Solved

How to properly send tcp/ip reset packet (RST)?  Raw packet creation problem...

Posted on 2004-04-22
3
6,299 Views
Last Modified: 2012-06-21
Hello,

I am trying to integrate a feature in my application which allows you to kill active tcp connections with a tcp reset packet.  I am using ethereal to monitor packet generation and have been able to craft a packet with the appropriate source ip source port destination ip destination port and the Reset field is 04 which is correct for tcp reset packet but when I try to kill a telnet connection from my machine to my router no luck, connection persists.  Solar winds includes a nice utility that works fine and kill the telnet connection.  I sniffed the solar winds utility and it appears it grabs the tcp session table from the router and then sends the tcp reset packet to the router (with spoofed source ip of my machine of course).   I know how to generate the raw packet with packetx and vb6 which works fine, question is what specific fields are REQUIRED to be correct for a reset to work?  I think my problem lies in the ack number window number or sequence number...Any hardcore techies want to try this one??
0
Comment
Question by:bluedragon99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 10895122
Sequence number is probably the problem, you have to be within a certain window with TCP in order for it to be accepted by the stack. This is the issue has recently gained much attention the last few days (eerie you bring thins up). The issue has existed for some time, someone finally started to get anxious and get the community to get involved to patch this up. I've been contacting all our internet carriers and getting the md5's configured all week.
http://www.uniras.gov.uk/vuls/2004/236929/index.htm
http://cisco.com/en/US/products/products_security_advisory09186a008021bc62.shtml

http://ciac.llnl.gov/ciac/bulletins/j-008.shtml (about the sequence numbers)

TCP RFC (standard) http://www.faqs.org/rfcs/rfc793.html
Section 3 is where you'll find the valuable info... specifically 3.3
3.3.  Sequence Numbers

  A fundamental notion in the design is that every octet of data sent
  over a TCP connection has a sequence number.  Since every octet is
  sequenced, each of them can be acknowledged.  The acknowledgment
  mechanism employed is cumulative so that an acknowledgment of sequence
  number X indicates that all octets up to but not including X have been
  received.  This mechanism allows for straight-forward duplicate
  detection in the presence of retransmission.  Numbering of octets
  within a segment is that the first data octet immediately following
  the header is the lowest numbered, and the following octets are
  numbered consecutively.
GL!
-rich
0
 
LVL 1

Author Comment

by:bluedragon99
ID: 10896004
Yup I just got a cert notice about it a few days ago..although I have been working on this for quite some time it was strange...
0
 

Expert Comment

by:mgbyrne2004
ID: 11498540
*** advertising removed by Netminder, Site Admin ***
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ADFS trust for Skype 4 27
Blocking outside IP Addresses 16 130
Dropbox phishing tutorial 5 70
Explain Man-in-the-middle attacks on Common Names 3 30
OnPage: Incident management and secure messaging on your smartphone
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question