[20560] in bugtraq
Re: Cisco HSRP Weakness/DoS
daemon@ATHENA.MIT.EDU (bashis)
Sat May 5 14:06:49 2001
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <200105051612.SAA02199@ns.wcd.se>
Date: Sat, 5 May 2001 18:12:16 +0200
Reply-To: bashis <bash@NS.WCD.SE>
From: bashis <bash@NS.WCD.SE>
X-To: jmayer@loplof.de
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20010504075956.A3291@thot.informatik.uni-kl.de> from "Joerg
Mayer" at May 04, 2001 07:59:56 AM
Hi
> b) what worries me about this method is that it is close to ideal for
> a man in the middle attack (take over default gw, rewrite source
> address to my own address, rewrite anything else in the packet, send
> to the real router).
It's realy old news, this was allready known in '98 when they written
RFC 2281 ( http://www.faqs.org/rfcs/rfc2281.html )
but nobody have talked about it in public,
except Cisco who is saying how good it is, to get a fault tolerant network..
Well, i'm not suprised that there are lots of ppl who dont know this,
so thats why i posted it to bugtraq, to make ppl aware of it..
Regards,
bashis
--
\0x62\0x61\0x73\0x68\0x69\0x73