RFC 3514: New Bit Defined for IPv4 Headers 270
RFC 3514
was just released, with a new bit definition for use in the headers of IP packets. Because there are important security implications, anyone coding internet services (on either the client or server end) should probably take a look.
It's about time! (Score:5, Funny)
What would script-kiddy see in l337? (Score:2, Funny)
I can see it now. (Score:5, Funny)
sex or war (Score:5, Funny)
I propose that instead anything coming from or going to a
*note: Larry Flint. Watch the movie.
**I hereforth trademark this name.
come again? (Score:2)
ttyl
Farrell
Re:I can see it now. (Score:2)
Ah, doesn't matter anyways, most of my users try to set their bit to 2..
Re:I can see it now. (Score:3, Insightful)
Ok, I'll take the liberty to be off-topic.. Mod me down.
I have friends in the military around the world. I'm sure as hell not going to be the one to throw rotten fruit at them, or call them baby killers when they come home. Ask any Vietnam vet how that feels.
Our military aren't under orders to shoot anything that moves.. They're given legitimate military targets.. Our soldiers always have the option of not shooting, if it doesn't seem like a valid target. They don't waste bullets shooting
Re:I can see it now. (Score:3, Interesting)
Like British tanks [bbc.co.uk] and buses full of unarmed women and children [bbc.co.uk].
Re:I can see it now. (Score:3, Interesting)
The van drove up to the checkpoint. But rather than stopping or even slowing down, it continued at full speed through the checkpoint.
If I was guarding a checkpoint, to make sure no one's driving a car bomb through, and they did the same manuver, I'd fire too.
That's the easiest way to get a bomb through a checkpoint. Drive. Don't stop.
Bin Laden did the same thing, except with airplanes full of
you are 2 hours early... (Score:4, Funny)
Darn! You have already thwarted my evil plans yet again.
Re:you are 2 hours early... (Score:2, Funny)
Re:you are 2 hours early... (Score:5, Insightful)
Re:you are 2 hours early... (Score:2)
Re:you are 2 hours early... (Score:3, Funny)
In other news.... (Score:5, Funny)
Linus has joined redhat.
Slackware is closing down.
Linux now runs on single entangled electrons at MIT
etc etc etc
Re:In other news.... (Score:5, Funny)
...BSD is not dying.
Re:In other news.... (Score:3, Funny)
Linux Kernel 2.6 to include DRM
Slashdot becomes an MSN Featured Site
IBM unveils first 1.0 exabyte ATAPI hard drive
RIAA successfully lobbies for $1 tax on every MP3 file on the net
Re:In other news.... (Score:2, Funny)
Don't give him any ideas.
Linux Kernel 2.6 to include DRM
[tinfoil hat] .
The way things are going, there might not be much choice. . .
[/tinfoil hat]
Slashdot becomes an MSN Featured Site
With all the MS ads, you mean it isn't already?
IBM unveils first 1.0 exabyte ATAPI hard drive
IBM is out of the hard drive business, you should read /. more often. :)
RIAA successfully lobbies for $1 tax on every MP3 file on the net
I am sure they are working
Re:In other news.... (Score:3, Funny)
Re:In other news.... (Score:3, Funny)
two hours early, and already slashdotted (Score:2)
...and so it begins (Score:5, Funny)
I love April fool's day.
Perl programmers may want to check out their beloved cpan.org [cpan.org] site today, too. :-)
Nasty! (Score:2)
Re:Nasty! (Score:5, Informative)
No link necessary. Matt's Script archive is well-known among Perl programmers as one of the densest collections of hole-ridden crappy code on the net.
There's even a project [sourceforge.net] to write secure, well-written clones of his scripts so the poor bastards stuck with his can drop-in something that won't allow remote exploits on their machine. :-)
Re:Nasty! (Score:2)
And the author is *very* defensive about it. I'm surprised he went along with the gag.
Re:...and so it begins (Score:2)
Apparently AOL/TW have gotten a lot more agressive at cracking down on TOS violations.
