On Sun, 28 Aug 2016 14:35:01 +0200 Frederic Marchal
<frederic.marc...@wowtechnology.com> wrote:
> The requirements are:
> 
> * TCP connection,
> * long-lived,
> * unencrypted,
> * long silences.
> 
> I'll add that the protocol must allow the server to initiate data
> sending with only one packet (such as news pushed from the server
> to the client). Any protocol relying on an exchange is ruled out as
> the attacker won't see the victim's response.
> 
> The authors found www.usatoday.com meets the requirements.
> 
> Even if the requirements are met, the attack fails if the client is
> protected by a stateful firewall (either on a NAT router, modem or
> computer).

So essentially no smartphones are protected, and only a fraction of
the world's end users.

> The attacker needs a direct connection to an open port
> to probe the target system.

Yup. Not a big deal if you're directly targeting someone. It isn't
like there's any shortage of situations where this comes up.

Before the Snowden revelations, I used to presume that people claiming
that a hole like this wasn't critical to patch were simply not
thinking clearly. Now I wonder every time if they're shills for
intelligence agencies.

> The attack is also useless if the attacker can't spoof the source
> IP address.

Which means most of the world's machines directly connected to the
internet, see the stats from CAIDA and others on how much ingress
filtering is happening (not much).

> Routers in corporate environments usually block this by
> design or due to VLAN.

Yes, but you need to be in a position to spoof from somewhere, not in
a position to spoof from everywhere. Your mentioning of corporate
networks that control spoofing is uninteresting, since you can spoof
from most direct connections to the internet.

Again, as it stands right now, loads of users of random newspaper and
other web sites are vulnerable to injection attacks because of
this.

There are people working under horrid conditions for the freedom of
their countries in all sorts of places who are routinely targeted by
the state agencies of dictatorships and other miscreants who would
like to inject malware onto their phones and personal computers. This
is not a theoretical problem.

Again, read an article like:

https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/

to understand what the modern security situation is like.

You are arguing that it is utterly unimportant that injection attacks
against such people are fairly straightforward if they go to totally
legitimate web sites hosted on servers running Debian.

Real people die this way nowadays, or end up being tortured
indefinitely in third world hellholes because their equipment gets
compromised by FinFisher, the Hacking Group, and other suppliers of
malware to third world dictatorships.

This sort of thing cannot be ignored by an operating system
supplier. One has a social responsibility to fix holes like this.

> I bet the authors demonstrated the exploit in a very hacker
> friendly environment by disabling the target computer firewall and
> using a switch to connect the attacker and the victim on the same
> LAN.

No, the demonstrated it on the ordinary WiFi at a conference without
modification.

> Now, I wonder if many sites or protocols do meet the requirements.
> 
> Except for the above requirements, I can't see many cases where
> legitimate packets injection is possible without visible side
> effects giving the attack away.

The "above requirements" are met by tens of thousands of totally
legitimate web sites that one might choose to connect to that are
running Linux kernels of appropriate vintage.

Again, in spite of a public demonstration of this, you still insist it
isn't feasible? And again, leaving such holes unpatched puts
people at risk -- and at an utterly unnecessary risk.

You claim this isn't easily feasible, but it has been demoed. It is
known possible.

The hole needs to be fixed.

Perry
-- 
Perry E. Metzger                pe...@piermont.com

Reply via email to