Livingston needs to update CERT regarding smurfing

From: Patrick J. McEvoy (swagmanat_private)
Date: Fri Jan 09 1998 - 10:21:42 PST

  • Next message: Dave Pifke: "Password problem in FrontPage 98"

    Livingston,
    
    >From the recent CERT advisory about "smurfing" [CA-98.01 - smurf]:
    
    >       III. Solution
    >
    >       A. Solutions for the Intermediary
    >
    >       1. Disable IP-directed broadcasts at your router.
    >
    >       One solution to prevent your site from being used as an
    >       intermediary in this attack is to disable IP-directed broadcasts
    >       at your router. By disabling these broadcasts, you configure your
    >       router to deny IP broadcast traffic onto your network from other
    >       networks. In almost all cases, IP-directed broadcast functionality
    >       is not needed.
    >
    >       Appendix A contains details on how to disable IP-directed
    >       broadcasts for some router vendors
    >
    >       ...
    >
    >       Appendix A - Vendor Information
    >
    >       ...
    >
    >       Livingston Enterprises, Inc.
    >       ============================
    >       Livingston Enterprises products discard any ICMP packets directed to
    >       broadcast addresses, so we protect against this form of attack.
    >       No special configuration is required.
    
    Unfortunately, this is not true. In the following "ping -s" (names and
    IP addresses changed to protect the innocent), the packets take the
    following path:
    
            Sparcstation  ==> ethernet    ==> IRX 211 (Livingston Firewall)
            IRX 211       ==> frame relay ==> PM2ER   (Livingston Portmaster)
            PM2ER         ==> ethernet    ==> IRX 211 (Livingston Firewall)
            IRX 211       ==> ethernet broadcast
    
    None of the three pieces of Livingston equipment dropped the packet. All are
    running ComOS 3.7.x. The Class C network in question is not subnetted or
    supernetted anywhere along the path.
    
    Sooooo, I thing CERT has some incorrect (or at least misleading) information
    about you.
    
    [As it turns out, none of the seven pieces of Livingston equipment on the
    end net responded to the ICMP broadcast packets, but all the pieces along
    the way were happy to forward them.]
    
    Cheers,
    swagman
    
     =============================================================================
    % ping -s 192.192.192.0
    PING 192.192.192.0: 56 data bytes
    64 bytes from news1.test.org (192.192.192.17): icmp_seq=0. time=44. ms
    64 bytes from news1.test.org (192.192.192.17): icmp_seq=0. time=92. ms
    64 bytes from relay1.test.org (192.192.192.18): icmp_seq=0. time=167. ms
    64 bytes from 192.192.192.1: icmp_seq=0. time=265. ms
    64 bytes from ns1.test.org (192.192.192.19): icmp_seq=0. time=285. ms
    64 bytes from ns2.test.org (192.192.192.20): icmp_seq=0. time=336. ms
    64 bytes from 192.192.192.1: icmp_seq=0. time=360. ms
    64 bytes from ns2.test.org (192.192.192.20): icmp_seq=0. time=376. ms
    64 bytes from relay1.test.org (192.192.192.18): icmp_seq=0. time=387. ms
    64 bytes from ns1.test.org (192.192.192.19): icmp_seq=0. time=406. ms
    64 bytes from news1.test.org (192.192.192.17): icmp_seq=1. time=45. ms
    64 bytes from news1.test.org (192.192.192.17): icmp_seq=1. time=76. ms
    64 bytes from 192.192.192.1: icmp_seq=1. time=129. ms
    64 bytes from relay1.test.org (192.192.192.18): icmp_seq=1. time=159. ms
    64 bytes from ns2.test.org (192.192.192.20): icmp_seq=1. time=187. ms
    64 bytes from ns1.test.org (192.192.192.19): icmp_seq=1. time=207. ms
    64 bytes from 192.192.192.1: icmp_seq=1. time=227. ms
    64 bytes from ns2.test.org (192.192.192.20): icmp_seq=1. time=247. ms
    64 bytes from relay1.test.org (192.192.192.18): icmp_seq=1. time=267. ms
    64 bytes from ns1.test.org (192.192.192.19): icmp_seq=1. time=287. ms
    ^C
    ----192.192.192.0 PING Statistics----
    2 packets transmitted, 20 packets received, -900% packet loss
    round-trip (ms)  min/avg/max = 44/227/406
    %
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:38:34 PDT