Feeds

Multipath TCP speeds up the internet so much that security breaks

Black Hat research says proposed protocol will bork network probes, flummox firewalls

Internet Security Threat Report 2014

The burgeoning Multipath TCP (MPTCP) standard promises to speed up the internet but will also break security solutions including intrusion detection and data leak prevention, says security researcher Catherine Pearce.

MPTCP technology is an update to the core communications backbone of the internet that will allow the Transmission Control Protocol to use multiple paths and network providers to improve speed, redundancy and resource utilisation.

As El Reg hack Richard Chirgwin detailed last October, MPTCP was already used by Apple's Siri for iOS but would not be more widely deployed in mobiles anytime soon because it broke current network designs, could lead to expensive data bills and may be torpedoed by carriers worried that firing more user data over wifi could starve bottom lines.

Now together with fellow Neohapsis security pro Patrick Thomas (@coffeetocode), Pearce (@secvalve) has found the technology would break current security systems.

"I can use MPTCP to break your intrusion detection system, data loss prevention, and many application-layer security devices today," Pearce wrote in a preview of the duo's Black Hat talk to be given this weekend.

MPTCP

The pair had not found any traffic inspection systems that could correlate and reassemble data in the way needed to analyse MPTCP, and said the technology broke trust models organisations placed in single network providers.

"With MPTCP it becomes much harder for a single network provider to undetectably (sic) alter or sniff your traffic unless they collaborate with the other [providers] you are using for that connection," she said.

It also created ambiguity concerning incoming and outgoing connections meaning MPTCP-confused firewalls may think incoming connections were outbound.

In September last year, Cisco noted MPTCP could create disruptions of service to protocol inspection products including firewalls and intrusion prevention systems.

And a month earlier, Michigan State University and IBM researchers found inherent side-channel design flaws in MPTCP could allow internet services providers to infer sensitive data on competitors including traffic congestion, end-to-end TCP throughput, packet loss, and network delay.

"Specifically, an attacker can infer the throughput of unmonitored paths with up to 90 percent accuracy and within measurements interval of less than two minutes by exploiting coupling among MPTCP subflows," four researchers wrote in the paper Cross-Path Inference Attacks on Multipath TCP [PDF].

" ... these attacks are fundamental to MPTCP and may constitute a barrier to its wide-scale adoption." ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
You dirty RAT! Hong Kong protesters infected by iOS, Android spyware
Did China fling remote access Trojan at Occupy Central?
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.