Re:...and so it begins (Score:2)
A couple of mirrors (Score:5, Informative)
Mirror 2 [shat.net]
To lighten the load.
Re:A couple of mirrors (Score:2)
Patch for Cisco IOS needed (Score:5, Funny)
It'll be the Router Admin Full Employment Act of 2003!
Whoops! Should have read the RFC (Score:2)
I think I will set it for the IIS servers anyway. I can remove it the day Microsoft stops adding sabotage code to their products.
Anyone care to place a bet? I need the URL of those 'Betting Pool' web sites. This one will need to run until at least the year 2050....
Chomping at the bit (Score:5, Funny)
First evil comment (Score:2)
Re:First evil comment (Score:4, Funny)
My favorite quote of the RFC is:
" This document defines the behavior of security elements for the 0x0
and 0x1 values of this bit. Behavior for other values of the bit may
be defined only by IETF consensus [RFC2434]."
Yes it's a joke (Score:2)
[In case you don't wanna bother or it's Slashdotted, it's about designating bits "evil" or not. Not that funny IMO, compared to some other good RFCs [google.com].]
Last 4/1 the editors posted about 15 of these in a row. Moderators got punchy and the whole place went to... well... be prepared.
Re:Yes it's a joke (Score:2, Interesting)
Take it just a little bit serious and you say to yourself 'Wait a minute, this isn't that funny. People really do believe a consensus-based network will scale well worldwide....'
ROFL (Score:2)
ARggghhhhhh
Re:ROFL (Score:4, Funny)
Re:ROFL (Score:3, Informative)
Actually, "today" (1 April) is also the 13th anniversary of RFC1149.
Check out its majesty: ftp://ftp.rfc-editor.org/in-notes/rfc1149.txt [rfc-editor.org]
People were so much more creative back in 1990. ;-)
Re:ROFL (Score:2)
You can squeak an extra bit out of the eyebrow polarization for this purpose.
Re:ROFL (Score:3, Funny)
100% Correct Spam Filters Now Possible (Score:4, Funny)
Re:100% Correct Spam Filters Now Possible (Score:3, Insightful)
Content-Type: application/evil
Re:100% Correct Spam Filters Now Possible (Score:2)
The X-Evil header was implemented under RFC666. The first widely used email client to make use of the header was Outlook 2002, while the first MTA to do so was Exchange 2000.
Timing problem (Score:3, Funny)
Must remember (Score:4, Funny)
Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.
Note to self: Remember to set "evil" bit to 1 when launching world domination attempt.
Re:Must remember (Score:3, Funny)
Which makes me think: Will the cable company terminate my account if I forget to set the evil bit when I am DDoSing someone, as a TOS violation?
What are we going to do tonight, Brain? (Score:2)
Why computers crash, by Dr. Seuss (Score:5, Funny)
If your cursor finds a menu item followed by a dash, and the double-clicking icon puts your Window in the trash, and your data is corrupted 'cause the index doesn't hash, then your situation's hopeless and your system's gonna crash!!
If the label on the cable on the table at your house says the network is connected to the button on your mouse, but your packets want to tunnel to another protocol that's repeatedly rejected by the printer down the hall, and your screen is all distorted by the side effects of gauss, so your icons in the window are as wavy as a souse; then you may as well reboot and go out with a bang, 'cuz sure as I'm a poet, the sucker's gonna hang!
When the copy of your floppy's getting sloppy in the disk, and the macro code instructions cause unnecessary risk, then you'll have to flash the memory and you'll want to RAM your ROM. Quick, turn off the computer and be sure to tell your Mom!
Blatently pinched from - Twisted Monkey Entertainment [twistedmonkey.org]
_________________
Cheap Web Site Hosting [cheap-web-...ing.com.au] - recommended by some worker posting on slashdot!
Re:Why computers crash, by Dr. Seuss (Score:4, Informative)
http://people.cornell.edu/pages/elz1/clocktower/D
The whole thing was created by Gene Ziegler. He gives a pretty good history of the poem as well as the full thing, which most people don't post.
