RE: IGMP denial of service vulnerability

From: Nick Roffey (nickat_private)
Date: Fri Jun 14 2002 - 16:49:36 PDT

  • Next message: Marty Schoch: "Re: IGMP denial of service vulnerability"

    Might be that I'm missing something here, but....
    
    In the scenario mentioned, since the IGMP report is still addressed 
    to a group, any attached routers will receive it, which means they'll
    continue to know there's at least one group member on the subnet and
    carry on forwarding multicast traffic.
    
    IGMP doesn't have any effect on what a host recieves or doesn't - 
    as long as there's at least one member of a multicast group on 
    a particular segment sending IGMP reports, an attached router will
    continue to forward multicast traffic, which all hosts will receive.
    
    CGMP, which limits multicast forwarding on switches to the ports that 
    have multicast group members on them, also from my documentation does
    not seem to be affected.  There appears to be no facility for a single 
    host to 'leave' via CGMP or to time out - as I understand it, only an 
    attached router can 'leave' CGMP - done when all IGMP group members have
    left or timed out, which deletes the switch state for all members of the
    
    group.  My documentation might be out of date, but it appears that once 
    a group member is known to CGMP, that switch port will continue to 
    receive multicast traffic until all group members have gone from the 
    network.
    
    The result -  the only situation where a DOS could be possible is when 
    the multicast sender and receiver are on different subnets AND the 
    multicast receiver is the only group member on that subnet. 
    
    Having said all that, unlikely though it is that this will cause any 
    major problems, accepting IGMP packets that are not addressed to a 
    group is pretty poor!
    
    Nick
    
    
    
    
    -----Original Message-----
    From: Arun D. Qamra [mailto:arunat_private]
    Sent: 14 June 2002 23:21
    To: Marty Schoch
    Cc: bugtraqat_private
    Subject: Re: IGMP denial of service vulnerability
    
    
    
    Thats an interesting scenario. We did test the same, and DOS doesnt take
    place, atleast in our test setup. 
    
    In our setup, the router (a Cisco 2514 running IOS ver12.0 in our case)
    does process such a report in the scenario you suggested.
    
    However we agree that the code should be tightened, in all systems.
    
    
    On 14 Jun 2002, Marty Schoch wrote:
    
    > 
    > Solution
    > ---------
    > All IGMP packets that are not multicast ethernet addresses should be 
    > dropped.
    
    Depending on the implementation of router R in linked document, couldn't
    there still be a problem in the following scenario.
    
    Host H1 is a member of two groups 230.0.0.1 and 230.0.0.2
    Host H2 sends a membership report for group 230.0.0.1 to group
    230.0.0.2.
    
    Host H1 will obviously see this report as well.
    Looking briefly at the code it appears host H1 may still consider this
    an acceptable report from another host.  If, and I haven't tested any
    router configurations, router R does not consider this a valid report
    for the group 230.0.0.1 then the same DOS effect may occur.
    
    The RFC says that membership reports should be sent to the group for
    which the report applies.  Why not tighten the code down all the way, to
    check not just that the report is multicast, but that all the addresses
    match.
    
    Marty Schoch
    <mschochat_private>
    



    This archive was generated by hypermail 2b30 : Sat Jun 15 2002 - 09:47:11 PDT