
enhancements over TCP: TAO and TIME_WAIT state truncation. TAO is TCP
Accelerated Open, which introduces new extended options to bypass the 3-way
handshake entirely. Using TAO, a given T/TCP connection can approximate a
UDP connection in terms of speed, while still maintaining the reliability of a
TCP connection. In most single data packet exchanges (such is the case with
transactional-oriented connections like http) the packet count is reduced by a
The second speed up is TIME_WAIT state truncation. TIME_WAIT state
truncation allows a T/TCP client to shorten the TIME_WAIT state by up to a
factor of 20. This can allow a client to make more efficient use of network
socket primitives and system memory.
----[ T/TCP TAO
TCP accelerated open is how T/TCP bypasses the 3-way handshake. Before we
discuss TAO, we need to understand why TCP employs a 3-way handshake.
According to RFC 793, the principal reason for the exchange is the prevention
of old duplicate connection initiations wandering into current connections and
causing confusion. With this in mind, in order to obviate the need for the
3-way handshake, there needs to be a mechanism for the receiver of a SYN to
guarantee that that SYN is in fact new. This is accomplished with a new
extended TCP header option, the connection count (CC).
The CC (referred as tcp_ccgen when on a host) is a simple monotonic
variable that a T/TCP host keeps and increments for every TCP connection
created on that host. Anytime a client host supporting T/TCP wishes to make a
T/TCP connection to a server, it includes (in it's TAO packet) a CC (or CCnew)
header option. If the server supports T/TCP, it will cache that client's
included CC value and respond with a CCecho option (CC values are cached by
T/TCP hosts on a per host basis). If the TAO test succeeds, the 3-way
handshake is bypassed, otherwise the hosts fall back to the older process.
The first time a client host supporting T/TCP and a server host supporting
T/TCP make a connection no CC state exists for that client on that server.
Because of this fact, the 3-way handshake must be done. However, also at that
time, the per host CC cache for that client host is initialized, and all
subsequent connections can use TAO. The TAO test on the server simply checks
to make sure the client's CC is greater then the last received CC from that
client. Consider figure 1 below:
i 0 --TAO+data--(CC = 2)--> ClientCC = 1
m 1 2 > 1; TAO test succeeds
e 2 accept data ---> (to application)
[ fig 1 ]
Initially (0) the client sends a TAO encapsulated SYN to the server, with
a CC of 2. Since the CC value on the server for this client is 1 (indicating
they have had previous T/TCP-based communication) the TAO test succeeds (1).
Since the TAO test was successful, the server can pass the data to application
layer immediately (2). If the client's CC had not been greater than the
server's cached value, the TAO test would have failed and forced the 3-way
----[ T/TCP TIME_WAIT truncation
Before we can see why it is ok to shorten the TIME_WAIT state, we need to
cover exactly what it is and why it exists.
Normally, when a client performs an active close on a TCP connection, it
must hold onto state information for twice the maximum segment lifetime (2MSL)
which is usually between 60 - 240 seconds (during this time, the socket pair
that describes the connection cannot be reused). It is thought that any
packet from this connection would be expired (due to IP TTL constraints) from
the network. TCP must be consistent with its behavior across all contingencies
and the TIME_WAIT state guarantees this consistency during the last phase of
connection closedown. It keeps old network segments from wandering into a
connection and causing problems and it helps implement the 4-way closedown
procedure. For example, if a wandering packet happens to be a retransmission
of the servers FIN (presumably due to the clients ACK being lost), the client
must be sure to retransmit the final ACK, rather then a RST (which it would do
if it had torn down all the state).
T/TCP allows for the truncation of the TIME_WAIT state. If a T/TCP
connection only lasts for MSL seconds or less (which is usually the case with
transactional-oriented connections) the TIME_WAIT state is truncated to as
little as 12 seconds (8 times the retranmission timeout - RTO). This is
allowable from a protocol standpoint because of two things: CC number
protection against old duplicates and the fact that the 4-way closedown
procedure packet loss scenario (see above) can be handled by waiting for the
RTO (multiplied by a constant) as opposed to waiting for a whole 2MSL.
As long as the connection didn't last any longer then MSL, the CC number
in the next connection will prevent old packets with an older CC number from
being accepted. This will protect connections from old wandering packets
(if the connection did last longer, it is possible for the CC values to wrap
and potentially be erroneously delivered to a new incarnation of a connection).
----[ Dominance of TAO
It is easy for an attacker to ensure the success or failure of the TAO
test. There are two methods. The first relies on the second oldest hacking
tool in the book. The second is more of a brutish technique, but is just as
--[ Packet sniffing
If we are on the local network with one of the hosts, we can snoop the
current CC value in use for a particular connection. Since the tcp_ccgen is
incremented monotonically we can precisely spoof the next expected value by
incrementing the snooped number. Not only will this ensure the success of our
TAO test, but it will ensure the failure of the next TAO test for the client
we are spoofing.
--[ The numbers game
The other method of TAO dominance is a bit rougher, but works almost as
well. The CC is an unsigned 32-bit number (ranging in value from 0 -
4,294,967,295). Under all observed implementations, the tcp_ccgen is
initialized to 1. If an attacker needs to ensure the success of a TAO
connection, but is not in a position where s/he can sniff on a local network,
they should simply choose a large value for the spoofed CC. The chances that
one given T/TCP host will burn through even half the tcp_ccgen space with
another given host is highly unlikely. Simple statistics tells us that the
larger the chosen tcp_ccgen is, the greater the odds that the TAO test will
succeed. When in doubt, aim high.