Don't forget RFC3251 as well (Score:3, Interesting)
The 128-bit strength indicator levels! (Score:4, Funny)
Therefore I, on behalf of the United Corp^H^H^H^H^H States government, submit that the top values should be reserved for the following:
2^127-n
4: Unpatriotic activity.
3: Terrorism. For up to date definition, see www.dhs.gov
2: Attempt to secure personal communication by encryption
1: Circumvention of copy protection mechanisms for purposes of piracy
0: Circumvention of copy protection mechanisms for purposes of "fair use"
Note that the last bit is reserved to indicate whether the packet originates from a foreign country.
Here's the info... (Score:2)
I have security. (Score:4, Funny)
The fine print: Aforementioned crimes are only illegal in Afghanistan and include, but are limited to, allowing women to walk around without being entirely concealed under a table cloth, teaching children how to read and write, and singing nursery rhymes.
HTTP link (Score:2, Funny)
Also note that it's actually based on the ideas initially developed by HTCPCP [ietf.org] protocol, which just turned 5 years.
A potential hole... (Score:4, Funny)
The inherent subtlety of this attack is revealed by considering what happens when a security expert attempts to analyze the attack. As soon as he recognizes the evil nature of the attacker, the packets appear to have the 'evil' bit set, and his firewalls start dropping the packets, depriving him of further packets for analysis. The attack is thus even more precisely targeted towards the naive than an attack on Microsoft IIS.
Evil (Score:3, Funny)
Should I start opening the April Fools Day gifts?
Serious question: Will this bit work over Carrier Pigeon?
And one other thought, will Windows2003Server recognize it? Oh...they'll have to release the Service Pack because anything set to 0 won't get through because of a buffer overflow extension illegal operation segfault doo-hickey.
Any other cliches missed?
Re:Evil (Score:3, Funny)
Usually, it can be detected for by a specially-designed packet sniffer: a freshly-washed car right beneath the carrier pigeons' flight path.
I think a much more pressing ssue would be making carrier pigeons compatable with IPv6. Perhaps if there were two pigeons, and they carried the packet on a string held between them.....
Re:Evil (Score:2)
Oh geez... (Score:5, Funny)
I liked this bit (emphasis mine):
Re:Oh geez... (Score:2)
Many [broken] routers and firewalls drop packets with reserved bit(s) set in various header fields of TCP and IP. This is one of the reasons Explicit Congestion Notification (see RFC 3168 [isi.edu]) has problems behind certain devices [gtf.org]. Sin
Re:Oh geez... (Score:2)
Re:Oh geez... (Score:2)
The bit field is laid out as follows:
0
+-+
|E|
+-+
I laughed out loud on that one. Reminds me of those books Mr. Bunny's Guide to ActiveX and Mr. Bunnies Big Cup 'o Java
Screenshots will be provided for developers trying to follow along but don't have monitors
Re:Oh geez... (Score:2)
My Favorite (Score:2)
Can someone clarify this? (Score:2)
My head spins along with this bit. Can someone please clear this up? Is it a bit intended only for quantum computers?
Re:Oh geez... (Score:2)
I hate to admit, I remember reading that paragraph, but didn't catch that
If only real life was as simple (Score:2, Funny)
"Sally, cross your legs! His bit is set to 'evil'!"
On second thought...
zerg (Score:2)
This will never work (Score:4, Funny)
Let's say there's a so-called "cyberterrorist attack" against Windows-architecture systems. Why should Unix-architecture systems treat that "attack" as evil, even if the "evil bit" is set? If it doesn't harm the Unix system, then it must be the equivalent of valid data.
What we really need is more social justice and handouts to resource-needy systems, like those with Windows-architecture. More handshakes wouldn't be bad, either. Thus, we are forced to answer the question: why do they hate us? It is because we are secure, and they are not.
