TUCoPS :: Network Appliances :: ascend3.htm

Ascend MAX predictable sequence numbers
Vulnerability

    ISN generation

Affected

    Ascend MAX

Description

    For those that  don't know, the  MAX is Ascend's  most popular WAN
    dialup server that is widely used among mid-sized ISPs.  It is not
    my idea to put stuff about SN on these pages, but what Marc Slemko
    found is really out of mind.

    Marc  decided  to  take  a  look  at  the  ISN  (sequence  number)
    generation on the MAX.  And results were surprise:

        time      isn        difference
        ========= ========== ==========
        17.979213 1024896036
        19.928152 1025024036 128000
        21.848087 1025152036 128000
        23.648915 1025280036 128000
        25.221257 1025408036 128000
        26.750434 1025536036 128000
        28.230257 1025664036 128000
        29.692895 1025792036 128000
        31.172050 1025920036 128000
        32.534981 1026048036 128000
        33.955213 1026176036 128000
        35.424979 1026304036 128000
        36.856233 1026432036 128000
        38.295180 1026560036 128000

    That is  pathetic.   In certain  limited situations,  this renders
    packet filtering useless WRT connections to the MAX itself.  While
    it presents no  risk to traffic  passing through the  MAX, it does
    potentially expose connections to (and actually, also  connections
    being made from) the MAX.

    Note that this violates section 4.2.2.9 of RFC-1122 in addition to
    simply being  a stupid  thing to  do from  a security  standpoint.
    There must be half a dozen freely available examples of how to  do
    this  in  a  TCP  stack.   The  method  suggested  in  RFC-793  is
    inadequate for obvious  reasons, but even  it is 100  times better
    than this.

Solution

    Write to Ascend and ask them  for health.  In meantime, use  other
    dialup server.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH