| .oO Phrack Magazine Oo. | |
| Volume Seven, Issue Forty-Nine | |
| File 06 of 16 | |
| [ Project Loki ] | |
| whitepaper by daemon9 AKA route | |
| sourcecode by daemon9 && alhambra | |
| for Phrack Magazine | |
| August 1996 Guild Productions, kid | |
| comments to route@infonexus.com/alhambra@infonexus.com | |
| --[ Introduction ]-- | |
| Ping traffic is ubiquitous to almost every TCP/IP based network and | |
| subnetwork. It has a standard packet format recognized by every IP-speaking | |
| router and is used universally for network management, testing, and | |
| measurement. As such, many firewalls and networks consider ping traffic | |
| to be benign and will allow it to pass through, unmolested. This project | |
| explores why that practice can be insecure. Ignoring the obvious threat of | |
| the done-to-death denial of service attack, use of ping traffic can open up | |
| covert channels through the networks in which it is allowed. | |
| Loki, Norse God of deceit and trickery, the 'Lord of Misrule' was | |
| well known for his subversive behavior. Inversion and reversal of all sorts | |
| was typical for him. Due to it's clandestine nature, we chose to name this | |
| project after him. | |
| The Loki Project consists of a whitepaper covering this covert channel | |
| in detail. The sourcecode is not for distribution at this time. | |
| --[ Overview ]-- | |
| This whitepaper is intended as a complete description of the covert | |
| channel that exists in networks that allow ping traffic (hereon referred to | |
| in the more general sense of ICMP_ECHO traffic --see below) to pass. It is | |
| organized into sections: | |
| Section I. ICMP Background Info and the Ping Program | |
| Section II. Basic Firewall Theory and Covert Channels | |
| Section III. The Loki Premise | |
| Section IV. Discussion, Detection, and Prevention | |
| Section V. References | |
| (Note that readers unfamiliar with the TCP/IP protocol suite may wish to first | |
| read ftp://ftp.infonexus.com/pub/Philes/NetTech/TCP-IP/tcipIp.intro.txt.gz) | |
| Section I. ICMP Background Info and the Ping Program | |
| The Internet Control Message Protocol is an adjunct to the IP layer. | |
| It is a connectionless protocol used to convey error messages and other | |
| information to unicast addresses. ICMP packets are encapsulated inside of IP | |
| datagrams. The first 4-bytes of the header are same for every ICMP message, | |
| with the remainder of the header differing for different ICMP message types. | |
| There are 15 different types of ICMP messages. | |
| The ICMP types we are concerned with are type 0x0 and type 0x8. | |
| ICMP type 0x0 specifies an ICMP_ECHOREPLY (the response) and type | |
| 0x8 indicates an ICMP_ECHO (the query). The normal course of action is | |
| for a type 0x8 to elicit a type 0x0 response from a listening server. | |
| (Normally, this server is actually the OS kernel of the target host. Most | |
| ICMP traffic is, by default, handled by the kernel). This is what the ping | |
| program does. | |
| Ping sends one or more ICMP_ECHO packets to a host. The purpose | |
| may just be to determine if a host is in fact alive (reachable). ICMP_ECHO | |
| packets also have the option to include a data section. This data section | |
| is used when the record route option is specified, or, the more common case, | |
| (usually the default) to store timing information to determine round-trip | |
| times. (See the ping(8) man page for more information on these topics). | |
| An excerpt from the ping man page: | |
| "...An IP header without options is 20 bytes. An ICMP ECHO_REQUEST packet | |
| contains an additional 8 bytes worth of ICMP header followed by an | |
| arbitrary-amount of data. When a packetsize is given, this indicated the | |
| size of this extra piece of data (the default is 56). Thus the amount of | |
| data received inside of an IP packet of type ICMP ECHO_REPLY will always | |
| be 8 bytes more than the requested data space (the ICMP header)..." | |
| Although the payload is often timing information, there is no check by | |
| any device as to the content of the data. So, as it turns out, this amount of | |
| data can also be arbitrary in content as well. Therein lies the covert | |
| channel. | |
| Section II. Basic Firewall Theory and Covert Channels | |
| The basic tenet of firewall theory is simple: To shield one network | |
| from another. This can be clarified further into 3 provisional rules: | |
| 1. All traffic passing between the two networks must pass through the firewall. | |
| 2. Only traffic authorized by the firewall may pass through (as dictated by | |
| the security policy of the site it protects). | |
| 3. The firewall itself is immune to compromise. | |
| A covert channel is a vessel in which information can pass, but this | |
| vessel is not ordinarily used for information exchange. Therefore, as a | |
| matter of consequence, covert channels are impossible to detect and deter | |
| using a system's normal (read: unmodified) security policy. In theory, | |
