[10474] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Infosec.19990305.macof.a

daemon@ATHENA.MIT.EDU (Emil Isberg)
Fri May 7 13:46:37 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=iso-8859-1
Content-Transfer-Encoding: QUOTED-PRINTABLE
Message-Id: <Pine.GSO.4.05.9905062222430.29816-100000@legolas.mdh.se>
Date: 	Thu, 6 May 1999 22:30:07 +0200
Reply-To: Emil Isberg <emil.isberg@mds.mdh.se>
From: Emil Isberg <cel95eig@MDS.MDH.SE>
X-To:         ian.vitek@INFOSEC.SE
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <41256768.002D5C09.00@mailgw.backupcentralen.se>

On 5 May 1999, ian.vitek@INFOSEC.SE wrote:
>Vulnerability Summary
>---------------------
>
>Problem:  Due to limitation with ARP/MAC-tables;
>               switches could start sending packages to all ports,
>               other network devices could hang, crash or reboot
>               if they receive lots of MAC-addresses.
>
>Threat:   Someone could eavesdrop/sniff network connections
>               over a switched network.
>               Denial of service attacks on a local network.
>Solution: There is no today known solution to the problem.

This problem is known.
The problem is known as "Learning mode" and is the state the switch is =
in
when it "learn" how the network is configurated.

What it does is simply to record what port each mac-address is respondi=
ng.

How does the solution look like?
Well. Don't use "learning mode" on the switch. In a secure environment =
you
know most of the needed mac-addresses and the rest you should know anyw=
ay
so you do not need "learning mode".

But is it a limitation? Yes. The switch should notice that a port is
behaving very strange and disable it (before it's MAC-table is flushed)=
.

--
/Emil
"Man kan s=E4ga att jag har ett eget filsystem i min l=E4genhet. /Born=E4=
s"

home help back first fref pref prev next nref lref last post