@blyeexx http://t.co/3UPLOsQR
9 minutes ago by gjertsenexsm2 on twitter
ZDNet is available in the following editions:
University of Cambridge computer experts say they breached firewall but can use it to launch denial-of-service attacks.
Computer experts from the University of Cambridge claim not only to have breached the Great Firewall of China, but have found a way to use the firewall to launch denial-of-service attacks against specific Internet Protocol addresses in the country.
The firewall, which uses routers supplied by Cisco, works in part by inspecting Web traffic for certain keywords that the Chinese government wishes to censor, including political ideologies and groups it finds unacceptable.
The Cambridge research group tested the firewall by firing data packets containing the word "Falun" at it, a reference to the Falun Gong religious group, which is banned in China.
The researchers found that it was possible to circumvent the Chinese intrusion detection systems by ignoring the forged transmission control protocol resets injected by the Chinese routers, which would normally force the endpoints to abandon the connection.
"The machines in China allow data packets in and out, but send a burst of resets to shut connections if they spot particular keywords," explained Richard Clayton of the University of Cambridge computer laboratory. "If you drop all the reset packets at both ends of the connection, which is relatively trivial to do, the Web page is transferred just fine."
Clayton added that this means the Chinese firewall can be used to launch denial-of-service attacks against specific IP addresses within China, including those of the Chinese government itself.
The IDS uses a stateless server, which examines each data packet both going in and out of the firewall individually, unrelated to any previous request. By forging the source address of a packet containing a "sensitive" keyword, people could trigger the firewall to block access between source and destination addresses for up to an hour at a time.
If an attacker had identified the machines used by regional government offices, they could block access to Windows Update, or prevent Chinese embassies abroad from accessing specific Chinese Web content.
"Due to the design of the firewall, a single packet addressed from a high party official could block their Web access," said Clayton.
Even though this technique would block communication between only two particular points on the Internet, the researchers calculated that a lone attacker using a single dial-up connection could still generate a "reasonably effective" denial-of-service attack. If an attacker generated 100 triggering packets per second, and each packet caused 20 minutes of disruption, 120,000 pairs of endpoints could be prevented from communicating at any one time.
Clayton, speaking at the Sixth Workshop on Privacy Enhancing Technologies in Cambridge last week, said that the researchers had reported their findings to the Chinese Computer Emergency Response Team.
Cambridge boffins - why report the flaw back? are they getting back-handers from the chinese government?
What's the point reporting this back to chinese officials and supporting censorship? I thought we should fight for the freedom of information..
gee...thanks for helping the chinese.
better than helping the usa and their fascist war against everyone but themselves!
The news was so good, until that last paragraph.
Still, we have TOR, elgooG, Your-Freedom.net, and countless free proxies.
Don't just report or say it, DO IT!
Wonder if Dr. Clayton and Cisco think for a second about the people they've put into Chinese prisons?
So if the industry leader Cisco cant implement a proper "firewall" then see the rest of the world's internet security!!! be careful people!!
I'm from Spain and my isp blocks p2p (bittorent for example) and tor =( but now i use SmartHide free version. You can get it from http://www.smarthide.com
you still can download free www.hide-the-ip.com
Japan develops malware cyberweapon http://t.co/3VFNFReb via @zdnetasia
1 hour ago by DroletGuillaume on twitterComplacency is Singapore's worst enemy http://t.co/dtHyWG01
1 hour ago by bookjtinyisland on twitter#sg Complacency Is Singapore's Worst Enemy: Four service incidents in as many days... http://t.co/o9RwUSIS
Cost-cutting is another cause.
Just to clear things up... (As quoted from the intra team) A reply on the actual thread on SCMagazine... Dear Colleagues, It was publ...
1 day ago by melynx on Singapore's NUS confirms security breachWe need white hackers Report: Singapore's NUS hacked http://t.co/1H4TdduH via @zdnetasia
1 day ago by aksuperdance on topsyS'pore companies eye 'happenstance' at CES. http://t.co/lMRz1sFg
1 day ago by zdnetasia on topsyConnect securely to Amazon EC2 using PuTTY, Pageant http://t.co/kJ6ePeDp
1 day ago by hsuru on topsyConnect securely to Amazon EC2 using PuTTY, Pageant - ZDNet Asia http://t.co/bX0c51PA
1 day ago by saas360 on topsy#Oracle Public #Cloud touts interoperability - Videos http://t.co/oO5bBdY0 via @zdnetasia
1 day ago by hsuru on topsyWell, I am not agree with the Ms Yu because in Asian continent there are many talented persons who are today working for the big industri...
1 day ago by RobertMiller on Asia cannot be the next Silicon ValleyPity that more users are not converting from Windows XP to a modern Linux distro, like the latest version of Ubuntu....
Henri
Click Asia Summit – Exploring the Power of Digital Marketing in Asia
Globalize your brand. Learn from experts. Network with leaders in India.Register today!
thank you big brothers