Analytics // Security Monitoring
8/1/2014
01:00 PM
100%
0%

Some Security Tools Fail With Multipath TCP

Researchers at Black Hat USA will reveal how multipath TCP breaks assumptions about how TCP works -- and the implications for network security.

The need for hardy networking connections has led to the development of Multipath TCP (MPTCP), which allows a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy. But the explosion in mobile and Internet of Things devices also requires network security tools keep pace with change.

Neohapsis researchers Catherine Pearce and Patrick Thomas say very few security and network management tools are up to that challenge when it comes to MPTCP streams. At a presentation at the upcoming Black Hat USA conference in Las Vegas, the two plan to discuss how MPTCP eviscerates assumptions about TCP that are made by both tools and network engineers alike.

TCP is a foundational protocol for communication on the Internet that has largely stood the test of time, says Thomas. "It's used everywhere; it's used by everything," he says. "It's been around since the dawn of the Internet."

Yet TCP is not set up for the future of the Internet people are seeing now -- a highly-connected world featuring different types of connectivity, says Thomas.

This had led to the development of MPTCP, which allows TCP to talk over multiple paths simultaneously, decoupling it from a specific IP address. Doing this, however, creates a new reality for security. For starters, it affects the ability of intrusion detection systems to inspect, correlate, and reassemble traffic. This can add a new wrinkle to fragmentation attacks, Thomas says.

"An intrusion detection system that is not multipath TCP-aware, sees five different connections coming from different IP addresses, has no conception that they are related, and on each of them it sees complete garbage data," he says.

"If any of your security decisions, tools, thought-processes, manual processes, if they rely on any of... these four things, then something in those is going to break," he says. "Those four things that we've got are: If you expect to see all app layer data within a TCP stream; if you expect to differentiate clients from servers based on the connection direction; if you expect to tamper with or close bad connections midstream; or if attempt to associate logical connections to IP addresses. If you make any security decisions based on any of those, then those security mechanisms are going to break in the face of MPTCP."

During their presentation, which is scheduled for Wednesday at 3:30 p.m., the researchers will show tools and strategies for understanding and mitigating the risk of MPTCP-capable devices on a network.

Multipath TCP changes the way the Internet works at its core, explains Pearce.

"If we're not ready for this the impact of this could be probably at least as great as IPv6," she says, adding that the goal of the talk at Black Hat is to raise awareness.

"We want security to keep up with technology," she says.

 

Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
EricD388
50%
50%
EricD388,
User Rank: Apprentice
8/1/2014 | 4:06:56 PM
Wireless Aggregation of Internet Bandwidth
This technology has been in the works for quite some time.  Delangis has three U.S. patents on this technology dating back to 2002.  Check out 7606156 and 8228801 for starters.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.