[Infowarrior] - Steganography via TCP
Richard Forno
rforno at infowarrior.org
Wed May 27 17:05:25 UTC 2009
Fake web traffic can hide secret chat
* 26 May 2009 by Paul Marks
http://www.newscientist.com/article/mg20227096.200-fake-web-traffic-can-hide-secret-chat.html?full=true&print=true
THE internet's underlying technology can be harnessed to let people
exchange secret messages, perhaps allowing free speech an outlet in
oppressive regimes.
So says a team of steganographers at the Institute of
Telecommunications in Warsaw, Poland. Steganography is the art of
hiding a message in an openly available medium. For example, you can
subtly change the pixels in an image in a way that is undetectable to
the eye but carries meaning to anyone who knows the pre-arranged
coding scheme.
Wojciech Mazurczyk, along with Krzysztof Szczypiorski and Milosz
Smolarczyk, have already worked out how to sneak messages into
internet phone calls, and now the Warsaw team have turned their
attention to the internet's transmission control protocol (TCP).
Web, file transfer, email and peer-to-peer networks all use TCP, which
ensures that data packets are received securely by making the sender
wait until the receiver returns a "got it" message. If no such
acknowledgement arrives (on average 1 in 1000 packets gets lost or
corrupted), the sender's computer sends the packet again. This scheme
is known as TCP's retransmission mechanism - and it can be bent to the
steganographer's whim, says Mazurczyk.
Their system, dubbed retransmission steganography (RSTEG), relies on
sender and receiver using software that deliberately asks for
retransmission even when email data packets are received successfully.
"The receiver intentionally signals that a loss has occurred. The
sender then retransmits the packet but with some secret data inserted
in it," he says in a preliminary research paper (www.arxiv.org/abs/0905.0363)
. So the message is hidden among the teeming network traffic.
Could a careful eavesdropper spot that RSTEG is being used because the
first sent packet is different from the one containing the secret
message? As long as the system is not over-used, apparently not,
because if a packet is corrupted the original packet and the
retransmitted one will differ from each other anyway, masking the use
of RSTEG.
One application of the RSTEG technique might be to help people in
totalitarian regimes avoid censorship. The Warsaw team plans to
demonstrate it at a workshop on network steganography in Wuhan, China,
this November. "We are aware that organising this event in China may
be not only a scientific challenge but also a political one," says
Mazurczyk.
More information about the Infowarrior
mailing list