[168240] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Proxy ARP detection (was re: best practice for advertising

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Thu Jan 16 00:18:03 2014

In-Reply-To: <52D764CB.3030509@kenweb.org>
From: Jimmy Hess <mysidia@gmail.com>
Date: Wed, 15 Jan 2014 23:17:29 -0600
To: ML <ml@kenweb.org>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Wed, Jan 15, 2014 at 10:49 PM, ML <ml@kenweb.org> wrote:
>
> Shouldn't ARP inspection be a common feature?
>

Dynamic ARP inspection is mostly useful  only when the trusted ports
receive their MAC to IP address
mapping from a trusted DHCP server,  and the trusted mapping is established
using DHCP snooping.

Or else,  you have a manually entered  entries in the  secure ARP database
of  MAC to IP mappings.
Which most operators would be resistant to dealing with,  because of all
the extra work.

-It's not as if the switches know what the valid subnets are and suppress
ARP requests for outside networks.



Therefore, in most cases; ARP inspection won't be used,  except for DHCP
clients.
Arp inspection goes hand-in-hand with increasing resistance against a  Man
in the Middle attack from
a compromised workstation on a LAN,  using ARP hijacking to capture traffic
or distribute malware
to a neighboring workstation.

In most cases, DHCP-based configuration will not be used for routers  (the
very devices that might inadvertently have proxy-arp)....


--
-JH

home help back first fref pref prev next nref lref last post