----[ T/TCP and SYN flooding
TCP SYN flooding hasn't changed much under TCP for Transactions. The
actual attack is the same; a series of TCP SYNs spoofed from unreachable IP
addresses. However, there are 2 major considerations to keep in mind when
the target host supports T/TCP:
1) SYN cookie invalidation: A host supporting T/TCP cannot, at the same
time, implement SYN cookies. TCP SYN cookies are a SYN flood defense
technique that works by sending a secure cookie as the sequence number
in the second packet of the 3-way handshake, then discarding all state
for that connection. Any TCP options sent would be lost. If the final
ACK comes in, only then will the host create the kernel socket data
structures. TAO obviously cannot be used with SYN cookies.
2) Failed TAO processing result in queued data: If the TAO test fails, any
data included with that packet will be queued pending the completion of
the connection processing (the 3-way handshake). During a SYN flood,
this can make the attack more severe as memory buffers fill up holding
this data. In this case, the attacker would want to ensure the failure
of the TAO test for each spoofed packet.
In a previous Phrack Magazine article, the author erroneously reported that
T/TCP would help to alleviate SYN flood vulnerability. This obviously
incorrect statement was made before copious T/TCP research was done and is
hereby rescinded. My bad.
----[ T/TCP and trust relationships
An old attack with a new twist. The attack paradigm is still the same,
(readers unfamiliar with trust relationship exploitation are directed to
P48-14) this time, however, it is easier to wage. Under T/TCP, there is no
need to attempt to predict TCP sequence numbers. Previously, this attack
required the attacker to predict the return sequence number in order to
complete the connection establishment processing and move the connection into
the established state. With T/TCP, a packet's data will be accepted by the
application as soon as the TAO test succeeds. All the attacker needs to do is
ensure that the TAO test will succeed. Consider the figure below.
Attacker Server Trusted
1 TAO test succeeds
T 2 data to application
i 3 ---TAO-response->
m 4 no open socket
e 5 <------RST-------
6 tears down connection
[ fig 2 ]
The attacker first sends a spoofed connection request TAO packet to the
server. The data portion of this packet presumably contains the tried and true
non-interactive backdooring command `echo + + > .rhosts`. At (1) the TAO test
succeeds and the data is accepted (2) and passed to application (where it is
processed). The server then sends its T/TCP response to the trusted host (3).
The trusted host, of course, has no open socket (4) for this connection, and
responds with the expected RST segment (5). This RST will teardown the
attacker's spoofed connection (6) on the server. If everything went according
to plan, and the process executing the command in question didn't take too long
to run, the attacker may now log directly into the server.
To deal with (5) the attacker can, of course, wage some sort of denial of
service attack on the trusted host to keep it from responding to the
----[ T/TCP and duplicate message delivery
Ignoring all the other weaknesses of the protocol, there is one major flaw
that causes the T/TCP to degrade and behave decidedly NONTCP-like, therefore
breaking the protocol entirely. The problem is within the TAO mechanism.
Certain conditions can cause T/TCP to deliver duplicate data to the
application layer. Consider the timeline in figure 3 below:
1 TAO test succeeds
T 2 accept data ---> (to application)
i 3 *crash* (reboot)
m 4 timeout (resends) --TAO-(data)--->
e 5 TAO test fails (data is queued)
6 established <-SYN-ACK(SYN)-- fallback to 3WHS
7 --ACK(SYN)-----> established (data --> application)
[ fig 3 ]
At time 0 the client sends its TAO encapsulated data to the server (for
this example, consider that both hosts have had recent communication, and the
server has defined CC values for the client). The TAO test succeeds (1) and
the server passes the data to the application layer for processing (2).
Before the server can send its response however (presumably an ACK) it crashes
(3). The client receives no acknowledgement from the server, so it times out
and resends its packet (4). After the server reboots it receives this
retransmission, this time, however, the TAO test fails and the server queues
the data (5). The TAO test failed and forced a 3-way handshake (6) because the
servers CC cache was invalidated when it rebooted. After completing the 3-way
handshake and establishing a connection, the server then passes the queued data
to the application layer, for a second time. The server cannot tell that it
has already accepted this data because it maintains no state after a reboot.
This violates the basic premise of T/TCP that it must remain completely
backward compatible with TCP.
----[ In closing
T/TCP is a good idea that just wasn't implemented properly. TCP was
not designed to support a connectionless-like paradigm while still
maintaining reliability and security (TCP wasn't even designed with security
in mind at all). T/TCP brings out too many problems and discrete bugs in TCP
to be anything more then a novelty.
----[ Appendix A: Internet hosts supporting RFC 1644
This information is ganked from Richard Steven's T/TCP homepage
(http://www.kohala.com/~rstevens/ttcp.html). It is not verfied to be correct.
----[ Appendix B: Bibliography
1) Braden, R. T. 1994 "T/TCP - TCP Extensions for Transactions...", 38 p
2) Braden, R. T. 1992 "Extending TCP for Transactions - Concepts...", 38 p
3) Stevens, W. Richard. 1996 "TCP Illustrated volume III", 328 p
4) Smith, Mark. 1996, "Formal verification of Communication...", 15 p