'It can be done easily by anyone in the world,' one researcher says Credit: Terry Goss A flaw in the Transmission Control Protocol (TCP) used by Linux since late 2012 poses a serious threat to internet users, whether or not they use Linux directly. That’s the key finding of a research study that’s scheduled to be presented Wednesday at the USENIX Security Symposium in Austin, Texas. The TCP weakness, identified by researchers from the University of California at Riverside, enables attackers to hijack users’ internet communications completely remotely. It could be used to launch targeted attacks that track users’ online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee of anonymity networks such as Tor, the researchers said. Because Linux runs behind the scenes on countless internet servers, Android phones and a range of other devices, a broad swath of users may be affected. Linux and other operating systems use TCP to package and send data being transferred from one place to another. When two people communicate by email, for example, TCP assembles each message into a series of data packets that are transmitted, received, and then reassembled into the original message. Those packets are identified by unique sequence numbers that could be handy for attackers, but typically there are too many possibilities to make those numbers guessable. That’s under ordinary circumstances. The subtle flaw the researchers found uses something called “side channels” in the Linux software to make it possible for attackers to infer the TCP sequence numbers associated with a particular connection by using no more information than the IP addresses of the communicating parties. So, given any two arbitrary machines on the internet, a remote blind attacker can track users’ online activity, terminate connections with others and inject false material into their communications. Even encrypted HTTPS connections — which are immune to data injection — could be forcibly terminated. Attackers could also undermine anonymity networks like Tor by forcing connections to route through certain relays. The attack is fast and reliable, often taking less than a minute and succeeding about 90 percent of the time, the researchers said. The video below explains it in more detail. “The unique aspect of the attack we demonstrated is the very low requirement to be able to carry it out,” said Zhiyun Qian, an assistant professor of computer science at UCR. “Essentially, it can be done easily by anyone in the world where an attack machine is in a network that allows IP spoofing. The only piece of information that is needed is the pair of IP addresses for victim client and server, which is fairly easy to obtain.” Qian’s team has alerted the Linux community to the vulnerability, and the next version of Linux is already patched. In the meantime, Qian recommends a temporary patch for both client and server hosts. It’s outlined in an announcement on the UCR site. The researchers’ full paper is also available online. “A side-channel attack capable of predicting TCP sequence numbers is a pretty serious problem,” said Craig Young, security researcher for Tripwire, via email. One potential result is to allow attackers to launch the kind of TCP hijacking attacks that were so prominent in the 1990s hacking scene, Young said. Kevin Mitnick rose to fame during that era for performing what’s known as session hijacking by exploiting TCP’s vulnerabilities at the time. “Back then the problem was that many computers would generate initial sequence values from the clock, thereby greatly reducing the number of guesses needed to take control of a remote session,” Young said. Related content analysis Kyndryl bolsters its Bridge infrastructure services Kyndryl is using AI to expand its integration services for on-premise and cloud environments, adding to its range of security, mainframe modernization, and AI-readiness services. By Michael Cooney May 14, 2024 7 mins Cloud Computing Networking how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux news High-bandwidth memory nearly sold out until 2026 While it might be tempting to blame Nvidia for the shortage of HBM, it’s not alone in driving high-performance computing and demand for the memory HPC requires. By Andy Patrizio May 13, 2024 3 mins CPUs and Processors High-Performance Computing Data Center opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe