Visible to the public Investigation of the 2016 Linux TCP Stack Vulnerability at Scale

TitleInvestigation of the 2016 Linux TCP Stack Vulnerability at Scale
Publication TypeConference Paper
Year of Publication2017
AuthorsQuach, Alan, Wang, Zhongjie, Qian, Zhiyun
Conference NameProceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5032-7
Keywordschallenge ack, Collaboration, composability, Human Behavior, Internet-scale Computing Security, Linux, Measurement, Metrics, off-path attacks, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Scalability, tcp vulnerability
Abstract

To combat blind in-window attacks against TCP, changes proposed in RFC 5961 have been implemented by Linux since late 2012. While successfully eliminating the old vulnerabilities, the new TCP implementation was reported in August 2016 to have introduced a subtle yet serious security flaw. Assigned CVE-2016-5696, the flaw exploits the challenge ACK rate limiting feature that could allow an off-path attacker to infer the presence/absence of a TCP connection between two arbitrary hosts, terminate such a connection, and even inject malicious payload. In this work, we perform a comprehensive measurement of the impact of the new vulnerability. This includes (1) tracking the vulnerable Internet servers, (2) monitoring the patch behavior over time, (3) picturing the overall security status of TCP stacks at scale. Towards this goal, we design a scalable measurement methodology to scan the Alexa top 1 million websites for almost 6 months. We also present how notifications impact the patching behavior, and compare the result with the Heartbleed and the Debian PRNG vulnerability. The measurement represents a valuable data point in understanding how Internet servers react to serious security flaws in the operating system kernel.

URLhttps://dl.acm.org/citation.cfm?doid=3078505.3078510
DOI10.1145/3078505.3078510
Citation Keyquach_investigation_2017