A jigsaw puzzle you don’t want put together: IP fragmentation attacks
March 17, 2016 No CommentsFeatured blog by Debbie Fletcher, Independent Technology Writer
Human ingenuity isn’t always used for benevolent purposes, which is a shame. But sometimes malevolent ingenuity is so, well, ingenious that you can’t help but be impressed anyway. Big tobacco. The Ship Your Enemies Glitter business. Every single children’s show, which simultaneously manage to be addictive to children yet make parents want to put their heads through the drywall.
Unfortunately for website owners, IP fragmentation attacks can be put into the malevolently ingenious category. Keep reading to find out how these attacks use internet protocol to wreak havoc and what you can do to prevent them from taking down your website.
The fragmentation explanation
Before you can fully understand how attackers are using fragmented datagrams to launch denial of service attacks, you’ll need a handle on datagram fragmentation – what it is and why it exists in the first place.
Data is sent over the internet in the form of datagrams. Every network has its own limit for the size of datagrams it can process. This is known as a maximum transmission unit, or MTU. If a datagram exceeds a network’s MTU, it’s broken down into pieces for transmission and reassembled back into its original form according to the instructions contained in what’s called the offset of each fragment. Reassembly is generally completed by the receiving host.
Think of it like buying a billiards table for your basement. You’re not going to be able to move a standard-sized billiards table through your front door and down your stairs in one piece. You move it into your basement in pieces, and then you put it together.
Example of how an IP datagram is fragmented and reassembled (Source: Incapsula)
Two types of bigger-than-you-figured datagram attacks
IP fragmentation attacks are brilliant in their evilness because they take advantage of a protocol that has to exist. You can’t just wipe out these attacks by disallowing fragmentation. The internet needs fragmentation in order to run correctly and efficiently, and according to internet security provider Incapsula, attackers have found two different ways to exploit this necessity.
The first way is through UDP and ICMP fragmentation attacks. During this sort of attack, fake UDP or ICMP packets that exceed the network’s MTU are transmitted. Once they reach the receiving host – the target server – the server gets to work reassembling the packets. However, because they’re fake, they can’t be reassembled and the server’s resources are quickly consumed by this fruitless endeavor.
The second way is through TCP fragmentation attacks, otherwise known as teardrop attacks. In these attacks the instructions contained in attack fragments indicate that fragments overlap in positioning within the full datagram. Many servers can’t handle overlapping fragments and will be quickly overwhelmed.
Teardrop attacks are made possible by a vulnerability in older operating systems, including Windows 3.1 95 and NT. Patches were made available for this vulnerability, however it was exploited again in Windows 7 and Windows Vista.
Fragmentation mitigation
While mitigation methods will vary based on the type of attack as well as other factors like the size and severity, the best possible protection against IP fragmentation attacks will ensure that the attack packets never reach the target server. This may include inspecting all incoming fragments for fragmentation rule violations.
In addition to providing this front-line inspection of incoming data packets for rule violations, advanced mitigation services will also filter traffic based on factors like rate patterns and IP reputation. This comprehensive mitigation uses blacklist and whitelist mechanisms that make protecting your servers and websites ultra-efficient.
As annoying as it is to have to admit something malicious may also be ingenious, that annoyance will be dwarfed by the satisfaction you’ll feel when you defeat that malevolent ingenuity. Protect yourself from IP fragmentation attacks. May brilliant benevolence always win.