Check out the new USENIX Web site. next up previous
Next: Protecting CoDeeN Up: Security Problems Previous: Content Theft

Anonymity


While some people use proxies for anonymity, some anonymizers accessing CoDeeN caused us some concern. Most added one of more layers of indirection into their activities, complicating abuse tracking.

Request Spreaders - We found that CoDeeN nodes were being advertised on sites that listed open proxies and sold additional software to make testing and using proxies easier. Some sites openly state that open proxies can be used for bulk e-mailing, a euphemism for spam. Many of these sites sell software that spreads requests over a collection of proxies. Our concern was that this approach could flood a single site from many proxies.

TCP over HTTP - Other request traffic suggested that some sites provided HTTP-to-TCP gateways, named http2tcp, presumably to bypass corporate firewalls. Other than a few archived Usenet messages on Google, we have not been able to find more information about this tool.

Non-HTTP Port 80 - While port 80 is normally reserved for HTTP, we also detected CONNECT tunnels via port 80, presumably to communicate between machines without triggering firewalls or intrusion detection systems. However, if someone were creating malformed HTTP requests to attack remote web sites, port 80 tunnels would complicate investigations.

Vulnerability Testing - We found bursts of odd-looking URLs passing through CoDeeN, often having the same URI portion of the URL and different host names. We found lists of such URLs on the Web, designed to remotely test known buffer overflow problems, URL parsing errors, and other security weaknesses. In one instance, these URLs triggered an intrusion detection system, which then identified CoDeeN as the culprit.



next up previous
Next: Protecting CoDeeN Up: Security Problems Previous: Content Theft
Vivek Pai
2004-05-04