internet wide network studies
play

Internet-Wide Network Studies Previous research has shown promise of - PowerPoint PPT Presentation

Fast Internet-Wide Scanning, ZMap Weak Keys and the HTTPS Certificate Ecosystem Zakir Durumeric Michael Bailey University of Michigan ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric


  1. Fast Internet-Wide Scanning, ZMap Weak Keys and the HTTPS Certificate Ecosystem Zakir Durumeric Michael Bailey University of Michigan ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  2. Internet-Wide Network Studies Previous research has shown promise of Internet-wide surveys Mining Ps and Qs: Widespread weak keys in network devices (2012) EFF SSL Observatory: A glimpse at the CA ecosystem (2010) Census and Survey of the Visible Internet (2008) ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  3. Internet-Wide Network Studies Previous research has shown promise of Internet-wide surveys Mining Ps and Qs: Widespread weak keys in network devices (2012) 25 hours acoss 25 Amazon EC2 Instances (625 CPU-hours) EFF SSL Observatory: A glimpse at the CA ecosystem (2010) 3 months on 3 Linux desktop machines (6500 CPU-hours) Census and Survey of the Visible Internet (2008) 3 months to complete ICMP census (2200 CPU-hours) ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  4. ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  5. ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  6. What if … ? What if Internet surveys didn’t require heroic effort? What if we could scan the HTTPS ecosystem every day? What if we wrote a whole-Internet scanner from scratch? ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  7. Talk Roadmap ZMap Scanner 1. Philosophy and Architecture of ZMap 2. Characterizing ZMap's Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  8. ZMap: The Internet Scanner an open-source tool that can port scan the entire IPv4 address space from just one machine in under 45 minutes with 98% coverage With Zmap, an Internet-wide TCP SYN scan on port 443 is as easy as: $ ¡zmap ¡–p ¡443 ¡–o ¡results.txt ¡ 34,132,693 ¡listening ¡hosts ¡ 97% of gigabit (took ¡44m12s) ¡ Ethernet linespeed ¡ ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  9. ZMap Architecture Existing Network Scanners ZMap Reduce state by scanning in batches Eliminate local per-connection state - Time lost due to blocking - Fully asynchronous components - Results lost due to timeouts - No blocking except for network Track individual hosts and retransmit Shotgun Scanning Approach - Most hosts will not respond - Always send n probes per host Avoid flooding through timing Scan widely dispersed targets - Time lost waiting - Send as fast as network allows Utilize existing OS network stack Probe-optimized Network Stack - Not optimized for immense - Bypass inefficiencies by number of connections generating Ethernet frames ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  10. Addressing Probes How do we randomly scan addresses without excessive state? 1. Scan hosts according to random permutation 2. Iterate over multiplicative group of integers modulo p 5 Ÿ 5 mod 7 = 4 5 4 Negligible State 4 Ÿ 5 mod 7 = 6 1 Ÿ 5 mod 7 = 5 1. Primitive Root 6 1 2. Current Location 3. First Address 3 Ÿ 5 mod 7 = 1 6 Ÿ 5 mod 7 = 2 3 2 2 Ÿ 5 mod 7 = 3 ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  11. 6 1 3 2 Z * 11 7 4 8 1 Generator: 2 9 7 9 8 Z * 11 10 5 6 5 Generator: 7 4 2 10 3 ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  12. Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses receiver sender Ethernet length data MAC address MAC address sender receiver IP V IHL … data IP address IP address sender receiver sequence ack. TCP … data port port number number ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  13. Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses receiver sender Ethernet length data MAC address MAC address sender receiver IP V IHL … data IP address IP address sender receiver sequence ack. TCP … data port port number number ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  14. Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses receiver sender Ethernet length data MAC address MAC address sender receiver IP V IHL … data IP address IP address sender receiver sequence ack. TCP … data port port number number ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  15. Packet Transmission and Receipt How do we make processing probes easy and fast? 1. ZMap framework handles the hard work 2 . Probe modules fill in packet details, interpret responses 3. Output modules allow follow-up or further processing Configuration, Probe Packet Tx Addressing, Generation (raw socket) and Timing Output Response Packet Rx (libpcap) Handler Interpretation ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  16. Talk Roadmap ZMap Scanner 1. Philosophy and Architecture of ZMap 2. Characterizing ZMap's Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  17. Scan Rate How fast is too fast? No correlation between hit-rate and scan-rate. Slower scanning does not reveal additional hosts. 1.02 Hitrate 1.01 Hit Rate (percent) 1 0.99 0.98 0.97 0.96 0.95 0.94 1 2 5 1 2 5 1 2 5 7 1 1 1 1 1 m 0 5 0 0 5 0 0 5 0 5 0 1 2 3 4 a 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 i m 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 u 0 0 0 0 0 m Scan Rate (packets per second) ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  18. Coverage Is one probe packet sufficient? 89000 We expect an eventual Hosts Found plateau in responsive 88500 hosts, regardless of 88000 additional probes. Unique Hosts Found 87500 Scan Coverage 87000 Estimated 1 Packet: 97.9% 86500 Ground Truth 2 Packets: 98.8% 86000 3 Packets: 99.4% 85500 85000 0 5 10 15 20 25 30 Unique SYN Packets Sent ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  19. Comparison with Nmap Averages for scanning 1 million random hosts Normalized Duration Est. Internet Coverage (mm:ss) Wide Scan Nmap (1 probe) 81.4% 24:12 62.5 days Nmap (2 probes) 97.8% 45:03 116.3 days ZMap (1 probe) 98.7% 00:10 1:09:35 ZMap (2 probes) 100.0% 00:11 2:12:35 ZMap is capable of scanning more than 1300 times faster than the most aggressive Nmap default configuration (“insane”) Surprisingly, ZMap also finds more results than Nmap ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  20. Probe Response Times Why does ZMap find more hosts than Nmap? 1.0 Response Times 0.8 500 ms CDF of responding hosts 250 ms: < 85% timeout 500 ms: 98.2% 0.6 250 ms timeout 1.0 s: 99.0% 0.4 8.2 s: 99.9% 0.2 0.0 0 0.2 0.4 0.6 0.8 1 response time (seconds) Statelessness leads to both higher performance and increased coverage. ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  21. Talk Roadmap ZMap Scanner 1. Philosophy and Architecture of ZMap 2. Characterizing ZMap's Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  22. Uncovering Hidden Services Enumerating Unadvertised Tor Bridges Scanning has potential to uncover unadvertised services We perform a Tor handshake with public IPv4 addresses on port 9001 and 443 We identified 86% of live allocated bridges with a single scan Tor has developed obfsproxy that listens on random ports to count this type of attack ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

  23. ZMap Applications Potential Applications Detect Service Disruptions Track Adoption of Defenses Study Criminal Behavior Security Implications Anonymous Communication Track users between IP leases Snapshot of HTTPS outages caused by Hurricane Sandy ZMap: Fast Internet-Wide Scanning, Weak Keys, and the HTTPS Certificate Ecosystem Zakir Durumeric

Recommend


More recommend