Difference between revisions of "Resource exhaustion"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
 
{{Template:SecureSoftware}}
 
{{Template:SecureSoftware}}
  
Line 116: Line 115:
 
Not available.
 
Not available.
  
==Categories ==
 
  
 
[[Category:Vulnerability]]
 
[[Category:Vulnerability]]

Revision as of 23:07, 27 May 2006


Overview

Resource exhaustion is a simple denial of service condition which occurs when the resources necessary to perform an action are entirely consumed, therefore preventing that action from taking place.

Consequences

  • Availability: The most common result of resource exhaustion is denial-of-service.
  • Access control: In some cases it may be possible to force a system to "fail open" in the event of resource exhaustion.

Exposure period

  • Design: Issues in system architecture and protocol design may make systems more subject to resource-exhaustion attacks.
  • Implementation: Lack of low level consideration often contributes to the problem.

Platform

  • Languages: All
  • Platforms: All

Required resources

Any

Severity

Low to medium

Likelihood of exploit

Very high

Avoidance and mitigation

  • Design: Design throttling mechanisms into the system architecture.
  • Design: Ensure that protocols have specific limits of scale placed on them.
  • Implementation: Ensure that all failures in resource allocation place the system into a safe posture.
  • Implementation: Fail safely when a resource exhaustion occurs.

Discussion

Resource exhaustion issues are generally understood but are far more difficult to successfully prevent. Resources can be exploited simply by ensuring that the target machine must do much more work and consume more resources in order to service a request than the attacker must do to initiate a request.

Prevention of these attacks requires either that the target system:

  • either recognizes the attack and denies that user further access for a given amount of time;
  • or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed.

The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, he may be able to prevent the user from accessing the server in question.

The second solution is simply difficult to effectively institute - and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

The final concern that must be discussed about issues of resource exhaustion is that of systems which "fail open." This means that in the event of resource consumption, the system fails in such a way that the state of the system - and possibly the security functionality of the system - is compromised. A prime example of this can be found in old switches that were vulnerable to "macof" attacks (so named for a tool developed by Dugsong). These attacks flooded a switch with random IP and MAC address combinations, therefore exhausting the switch's cache, which held the information of which port corresponded to which MAC addresses. Once this cache was exhausted, the switch would fail in an insecure way and would begin to act simply as a hub, broadcasting all traffic on all ports and allowing for basic sniffing attacks.

Examples

In Java:

class Worker implements Executor {
 ...
  public void execute(Runnable r) {
  try {
   ...
  }
  catch (InterruptedException ie) { // postpone response
   Thread.currentThread().interrupt();
  }
 }

 public Worker(Channel ch, int nworkers) { 
  ... 
  }

 protected void activate() {
  Runnable loop = new Runnable() {
   public void run() {
    try {
     for (;;) {
      Runnable r = ...
      r.run();
     }
    }
    catch (InterruptedException ie) {...}
   }
  };
  new Thread(loop).start();
 }

In C/C++:

int main(int argc, char *argv[]) {
  sock=socket(AF_INET, SOCK_STREAM, 0);
  while (1) {    
    newsock=accept(sock, ...);
    printf("A connection has been accepted\n");
    pid = fork();
  }

There are no limits to runnables/forks. Potentially an attacker could cause resource problems very quickly.

Related problems

Not available.