Academic breaks the Great Firewall of China:
Researchers from the University of Cambridge have found a way to launch denial of service attacks against China, using the country's own firewall
Computer experts from the University of Cambridge claim not only to have breached the Great Firewall of China, but have found a way to use the firewall to launch denial of service attacks against specific IP addresses in the country.
The firewall, which uses routers supplied by Cisco, works in part by inspecting Web traffic for certain keywords that the Chinese Government wish to censor, including political ideologies and groups it finds unacceptable.
The Cambridge research group tested the firewall by firing data packets containing the word "Falun" at it, a reference to the banned Falun Gong religious group. The researchers found that it was possible to circumvent the Chinese intrusion detection systems (IDS) by ignoring the forged transmission control protocol (TCP) resets injected by the Chinese routers, which would normally force the endpoints to abandon the connection.
"The machines in China allow data packets in and out, but send a burst of resets to shut connections if they spot particular keywords," explained Richard Clayton of the University of Cambridge computer laboratory. "If you drop all the reset packets at both ends of the connection, which is relatively trivial to do, the Web page is transferred just fine."
Bwahahaha! And since the busy little bees are sending out bogus resets, they're vulnerable to some er, redirection:
By forging the source address of a packet containing a "sensitive" keyword, people could trigger the firewall to block access between source and destination addresses for up to an hour at a time.
Ruh oh! It's not exactly the neutron bomb, but amusing nonetheless.