当前位置:网站首页>What does IP fragment mean? How to defend against IP fragment attacks?
What does IP fragment mean? How to defend against IP fragment attacks?
2022-07-19 07:02:00 【V13807970340】
P In the message , Several fields related to message fragmentation are :DF(Don’t Fragmentate) position 、MF position ,Fragment Offset、Length.DF and MF Just as mentioned earlier 3 Bits identify the second and third bits ,Fragment Offset Namely “13 Bit slice offset ” Field ,Length Namely “16 Total length of bit message ” Field . If the values of the above fields are inconsistent , And the equipment is not handled properly , It will have a certain impact on the equipment , Even paralysis .Ip-fragment It is deliberately creating such contradictory messages on the existing fields to attack .
for example :
a). DF Bit is set ( Indicate that the message is not fragmented ), and MF Bits are set at the same time or Fragment Offset Not for 0( It means fragment message );
b). DF Position as 0( It is marked as fragment message ), and Fragment Offset + Length > 65535( Undivided ) ;
These may cause the system to crash , The defense method is the same as Teardrop equally , It is to check the message , Discard illegal messages .
The problem of fragmentation
1、 The performance cost of fragmentation
Fragmentation and reassembly consume the sender 、 I'm sure CPU And so on , If there are a large number of fragmentation messages , It may cause serious resource consumption ;
Fragmentation consumes more memory resources for the receiver , Because the receiver needs to allocate memory space for each fragment message received , In order to complete the reorganization after the last fragment message arrives .
2、 Retransmission problem caused by packet loss of fragmentation
If a fragment message is lost during network transmission , Then the recipient will not be able to complete the reorganization , If the application process requires retransmission , The sender must retransmit all the fragment messages instead of the discarded fragment message , This inefficient retransmission behavior will bring additional consumption to the end system and network resources .
3、 Fragment attack
Fragment messages constructed by hackers , But the last fragment message is not sent to the receiver , This causes the receiver to allocate memory space for all fragmentation messages , But because the last fragment message will never reach , The memory of the receiver is not released in time ( The receiver will start a timer for fragment reorganization , If the reorganization cannot be completed within a certain period of time , Will send... To the sender ICMP Reorganize the timeout error message ), As long as there are enough pieces of packets sent in this attack 、 Fast enough , It's easy to fill the receiver's memory , Let the receiver process normal business without memory resources , So as to achieve DOS The attack effect of .
4、 Safe hidden trouble
Because only the first fragment has four layers of information, while the other fragments do not , This gives the router 、 Firewall and other intermediate devices bring trouble in matching access control policies .
If router 、 Intermediate devices such as firewalls do not perform matching detection of security policies for partitioned messages and release them directly IP Fragmentation message , It may bring security risks and threats to the receiving party , Because hackers can take advantage of this feature , Bypass the router 、 The firewall's security policy check attacks the recipient ;
If router 、 After the firewall and other intermediate devices reorganize these pieces of packets, they match their security policies , Then it will bring great consumption to the resources of these intermediate devices , Especially when it comes to fragmentation , These intermediate devices will consume all their memory resources in the first time , This will lead to the serious consequences of the whole network interruption .
Then what can we do to prevent Ip-fragment Attack ?
1、 For packet filtering devices or intrusion detection systems , First, allow by judging the destination port number / Prohibitions . However, due to malicious sharding, the destination port number is located in the second shard , Therefore, the packet filtering device judges the first partition , Decide whether the subsequent partition is allowed to pass . But these fragments will form various attacks after reorganization on the target host . This method can bypass some intrusion detection systems and some security filtering systems .
2、 Using extensions ACL prevent IP Fragment attack , The order is as follows :
access-list 101 permit/deny < agreement > < Source > < Purpose > fragment ' Add a after the command fragment That's it . Special note , With four layers of information ACL And belt Fragment Of ACL Combined with the effect will be better
3、 Improve the technical level of enterprise security administrators , Effectively ensure timely discovery IP Fragment attack , Stop in time
边栏推荐
- Deploy zabbix-agaent2 and verify
- Sed command of text three swordsman -- text replacement; Grep command - text filtering
- Gnome 安装扩展插件(40.1版本,opensuse tumbleweed)。
- Xiaodi network security - Notes (2)
- Recursive access to directories, print Fibonacci sequences, high-order functions
- 闭包与装饰器
- 103.53.124.X IP段BGP线路和普通的专线有什么区别
- mysql的复习总结
- Steam游戏服务器配置选择 IP
- 快速掌握sort命令,tr命令
猜你喜欢

Performance evaluation and comparison of Huawei cloud Kunpeng arm ECs and x86 ECS

PyTorch学习日记(四)

Xiaodi network security - Notes (5)

Commande awk du troisième épéiste - - interception

【自动化测试】——robotframework实战(一)搭建环境

SYN洪水攻击的原理,syn洪水攻击的解决办法

m基于Simulink的高速跳频通信系统抗干扰性能分析

论文阅读:Deep Residual Shrinkage Networksfor Fault Diagnosis

ssh远程登录服务

银河麒麟桌面操作系统V10SP1(X86)安装SQL Developer
随机推荐
类与super、继承
华为云 鲲鹏ARM云服务器 和 x86云服务器 性能评测对比
Personal information management system
Mingming loves drinking water
明明爱喝水
STEAM游戏高主频i9-12900k 搭建CS:GO服务器
FreeBSD 12 国内源提速 pkg 和 ports 做个笔记
论文阅读:Deep Residual Learning in Spiking Neural Networks
How to set primary key self growth in PostgreSQL database
Maomao goes to work (recursive)
Solve the problem that the unit test coverage of sonar will be 0
破译密码(综合)
Manual string comparison (pointer question)
企业或个人域名备案怎么弄
剑指Offer刷题记录——Offer 06.从尾到头打印链表
Homework
递归访问目录,打印斐波那契数列,高阶函数
FreeBSD 12 domestic source speed up PKG and ports take a note
毛毛上班(递推)
快速理解重定向