home *** CD-ROM | disk | FTP | other *** search
- --------------------------------------------------------------
- This story was printed from ZDNN,
- located at http://www.zdnet.com/zdnn.
- --------------------------------------------------------------
-
- Major Unix flaw emerges
- By Randy Barrett, Inter@ctive Week Online
- March 1, 1999 9:30 AM PT
- URL: http://www.zdnet.com/zdnn/stories/news/0,4586,2217922,00.html
-
- A newly discovered Unix design flaw threatens thousands of computers that operate on the Internet.
-
- The vulnerability opens Unix-based servers to a new kind of denial-of-service attack that overloads the servers'
- ability to answer incoming queries, according to security expert and Internet service provider (ISP) owner Simson
- Garfinkel. Garfinkel's ISP, Vineyard.Net, experienced such an attack in early 1998, but Garfinkel soon realized the
- situation was an accident caused by a subscriber's faulty software.
-
- "The buggy software would finger our computer every minute, but it never hung up," Garfinkel said. By not terminating
- the connection, the program quickly loaded up his Unix server's "process tables" and brought the ISP to a standstill
- for two hours.
-
- "We didn't go looking for this. It hit us. It's not theoretical," Garfinkel said.
-
- The attack entails sending repeated open-connection requests to a Unix server. Subprograms - like Internet
- Daemon, Secure Shell Daemon and Internet Message Access Protocol Daemon - are written to automatically answer
- the connection and carry out requests. But if the connection is initiated with no request, most Daemons keep the line
- open, using resources from the server's process table, which can handle between 600 and 1,500 simultaneous tasks.
- Repeated connections eventually overload the process table and crash the server.
-
- Garfinkel publicly outlined the vulnerability - which affects nearly all Unix-based platforms, including Irix, Linux and
- Solaris - on a security newsgroup Feb. 19. This was after his repeated attempts to notify programmers at Berkeley
- Software Design Inc., Hewlett-Packard, Silicon Graphics Inc. and Sun Microsystems of the problem last year. None
- of the vendors gave it any notice, Garfinkel said.
-
- "It wasn't new enough to immediately gain attention. It's a design flaw, not a bug," said Gene Spafford, professor of
- computer science at Purdue University.
-
- Sabotage can come from outside
- Process table attacks are old news to Unix programmers, but Garfinkel discovered that the assault can come from the
- outside. Previously, developers only thought such sabotage could come from someone with internal access.
-
- AT&T Fellow Steven Bellovin said the vulnerability is real. "If I were running a popular server, I would at least try to
- add some resource limitation."
-
- Garfinkel said the servers most open to attack are those used for electronic mail, file serving and Web hosting.
- Protecting against it is relatively easy: Daemon programs can be rewritten to limit incoming connections or drop them
- after 30 seconds.
-
- "They need to have a governor installed," Garfinkel said.
-
- BSDI Director of Product Marketing Douglas Urner said the process table threat is hardly catastrophic. "In theory,
- there is a vulnerability here, which is like saying the gas in your car might explode."
-
- BSDI software safe
- Urner said the flaw probably wouldn't affect most BSDI software, because of existing safeguards.
-
- SGI Principal Engineer Bill Earl said the threat exists but isn't a big deal, because the Daemons can be easily
- configured to limit incoming connections.
-
- Red Hat Software spokeswoman Melissa London wasn't familiar with the process table problem, but she said holes
- in Linux usually are solved quickly on public open source bulletin boards. "If there is any breach, we'll work to fix it,"
- she said.
-
- A perceived lack of responsible vendor action to patch the problem is partly what spurred Garfinkel to make the attack
- known.
-
- "They don't do anything unless its publicly exposed," he said. "I can shut down any one of their servers on the Net."
-
- Hard to stay hidden
- But if he did, Garfinkel wouldn't be able to easily cloak his identity. Because the onslaught can take up to 10 hours to
- complete, Unix experts and vendors agree that maintaining stealth is nearly impossible.
-
- "It's an attack you're unlikely to see people get away with," Urner said.
-
- That fact doesn't assuage the fears of many Unix experts who take the vulnerability seriously as yet another sign that
- the Internet isn't robust enough to handle 21st century threats.
-
- "The real deeper problem is that the whole infrastructure is pretty rotten," said Peter G. Neumann, principal scientist
- at the Computer Science Lab at SRI International.
-