MEDIA ACCESS CONTROL (MAC) ADDRESS SPOOFING ATTACKS



Similar documents
Packet Sniffing on Layer 2 Switched Local Area Networks

Securing end devices

Overview of Routing between Virtual LANs

What is VLAN Routing?

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

VMware ESX Server Q VLAN Solutions W H I T E P A P E R

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Switching in an Enterprise Network

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

RESILIENT NETWORK DESIGN

Solutions for LAN Protection

Cisco Data Centre: Introducing Cisco Data Center Networking

Tools for Attacking Layer 2 Network Infrastructure

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

Network Security. Ensuring Information Availability. Security

Implementing Cisco IOS Network Security

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Understand VLANs, Wired LANs, and Wireless LANs

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Top-Down Network Design

IINS Implementing Cisco Network Security 3.0 (IINS)

Adding Traffic Sources to a Monitoring Session, page 7 Activating a Traffic Monitoring Session, page 8 Deleting a Traffic Monitoring Session, page 9

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon Paul Coggin Senior Principal Cyber Security

LAYER 2 ATTACKS & MITIGATION TECHNIQUES

Monitoring Traffic. Traffic Monitoring. This chapter includes the following sections:

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

The Trivial Cisco IP Phones Compromise

Security Considerations in IP Telephony Network Configuration

Configuring DHCP Snooping

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Lab - Using IOS CLI with Switch MAC Address Tables

LiveAction Application Note

How To Understand and Configure Your Network for IntraVUE

VLAN Interoperability

CTS2134 Introduction to Networking. Module Network Security

How To Manage Address Management In Ip Networks (Netware)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

White Paper. Using VLAN s in Network Design. Kevin Colo

VXLAN Bridging & Routing

How To Configure Voice Vlan On An Ip Phone

Virtual LANs. or Raj Jain

ASM Educational Center (ASM) Est. 1992

Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009

Configuring Port Security

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

- Virtual LANs (VLANs) and VTP -

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Lab Use Network Inspector to Observe STP Behavior

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

Configuring Redundancy

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Configuring and Monitoring Port Security

STATE OF THE ART OF DATA CENTRE NETWORK TECHNOLOGIES CASE: COMPARISON BETWEEN ETHERNET FABRIC SOLUTIONS

hp ProLiant network adapter teaming

VMDC 3.0 Design Overview

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Architecture Overview

Network Layers. CSC358 - Introduction to Computer Networks

Interconnecting Cisco Networking Devices Part 2

: Interconnecting Cisco Networking Devices Part 2 v1.1

Chapter 3. Enterprise Campus Network Design

All You Wanted to Know About WiFi Rogue Access Points

6/8/2011. Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction

LAN Switching and VLANs

Course Contents CCNP (CISco certified network professional)

Fibre Channel and iscsi Configuration Guide

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

CSE 127: Computer Security. Network Security. Kirill Levchenko

Visio Enabled Solution: One-Click Switched Network Vision

Storage Cloud Infrastructures

Threats to be considered (1) ERSTE GROUP

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

VMware Virtual Networking Concepts I N F O R M A T I O N G U I D E

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Use MAC-Forced Forwarding with DHCP Snooping to Create Enhanced Private VLANs

Tim Bovles WILEY. Wiley Publishing, Inc.

Implementation of Virtual Local Area Network using network simulator

Wireless Security: Secure and Public Networks Kory Kirk

CCT vs. CCENT Skill Set Comparison

Course. Contact us at: Information 1/8. Introducing Cisco Data Center Networking No. Days: 4. Course Code

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

CCNA Security v1.0 Scope and Sequence

Recommended IP Telephony Architecture

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Configuring the Transparent or Routed Firewall

Sniffing in a Switched Network

Transcription:

MEDIA ACCESS CONTROL (MAC) ADDRESS SPOOFING ATTACKS AGAINST PORT SECURITY Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl Concordia University College of Alberta

Findings Port Security is ineffective at preventing 3 different MAC Spoofing attacks in broadcast domains that span multiple switches. Port Security actually decrease the difficulty for 2 of these attacks.

