Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Aug 1999 14:06:02 -0600 (MDT)
From:      Joel Maslak <jmaslak@updatesystems.com>
To:        freebsd-security@freebsd.org
Subject:   Switches & Security
Message-ID:  <Pine.LNX.4.10.9908201358560.1547-100000@unix.updatesystems.com>

next in thread | raw e-mail | index | archive | help

To compromize a network consisting of a switched backbone...

Let's say there are two machines, A and B.  Let's say there is a router,
R.

So:

Internet ---- R ----+
                    |
            A -- SWITCH -- B

Let's say B got compromised.

What B has to do is send ARP broadcasts out, claiming that it is actually
R.  Now, it knows R's REAL ethernet address.

If R is busy and doesn't notice this (can be done a lot of ways), A may
change it's ARP table.  If R notices, it may log this problem, or even
stop working.

Thus, to send packets to the Internet, A ends up sending them to B's
ethernet address (B thinks that is the ethernet address of R).  B resends
them (after logging them) to R's real ethernet address.

--- That was method 1. ---

There are MANY ways to invalidate the ARP cache of a switch.  Some
crash the switch.

VLANs do *NOT* always protect you, either!  VLANs, technically, are just
broadcast domain seperations and nothing more.  Some switches prevent any
packet from crossing VLAN boundaries.  A lot of others, though, just
prevent broadcast packets from crossing those boundaries.  Thus, two
machines can communicate through the VLAN boundary if they know each
other's ethernet address.

Sending out forged packets with the source ethernet address of another
VLAN is a sure way to confuse most switches, BTW.


Joel Maslak
UPDATE Systems Inc.




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.10.9908201358560.1547-100000>