RE: Exploit code for IP Smart Spoofing

From: Stephen Gill (gillsrat_private)
Date: Thu Nov 14 2002 - 07:09:31 PST

  • Next message: Leif Sawyer: "RE: i386 Linux kernel DoS"

    Laurent,
    Thanks for your note.  In reality IP Smartspoofing is no different than
    ARP cache poisoning so I'm not entirely sure why a new name was
    "invented".  In this particular case one is able to prevent the
    following:
     - key ports and corresponding MAC entries are hardcoded and secured (ie
    gateways).  If there is a MAC violation, this is logged and the port is
    shut down.  9 times out of 10 if someone is performing ARP spoofing they
    will go for a device that is best connected so consider this a fly trap.
     - host ports are protected by only allowing one MAC address on a port
    at any given time with a lag of 5 minutes for timeout.  Yes a station
    can change its hardcoded MAC.  This will allow them to see at most the
    traffic of one other host on the switch.  Not perfect, but the odds are
    greatly reduced.
    
    
    A couple of ways that come to mind for having complete protection are:
     - have a method of detecting duplicate MAC addresses on a switch
     - enable "sticky" ARP.  This will keep end stations from being able to
    change their MAC address, but at a potentially high administrative
    burden.  I'll make a note of this option in the doc.
    
    Cheers,
    -- steve
    
    -----Original Message-----
    From: Laurent Licour [mailto:llicourat_private] 
    Sent: Thursday, November 14, 2002 3:56 AM
    To: bugtraqat_private
    Cc: 'Stephen Gill'
    Subject: RE: Exploit code for IP Smart Spoofing
    
    Your document is quite usefull, but there is no way to protect against 
    IP smartspoofing with a switch.
    Smartspoofing use ARP cache poisonning of hosts.
    Using a switch, you can only protect against MAC spoofing as describe in
    your document.
    You can also detect and refuse the plug of a new host on your network.
    But
    as it is possible
    to change the MAC address of hosts (at least linux and windows 2000),
    this
    protection is not very strong.
    You just have to replace a host by another.
    
    One way to protect with switchs could be the use of switchs that are
    able to
    create 
    their CAM entry with the PORT, the MAC and the IP. (against PORT and MAC
    only for now)
    I think that only layer 3 switch are able to do such work. I have
    however no
    specific information
    about which switch support this feature.
    Nortel Passeport 8600 is supposed to do this with the IP filter feature
    (something like an ACL
    associated with each PORT)
    
    In any case, this could protect only a LAN. If you put a source IP
    filtering
    rule IP that allows
    an external IP, you have no way to detect a spoofing connexion. Only
    cryptography can help you
    (IPSec...)
    
    
    Regards
    
    Laurent Licour
    llicourat_private
    
    
    
    -----Message d'origine-----
    De : Stephen Gill [mailto:gillsrat_private]
    Envoyé : mercredi 13 novembre 2002 20:33
    À : 'Laurent Licour'; bugtraqat_private
    Objet : RE: Exploit code for IP Smart Spoofing
    
    
    In order to mitigate this on edge switches it may behoove the network
    administrator to review his or her security policy and adhere to
    stricter guidelines.  The following document suggests one method for
    protecting Cisco switches along with additional guidelines for secure
    configuration in a template format.
    
    http://www.qorbit.net/documents/catalyst-secure-template.pdf
    http://www.qorbit.net/documents/catalyst-secure-template.htm
    
    Comments or suggestions welcome.
    -- steve
    
    
    
    *---------------------------------------------------------------*
    * Cet e-mail et toutes les pièces jointes sont destinés aux     *
    * seules personnes auxquelles ils sont spécifiquement adressés  *
    * et n'engagent que le signataire de ces documents et non la    *
    * structure dont il dépend.                                     *
    * Leur existence et leur contenu ont un caractère confidentiel. *
    * Toute utilisation ou diffusion non autorisée est interdite.   *
    * Si vous avez reçu cet  e-mail ou si vous détenez sans en être *
    * le destinataire, nous vous demandons de bien vouloir nous en  *
    * informer immédiatement.                                       *
    * Cette note assure que ce message a été contrôlé et ne         *
    * comprenait aucun virus connu à ce jour, néanmoins tout        *
    * message électronique est susceptible d'altération.            *
    * Nous déclinons toute responsabilité au titre de ce message    *
    * s'il a été altéré, déformé ou falsifié.                        *
    *---------------------------------------------------------------*
     
    



    This archive was generated by hypermail 2b30 : Fri Nov 15 2002 - 14:09:59 PST