| almost any process or bit of data can be a covert channel. In practice, it | |
| is usually quite difficult to elicit meaningful data from most covert | |
| channels in a timely fashion. In the case of Loki, however, it is quite | |
| simple to exploit. | |
| A firewall, in it's most basic sense, seeks to preserve the security | |
| policy of the site it protects. It does so by enforcing the 3 rules above. | |
| Covert channels, however, by very definition, are not subject to a site's | |
| normal security policy. | |
| Section III. The Loki Premise | |
| The concept of the Loki Project is simple: arbitrary information | |
| tunneling in the data portion of ICMP_ECHO and ICMP_ECHOREPLY packets. Loki | |
| exploits the covert channel that exists inside of ICMP_ECHO traffic. This | |
| channel exists because network devices do not filter the contents of ICMP_ECHO | |
| traffic. They simply pass them, drop them, or return them. The trojan packets | |
| themselves are masqueraded as common ICMP_ECHO traffic. We can encapsulate | |
| (tunnel) any information we want. From here on out, Loki traffic will refer | |
| to ICMP_ECHO traffic that tunnels information. (Astute readers will note that | |
| Loki is simply a form of steganography). | |
| Loki is not a compromise tool. It has many uses, none of which are | |
| breaking into a machine. It can be used as a backdoor into a system by | |
| providing a covert method of getting commands executed on a target machine. | |
| It can be used as a way of clandestinely leeching information off of a | |
| machine. It can be used as a covert method of user-machine or user-user | |
| communication. In essence the channel is simply a way to secretly shuffle | |
| data (confidentiality and authenticity can be added by way of cryptography). | |
| Loki is touted as a firewall subversion technique, but in reality it | |
| is simple a vessel to covertly move data. *Through* exactly what we move this | |
| data is not so much an issue, as long as it passes ICMP_ECHO traffic. It does | |
| not matter: routers, firewalls, packet-filters, dual-homed hosts, etc... all | |
| can serve as conduits for Loki. | |
| Section IV. Discussion, Detection and Prevention | |
| If ICMP_ECHO traffic is allowed, then this channel exists. If this | |
| channel exists, then it is unbeatable for a backdoor (once the system is | |
| compromised). Even with extensive firewalling and packet-filtering | |
| mechanisms in place, this channel continues to exist (provided, of course, | |
| they do not deny the passing of ICMP_ECHO traffic). With a proper | |
| implementation, the channel can go completely undetected for the duration of | |
| its existence. | |
| Detection can be difficult. If you know what to look for, you may | |
| find that the channel is being used on your system. However, knowing when | |
| to look, where to look, and the mere fact that you *should* be looking all | |
| have to be in place. A surplus of ICMP_ECHOREPLY packets with a garbled | |
| payload can be ready indication the channel is in use. The standalone Loki | |
| server program can also be a dead give-away. However, if the attacker can | |
| keep traffic on the channel down to a minimum, and was to hide the Loki | |
| server *inside* the kernel, detection suddenly becomes much more difficult. | |
| Disruption of this channel is simply preventative. Disallow ICMP_ECHO | |
| traffic entirely. ICMP_ECHO traffic, when weighed against the security | |
| liabilities it imposes, is simply not *that* necessary. Restricting ICMP_ECHO | |
| traffic to be accepted from trusted hosts only is ludicrous with a | |
| connectionless protocol such as ICMP. Forged traffic can still reach the | |
| target host. The LOKI packet with a forged source IP address will arrive at | |
| the target (and will elicit a legitimate ICMP_ECHOREPLY, which will | |
| travel to the spoofed host, and will be subsequently dropped silently) and | |
| can contain the 4-byte IP address of the desired target of the Loki response | |
| packets, as well as 51-bytes of malevolent data... While the possibility | |
| exists for a smart packet filter to check the payload field and ensure that | |
| it *only* contains legal information, such a filter for ICMP is not in wide | |
| usage, and could still be open to fooling. The only sure way to destroy this | |
| channel is to deny ALL ICMP_ECHO traffic into your network. | |
| NOTE: This channel exists in many other protocols. Loki Simply covers | |
| ICMP, but in theory (and practice) any protocol is vulnerable to covert | |
| data tunneling. All that is required is the ingenuity... | |
| Section V. References | |
| Books: TCP Illustrated vols. I, II, III | |
| RFCs: rfc 792 | |
| Source: Loki v1.0 | |
| Ppl: We did not pioneer this concept To our knowledge, | |
| it was discovered independently of our efforts, prior to our | |
| research. This party wishes to remain aloof. | |
| This project made possible by a grant from the Guild Corporation. | |
| EOF | |