Another
IP-level consideration for packet filtering is fragmentation. One of
the features of IP is its ability to divide a large packet that
otherwise couldn't traverse some network link (because of
limitations on packet size along that link) into smaller packets,
called fragments, which can traverse that link.
The fragments are then reassembled into the full packet by the
destination machine (not by the machine at the other end of the
limited link; once a packet is fragmented, it normally stays
fragmented until it reaches its destination).
Normally, any router can decide to fragment a packet. A flag in the
IP header can be used to prevent routers from fragmenting packets.
Originally, this wasn't much used, because a router that needs
to fragment a packet but is forbidden to do so will have to reject
the packet, and communication will fail, which is generally less
desirable than having the packet fragmented. However, there is now a
system called path maximum transmission unit (MTU) discovery that
uses the flag that prevents fragmentation.
Path MTU discovery is a way for systems to determine what is the
largest packet that can be sent to another machine without getting
fragmented. Large unfragmented packets are more efficient than small
packets, but if packets have to be broken up later in the process,
this will significantly decrease transfer speed. Therefore, maximum
efficiency depends on knowing how big to make the packets, but that
depends on all the network links between the machines. Neither
machine has any way to know what the answer is (and, in fact, it may
vary from moment to moment). In order to discover the limit, systems
can send out packets with "don't fragment" set and
look for the error response that says that the packet has been
dropped because it was too big but could not be fragmented. If
there's an error, the machine reduces the packet size; if
there's no error, it increases it. This adds some extra expense
at the beginning of a connection, but for a connection that transmits
a significant amount of data across a network that includes a limited
link, the overall transmission time will probably be improved despite
the intentionally lost packets. However, path MTU discovery will fail
catastrophically if the error messages (which are ICMP messages,
discussed later in this chapter) are not correctly returned (for
instance, if your firewall drops them).
From a packet filtering point of view, the problem with fragmentation
is that only the first fragment will contain the header information
from higher-level protocols, like TCP, that the packet filtering
system needs in order to decide whether or not to allow the full
packet. Originally, the common packet filtering approach to dealing
with fragmentation was to allow any non-first fragments through and
to do packet filtering only on the first fragment of a packet. This
was considered safe because if the packet filtering decides to drop
the first fragment, the destination system will not be able to
reassemble the rest of the fragments into the original packet,
regardless of how many of the rest of the fragments it receives. If
it can't reconstruct the original packet, the partially
reassembled packet will not be accepted.
However, there are still problems with fragmented packets. If you
pass all non-first fragments, the destination host will hold the
fragments in memory for a while, waiting to see if it gets the
missing piece; this makes it possible for attackers to use fragmented
packets in a denial of service attack. When the destination host
gives up on reassembling the packet, it will send an ICMP
"packet reassembly time expired" message back to the
source host, which will tell an attacker that the host exists and why
the connection didn't succeed.
In addition, attackers can use specially fragmented packets to
conceal data. Each fragment contains information about where the data
it contains starts and ends. Normally, each one starts after the last
one ended. However, an attacker can construct packets where fragments
actually overlap, and contain the same data addresses. This does not
happen in normal operation; it can happen only when bugs or attackers
are involved, and attackers are by far the most likely cause.
Operating systems differ in their response to overlapping fragments.
Because overlapping fragments are abnormal, many operating systems
respond very badly to them and may reassemble them into invalid
packets, with the expected sorts of unfortunate results up to and
including operating system crashes. When they are reassembled, there
are differences in whether the first or second fragment's data
is kept; these differences can be increased by sending the fragments
out of order. Some machines prefer the first version received, others
the most recent version received, others the numerically first, and
still others the numerically last. This makes it nearly impossible
for packet filtering or intrusion detection systems to figure out
what data the receiving system will actually see if and when the
fragments are reassembled.
Three kinds of attacks are made possible by overlapping fragments:
Figure 4-4. Overlapping fragments
There are other, special problems with passing outbound fragments.
Outbound fragments could conceivably contain data you don't
want to release to the world. For example, an outbound NFS packet
would almost certainly be fragmented, and if the file were
confidential, that information would be released. If this happens by
accident, it's unlikely to be a problem; people do not
generally hang around looking at the data in random packets going by
just in case there's something interesting in them. You could
wait a very long time for somebody to accidentally send a fragment
out with interesting data in it.
If somebody inside intentionally uses fragmentation to transmit data,
you have hostile users within the firewall, and no firewall can deal
successfully with insiders. (They probably aren't very clever
hostile users, though, because there are easier ways to get data
out.)
However, there is one other situation in which outbound fragments
could carry data: if you have decided to deal with some vulnerability
by blocking outbound responses to something (instead of attempting to
block the original request on the incoming side, which would be a
better idea), and the reply is fragmented. In this situation,
non-first fragments of the reply will get out, and the attacker has
reason to expect them and look for them. You can deal with this by
being careful to filter out requests and by not relying on filtering
out the replies.
Because of these many and varied problems with fragmentation, you
should look for a packet filter that does fragment reassembly; rather
than either permitting or denying fragments, the packet filter should
reassemble the packet locally (and, if necessary, refragment it
before sending it on). This will increase the load on the firewall
somewhat, but it protects against all fragmentation-based risks and
attacks, except those the firewall itself is vulnerable to (for
instance, denial of service attacks based on sending non-first
fragments until the firewall runs out of memory).