An evil bit is discriminatory. Just because they're evil, is that sufficient justification for sending it to /dev/null? Have a heart, people. Have a heart. Just remember that every evil bit has a parent bit. Allowing "bit profiling" to pervade our systems will mean that the evildoers will have already one.
Re:This will never work (Score:2)
Sounds like the beginning of another r.g.f.d alignment flamefest...
Re:This will never work (Score:2)
What a day! (Score:5, Funny)
10.5.4.1 503.1 Slashdotted
The server is currently unable to handle the request due to a fucking slashdotting of the server. Visit slashdot.org for potential mirrors.
April 1st RFCs are always the most important... (Score:5, Informative)
Potentially devastating Y10k problem [rfc-editor.org]
Lifesaving method to temporarily reroute ip in cause of equipment failure [rfc-editor.org]
Protocol to guarantee software engineer productivity and efficiency [rfc-editor.org]
Addressing ipv6 with incredible bandwidth savings [rfc-editor.org]
Planning ahead to Star Trek technology with current protocols and infrastructure [rfc-editor.org]
I don't even know what this one is about... [rfc-editor.org]
And many, many more. Any self-respecting network engineer should be especially familiar with all April 1st RFCs, in my opinion...
Hey, I recognize this security scheme! (Score:3, Funny)
Our IT group must have contributed to this RFC! Now I know exactly what to think of it...
Perspiring minds want to know.... (Score:5, Funny)
Re:Perspiring minds want to know.... (Score:3, Funny)
If we lobby hard enough (Score:3, Funny)
Office fun. (Score:2)
I'm not evil, I swear! (Score:2, Funny)
have we forgotten that evil people often masquerade in sheep's clothing????
stupid!
joshua
no comment (Score:2)
Attacking systems MUST set the "evil" bit. Secure systems MUST drop the packets, insecure systems MAY chose their action -- drop, crash, give in.
Basically, this system, you give implicit trust to the remote system on the end of the communications, and let that system determine the security your own network will take in response to the communications.
Let one
By testing the flag... (Score:2)
Previous April 1 RFCs (Score:4, Informative)
Back to the RFCs: the list above doesn't seem exhaustive. I found some more: 12 networking truths RFC [ibiblio.org], telnet randomly lose option [ibiblio.org] and Hyper Text Coffee Pot Control Protocol [ibiblio.org]
Here's yer problem... (Score:3, Funny)
It isn't April 1st yet (Score:3, Insightful)
another joke you probably missed in this (Score:3, Funny)
Full text, ftp server slashdotted (Score:3, Informative)
Request for Comments: 3514 AT&T Labs Research
Category: Informational 1 April 2003
The Security Flag in the IPv4 Header
Status of this Memo
This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2003). All Rights Reserved.
Abstract
Firewalls, packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. We define a security flag in the IPv4 header as a means of distinguishing the two cases.
1. Introduction
Firewalls CBR03 , packet filters, intrusion detection systems, and the like often have difficulty distinguishing between packets that have malicious intent and those that are merely unusual. The problem is that making such determinations is hard. To solve this problem, we define a security flag, known as the "evil" bit, in the IPv4 RFC791 header. Benign packets have this bit set to 0; those that are used for an attack will have the bit set to 1.
1.1. Terminology
The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this document, are to be interpreted as described in RFC2119
2. Syntax
The high-order bit of the IP fragment offset field is the only unused bit in the IP header. Accordingly, the selection of the bit position is not left to IANA.
The bit field is laid out as follows:
0
+-+
|E|
+-+
Currently-assigned values are defined as follows:
0x0 If the bit is set to 0, the packet has no evil intent. Hosts, network elements, etc., SHOULD assume that the packet is harmless, and SHOULD NOT take any defensive measures. (We note
that this part of the spec is already implemented by many common desktop operating systems.)
0x1 If the bit is set to 1, the packet has evil intent. Secure systems SHOULD try to defend themselves against such packets. Insecure systems MAY chose to crash, be penetrated, etc.