Overview Background Switch learning process Port security Describe 2 attacks Details, ease and limitations Discuss 3 countermeasures Trunk port security Port security sticky Segregation mitigation strategy (recommended)

Not Covered in Presentation Third attack in a more sophisticated topology (Full MITM with three edge switches) Attack limitation details Reconnaissance Improving attack success

What is Cisco Port Security? Restrictive control applied to edge ports CAM overflow attacks -> MAC address spoofing Source MAC address compared to other learnt addresses

Non-secure Switch Learning Process Source MAC learning 1:N(int-MAC) Aging

Secure Switch Learning Process Secure source MAC learning Non-aging Precedence

Interswitch Connections

MAC Spoofing

Port Security - Violation Condition (1) The maximum number of secure MAC addresses have been added to the address table, and a station whose MAC address is not in the address table attempts to access the [secure] interface - Cisco Mitigates CAM overflow attacks Caveats (in regards to MAC spoofing) Legitimate MAC no mechanism Immediate registration no mechanism

Port Security - Violation Condition (2) An address learned or configured on one secure interface is seen on another secure interface in the same VLAN - Cisco Mitigates MAC Spoofing Applies only when both interfaces are secure

Port Security Best Practices Enterprise Environment For a dynamic environment, such as an access edge, where a port may have port security enabled with the maximum number [secure] MAC addresses set to one, enable only one [secure] MAC address to be dynamically learnt ay any one time Cisco

Assumptions (1) Attacker hasn t registered MAC; Or can unplug cable (clear secure MAC entry) Sticky more later (2) No port security on interconnecting interfaces Against best practices More later We assume full network knowledge Covered in limitations section

Attack #1 Impersonation (initial) Port Security enabled on edge ports A listens for an ARP-Request V1 -> V2 V2 replies to V1 E1 MAC Address Table (initial): VLAN MAC Addr Type Ports Secure 1 V1 DYNAMIC Fa0/1 Yes 1 V2 DYNAMIC Gi0/1 No

Attack #1 (resulting) A replays V2 exect ARP-Reply to update MAC address table No violation is thrown because initial V2 entry was non-secure and secure entries take precedence E1 MAC Address Table (resulting): VLAN MAC Addr Type Ports Secure 1 V1 DYNAMIC Fa0/1 Yes 1 V2 DYNAMIC Fa0/2 Yes All frames V1 -> A A cannot -> V2

Attack #1 (ease no port security) Race condition introduced: If A replays V2 ARP-Reply, then E1 MAC Address Table will show V2 on Fa0/2 But If V2 tries to communicate with any node on E1, then V2 will switch back to Gi0/1 on E1 MAC table updates on last observed basis Port security locks in the MAC

Attack #1 (limitations) A cannot impersonate directly connected node - violation A cannot impersonate 2 indirectly connected nodes Can impersonate ½ network nodes and ¼ of total communication streams A V1 V2 Result E1 E1 E1 Port security violation E1 E1 E2 Impersonate V2 (V1 perspective) E1 E2 E1 Impersonate V1 (V2 perspective) E1 E2 E2 No port security violation

Attack #2 Full MITM Additional switch access A replays ARP-Reply out Fa0/2 on E1 to poison E1 (same as Attack #1) A then replays ARP- Request out Fa0/2 on E2 to poison E2 Removes limitation of spoofing directly connected nodes (attack victims doubled)

Attack #2 (cont.) May be detected because ARP-Reply is unsolicited (could be blocked) Attack is more difficult without port security because race conditions exit on both sides ½ of communication streams (no direct to direct)

Defences and Countermeasures (1) (1) Interconnecting Switch Port Security Would span secure entries across broadcast domain Etherchannel is not supported STP is not interoperable Topology change different ports Node relocation problems No deregistration mechanism (distribution lock) Increased risk to infrastructure

Defences and Countermeasures (2) (2) Port Security Sticky More difficult to spoof if address already registered Node relocation problems Deliver to wrong port Manual change process control Undermines dynamic benefit of switch learning process

Defences and Countermeasures (3) (3) Segregate broadcast domains based on trust and role Ideal to de-span all broadcast domains Prevents attacks But logical grouping is sometimes required Flexibility Cost Performance

Defences and Countermeasures (3) Segregate trusted from untrusted Then they can t attack each other Nodes Trusted Untrusted Servers Clients Mobile/Temp Clients

Defences and Countermeasures (3) Segregate untrusted nodes from untrusted nodes They are the most likely to attack Segregate trusted based on role (client or server) Trusted clients can still span Trusted servers can either span or not Implement sticky when they span