Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
The burgeoning Multipath TCP (MPTCP) standard promises to speed up the internet but will also break security solutions including intrusion detection and data leak prevention, says security researcher Catherine Pearce.
MPTCP technology is an update to the core communications backbone of the internet that will allow the Transmission Control Protocol to use multiple paths and network providers to improve speed, redundancy and resource utilisation.
As El Reg hack Richard Chirgwin detailed last October, MPTCP was already used by Apple's Siri for iOS but would not be more widely deployed in mobiles anytime soon because it broke current network designs, could lead to expensive data bills and may be torpedoed by carriers worried that firing more user data over wifi could starve bottom lines.
"I can use MPTCP to break your intrusion detection system, data loss prevention, and many application-layer security devices today," Pearce wrote in a preview of the duo's Black Hat talk to be given this weekend.
The pair had not found any traffic inspection systems that could correlate and reassemble data in the way needed to analyse MPTCP, and said the technology broke trust models organisations placed in single network providers.
"With MPTCP it becomes much harder for a single network provider to undetectably (sic) alter or sniff your traffic unless they collaborate with the other [providers] you are using for that connection," she said.
It also created ambiguity concerning incoming and outgoing connections meaning MPTCP-confused firewalls may think incoming connections were outbound.
In September last year, Cisco noted MPTCP could create disruptions of service to protocol inspection products including firewalls and intrusion prevention systems.
And a month earlier, Michigan State University and IBM researchers found inherent side-channel design flaws in MPTCP could allow internet services providers to infer sensitive data on competitors including traffic congestion, end-to-end TCP throughput, packet loss, and network delay.
"Specifically, an attacker can infer the throughput of unmonitored paths with up to 90 percent accuracy and within measurements interval of less than two minutes by exploiting coupling among MPTCP subflows," four researchers wrote in the paper Cross-Path Inference Attacks on Multipath TCP [PDF].
" ... these attacks are fundamental to MPTCP and may constitute a barrier to its wide-scale adoption." ®
Sponsored: Are DLP and DTP still an issue?