Yesterday RSnake released an interesting HTTP DoS tool that performs a Denial of Service attack on Apache servers by exhausting available connections by holding the connection open while sending incomplete HTTP requests to the server. The initial part of the HTTP request is standard: GET / HTTP/1.1\r\n Host: host\r\n User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n Content-Length: 42\r\n Notice that it is missing one CRLF to finish the header which is otherwise completely legitimate. The bogus header line the tools sends is currently: X-a: b\r\n So the server keeps waiting for the rest of the header. RSnake explains: "In considering the ramifcations of a slow denial of service attack against particular services, rather than flooding networks, a concept emerged that would allow a single machine to take down another machine's web server with minimal bandwidth and side effects on unrelated services and ports. The ideal situation for many denial of service attacks is where all other services remain intact but the webserver itself is completely inaccessible. Slowloris was born from this concept, and is therefore relatively very stealthy compared to most flooding tools. Slowloris holds connections open by sending partial HTTP requests. It continues to send subsequent headers at regular intervals to keep the sockets from closing. In this way webservers can be quickly tied up. In particular, servers that have threading will tend to be vulnerable, by virtue of the fact that they attempt to limit the amount of threading they'll allow. Slowloris must wait for all the sockets to become available before it's successful at consuming them, so if it's a high traffic website, it may take a while for the site to free up it's sockets. So while you may be unable to see the website from your vantage point, others may still be able to see it until all sockets are freed by them and consumed by Slowloris. This is because other users of the system must finish their requests before the sockets become available for Slowloris to consume. If others re-initiate their connections in that brief time-period they'll still be able to see the site. So it's a bit of a race condition, but one that Slowloris will eventually always win - and sooner than later." Apache 1.x and 2.x are affected as well as Squid, so the number of servers that are effected will be quite high. The traffic to exhaust available connections on a server is slight. Microsoft IIS 6.0 or 7.0 are not affected. At the moment Apache's has not responded to state configuration change that might prevent this attack – increasing MaxClients will just increase requirements for the attack. Tomasz Miklas said that he was able to prevent the attack by using a reverse proxy called Perlbal in front of an Apache server. Of course load balancers will, like IIS, probably not be effected (with this exploit - check your headers and URI rewrites for other known exploits). Reference: http://www.hackinthebox.org/index.php?name=News&file=article&sid=31831 -- (503)754-4452 http://en.wikipedia.org/wiki/User:LisaKachold http://www.theregister.co.uk/2009/05/29/wikipedia_bans_scientology/ --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss