HOME

TheInfoList



OR:

A Smurf attack is a distributed denial-of-service attack in which large numbers of
Internet Control Message Protocol The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when commun ...
(ICMP) packets with the intended victim's spoofed source IP are broadcast to a
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
using an IP
broadcast address A broadcast address is a network address used to transmit to all devices connected to a multiple-access communications network. A message sent to a broadcast address may be received by all network-attached hosts. In contrast, a multicast address ...
. Most devices on a network will, by default, respond to this by sending a reply to the source IP address. If the number of machines on the network that receive and respond to these packets is very large, the victim's computer will be flooded with traffic. This can slow down the victim's computer to the point where it becomes impossible to work on.


History

The original Smurf was written by Dan Moschuk (alias TFreak) in 1997 . In the late 1990s, many IP networks would participate in Smurf attacks if prompted (that is, they would respond to ICMP requests sent to broadcast addresses). The name comes from the idea of very small, but numerous attackers overwhelming a much larger opponent (see Smurfs). Today, administrators can make a network immune to such abuse; therefore, very few networks remain vulnerable to Smurf attacks.


Attack amplification factors

A Smurf amplifier is a computer network that lends itself to being used in a Smurf attack. Smurf amplifiers act to worsen the severity of a Smurf attack because they are configured in such a way that they generate a large number of ICMP replies to the victim at the spoofed source IP address. Attack Amplification Factor (AAF) is a term coined by Dr. Sanjeev Kumar, professor at The University of Texas in his published paper to represent the degree of bandwidth enhancement or amplification that an original attack traffic undergoes (with the help of Smurf amplifiers) during its transmission towards the victim computer. Under the assumption no countermeasures are taken to dampen the effect of a Smurf Attack, this is what happens in the target network with ''n'' active hosts (that will respond to ICMP echo requests). The ICMP echo request packets have a spoofed source address (the Smurfs' target) and a destination address (the patsy; the apparent source of the attack). Both addresses can take two forms:
unicast Unicast is data transmission from a single sender (red) to a single receiver (green). Other devices on the network (yellow) do not participate in the communication. In computer networking, unicast is a one-to-one transmission from one point in ...
and
broadcast Broadcasting is the distribution of audio or video content to a dispersed audience via any electronic mass communications medium, but typically one using the electromagnetic spectrum (radio waves), in a one-to-many model. Broadcasting began wi ...
. The dual unicast form is comparable with a regular ping: an ICMP echo request is sent to the patsy (a single host), which sends a single ICMP echo reply (a Smurf) back to the target (the single host in the source address). This type of attack has an amplification factor of 1, which means: just a single Smurf per ping. When the target is a unicast address and the destination is the broadcast address of the target's network, then all hosts in the network will receive an echo request. In return they will each reply to the target, so the target is swamped with ''n'' Smurfs. Amplification factor = ''n''. If ''n'' is small, a host may be hindered but not crippled. If ''n'' is large, a host may come to a halt. If the target is the broadcast address and the patsy a unicast address, each host in the network will receive a single Smurf per ping, so an amplification factor of 1 per host, but a factor of ''n'' for the network. Generally, a network would be able to cope with this form of the attack, if ''n'' is not too great. When both the source and destination address in the original packet are set to the broadcast address of the target network, things start to get out of hand quickly. All hosts receive an echo request, but all replies to that are broadcast again to all hosts. Each host will receive an initial ping, broadcast the reply and get a reply from all ''n-1'' hosts. An amplification factor of ''n'' for a single host, but an amplification factor of ''n2'' for the network. ICMP echo requests are typically sent once a second. The reply should contain the contents of the request; a few bytes, normally. A single (double broadcast) ping to a network with 100 hosts causes the network to process packets. If the payload of the ping is increased to bytes (or 10 full packets in
ethernet Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1 ...
) then that ping will cause the network to have to process large packets per second. Send more packets per second, and any network would collapse under the load. This will render any host in the network unreachable for as long as the attack lasts.


Mitigation

The fix is two-fold: #Configure hosts and routers to ignore packets where the source address is a broadcast address; and #Configure routers to not forward packets directed to broadcast addresses. Until 1999, standards required routers to forward such packets by default. Since then, the default standard was changed to not forward such packets. It's also important for ISPs to implement ingress filtering, which rejects the attacking packets on the basis of the forged source address.


Mitigation on a Cisco router

An example of configuring a router so it will not forward packets to broadcast addresses, for a
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
router, is: : (This example does not protect a network from becoming the ''target'' of a Smurf attack; it merely prevents the network from ''participating'' in a Smurf attack.)


Fraggle attack

A Fraggle attack (named for the creatures in the puppet TV series ''
Fraggle Rock ''Fraggle Rock'' (also known as ''Jim Henson's Fraggle Rock'' or ''Fraggle Rock with Jim Henson's Muppets'') is a children's musical fantasy comedy puppet television series about interconnected societies of Muppet creatures, created by Jim Hen ...
'') is a variation of a Smurf attack where an attacker sends a large amount of UDP traffic to ports 7 (
Echo In audio signal processing and acoustics, an echo is a reflection of sound that arrives at the listener with a delay after the direct sound. The delay is directly proportional to the distance of the reflecting surface from the source and the lis ...
) and 19 ( CHARGEN). It works similarly to the Smurf attack in that many computers on the network will respond to this traffic by sending traffic back to the spoofed source IP of the victim, flooding it with traffic. , the
source code In computing, source code, or simply code, is any collection of code, with or without comments, written using a human-readable programming language, usually as plain text. The source code of a program is specially designed to facilitate the ...
of the attack, was also released by TFreak.


See also

*
Ping flood A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP "echo request" (ping) packets. This is most effective by using the flood option of ping which sends ICMP packets as fast as possible without wait ...


References


External links


Securing Cisco Routers with IP Directed-Broadcast

Smurf Amplifier Registry
{{DEFAULTSORT:smurf attack Denial-of-service attacks