3. Setting the Evil Bit
There are a number of ways in which the evil bit may be set. Attack applications may use a suitable API to request that it be set. Systems that do not have other mechanisms MUST provide such an API; attack programs MUST use it.
Multi-level insecure operating systems may have special levels for attack programs; the evil bit MUST be set by default on packets emanating from programs running at such levels. However, the system MAY provide an API to allow it to be cleared for non-malicious activity by users who normally engage in attack behavior.
Fragments that by themselves are dangerous MUST have the evil bit set. If a packet with the evil bit set is fragmented by an intermediate router and the fragments themselves are not dangerous, the evil bit MUST be cleared in the fragments, and MUST be turned back on in the reassembled packet.
Intermediate systems are sometimes used to launder attack connections. Packets to such systems that are intended to be relayed to a target SHOULD have the evil bit set.
Some applications hand-craft their own packets. If these packets are part of an attack, the application MUST set the evil bit by itself.
In networks protected by firewalls, it is axiomatic that all attackers are on the outside of the firewall. Therefore, hosts inside the firewall MUST NOT set the evil bit on any packets.
Because NAT RFC3022 boxes modify packets, they SHOULD set the evil bit on such packets. "Transparent" http and email proxies SHOULD set the evil bit on their reply packets to the innocent client host.
Some hosts scan other hosts in a fashion that can alert intrusion detection systems. If the scanning is part of a be
Hehehehhe (Score:2)
Trust me, this program is not malicious.
Re:4/1/03 (Score:5, Insightful)
Thanks for the reminder.
I am sitting here, reading the article before the replys here (yes, some of us really do before we post
I mean, the whole protocol thing is over my head, but I read anyway to maybe learn something. It took about 3 minutes of head scratching before I really looked at the url, return here suspicious and decide that I had been had.
I am betting 1% of the readers come back and think the new protocol is a good thing before realizing its a hoax
Re:4/1/03 (Score:3, Insightful)
I'd also put down that about 80% of
Re:4/1/03 (Score:5, Funny)
Well, ya they are predictable, they come every April 1....:)
Perhaps if they just did a few random hoaxes a year, at different times, it would be a little more fun. As it is, its kind of like acting suprised when you get socks for christmas. And just as gratifying.
Re:4/1/03 (Score:2)
Re:4/1/03 (Score:2)
I'm not being a spoilsport, but after a few years April Fools Day jokes start to seem a little formulaic and predictable.
Taht's just because nobody around here has any imagination, otherwise April Fools would be a great day. Just think, my wife's going in for her ultrasound today. Do you really think the Doctor's gonna tell her the truth about the baby's sex? I don't.... at least, not if I were the Doctor.
Doc: Looks like you're having a girl.
Wife: But what's that pointy thing?
Doc: It's her, uh,
Re:4/1/03 (Score:2)
Took me about 2 paragraphs before I finally did conclude it *was* an april fools joke.
Re:4/1/03 (Score:2)
Course the thing is, they could come back here, post a reply thinking this was for real, then we'd all laugh at them, and they could just as easily turn around and say "Ha ha, had you going!" to get out of looking like a fool.
Re:4/1/03 (Score:2)
I'm betting I'll have no less than 4 Emails by noon asking how soon we cam implement it..
Re:4/1/03 (Score:2)
Also known as the one day a year I avoid
Just notice it's also Troll Tuesday... (Score:2)
Re:4/1/03 (Score:2)
> Posted by jamie on Monday March 31, @09:25PM
Perhaps they failed that all-to-important question when installing RedHat that asked, "Is your clock set to GMT or local time?"
Re:So 2003/04/01 starts in GMT? (Score:2)
Technically, you are wrong. It IS uscentric. Quoting directly from the FAQ [slashdot.org]...
Slashdot is U.S.-centric. We readily admit this, and really don't see it as a problem. Slashdot is run by Americans, after all, and the vast majority of our readership is in the U.S. We're certainly not opposed to doing more international stories, but we don't have any formal plans for making that happen. All we can really tell you is that if you're outside the U.S. and you have news,