[164824] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OSPF Vulnerability - Owning the Routing Table

daemon@ATHENA.MIT.EDU (Saku Ytti)
Sun Aug 4 04:17:39 2013

Date: Sun, 4 Aug 2013 11:17:03 +0300
From: Saku Ytti <saku@ytti.fi>
To: nanog@nanog.org
In-Reply-To: <CAAAwwbW6YdRxrN=Oeta895zHHE_HdTmn=CW35v_yf8DMsDKg7Q@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On (2013-08-03 18:38 -0500), Jimmy Hess wrote:

> That's not news to me, but fully expected.
> Do the vendors /really/  have a code fix to  what would seem to be an
> inherent problem;  if you failed to properly secure your OSPF
> implementation (via MD5 authentication)?

It is news to me. It's design flaw in the protocol itself which has gone
unnoticed for two decades and I would have naively fully expected that this
flaw does not exist in standard.

As I've understood issue lies in the fact that 'link state id' and
'advertising router' should always be the same (so it's redundant
information in the LSA, single field should suffice?). But standard does
not enforce this at all.
Victim will omit doing corrective reflood for received bogus LSA if
'advertising router' is something else than 'router-id', even while 'link
state id' == 'router-id'

I suppose vendors implement fix where either
  a) corrective reflood occur if 'link state id' == 'router-id'
  or
  b) LSA is rejected unless 'link state id' == 'advertising router'

How serious or new this is, may be debatable, as only thing it seems
remove, is the need for attacker to inject 0.2pps worth of packets which
will suppress the corrective reflooding.

-- 
  ++ytti


home help back first fref pref prev next nref lref last post