Update: Report sounds alarm on China's rerouting of U.S. Internet traffic
Substantial portion of traffic was routed through China earlier this year, says U.S.-China commission
Computerworld - A report submitted to Congress on Wednesday by the U.S.-China Economic and Security Review Commission expressed concerns over what the commission claims is China's growing ability to control and manipulate Internet traffic.
The report points to two specific incidents earlier this year where actions taken inside China had a direct impact on Internet traffic in the U.S. and other regions of the world.
In one of the incidents, traffic to and from about 15% of all Internet destinations was routed through servers belonging to China Telecom, a state-owned telecommunications company.
In an e-mailed statement Wednesday, China Telecom rejected the claims, but offered no further comment.
The rerouting happened on April 8 and lasted for about 18 minutes. The traffic hijacking affected U.S. government and military networks, including those belonging to the Army, Navy, Air Force and Marine Corps, as well as the Office of the Secretary of Defense, the Department of Commerce, NASA and the U.S. Senate.
Commercial sites, including those belonging to Microsoft, Dell and Yahoo, were also affected.
It's unclear if Chinese telecommunications companies did anything with the hijacked data, the commission said in its report. But the kind of access that Chinese authorities had to the data could enable surveillance of specific users or sites, disrupt transactions, prevent a user from establishing connections to specific sites or divert them to other spoofed sites, the report noted.
"Incidents of this nature could have a number of serious implications," the report said.
Because of a network error, users in the U.S. and Chile also found themselves unable to access those sites, and were directed to incorrect servers -- just as they would have if they had been inside China.
Today's report makes it clear that there is little evidence to show that either incident was planned or executed deliberately. Even so, the incidents show that China and other countries have the capability to do so, if they want to.
"Although China is by no means alone in this regard, persistent reports of that nation's use of malicious computer activities raise questions about whether China might seek intentionally to leverage these abilities to assert some level of control over the Internet, even for a brief period," the report noted.
Incidents such as those reported by the commission highlight some of the fundamental vulnerabilities of the Internet, said Dmitri Alperovitch, an Internet threat researcher at McAfee.
Traffic flow on the Internet is enabled by routing servers, which essentially exchange information with each other on the best routes for traffic to take to get to a particular Internet destination. Each server implicitly trusts the information provided by other servers in the system.
The Internet hijacking incident of April 8 resulted when China Telecom's servers erroneously started advertising themselves as the best routes for a large chunk of Internet traffic. Such rerouting has happened before from simple configuration errors, though it can certainly be caused by deliberate actions as well.
There is no way of knowing for sure whether the April incident was done with malicious intent or was caused by accident as China Telecom has suggested, Alperovitch said.
"The takeaway here is that the foundation on which the Internet is built is insecure," Alperovitch said. "It is based on trust. We trust ISPs to tell us which networks they own. There is no validation [of that information]."
"Not only can this problem happen again, but it probably will," he said.
With most routing errors, traffic is either dropped or misdirected, said Craig Labovitz, chief scientist at Arbor Networks, a network security systems vendor. Even a single misplaced line of code in a core router can result in wrong routing information being propagated through the Internet and cause all sorts of problems, he said.
"The underlying plumbing relies on trust," Labovitz said. "You got a lot of different telecoms all telling each other what address space they have and what they can reach. You believe what address space they have and you send traffic to them."
This is not the first time the commission has raised Internet security concerns related to China. In a similar report last year, it noted that China was using its maturing network exploitation capabilities to leach intelligence information from the U.S. government, military and industry.
"The problem is characterized by disciplined, standardized operations, sophisticated techniques, access to high-end software development resources, a deep knowledge of the targeted networks, and an ability to sustain activities," the earlier report had noted.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Network Security in Computerworld's Network Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- BlackBeard Case Study In this case study, learn how a business with 95% of revenues generated online was hit by DDoS attacks over a 6-month period,...
- Four Ways DNS Can Accelerate Business Growth This e-book describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Network Security White Papers | Webcasts